{"title":"The Obama Administration and Incident Response: A Report","authors":"Raymond Collier","doi":"10.11610/ISIJ.3408","DOIUrl":"https://doi.org/10.11610/ISIJ.3408","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The EU Civil Protection Upgrading Needs","authors":"D. Procházková","doi":"10.11610/ISIJ.2907","DOIUrl":"https://doi.org/10.11610/ISIJ.2907","url":null,"abstract":"Civil protection has two pillars. The first one supports the humans daily lives and the other ensures the protection of humans at emergency and critical situations. Both consist of systems aiming to provide human security, welfare and critical infrastructure protection. This paper describes the three types of civil protection systems existing in the EU Member States and summarizes the results of original research. The results demonstrate a need for individual public assets’ protection. The paper includes suggestions on domains for future research to fulfil identified requirements.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"24 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120942570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to the Fusion of Quantitative and Qualitative Beliefs","authors":"J. Dezert, F. Smarandache","doi":"10.11610/ISIJ.2001","DOIUrl":"https://doi.org/10.11610/ISIJ.2001","url":null,"abstract":"The efficient management and combination of uncertain and conflict- ing sources of information remain of primal importance for the development of re- liable information fusion systems. Advanced fusion systems must deal both with quantitative and qualitative aspects of beliefs expressed by the differen t sources of information (sensors, expert systems, human reports, etc). This paper intro- duces the theory of plausible and paradoxical reasoning, known as DSmT (Dezert- Smarandache Theory) in literature, developed originally for dealing with impre- cise, uncertain and potentially highly conflicting sources of information pro viding quantitative beliefs on a given set of possible solutions of a given proble m. We also propose in this paper new ideas on a possible extension of DSmT for the combination of uncertain and conflicting qualitative information in order to de al directly with beliefs expressed with linguistic labels instead of numerical value s to be closer to the nature of information expressed in natural languages and available directly from human experts.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development","authors":"Leonid I. Polyakov","doi":"10.11610/isij.2303","DOIUrl":"https://doi.org/10.11610/isij.2303","url":null,"abstract":"The First Deputy Minister of Defence of Ukraine examines the challenges of transformation at three levels—conceptual, planning/programming, and implementation of force development programmes—and the main challenges that require scientific support from research organisations in the Ukrainian defence establishment.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116551958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AN EXPERIMENTAL APPLICATION OF A TRAIT-BASED PERSONALITY MODEL TO THE SIMULATION OF MILITARY DECISION-MAKING","authors":"F. McKenzie, Mikel D. Petty, Jean M. Catanzaro","doi":"10.11610/ISIJ.1204","DOIUrl":"https://doi.org/10.11610/ISIJ.1204","url":null,"abstract":"Due to the uncertainties inherent in military operations and the variations in human personalities, military command and control behavior rarely conforms strictly to doctrine. (Of course, the degree of conformity to doctrine may vary.) In a military simulation with automated commanders, models of command behavior and decisionmaking that follow doctrine precisely and exhibit no variations are therefore unrealistic. Automated commanders that exhibit doctrinal behavior are essential for training, especially at the introductory levels, but are not sufficient for the full range of purposes the simulation may be applied to, such as advanced training and mission rehearsal. Simulation users may seek an automated commander that realistically models the effects of the fog of war and the difficulty of making doctrinal decisions under stressful conditions. Such realism in simulation could better prepare trainees for expected encounters on the battlefield.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cilvil-military Interoperability in Support of NATO Emerging Security Challenges","authors":"J. Shea","doi":"10.11610/isij.2703","DOIUrl":"https://doi.org/10.11610/isij.2703","url":null,"abstract":"A speech by the Deputy Assistant Secretary General, Emerging Security Challenges Division, NATO International Staff, to the Second Workshop on Multinational Cooperation in Civil-Military Interoperability in Sofia, underlining the importance of civil-military interaction and multinational approaches in various frameworks, as well as their important contribution to allied and national capabilities to deal with new threats and challenges.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122749651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interoperability between Agencies and Nations","authors":"Magnus Wallmark","doi":"10.11610/ISIJ.1601","DOIUrl":"https://doi.org/10.11610/ISIJ.1601","url":null,"abstract":"This article describes how secure and robust communications and information solutions, adapted for the National Security and Public Safety (NSPS) segment, can be obtained using commercial technology and existing infrastructure. Application areas include, for instance, emergency dispatch and command centres, agency communication and collaboration, and coast and border surveillance. The communication and information solutions follow the principles of a service-oriented architecture. The proposed approach to communications and information services for National Security and Public Safety facilitates improved operational capabilities and efficiency by providing access to much more advanced and timely information, by supporting efficient management of operations and by enabling cooperation and sharing of resources and information.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization","authors":"T. Semerdjiev","doi":"10.11610/ISIJ.0903","DOIUrl":"https://doi.org/10.11610/ISIJ.0903","url":null,"abstract":"The Hypothesis Billions of years before the new era, while the third planet in the Solar system covered in dense clouds was still in its sleep, in the dark depths of the endless ocean of organoids, the last module of the Genetic Program began. It was part of the perfect algorithm for evolution of life on Earth. Also, it was the beginning of the second of the three qualitative transitions unexplained by the human beings, which mark the separate parts of the Creation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"90 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine","authors":"O. Manko, Y. Mikhieiev","doi":"10.11610/isij.4107","DOIUrl":"https://doi.org/10.11610/isij.4107","url":null,"abstract":"There is no generally accepted definition of ‘Hybrid Warfare.’ Often, authors use the term depending on the particular context and the issue at stake. This article reviews the variety of views on the definition of the concept of ‘hybrid warfare,’ suggests an up-to-date interpretation of the concept, and identifies key characteristics of conflicts involving this type of warfare. It has been found that an information-psychological element forms the basis of ‘hybrid warfare’ with the aim to influence primarily public consciousness, rather than the armed forces or the State’s infrastructure. Moreover, it has been identified that the indicated threats are of ambiguous nature, and thus it is difficult to single out, detect and identify them in order to organize an appropriate response. The authors note that the concept of ‘hybrid warfare’ has originated in the realm of special forces’ operations in geopolitical terms by integrating the experience of severe confrontations threatening international security, combating terrorism and extremism of state and non-state actors. Along with the features of ‘hybrid warfare,’ the authors elaborate on its components and types, i.e. information warfare, cyber warfare, asymmetric warfare, task force hostilities, terrorist activities, urban guerrilla warfare, signs of humanitarian war, signs of ethnic conflict, trade war, etc. It has been proved that information operations’ planning is a significant component of the interagency approach to the decision-making under conditions of a new type of war – the ‘hybrid’ war.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131577915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Profiling Human Roles in Cybercrime","authors":"Venelin Georgiev","doi":"10.11610/isij.4313","DOIUrl":"https://doi.org/10.11610/isij.4313","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131102040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}