Full Issue

Cikkek

object(Publication)#686 (6) { ["_data"]=> array(28) { ["id"]=> int(6306) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:16" ["primaryContactId"]=> int(7767) ["sectionId"]=> int(10) ["seq"]=> int(1) ["submissionId"]=> int(6182) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(1096) "Kissné András, Klára: Kettős kockázat. s. a. Online: https://docplayer.hu/104612858-Kettos-kockazat-kissne-andras-klara.html Madsen, Kristina M.: The Gamified Museum: A Critical Literature Review and Discussion of Gamification in Museums. In Thessa Jensen – Ole Ertløv Hansen – Claus Andreas Foss Rosenstand (eds.): Gamescope: The Potential for Gamification in Digital and Analogue Places. Aalborg, Aalborg Universitetsforlag, 2020. Online: https://www.researchgate.net/figure/Relation-between-game-based-learning-gamificationand-edutainment-after-Martens-and_fig1_327860304 Pais, Ella Regina: Y és Z generáció, mint a jövő munkavállalói. s. a. Online: https://www.kormanyhivatal.hu/download/2/18/60000/Y%20%C3%A9s%20Z%20gener%C3%A1ci%C3%B3%20mint%20a%20j%C3%B6v%C5%91%20munkav%C3%A1llal%C3%B3i.pdf Patyi, András (2011): “E pluribus Unum” – A Nemzeti Közszolgálati Egyetem előtt álló kihívások. Magyar Közigazgatás, Új Folyam, 61, no. 3 (2011). 24–31. Steigervald, Krisztián: Generációk harca. Hogyan értsük meg egymást? Budapest, Partvonal Kiadó, 2021." ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(4) "3-12" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.1" ["abstract"]=> array(1) { ["en_US"]=> string(763) "

In recent years, increasingly far-reaching findings and researches on different generations appear, and parallel to  this, the challenges related to the topic keep emerging in almost every area of life. The latter is particularly strong in the field of employment and education, the main reason for which is that the completely different attitudes of the younger generations have catalysed serious changes in both segments. In addition, in recent years, the global technological and IT development have accelerated tremendously, and the generations of the digital age are socialising in a completely different environment than their predecessors. Thus, their vision on the world, their values and their future prospects are also fundamentally different. 

" } ["title"]=> array(1) { ["en_US"]=> string(54) "Generational Challenges in National Security Education" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(23) "Zalai-Göbölös Noémi" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#721 (6) { ["_data"]=> array(15) { ["id"]=> int(7767) ["email"]=> string(30) "zalai.gobolos.noemi@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6306) ["seq"]=> int(1) ["userGroupId"]=> int(167) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-7651-5321" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(16) "Zalai-Göbölös" ["hu_HU"]=> string(16) "Zalai-Göbölös" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Noémi " ["hu_HU"]=> string(6) "Noémi" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(1) { [0]=> string(71) "national security, generational challenges, national security education" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#734 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25449) ["id"]=> int(5124) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6306) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#115 (6) { ["_data"]=> array(29) { ["id"]=> int(6303) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:16" ["primaryContactId"]=> int(7764) ["sectionId"]=> int(10) ["seq"]=> int(2) ["submissionId"]=> int(6179) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(1431) "Academy of Security Intelligence and Risk Studies. Online: https://www.asirs.org Академия Федеральной службы безопасности Российской Федерации. Online: https://fsb.ru Australian National University – Bachelor of International Security Studies – Asia and the Pacific. Online: https://asiapacific.anu.edu.au/students/undergrad/international-security Australian National University – Strategic and Defence Studies Centre. Online: https://sdsc.bellschool.anu.edu.au/about-us European Intelligence Academy. Online: https://www.euintelligenceacademy.eu/ Ebon, Martin: KGB. Death and Rebirth. Westport, Praeger Publisher, 1994. Miles, Frank: Germany Opens School for Intelligence Agencies in Berlin, Once Dubbed ‘Capital of Spies’. Fox News, 12 November 2019. Online: https://www.foxnews.com/world/germany-opens-school-for-intelligence-agencies-in-berlin-once-dubbedcapital-of-spies Suzhou Institute of Cadre Management – Ministry of State Security Organisation – Chinese Intelligence Agencies. Online: https://irp.fas.org/world/china/mss/org_icm.htm Taylor, Brendan: The Evolution of National Security Studies. National Security College Occasional Paper, no. 3 (2012). Online: https://nsc.crawford.anu.edu.au/files/uploads/nsc_crawford_anu_edu_au/2017-05/occasional-3-taylor.pdf University of International Relations – 国际关系学院. Online: http://en.uir.cn/" ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "13-24" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.2" ["abstract"]=> array(2) { ["en_US"]=> string(430) "

The author provides an overview of the national security and intelligence studies of some international organisations and some countries. The main focus of the article is on the development of national security and intelligence education in the European Union (EU), North  Atlantic Treaty Organization (NATO) and China, Romania,  Russia, the United State of America (USA), the United  Kingdom, Singapore and Australia. 

" ["hu_HU"]=> string(432) "

The author provides an overview of the national security and intelligence studies of some international  organisations and some countries. The main focus of the article is on the development of national security and intelligence education in the European Union (EU), North  Atlantic Treaty Organization (NATO) and China, Romania,  Russia, the United State of America (USA), the United  Kingdom, Singapore and Australia. 

" } ["subtitle"]=> array(2) { ["en_US"]=> string(16) "A Short Overview" ["hu_HU"]=> string(16) "A Short Overview" } ["title"]=> array(2) { ["en_US"]=> string(42) "The Situation of National Security Studies" ["hu_HU"]=> string(42) "The Situation of National Security Studies" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(13) " Boda József" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#727 (6) { ["_data"]=> array(15) { ["id"]=> int(7764) ["email"]=> string(22) "boda.jozsef@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6303) ["seq"]=> int(2) ["userGroupId"]=> int(167) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-4010-896X" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Boda" ["hu_HU"]=> string(5) " Boda" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "József" ["hu_HU"]=> string(7) "József" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(9) "education" [1]=> string(12) "intelligence" [2]=> string(27) "international organisations" [3]=> string(25) "national security studies" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#750 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25453) ["id"]=> int(5125) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6303) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#188 (6) { ["_data"]=> array(29) { ["id"]=> int(6577) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:15" ["primaryContactId"]=> int(8110) ["sectionId"]=> int(10) ["seq"]=> int(3) ["submissionId"]=> int(6453) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(2694) "Avetisyan, Aramayis: Police as Public Servants: A New Armenian Model? EVN Report, 02 July 2020. Casey, John: Implementing Community Policing in Different Countries and Cultures. Pakistan Journal of Criminology, 2, no. 4 (2010). 55–70. Coquilhat, Jenny: Community Policing: An International Literature Review. Evaluation Team, Organisational Assurance, New Zealand Police, 2008. Elliott, Raffi: Former Government Supporters Continue Civil Disobedience in Bid to Dethrone Pashinyan: Analysis. Armenian Mirror Spectator, 10 May 2022. Fielding, Nigel G.: Concepts and Theory in Community Policing. The Howard Journal of Crime and Justice, 44, no. 5 (2005). 460–472. Online: https://doi.org/10.1111/j.1468-2311.2005.00391.x Fluri, Philipp: Arménie – Construire la transparence et la responsabilité dans le secteur de la défense et de la sécurité. In Bénédicte Borel (ed.): De Gorbatchev à Zélénsky: Quel avenir pour les valeurs démocratiques? Paris, L’Harmattan, 2022. Goldstein, Herman: Improving Policing: A Problem-Oriented Approach. Crime and Delinquency, 25, no. 2 (1979). 236– 258. Grigoryan, Armen: Armenian Government Takes up Fight Against Corruption and Organized Crime. Jamestown Eurasia Daily Monitor, 15, no. 97 (2018). Grigoryan, Armen: One Year After Armenia’s ‘Velvet Revolution’: The Plans and Challenges Ahead. Jamestown Eurasia Daily Monitor, 16, no. 60 (2019). Groenewald, Hesta – Gordon Peake: Police Reform Through Community-Based Policing: Philosophy and Guidelines for Implementation. New York, International Peace Academy, 2004. Mackenzie, Simon – Alistair Henry: Community Policing: A Review of the Evidence. Scottish Government Social Research, 2009. Malakyan, Petros G.: Leadership Models in Armenia: Historical and Contemporary Perspectives. SAGE Open, April–June 2013. 1–11. Online: https://doi.org/10.1177/2158244013494220 OSCE: Guidebook on Democratic Policing. 2008. Online: https://www.osce.org/spmu/23804 Sassounian, Harut: Pashinyan is Losing his Prized Trump Card of Democratic Rule. Gagrule.net, 17 January 2022. Socor, Vladimir: The South Caucasus: New Realities After the Armenia–Azerbaijan War (Part Three). Jamestown Eurasia Daily Monitor, 17, no. 180 (2020). Socor, Vladimir: Prime Minister Pashinian Stages Own Coup Against Armenia’s Military. Jamestown Eurasia Daily Monitor, 18, no. 51 (2021). Strategy 2020 of the Republic of Armenia on Police Reform. 23 April 2020. Stronski, Paul: The Shifting Geography of the South Caucasus. Carnegie Endowment for International Peace, 23 June 2021. The Armenian Mirror-Spectator: President Armen Sarkissian Resigns. The Armenian Mirror-Spectator, 23 January 2022. " ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "25-43" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.3" ["abstract"]=> array(2) { ["en_US"]=> string(1884) "

Reform, as opposed to revolution, is an iterative process. It is also non-linear. You may not be getting it right the first  time. At least not completely right. The authors of this  article had the privilege and the pleasure of being invited to advise on the police reform process in the Republic of  Armenia from 2014 through 2017 (the introduction of a  form of ‘community policing’ had been announced in 2012 but failed to gain traction in the interim). In close cooperation with the then OSCE Office in Yerevan (OiY) and obviously the Armenian authorities, and at times the EU and U.S. representatives, the authors – after taking inventory of existing policies, laws, directives and regulations, and analysing them in light of internationally recognised good practice – designed and delivered instruction programs for police officers at different levels,  including leadership. In parallel, and as part of a ‘two-pronged’ approach, they contributed to structuring and informing an enabling political (parliamentary) process, including civil society organisations, in close cooperation with the then chairman of the Standing Committee on  Defence, National Security and Internal Affairs of the  National Assembly, Mr Koryun Nahapetyan, though the police force at the time was still kept close to the presidency. The authors feel encouraged by and welcome recent steps taken by the Pashinyan Government to reanimate the police reform process in the RA. It is understood that police reform necessarily is an ongoing process of reflection and implementation on the one hand,  structured by focussed phases of more intense political fact-finding and operational structuring on the other. In this article the authors share their observations from the days of their own involvement with added insights on the later evolution of police reform and practice.  

" ["hu_HU"]=> string(1871) "

Reform, as opposed to revolution, is an iterative process. It is also non-linear. You may not be getting it right the first time. At least not completely right. The authors of this article had the privilege and the pleasure of being invited to advise on the police reform process in the Republic of Armenia from 2014 through 2017 (the introduction of a form of ‘community policing’ had been announced in 2012 but failed to gain traction in the interim). In close cooperation with the then OSCE Office in Yerevan (OiY) and obviously the Armenian authorities, and at times the EU and US representatives, the authors – after taking inventory of existing policies, laws, directives, and regulations, and analysing them in light of internationally recognized good practice -- designed and delivered instruction programs for police officers at different levels, including leadership. In parallel, and as part of a ‘two-pronged’ approach, they contributed to structuring and informing an enabling political (parliamentary) process, including civil society organisations, in close cooperation with the then chairman of the Standing Committee on Defense, National Security and Internal Affairs of the National Assembly, Mr Koryun Nahapetyan, though the police force at the time was still kept close to the presidency. The authors feel encouraged by and welcome recent steps taken by the Pashinyan government to reanimate the police reform process in the RA. It is understood that police reform necessarily is an ongoing process of reflection and implementation on the one hand, structured by focussed phases of more intense political fact-finding and operational structuring on the other. In this article the authors share their observations from the days of their own involvement with added insights on the later evolution of police reform and practice.

" } ["subtitle"]=> array(2) { ["en_US"]=> string(67) "Lessons Learned from An International Advisory Mission 2014– 2017" ["hu_HU"]=> string(67) "Lessons Learned from An International Advisory Mission 2014– 2017" } ["title"]=> array(2) { ["en_US"]=> string(49) "Armenia – Police Reform as a Cooperative Effort" ["hu_HU"]=> string(49) "Armenia – Police Reform as a Cooperative Effort" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(30) "Fluri Philipp, Parsons Timothy" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(2) { [0]=> object(Author)#722 (6) { ["_data"]=> array(15) { ["id"]=> int(8110) ["email"]=> string(24) "drphilippfluri@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6577) ["seq"]=> int(3) ["userGroupId"]=> int(167) ["country"]=> string(2) "TW" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Fluri" ["hu_HU"]=> string(5) "Fluri" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Philipp" ["hu_HU"]=> string(7) "Philipp" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } [1]=> object(Author)#754 (6) { ["_data"]=> array(15) { ["id"]=> int(8170) ["email"]=> string(19) "noreply@ludovika.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6577) ["seq"]=> int(3) ["userGroupId"]=> int(167) ["country"]=> string(2) "TW" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(7) "Parsons" ["hu_HU"]=> string(7) "Parsons" } ["givenName"]=> array(2) { ["en_US"]=> string(7) "Timothy" ["hu_HU"]=> string(7) "Timothy" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(10) { [0]=> string(7) "Armenia" [1]=> string(13) "police reform" [2]=> string(24) "reform status assessment" [3]=> string(11) "Rule of Law" [4]=> string(28) "OSCE Office in Yerevan (OiY)" [5]=> string(22) "Rights Without Borders" [6]=> string(16) "Police Education" [7]=> string(38) "Police Transparency and Accountability" [8]=> string(31) "Human Rights and Civic Freedoms" [9]=> string(16) "Community Police" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#731 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25476) ["id"]=> int(5126) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6577) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#185 (6) { ["_data"]=> array(28) { ["id"]=> int(6301) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:16" ["primaryContactId"]=> int(7762) ["sectionId"]=> int(10) ["seq"]=> int(4) ["submissionId"]=> int(6177) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(2420) "Atkinson, Rita L., Bem, Daryl J., Renner, Michael, Atkinson, Richard C., Smith, Edwin: Introduction to Psychology, 12th edition, Harcourt Press, 1996, ISBN10: 0155015540 ISBN13: 97801550155489780155436886. Carroll, John B. (ed.): Language, Thought, and Reality. Selected Writings of Benjamin Lee Whorf. Cambridge, Mass., MIT Press, 1956. Damasio, Antonio R. – Daniel Tranel – Hanna C. Damasio: Somatic Markers and the Guidance of Behavior: Theory and Preliminary Testing. In Harvey S. Levin – Howard M. Eisenberg – Arthur L. Benton (eds.): Frontal Lobe Function and Dysfunction. Oxford – New York, Oxford University Press, 1991. 217–229. Damasio, Antonio R.: Descartes’ Error. New York, Avon Books, 1994. ISBN 0-380-72647-5 Forgács, József P.: A társas érintkezés pszichológiája. Budapest, Kairosz, 1996. Greene, Joshua D. – Leigh E. Nystrom – Andrew D. Engell – John M. Darley – Jonathan D. Cohen: The Neural Bases of Cognitive Conflict and Control in Moral Judgment. Neuron, 44, no. 2 (2004). 389–400. Online: https://doi.org/10.1016/j.neuron.2004.09.027 MacLean, Paul D.: Man and His Animal Brains. Modern Medicine, 32 (1964). 95–106. MacLean, Paul D.: Alternative Neural Pathways to Violence. In Larry Ng (ed.): Alternatives to Violence. New York, Time-Life Books, 1968. McMillan, Beverly: Illustrated Atlas of the Human Body, Weldon Owen Pty Ltd, Sydney, 2008, ISBN 10:1740896483, ISBN 13:9781740896481. Mérő, László: Észjárások. A racionális gondolkodás korlátai és a mesterséges intelligencia. Budapest, Tericum, 1997. Mérő, László: Észjárások – Remix. A racionális gondolkodás ereje és korlátai. Budapest, Tericum, 2008. Mérő, László: Az érzelmek logikája. Budapest, Tericum, 2010. Osgood, Charles E. – William H. May – Murray S. Miron: Cross-Cultural Universals of Affective Meaning. Urbana, IL, University of Illinois Press, 1975. Panksepp, Jaak: Affective Neuroscience. The Foundations of Human and Animal Emotions. Oxford – New York, Oxford University Press, 1998. Schachter, Stanley – Jerome Singer: Cognitive, Social, and Physiological Determinants of Emotional State. Psychological Review, 69, no. 5 (1962). 379–399. Online: https://doi.org/10.1037/h0046234 Scharle, Péter: A kognitív pszichológia sémafogalma és a többciklusú felsőoktatási képzés szintjei. Magyar Tudomány, 49 (111), no. 7 (2004). 743–753." ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "44-56" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.4" ["abstract"]=> array(2) { ["en_US"]=> string(1173) "

Education is an investment in the future. An investment is only good if it pays off, and education is only effective if the resources used to result in the necessary increase in knowledge and competence. It is easy to make the mistake of investing less energy than necessary in choosing the appropriate training methods, which ultimately fails to have the desired impact. It is especially important in professions where theoretical knowledge must be converted into practice, such as in national security activity. The present study proposes a method to help adult education providers assess the depth of training methods that need to be deployed to achieve a given type of training outcome to avoid wasting money and energy on training. The essence of the idea is that a form of training can only be truly successful if it works through all the physical and psychological processes that are relevant to the actual manifestation of the knowledge, skills and competencies to be acquired. In this paper, I will review which nervous system levels may be involved in information processing and which training methods can be used to involve them in the learning process. 

" ["hu_HU"]=> string(1173) "

Education is an investment in the future. An investment is only good if it pays off, and education is only effective if the resources used to result in the necessary increase in knowledge and competence. It is easy to make the mistake of investing less energy than necessary in choosing the appropriate training methods, which ultimately fails to have the desired impact. It is especially important in professions where theoretical knowledge must be converted into practice, such as in national security activity. The present study proposes a method to help adult education providers assess the depth of training methods that need to be deployed to achieve a given type of training outcome to avoid wasting money and energy on training. The essence of the idea is that a form of training can only be truly successful if it works through all the physical and psychological processes that are relevant to the actual manifestation of the knowledge, skills and competencies to be acquired. In this paper, I will review which nervous system levels may be involved in information processing and which training methods can be used to involve them in the learning process. 

" } ["title"]=> array(1) { ["en_US"]=> string(63) "“From Top to Toe”: Choosing the Appropriate Training Method" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(15) "Horváth Ferenc" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#758 (6) { ["_data"]=> array(15) { ["id"]=> int(7762) ["email"]=> string(20) "fhorvath25@gmail.com" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6301) ["seq"]=> int(4) ["userGroupId"]=> int(167) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(29) "a:1:{s:5:"hu_HU";s:4:"NBSZ";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Horváth" ["hu_HU"]=> string(8) "Horváth" } ["givenName"]=> array(2) { ["en_US"]=> string(6) "Ferenc" ["hu_HU"]=> string(6) "Ferenc" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(4) { [0]=> string(20) "training methodology" [1]=> string(22) "competence development" [2]=> string(20) "situational learning" [3]=> string(8) "learning" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#760 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25477) ["id"]=> int(5127) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6301) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#119 (6) { ["_data"]=> array(28) { ["id"]=> int(6311) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:16" ["primaryContactId"]=> int(7772) ["sectionId"]=> int(10) ["seq"]=> int(5) ["submissionId"]=> int(6187) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(2702) "Béres, János (ed.): Külföldi nemzetbiztonsági szolgálatok. Budapest, Zrínyi Kiadó, 2018. Boda, József: A Nemzetbiztonsági Képzés Helyzete Magyarországon. Belügyi Szemle, 66, no. 2 (2018). 5–21. Online: https://doi.org/10.38146/BSZ.2018.2.1 Boda, József: Az állambiztonsági és nemzetbiztonsági képzés története. In Orsolya Ilona Jámbor – Máté Gábor Lénárt – Gábor G. Tarján (eds.): A rendőrakadémiától az egyetemig: Rendészettörténeti tanulmányok. Budapest, Rendőrség Tudományos Tanácsa, 2019. Campbell, Stephen H.: A Survey of the U.S. Market for Intelligence Education. International Journal of Intelligence and CounterIntelligence, 24, no. 2 (2011). 307–337. Online: https://doi.org/10.1080/08850607.2011.548207 Dobák, Imre: Polgári nemzetbiztonsági képzések a hazai felsőoktatásban. Nemzetbiztonsági Szemle, 5, no. 4 (2017). 37–54. Dobák, Imre: A nemzetbiztonsági felsőoktatás aktuális kérdései. Hadtudományi Szemle, 11, no. 1 (2018). 157–172. Dobák, Imre: A nemzetbiztonság felsőoktatási képzéseinek külföldi modelljei. In Gyula Gaál – Zoltán Hautzinger (eds.): A hadtudománytól a rendészettudományig – Társadalmi kihívások a nemzeti összetartozás évében. Pécs, Magyar Hadtudományi Társaság Határőr Szakosztály Pécsi Szakcsoport, 2020. 153–159. Fialka, György – Imre Dobák – József Mezei: Az állambiztonsági felsőoktatás rendszerváltozás előtti kerete és annak lezárása. Nemzetbiztonsági Szemle, 8, no. 3 (2020). 33–43. Online: https://doi.org/10.32561/nsz.2020.3.3 Gogolák, H. Csongor: A romániai titkosszolgálatokról (II.). Népújság, 13 December 2016. Online: https://www.e-nepujsag.ro/articles/romaniai-titkosszolgalatokrol-ii Government Decree No. 222/2019 (IX.25.) on the register of qualifications in the field of science of public governance and the training and graduation requirements of the program. Online: https://net.jogtar.hu/jogszabaly?docid=A1900222.KOR MAB Intézményakkreditációs eljárás 2016/2017. NKE, Akkreditációs jelentés. Online: https://www.uni-nke.hu/document/uni-nke-hu/MAB%20akkredit%C3%A1ci%C3%B3s%20jelent%C3%A9s%202016-2017.pdf National Intelligence University: 2017–2018 Catalog. Online: https://ni-u.edu/wp/wp-content/uploads/2015/01/2017-18_Catalog_v.2.pdf Vida, Csaba: A tudományos képzés rendszere a nemzetbiztonság területén. Nemzetbiztonsági Szemle, 2, Special Issue 1 (2014). 40–57. Warg, Günter: Wo wird man Dienstleister für die Demokratie? – Die Aus- und Fortbildungseinrichtungen für Mitarbeiter der Verfassungsschutzbehörden in Deutschland. Nemzetbiztonsági Szemle, 2, no. 3 (2014). 5–17." ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "57-66" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.5" ["abstract"]=> array(2) { ["en_US"]=> string(461) "

This study examines the place and role of Hungarian national security higher education coordinated by the Institute of National Security of the University of Public  Service. Compared to the models seen on the international stage, the study describes the Hungarian university (UPS)  form of national security training, the peculiarities that have developed as a result of the last ten years, and the framework of higher education in this special field.

" ["hu_HU"]=> string(461) "

This study examines the place and role of Hungarian national security higher education coordinated by the Institute of National Security of the University of Public  Service. Compared to the models seen on the international stage, the study describes the Hungarian university (UPS)  form of national security training, the peculiarities that have developed as a result of the last ten years, and the framework of higher education in this special field.

" } ["title"]=> array(2) { ["en_US"]=> string(70) "10 Years of Hungarian National Security Higher Education (2012–2022)" ["hu_HU"]=> string(70) "10 Years of Hungarian National Security Higher Education (2012–2022)" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(11) "Dobák Imre" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#763 (6) { ["_data"]=> array(15) { ["id"]=> int(7772) ["email"]=> string(21) "dobak.imre@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6311) ["seq"]=> int(5) ["userGroupId"]=> int(167) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-9632-2914" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(6) "Dobák" ["hu_HU"]=> string(6) "Dobák" } ["givenName"]=> array(2) { ["en_US"]=> string(4) "Imre" ["hu_HU"]=> string(4) "Imre" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(3) { [0]=> string(17) "national security" [1]=> string(10) "university" [2]=> string(8) "training" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#756 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25478) ["id"]=> int(5128) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6311) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#113 (6) { ["_data"]=> array(29) { ["id"]=> int(6356) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:15" ["primaryContactId"]=> int(7830) ["sectionId"]=> int(10) ["seq"]=> int(6) ["submissionId"]=> int(6232) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(554) "Act CXXV of 1995 on National Security Services. Farkas, István – József Végh: A lélektatktikai képzés elvei, módszerei és gyakorlati tapasztalatai [Principles, Methods and Experiences of the So-Called Soul-Tactical Training]. Magyar Rendészet, 3, no. 3 (2003). 53–62. Petrina, Stephen: Advanced Teaching Methods for the Technology Classroom. Hershey, IGI Global, 2006. Online: https://doi.org/10.4018/978-1-59904-337-1 Suarez, Gabriel: Force-on-Force Gunfight Training. The Interactive, Reality-Based Solution. Boulder, Paladin Press, 2005. " ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "67-73" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.6" ["abstract"]=> array(2) { ["en_US"]=> string(711) "

The article presents the meaning, sources and development of situational training. It discusses its place and role in civilian national security education and also describes its personal and material conditions, the tools and equipment used. It presents the related challenges and limitations and highlights the connections between experiential learning and situational training. The article points out the importance of knowledge transfer within a group as well as the importance of self-expression. It underlines the significant role of the fact-based planning and preparedness for unforeseen events and outlines a possible way of development of situational training in the form of reactive shooting. 

" ["hu_HU"]=> string(711) "

The article presents the meaning, sources and development of situational training. It discusses its place and role in civilian national security education and also describes its personal and material conditions, the tools and equipment used. It presents the related challenges and limitations and highlights the connections between experiential learning and situational training. The article points out the importance of knowledge transfer within a group as well as the importance of self-expression. It underlines the significant role of the fact-based planning and preparedness for unforeseen events and outlines a possible way of development of situational training in the form of reactive shooting. 

" } ["title"]=> array(1) { ["en_US"]=> string(80) "A Good Practice – Situational Training in Civilian National Security Education" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(21) "Regényi Kund Miklós" } ["prefix"]=> array(1) { ["hu_HU"]=> string(7) "English" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#761 (6) { ["_data"]=> array(15) { ["id"]=> int(7830) ["email"]=> string(23) "regenyi.kund@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6356) ["seq"]=> int(6) ["userGroupId"]=> int(167) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-1833-9523" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(8) "Regényi" ["hu_HU"]=> string(8) "Regényi" } ["givenName"]=> array(2) { ["en_US"]=> string(12) "Kund Miklós" ["hu_HU"]=> string(12) "Kund Miklós" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(9) { [0]=> string(27) "three-dimensional knowledge" [1]=> string(15) "enduring skills" [2]=> string(21) "experiential learning" [3]=> string(20) "communication skills" [4]=> string(16) "stress tolerance" [5]=> string(14) "pain tolerance" [6]=> string(17) "reactive shooting" [7]=> string(70) "prevention and management of emergencies during operational collecting" [8]=> string(21) "situational awareness" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#762 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25479) ["id"]=> int(5129) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6356) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#751 (6) { ["_data"]=> array(28) { ["id"]=> int(6431) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:15" ["primaryContactId"]=> int(7929) ["sectionId"]=> int(10) ["seq"]=> int(7) ["submissionId"]=> int(6307) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(3696) "Angyal, Pál: A magyar büntetőjog kézikönyve 4. Az állami és társadalmi rend hatályosabb védelméről szóló 1921. III. t.-c. [Handbook of Hungarian Criminal Law 4. Act III of 1921 on the More Effective Protection of State and Social Order]. Budapest, Athenaeum Irodalmi és Nyomdai Rt. Kiadása, 1928. Boda, József: A Nemzetbiztonsági Szakszolgálat helye és szerepe a rendvédelemben [The Place and Role of the Special Service for National Security in Law Enforcement]. In Gyula Gaál – Zoltán Hautzinger (eds.): Tanulmányok „A biztonság rendészettudományi dimenziói – változások és hatások” című tudományos konferenciáról [Studies from the Scientific Conference Entitled “Dimensions of Security in Law Enforcement – Changes and Effects”]. Pécs, Magyar Hadtudományi Társaság Határőr Szakosztály Pécsi Szakcsoport, 2012. Farrell, Henry – Abraham L. Newman: Of Privacy and Power. Princeton, Princeton University Press, 2019. Fialka, György – Imre Dobák – József Mezei: Az állambiztonsági felsőoktatás rendszerváltozás előtti kerete és annak lezárása [The Framework of State Security Higher Education before the System Change and Its Closure]. Nemzetbiztonsági Szemle, 8, no. 3 (2020). 33–43. Online: https://doi.org/10.32561/nsz.2020.3.3 Finszter, Géza – József Pajcsics: Az állambiztonsági tevékenység alkotmányos szabályozása [The Constitutional Regulation of State Security Activities]. Magyar Jog, 37, no. 1 (1990). 31–41. Földvári, József: Büntetőjog. Különös rész [Criminal Law. Special Part]. Budapest, Tankönyvkiadó, 1978. Gál, István László (ed.): Nemzetbiztonsági szakági jogi alapismeretek [Basic Knowledge of National Security Law]. Budapest, Nemzeti Közszolgálati Egyetem Közigazgatási Továbbképzési Intézet, 2018. Gál, István László: A magyar állam titkainak büntetőjogi védelme [Protection of Hungarian State Secrets under Criminal Law]. Budapest, Ludovika Egyetemi Kiadó, 2021. Fuchs, Meredith: Judging Secrets: The Role Courts Should Play in Preventing Unnecessary Secrecy. Administrative Law Review, 58, no. 1 (2006). 131–176. Héjja, István: A katonai nemzetbiztonsági képzések helyzete (1990–2012) [The Situation of Military National Security Training (1990–2012)]. Nemzetbiztonsági Szemle, 2, Special Issue 1 (2014). 10–24. Izsa, Jenő: Nemzetbiztonsági alapismeretek. A titkosszolgálatok működése [Basic Knowledge of National Security. The Functioning of Secret Services]. Budapest, ZMNE, 2009. Jagadics, Péter – Sándor Rajos – László Simon – Károly Szabó: A magyar katonai elhárítás története 1918–2018 [The History of Hungarian Military Counterintelligence 1918–2018]. Budapest, Metropolis Media Group Kft., 2018. Johnson, Loch K. (ed.): The Oxford Handbook of National Security Intelligence. Oxford, Oxford University Press, 2010. Online: https://doi.org/10.1093/oxfordhb/9780195375886.001.0001 Lowenthal, Mark M.: Intelligence: From Secrets to Policy. Washington, D.C., CQ Press, 2012. Révész, Béla: Az állambiztonsági szervek politológiai kutatásainak kérdéséhez [The Question of Political Science Research on State Security Agencies]. Acta Universitatis Szegediensis: Acta Juridica et Politica, 66, no. 17 (2004). 1–136. Shpiro, Shlomo: Speak No Evil. Intelligence Ethics in Israel. In Jan Goldman (ed.): Ethics of Spying. Lanham–Toronto–Plymouth, the Scarecrow Press, 2010. Weaver, William G. – Pallitto, Robert M.: State Secrets and Executive Power. Political Science Quarterly, 120, no. 1 (2005). 85–112. Online: https://doi.org/10.1002/j.1538-165X.2005.tb00539.x " ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "74-82" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.7" ["abstract"]=> array(1) { ["en_US"]=> string(472) "

Some level of legal education can be found in almost all Hungarian undergraduate and Master’s degrees. In Hungarian national security education there is a complex system of legal subjects, at the centre of which is the subject of the three-semester national security law. The most important legal subjects in military national security training are basic legal knowledge, national security law I–II–III, security challenges and criminal law, and military law.

" } ["title"]=> array(1) { ["en_US"]=> string(98) "Thoughts on the Purpose and Significance of Legal Education in Military National Security Training" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(21) "Gál István László" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#765 (6) { ["_data"]=> array(15) { ["id"]=> int(7929) ["email"]=> string(28) "gal.istvan.laszlo@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6431) ["seq"]=> int(7) ["userGroupId"]=> int(167) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0002-0258-8587" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(56) "a:1:{s:5:"hu_HU";s:30:"NKE Nemzetbiztonsági Intézet";}" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Gál" ["hu_HU"]=> string(4) "Gál" } ["givenName"]=> array(2) { ["en_US"]=> string(16) "István László" ["hu_HU"]=> string(16) "István László" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(7) { [0]=> string(27) "national security education" [1]=> string(21) "basic legal knowledge" [2]=> string(21) "national security law" [3]=> string(36) "security challenges and criminal law" [4]=> string(12) "military law" [5]=> string(28) "Department of State Security" [6]=> string(30) "Institute of National Security" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#766 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25480) ["id"]=> int(5130) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6431) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#732 (6) { ["_data"]=> array(28) { ["id"]=> int(6434) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:15" ["primaryContactId"]=> int(7932) ["sectionId"]=> int(10) ["seq"]=> int(8) ["submissionId"]=> int(6310) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(1021) "Héjja, István: Az MK Katonai Felderítő Hivatal és a Zrínyi Miklós Nemzetvédelmi Egyetem együttműködése 1960–2008. Felderítő Szemle, 7 (2008). 103–106. Héjja, István: A katonai nemzetbiztonsági képzések helyzete (1990–2012). Nemzetbiztonsági Szemle, 2, Special Issue 1 (2014). 10–24. M. Szabó, Miklós: A Zrínyi Miklós Katonai Akadémia története 1980–1989. Budapest, Zrínyi Média, 2011. Nagy, Gyula: A magyar katonai képzések története 1945–1990. Nemzetbiztonsági Szemle, 2, Special Issue 1 (2014). 58–67. Rácz, Lajos: Az elemző-értékelő munka módszertana. Budapest, MK KFH, 1999. Vida, Csaba: A tudományos képzés rendszere a nemzetbiztonság területén. Nemzetbiztonsági Szemle, 2, Special Issue 1 (2014). 40–57. Vida, Csaba: A nemzetbiztonsági elméletek alapjai. Szakmai Szemle, 20, no. 1 (2022). 5–21. Wheaton, Kristan J. – Michael T. Beerbower: Towards a New Definition of Intelligence. Stanford Law and Policy Review, 17, no. 2 (2006). 319–330. " ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "83-90" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.8" ["abstract"]=> array(2) { ["en_US"]=> string(1183) "

The author presents the education of military intelligence analysis in the last four decades, which he divided into three periods. These periods well illustrate the stages of development of intelligence analysis in Hungary. The result of this development process is the current education of military intelligence analysis, as the three periods are built on each other. Nowadays, the education of intelligence analysis takes place at the Institute of National Security of the National University of Public Service. This education-based program was approved in 2012 and later accredited. This program already presents the intelligence analysis in a complex way, and it is not just about analysing information and making reports, but about the complex problem-solving activities. The development of the current education began in 2009, but it is still going on because it needs to constantly adapt to the current development of theory and practice of intelligence analysis. The study presents the main elements of the education of intelligence analysis, as well as provides a future perspective on the direction in which the theory of intelligence analysis work needs to develop.

" ["hu_HU"]=> string(1183) "

The author presents the education of military intelligence analysis in the last four decades, which he divided into three periods. These periods well illustrate the stages of development of intelligence analysis in Hungary. The result of this development process is the current education of military intelligence analysis, as the three periods are built on each other. Nowadays, the education of intelligence analysis takes place at the Institute of National Security of the National University of Public Service. This education-based program was approved in 2012 and later accredited. This program already presents the intelligence analysis in a complex way, and it is not just about analysing information and making reports, but about the complex problem-solving activities. The development of the current education began in 2009, but it is still going on because it needs to constantly adapt to the current development of theory and practice of intelligence analysis. The study presents the main elements of the education of intelligence analysis, as well as provides a future perspective on the direction in which the theory of intelligence analysis work needs to develop.

" } ["title"]=> array(2) { ["en_US"]=> string(58) "The Education of Military Intelligence Analysis in Hungary" ["hu_HU"]=> string(58) "The Education of Military Intelligence Analysis in Hungary" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(10) "Vida Csaba" } ["locale"]=> string(5) "hu_HU" ["authors"]=> array(1) { [0]=> object(Author)#775 (6) { ["_data"]=> array(15) { ["id"]=> int(7932) ["email"]=> string(21) "vida.csaba@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6434) ["seq"]=> int(8) ["userGroupId"]=> int(167) ["country"]=> string(2) "HU" ["orcid"]=> string(0) "" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["biography"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["familyName"]=> array(2) { ["en_US"]=> string(4) "Vida" ["hu_HU"]=> string(4) "Vida" } ["givenName"]=> array(2) { ["en_US"]=> string(5) "Csaba" ["hu_HU"]=> string(5) "Csaba" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "hu_HU" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(5) { [0]=> string(17) "national security" [1]=> string(12) "intelligence" [2]=> string(21) "intelligence analysis" [3]=> string(9) "education" [4]=> string(31) "theory of intelligence analysis" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#770 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25481) ["id"]=> int(5131) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6434) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF
object(Publication)#768 (6) { ["_data"]=> array(28) { ["id"]=> int(6346) ["accessStatus"]=> int(0) ["datePublished"]=> string(10) "2022-11-11" ["lastModified"]=> string(19) "2022-11-11 15:56:15" ["primaryContactId"]=> int(7818) ["sectionId"]=> int(10) ["seq"]=> int(9) ["submissionId"]=> int(6222) ["status"]=> int(3) ["version"]=> int(1) ["categoryIds"]=> array(0) { } ["citationsRaw"]=> string(742) "1995. évi CXXV. törvény a nemzetbiztonsági szolgálatokról [Act CXXV of 1995 on National Security Services]. Online: https://net.jogtar.hu/jogszabaly?docid=99500125.tv Allen, Grahame – Megan Harding: Terrorism in Great Britain: The Statistics. House of Commons Library, 14 October 2021. Government Decree 1163/2020 on the National Security Strategy of Hungary. Home Office: Operation of police powers under the Terrorism Act 2000 and subsequent legislation: financial year ending March 2021. Table A.10. 10 June 2021. Maras, Marie-Helen: A terrorizmus elmélete és gyakorlata. Budapest, Antall József Tudásközpont, 2016. Nyeste, Péter – Ferenc Szendrei: A bűnügyi hírszerzés kézikönyve. Budapest, Dialóg Campus, 2019. " ["copyrightYear"]=> int(2022) ["issueId"]=> int(484) ["licenseUrl"]=> string(49) "https://creativecommons.org/licenses/by-nc-nd/4.0" ["pages"]=> string(5) "91-99" ["pub-id::doi"]=> string(21) "10.32561/nsz.2022.3.9" ["abstract"]=> array(2) { ["en_US"]=> string(873) "

Globalisation raises the risk of unwanted leaks of information from higher education institutions and the use of the scientific results of one country for hostile purposes by another one. The national interests to be protected have their dynamics so national security has to also be in permanent development. Networking as a part of HUMINT has a growing importance among students and the teaching staff as well. The protective measures need urgent upgrading in order to prevent any possible risk on behalf of state and non-state actors. As the students are the most exposed to different radical ideas, the preventive measures have to be focused on them. It is also important to keep an eye on the laboratories accessible at the higher education institutions where electronic, technical and chemical tools and devices can be illegally elaborated for illicit purposes.

" ["hu_HU"]=> string(873) "

Globalisation raises the risk of unwanted leaks of information from higher education institutions and the use of the scientific results of one country for hostile purposes by another one. The national interests to be protected have their dynamics so national security has to also be in permanent development. Networking as a part of HUMINT has a growing importance among students and the teaching staff as well. The protective measures need urgent upgrading in order to prevent any possible risk on behalf of state and non-state actors. As the students are the most exposed to different radical ideas, the preventive measures have to be focused on them. It is also important to keep an eye on the laboratories accessible at the higher education institutions where electronic, technical and chemical tools and devices can be illegally elaborated for illicit purposes.

" } ["title"]=> array(1) { ["en_US"]=> string(72) "National Security and Higher Education – Challenges, Risks and Threats" } ["copyrightHolder"]=> array(1) { ["hu_HU"]=> string(21) "Bács Zoltán György" } ["locale"]=> string(5) "en_US" ["authors"]=> array(1) { [0]=> object(Author)#764 (6) { ["_data"]=> array(15) { ["id"]=> int(7818) ["email"]=> string(29) "bacs.zoltan.gyorgy@uni-nke.hu" ["includeInBrowse"]=> bool(true) ["publicationId"]=> int(6346) ["seq"]=> int(9) ["userGroupId"]=> int(167) ["country"]=> string(2) "HU" ["orcid"]=> string(37) "https://orcid.org/0000-0003-3454-9539" ["url"]=> string(0) "" ["affiliation"]=> array(2) { ["en_US"]=> string(37) "National University of Public Service" ["hu_HU"]=> string(31) "Nemzeti Közszolgálati Egyetem" } ["biography"]=> array(2) { ["en_US"]=> string(15) "

lecturer

" ["hu_HU"]=> string(18) "

szakoktató

" } ["familyName"]=> array(2) { ["en_US"]=> string(5) "Bács" ["hu_HU"]=> string(5) "Bács" } ["givenName"]=> array(2) { ["en_US"]=> string(15) "Zoltán György" ["hu_HU"]=> string(15) "Zoltán György" } ["preferredPublicName"]=> array(2) { ["en_US"]=> string(0) "" ["hu_HU"]=> string(0) "" } ["submissionLocale"]=> string(5) "en_US" } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } ["keywords"]=> array(1) { ["en_US"]=> array(3) { [0]=> string(10) "networking" [1]=> string(6) "HUMINT" [2]=> string(33) "upgrading the protective measures" } } ["subjects"]=> array(0) { } ["disciplines"]=> array(0) { } ["languages"]=> array(0) { } ["supportingAgencies"]=> array(0) { } ["galleys"]=> array(1) { [0]=> object(ArticleGalley)#777 (7) { ["_submissionFile"]=> NULL ["_data"]=> array(9) { ["submissionFileId"]=> int(25482) ["id"]=> int(5132) ["isApproved"]=> bool(false) ["locale"]=> string(5) "en_US" ["label"]=> string(3) "PDF" ["publicationId"]=> int(6346) ["seq"]=> int(0) ["urlPath"]=> string(0) "" ["urlRemote"]=> string(0) "" } ["_hasLoadableAdapters"]=> bool(true) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) } } } ["_hasLoadableAdapters"]=> bool(false) ["_metadataExtractionAdapters"]=> array(0) { } ["_extractionAdaptersLoaded"]=> bool(false) ["_metadataInjectionAdapters"]=> array(0) { } ["_injectionAdaptersLoaded"]=> bool(false) }
PDF