CONTEMPORARY MILITARY CHALLENGES最新文献

筛选
英文 中文
THE SAF SPECIAL OPERATIONS UNIT RESPONSE TO MODERN CHALLENGES 安全特种作战部队应对现代挑战
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-09-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.3.5
A. Rode, Kristian Beršnak, Bojan Langerholc
{"title":"THE SAF SPECIAL OPERATIONS UNIT RESPONSE TO MODERN CHALLENGES","authors":"A. Rode, Kristian Beršnak, Bojan Langerholc","doi":"10.33179/bsv.99.svi.11.cmc.13.3.5","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.3.5","url":null,"abstract":"The Special Operations Unit (SOU) provides special operations capabilities for the Slovenian Armed Forces (SAF) and the implementation of special national security objectives for the Republic of Slovenia.Specialized training, the ability to perform covert operations, high accuracy to achieve collateral damage reduction, and great flexibility in facing different sources of threat are but a few of the features that highlight the role and importance of the Special Forces units of the armed forces. Having such characteristics, the unit can be used to fulfil the obligations of the Republic of Slovenia to NATO’s collective defence system and ensure the international security of UN missions when no other SAF units and capabilities can be employed. At the same time, the SOU provides potential capabilities for national defence and specific crisis situations for counterterrorism activities in the Republic of Slovenia. By validating its capabilities in practice, the SOU has shown that the theoretical concepts on which it is based are both good and feasible. It has proved itself to be a highly qualified unit – the elite of the SAF's combat operations units.","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125901135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UVODNIK
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-09-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.3.0
Liliana Brožič
{"title":"UVODNIK","authors":"Liliana Brožič","doi":"10.33179/bsv.99.svi.11.cmc.13.3.0","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.3.0","url":null,"abstract":"Letošnja tretja številka Sodobnih vojaških izzivov je v celoti v angleškem jeziku, s čimer sledimo programu dela uredniškega odbora in standardom kakovostnih znanstveno-strokovnih publikacij, tako v Republiki Sloveniji kot v širšem mednarodnem prostoru. Številko smo posvetili hibridnim grožnjam. Definicijo hibridnih groženj in njihov razvoj pojasnjuje Jan Spišák v svojem članku o hibridnih grožnjah in razvoju novega Natovega splošnega koncepta. V njem pojasni tudi razumevanje hibridnih groženj v zavezništvu in načine odzivanja nanje. Med hibridne grožnje spadajo tudi tako imenovane kibernetske grožnje, ki so vedno bolj domišljene, organizirane in povzročajo vedno večjo škodo državam, podjetjem, infrastrukturi in logistiki, tako v varnostnem kot finančnem smislu.Aktualnim težnjam kibernetskega prostora v obdobju WEB 2.0 sta se posvetila Uroš Svete in Anja Kolak, in sicer s poudarkom na primeru WikiLeaks, v katerem je posebej izražen razvoj druge generacije svetovnega spleta, torej generacije, ki jo ne-posredno oblikujejo uporabniki sami in lahko tako tudi ogrozijo nacionalno varnost posamezne države ali zavezništva.O pomembnosti in organiziranosti kibernetske varnosti v povezavi s kritično infra-strukturo pišeta Denis Čaleta in Gorazd Rolih. Predstavljata urejenost področja v Evropski uniji, Natu in na nacionalni ravni ter opozarjata na nekatere pomanjkljivosti, ki bi jih bilo treba še urediti. Informacijsko varnost in njen pomen za javno upravo predstavlja Maja Bolle na primeru primerjave odprto- in zaprtokodne programske opreme. Seznani nas z njuno zgodovino in načinom delovanja ter prednostmi in slabostmi pri izbiri ene izmed njiju. Seveda pa izbira ene ali druge prinaša številne izzive, o katerih avtorica razpravlja. Avtorji Anže Rode, Kristian Beršnak in Bojan Langerholc predstavljajo Enoto za specialno delovanje Slovenske vojske ter njeno vpetost v širši nacionalni in nad-nacionalni varnostni kontekst, s poudarkom na morebitnem delovanju v kriznih razmerah in protiterorističnih aktivnostih.Kritični pogled na sicer že splošno sprejeto teorijo Karla von Clausewitza sta pripravila Zoltán Jobbágy in László Szegő. Preverjala sta jo na najnovejših spoznanjih na primeru Iraka in Afganistana, bralcem pa predstavljata svoja razmišljanja. Članki slovenskih avtorjev, ki so bili napisani v slovenskem jeziku in pozneje prevedeni v angleški jezik ter tako tudi natisnjeni, so slovenskim bralcem na voljo v elektronski obliki na spletnih straneh Sodobnih vojaških izzivov, v posebnem dodatku na koncu publikacije. Tako poskušamo ob upoštevanju racionalne rabe virov in kakovostnih kazalcev, ki veljajo za periodične znanstveno-strokovne publikacije, doseči čim širši krog bralcev in morebitnih piscev. Vse naše bralce prijazno vabimo k pisanju člankov!","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124839764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CYBERSPACESE CURITY RELEVANCE IN THE TIME OF WEB 2.0 web 2.0时代的网络空间安全相关性
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-09-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.3.2
Uroš Svete, Anja Kolak
{"title":"CYBERSPACESE CURITY RELEVANCE IN THE TIME OF WEB 2.0","authors":"Uroš Svete, Anja Kolak","doi":"10.33179/bsv.99.svi.11.cmc.13.3.2","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.3.2","url":null,"abstract":"Regardless if the information-communication technology has been developed to follow national security interests or not, at the moment, nobody doubts this corre-lation anymore. But the discussion has become much more important in time when practically all critical social infrastructures and processes depend on digital tech-nology. In the paper, importance of the cyberspace has been analysed by security theories and with special focus on the Web 2.0 and WikiLeaks issue. The current way of such interactive communication is namely based on individuals as data and information producers, which could be in (Western) countries perceived as a greater challenge and in some cases even national security threat.","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121539929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HYBRID THREATS AND THE DEVELOPMENT OF THE NEW NATO OVERARCHING CONCEPT 混合威胁和新北约总体概念的发展
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-09-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.3.1
J. Spisak
{"title":"HYBRID THREATS AND THE DEVELOPMENT OF THE NEW NATO OVERARCHING CONCEPT","authors":"J. Spisak","doi":"10.33179/bsv.99.svi.11.cmc.13.3.1","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.3.1","url":null,"abstract":"This article deals with aspects of newly emerging security challenges that military theoreticians and authors of security and defense strategic documents name ‘Hybrid Threats’. They currently present a significant challenge for the Alliance and its interests. Hybrid Threats involve adversaries (including states, rogue states, non-state actors or terrorist organizations) that may employ a combination of actions in an increasingly unconstrained operating environment in order to achieve their aims. Hybrid Threats may consist of a combination of every aspect of warfare and compound the activities of multiple adversaries. Experience from current operations has demonstrated that adversaries can now conduct hostile actions through a broad array of conventional or non-conventional means, methods and procedures, having a favorable outcome against a NATO force that is technologically and militarily superior. Cognition of the scale and complexity of future threats has demanded a development of an overarching Capstone Concept1 for the NATO Military Contribution to Countering Hybrid Threats (MCCHT). This Concept articulates the unique challenges posed by current and future Hybrid Threats and explains why these challenges may require NATO to adapt its strategy, structure and capabilities for the next twenty years.","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126375768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INFORMACIJSkA VARNOST IN ODPRTOkODNA PROGRAMSkA OPREMA
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-09-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.3.4.prev
Maja Bolle
{"title":"INFORMACIJSkA VARNOST IN ODPRTOkODNA PROGRAMSkA OPREMA","authors":"Maja Bolle","doi":"10.33179/bsv.99.svi.11.cmc.13.3.4.prev","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.3.4.prev","url":null,"abstract":"Informacijska varnost je ob vedno večji odvisnosti od računalniških sistemov pomembna tema tudi za javno upravo. Ob vedno večjem številu napadov in drugih posegov v integriteto operacijskih sistemov in drugega programja so se mnoge države odločile za prehod na odprtokodno programsko opremo, ki poleg varčevanja pri nakupu programskih licenc državam omogoča tudi večji nadzor nad to opremo. Nekatere raziskave govorijo v prid varnosti zaprtokodnih sistemov, spet druge pri-poročajo uporabo odprtokodnih. Podatki kažejo, da ima odprtokodna programska oprema na marsikaterem področju boljše varnostne mehanizme kot zaprtokodna, vendar pa ima tudi svoje omejitve. Zaradi teh mora biti prehod držav na odprtokodno programsko opremo dobro premišljen.","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126932360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INFORMATION SECURITY AND OPEN SOURCE SOFTWARE 信息安全和开源软件
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-09-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.3.4
Maja Bolle
{"title":"INFORMATION SECURITY AND OPEN SOURCE SOFTWARE","authors":"Maja Bolle","doi":"10.33179/bsv.99.svi.11.cmc.13.3.4","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.3.4","url":null,"abstract":"In times of increasing dependence on computer systems, information security emerges as an important issue for public administrations. Many governments have made a transition to open source software; the reason being not just financial, but connected to increasing numbers of operating systems security issues. Having more control over the systems is also key. Some researchers speak in favour of proprietary software, others in favour of open source software. Data shows, however, that open source software leads over proprietary software in security mechanisms, although it is not without its limitations. This is the reason that states transitioning to open source software must take precautions in doing so.","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"2386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130511481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ENOTA ZA SPECIALNO DELOVANJE SLOVENSkE VOJSkE – ODGOVOR NA SODOBNE IZZIVE
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-09-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.3.5.prev
Anže Rode, Kristian Beršnak, Leon Langerholc
{"title":"ENOTA ZA SPECIALNO DELOVANJE SLOVENSkE VOJSkE – ODGOVOR NA SODOBNE IZZIVE","authors":"Anže Rode, Kristian Beršnak, Leon Langerholc","doi":"10.33179/bsv.99.svi.11.cmc.13.3.5.prev","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.3.5.prev","url":null,"abstract":"Enota za specialno delovanje (ESD) zagotavlja zmogljivosti specialnega delovanja Slovenske vojske in uresničevanje posebnih nacionalnovarnostnih ciljev Republike Slovenije. Visoka usposobljenost, sposobnost prikritega delovanja, zmožnost velike natančnosti zaradi zmanjševanja stranskih učinkov in visoka prilagodljivost glede na različne vire ogrožanja so samo nekatere značilnosti, ki poudarjajo vlogo in pomen ESD znotraj oboroženih sil. Te značilnosti omogočajo njeno uporabo za izpolnjevanje obveznosti Republike Slovenije do sistema kolektivne obrambe zveze Nato ter zagotavljanje mednarodne varnosti znotraj OZN v mednarodnih operacijah in na misijah, ko drugih enot ter virov Slovenske vojske ni mogoče uporabiti. Hkrati je ESD po-tencialna zmogljivost za obrambo države in delovanje v posebnih kriznih razmerah protiterorističnega delovanja v Republiki Sloveniji. ESD je s potrditvijo svojih zmogljivosti v praksi pokazala, da so predlagani teoretični koncepti in rešitve, na katerih temelji, pravilni in uresničljivi, ESD pa vrhunsko usposobljena enota, ki predstavlja ost enot za bojno delovanje Slovenske vojske.","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122614148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
kIBERNETSkA VARNOST V DRUŽBI IN DELOVANJE kRITIČNE INFRASTRUkTURE – ANALIZA STANJA NA OBRAMBNEM PODROČJU V REPUBLIkI SLOVENIJI
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-09-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.3.3.prev
D. Ćaleta, Gorazd Rolih
{"title":"kIBERNETSkA VARNOST V DRUŽBI IN DELOVANJE kRITIČNE INFRASTRUkTURE – ANALIZA STANJA NA OBRAMBNEM PODROČJU V REPUBLIkI SLOVENIJI","authors":"D. Ćaleta, Gorazd Rolih","doi":"10.33179/bsv.99.svi.11.cmc.13.3.3.prev","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.3.3.prev","url":null,"abstract":"Pojav asimetričnih oblik ogrožanja nacionalne in mednarodne varnosti izhaja iz popolnoma drugih predpostavk in dojemanj temeljnih konceptov zagotavljanja varnosti, ki je še nekaj časa po koncu hladne vojne temeljila na statičnem pristopu do obvladovanja konvencionalno opredeljivih vrst groženj. Spreminjajoče se družbene razmere in napetosti, ki jih je prinašal hiter tehnološki razvoj, so posamezna družbena okolja našle popolnoma nepripravljena na spopadanje z novo globalno varnostno situacijo. Zaradi navedenega bo treba kibernetskim grožnjam nameniti posebno pozornost. Učinkovito obvladovanje teh groženj je pomemben pogoj za nemoteno delovanje informacijsko-komunikacijskih sistemov, ki delujejo v okviru kritične infrastrukture. V Republiki Sloveniji bo treba ukrepe zoperstavljanja kibernetskim grožnjam načrtovati in izvajati s sistemskim pristopom, saj si je zaradi omejenosti finančnih, kadrovskih in tehnoloških potencialov nemogoče zamisliti drugačno pot. Pri tem pa mora imeti obrambno področje, vključno s Slovensko vojsko, pomembno vlogo.","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRANSFORMACIJA – JO HOČEMO, JO ZMOREMO?
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-05-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.2.3
Alojz Šteiner
{"title":"TRANSFORMACIJA – JO HOČEMO, JO ZMOREMO?","authors":"Alojz Šteiner","doi":"10.33179/bsv.99.svi.11.cmc.13.2.3","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.2.3","url":null,"abstract":"Dvajsetletni obstoj slovenske države in delovanje njenega obrambnega sistema ter vojske omogočata opisovanje in vrednotenje dosežkov z uspehi ter neuspehi, pa tudi pogled v prihodnost in izzive za naslednjo dekado. Tako kot za področje družbenih in ekonomskih sprememb ter razvoja v Sloveniji tudi za obrambno-vojaško področje najpogosteje navajamo, da se je obdobje tranzicije končalo. Odkrito izpostavljamo tudi nujnost prihodnjih sprememb, pri čemer se kot poseben dejavnik pojavlja go- spodarska kriza. Ko obravnavamo rezultate in zaključek slovenske obrambno-voja- ške tranzicije, se oziramo po izzivih na prehodu v obdobje transformacije. O nujnosti reform in nadaljevanju transformacije govori tudi novi Natov strateški koncept, zato je razmišljanje o nadaljnjem razvoju slovenskega obrambno-vojaškega sistema usmerjeno v iskanje odgovorov na transformacijske izzive in vprašanje, ali transfor- macijo glede na okoliščine hočemo oziroma jo zmoremo. The twenty-year existence of Slovenia and the work of its defence system and the armed forces enable us to describe and evaluate the achievements with successes and failures, as well as to take a look into the future and at the challenges for the next decade. We most often state that the transition period has ended, both, with regard to social and economic changes and development in Slovenia, as well as to the defence and military sphere. We also clearly emphasise the urgency of future changes, with the economic crisis as a special factor. As we deal with the results and the completion of the Slovenian defence and military transition, we look out for the challenges on the way to the transformation period. The necessity of reform and continued trans- formation are also included in the NATO’s New Strategic Concept; therefore the reflections about further development of the Slovenian defence and military system should be concentrating on the search of responses to transformation challenges the question whether we want transformation, considering the circumstances, and whether we can manage it.","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128555791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAZVOJ SLOVENSKE VOJSKE V DRUGEM DVAJSETLETJU NJENEGA OBSTOJA
CONTEMPORARY MILITARY CHALLENGES Pub Date : 2011-05-15 DOI: 10.33179/bsv.99.svi.11.cmc.13.2.4
Primož Šavc, Ivan Mikuž
{"title":"RAZVOJ SLOVENSKE VOJSKE V DRUGEM DVAJSETLETJU NJENEGA OBSTOJA","authors":"Primož Šavc, Ivan Mikuž","doi":"10.33179/bsv.99.svi.11.cmc.13.2.4","DOIUrl":"https://doi.org/10.33179/bsv.99.svi.11.cmc.13.2.4","url":null,"abstract":"Posodobljeni strateški politični in usmerjevalno-planski dokumenti Republike Slovenije (RS so sorazmerno dobra podlaga za nadaljnji razvoj obrambnega sistema in transformacijo Slovenske vojske (SV. V dvajsetih letih je bilo narejenega veliko, predvsem SV je glede na čas doživela najbolj dramatične spremembe. Uresničevanje novih strategij je treba nadaljevati in preseči trenutno ambivalentnost. Zastavljene cilje je mogoče doseči s krepitvijo konsistentne obrambne politike in načrtovanja, podprtih z ustreznimi viri. Obrambni sistem in SV bosta morala biti vedno bolj pri- lagodljiva za različne naloge in potrebe, zato utegne modularni pristop organizira- nja prispevati k njuni učinkovitosti. Pri definiranju organizacije SV je treba osvojiti celovit pristop. SV bo še naprej organizirana kot enovita vojska, brez delitve na zvrsti. Glede na prostor in potrebe usklajenega načrtovanja sil in delovanja v Natu pa bo upoštevala delitev sil znotraj zavezništva za opravljanje nalog na kopnem, v zračnem prostoru in na morju. Njena organizacija bo temeljila na delitvi na bojne enote, enote bojne podpore, enote za zagotovitev bojnega delovanja in enote za podporo pove- ljevanju. Organizacijska struktura SV bo leta 2025 zagotavljala možnost modular- nega sestavljanja sil za izvajanje nalog ob največji mogoči racionalizaciji povelj- niške strukture. Pri organiziranju sil bodo upoštevana predvsem vojaškostrokovna načela in načela učinkovitosti ob upoštevanju načel gospodarnosti. Obseg Slovenske vojske, pa tudi njeno konfiguracijo in značaj, bodo določali različni, med seboj pre- pleteni dejavniki, kot so demografski, ekonomski, politični in drugi. Celovit pristop pri dodeljevanju nalog znotraj države in celostna uporaba virov pri upravljanju in reševanju varnostnih izzivov pa sta ključnega pomena. Slovenija bo v prihodnosti samozavestnejša v premisleku o svoji organiziranosti, delovanju, dojemanju prilo- žnosti in uresničitvi svojih ambicij. The updated strategic policy as well as steering and planning documents of the Republic of Slovenia represent a relatively good platform for further development of the defence system and the transformation of the Slovenian Armed Forces (SAF). A lot has been achieved in the past twenty years. The Slovenian Armed Forces in parti - cular have faced dramatic changes considering the period in which they were imple- mented. Slovenia should continue to implement new strategies and try to overcome the temporary ambivalence. The planned goals can be achieved by reinforcing consi- stent defence policy and planning, supported by appropriate resources. The Defence System and the SAF in particular will have to be increasingly flexible when it comes to different assignments and needs, and perhaps the modular approach to its orga- nization will contribute to its efficiency. A comprehensive approach will have to be taken when defining SAF structure. The SAF will continue to be organized as a unified force, without branches. However, because of","PeriodicalId":312853,"journal":{"name":"CONTEMPORARY MILITARY CHALLENGES","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121465007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信