{"title":"The Consequences of Public Procurement and Its Associated Irregularities in Ghana","authors":"E. Essel","doi":"10.32565/aarms.2021.1.4","DOIUrl":"https://doi.org/10.32565/aarms.2021.1.4","url":null,"abstract":"Ghana spends a large number of its public resources on the acquisition of goods, works and services with most of them being sourced through Public Procurement. The country in its quest to ensure transparency and efficiency in its public transaction established the Public Procurement Authority (PPA) and clothed it with powers by an Act of Parliament to discharge the given responsibilities. However, since 2003 when the 4th Republican rule was instituted, not a single government regime has exited from office without recourse to irregularities associated with the procurement processes as reported by the Auditor General’s Annual Reports or reports by Civil Society Organisations (CSOs). The goal of this paper is to look at the consequences of these irregularities in the procurement process posed to Ghana’s development. The methodology used in carrying out this study centred mainly on secondary data, and some recommendations have been offered for consideration.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116809844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Military Relevancies of Digitisation, Globalisation and Cyberspace","authors":"Alexandra Lilla Beregi, Tibor Babos","doi":"10.32565/aarms.2021.1.6","DOIUrl":"https://doi.org/10.32565/aarms.2021.1.6","url":null,"abstract":"The goal of this study is to explore security threats and challenges of digitisation. Digitisation as one of the key technological factors has a significant impact on the development of today’s modern world. Beyond general security circumstances, this impact touches upon economic, financial, social, technological, medical, educational, defence and military issues, as well all over the world.The argument of this study is that the modernisation of defence systems is an essential key to successfully responding to new security challenges in our digital explosion era. Therefore, it is a must that government organisations, including defence and military systems fundamentally upgrade their own technical, structural and operational capabilities and accept digitisation as the driving factor of future defence and military development.In light of the above, the study first examines digitisation as a global security challenge and then presents a comparative analysis of the relationship between hybrid warfare and cybersecurity. Finally, before drawing conclusions, it takes stock of the military policy relevance of the cybersecurity challenges relevant to Hungary.Overall, it can be stated that digitisation and digital transformation are present all over the world as a result of globalisation. Developed nations, including Hungary must be connected to digitisation and by digitisation to each other’s various systems and technologies. This system has to be integrated, but independent at the same time, as well as connected but separable in order to be able to be involved in the whole cyberspace and get the benefits of it or get separated from it to defend threats or direct attacks coming from the outside. The Hungarian Defence Forces has a key role in this very important process.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133283401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Possibility of Peace between Hamas and Israel","authors":"Faisal Warikat","doi":"10.32565/aarms.2021.1.3","DOIUrl":"https://doi.org/10.32565/aarms.2021.1.3","url":null,"abstract":"This paper investigates the possibility of establishing peace between Hamas and Israel, based on the politicisation model of armed groups that leads eventually to change the violent character of armed groups. The main question is: Can Israel and Hamas have a long-lasting peace to end the conflict in the Gaza Strip?The main pillars of politicisation are the willingness of warring parties to conclude peace, the existence of a ‘hurting stalemate’, the narrowness of objectives and the ability to guarantee public support. The primary conclusion of this paper is that comprehensive peace is difficult to achieve, but a unique long-term truce ‘Hudna’ is attainable.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125071243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conflict Dynamics between Two Neighbours: Looking Beyond Federalism","authors":"T. Bayu","doi":"10.32565/aarms.2021.1.2","DOIUrl":"https://doi.org/10.32565/aarms.2021.1.2","url":null,"abstract":"Ethiopia is a multicultural and multilingual country. The Oromo and Somali communities are found in the same linguistic community, that is, the Cushitic language. Historically, Somalis and Oromo have a long tradition of co-existence and strong socio-cultural interactions, as well as antagonistic relationships and intermittent conflicts. Traditionally, the major sources of conflict between the two communities were competition over scarce resources, territorial expansion, livestock raids and counter raids, kidnapping for marriage purposes and the revenge tradition. However, this time the conflict took a different nature, form and bigger scale causing devastation never seen in the history of communal conflict in the country. The study has utilised primary and secondary data collection and employed narration and content analysis to realise the objective of the paper. The findings of this study reveal that the causes of the Oromo–Somali conflict are complex and dynamic. This urges the need to carry out a deeper investigation beyond the federal arrangement. Thus, fundamental and triggering factors including the involvement of internal and external forces, the collapse of social norms and prevalence of moral anarchism, socio-economic issues, competing interests among public and military officials, poor leadership and governance system, competing interests over resources, aspects of local cultural institutions in regulating inter-ethnic relationships are identified in fuelling ethnic conflict in the studied area. Since the conflict in the region is much more complex than the dominant narrative of resource scarcity and ethnic politicisation, open democratic dialogue, genuine consultation and negotiation at a different level with various interest groups, stakeholders and community representatives, militant groups operating in the area is of paramount importance to ease the increasing ethnic tension and political crisis in order to build sustainable peace in the region.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125427389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunities of Darknet Operations in Cyber Warfare: Examining its Functions and Presence in the University Environment","authors":"Ferenc Koczka","doi":"10.32565/aarms.2020.1.6","DOIUrl":"https://doi.org/10.32565/aarms.2020.1.6","url":null,"abstract":"Regarding the Internet, individuals expect anonymity and confidentiality, but the authorities expect as much traceability as possible. Individuals are provided with encryption procedures used in internet communication, supported by more and more efficient devices and applications. For law enforcement, the publicity of these procedures could be a serious problem. However, in addition to a well-functioning technical background, conscious use of tools is required to maintain anonymity. In this article I present the necessary techniques to achieve this goal, their operational principles, scopes and points that may enable the technology to be compromised. In the second part of this article, the partial results of my research will be presented, which measures the presence and activity of the darknet; it can provide a basis for carrying out similar investigations and can help develop the protection process.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115814007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Governmental Regulation of Cybersecurity in the EU and Hungary after 2000","authors":"Tamás Szádeczky","doi":"10.32565/aarms.2020.1.7","DOIUrl":"https://doi.org/10.32565/aarms.2020.1.7","url":null,"abstract":"The term information security evolved to cybersecurity nowadays, which emphasises the interdependence of information assets and the importance of cyber-physical systems. Parallel to this, the need for appropriate management of the EU and government strategies and new public administration tasks also appeared. In the European Union, the first measure concerning this issue was the establishment of the European Union Agency for Network and Information Security (ENISA) in 2004, mostly with consultative tasks. The first official cybersecurity strategy in the EU, called the Open, Safe and Secure Cyberspace, was accepted in 2013. Afterwards, ENISA’s role has been strengthened as well as its range of tasks were broadened. Beside the critical infrastructure protection efforts, the Network Information Security (NIS) directive and related legislation were a giant leap towards a common level of cybersecurity in the community. The formation of an EU Cybersecurity Act and filling NIS with more practical guidance is an ongoing process nowadays. Despite being a post-socialist country, Hungary is in the first line of legislation on cybersecurity in the community. Since 2005 there were several government decrees, from 2009 the first act-level rules on the information security of some governmental services. Based on the National Security Strategy, the National Cybersecurity Strategy was formed in 2013. The same year the first information security act applicable to all government, local government, governmental data processing and critical infrastructure service providers has come into force. The alignment of the National Cybersecurity Strategy to NIS directive happens these days. Thus, the regulation of cybersecurity in the EU and in Hungary are heading in the right direction, but the practical implementation today is far away from the strategic objectives. The community is lagging far behind the United States of America and China, just to mention the most important players in the field.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Erasmus and István Magyari on the Justification of War","authors":"Mihály Boda","doi":"10.32565/aarms.2020.1.9","DOIUrl":"https://doi.org/10.32565/aarms.2020.1.9","url":null,"abstract":"Warfare ideologies in Europe basically changed in the Early Modern period. This period is the age of Reformation, of which Desiderius Erasmus was one of the earliest prominent thinkers. Concerning warfare, Erasmus can be understood as a representative of pacifism, but at the same time, it can be argued that he was the first reformer with a specific theory of justification of war. In this respect, Erasmus had several followers from every part of Europe, including Hungary. This Hungarian “apprentice” was István Magyari, who was also the first representative of Hungarian military science. This paper uncovers and examines the common points of Erasmus and Magyari in their theory of justification of war, and Magyari’s divergence from Erasmus’ thinking.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outlining a Set of Theory-based Requirements for the Future Digital Soldier","authors":"Szilveszter Szeleczki","doi":"10.32565/aarms.2020.1.8","DOIUrl":"https://doi.org/10.32565/aarms.2020.1.8","url":null,"abstract":"The military information scene is expanding as technology advances, and it has a fundamental impact on combat activities. It requires a high level of precision, expertise and dedication to set the right standards for military concepts and to establish a proper set of requirements of standards for military concepts, such as in NATO. Digital devices have become an integral part of the activities of the combatant soldier, as the use of modern tools makes combat activities more efficient. In a modern society, modernisation processes extend to the field of defence as well, resulting in intensive development in a growing number of countries. The requirements of the digital soldier are nowadays influenced not only by the warrior but also by those connected to him in the full information space, since a modern soldier is already an element of a network in network-centric military operations.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116137983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voluntary Rescue Service in Hungary: The HUSZÁR Team","authors":"Tamás Hábermayer, P. Horváth","doi":"10.32565/aarms.2020.1.4","DOIUrl":"https://doi.org/10.32565/aarms.2020.1.4","url":null,"abstract":"HUSZÁR, the Hungarian National Organisation for Rescue Services, was founded in 2012 and now has a staff of over 80. HUSZÁR is a special rescue unit that can be deployed in domestic and international disaster management. Based on the United Nations International Search and Rescue Advisory Group (UN INSARAG) classification, HUSZÁR is a medium level urban search and rescue team and its units are equipped with special skills and technical equipment. A special feature of the team is volunteerism combined with professional interventional skills. Its subunits can manage individual interventions, they have participated in several international disaster relief tasks following earthquakes and tsunamis, and they have also played an active role in the preparation of other nations’ rescue teams.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solutions for the Accessibility of Water Sources for Fire Extinguishment","authors":"G. Herczeg, Á. Restás","doi":"10.32565/aarms.2020.1.5","DOIUrl":"https://doi.org/10.32565/aarms.2020.1.5","url":null,"abstract":"Water is an essential fire extinguishing agent. Besides the existence of water for this purpose, the availability of water sources is essential as well. Quick and efficient access to water sources contributes to effective firefighting, thereby avoiding any increase in damage, and it protects human life. With regard to the water sources, the authors examine and analyse the anthropometric data, and the physical properties of the equipment needed for the water. These are also used to determine the conditions of optimal access to the various water sources for firefighting.","PeriodicalId":297100,"journal":{"name":"Academic and Applied Research in Military and Public","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114188032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}