scholarly journals Federal Administration

Author(s):  
Julia Fleischer

AbstractThe federal administration is significantly small (around 10 percent of all public employees). This speciality of the German administrative system is based on the division of responsibilities: the central (federal) level drafts and adopts most of the laws and public programmes, and the state level (together with the municipal level) implements them. The administration of the federal level comprises the ministries, subordinated agencies for special and selected operational tasks (e.g. the authorisation of drugs, information security and registration of refugees) in distinct administrative sectors (e.g. foreign service, armed forces and federal police). The capacity for preparing and monitoring government bills and statutory instruments is well developed. Moreover, the instruments and tools of coordination are exemplary compared with other countries, although the recent digital turn has been adopted less advanced than elsewhere.

Author(s):  
Anzhelika Dilai

The main purpose of this article is to investigate the possible gaps in the strategic communications system proposed by the Ministry of Defense of Ukraine, trying to suggest also the ways to reconcile the possible divergences. Methodology. The study uses a comparative analysis to compare the key points of the Strategic Communications Concept of the Ministry of Defense of Ukraine and the Armed Forces of Ukraine as well as the NATO Strategic Communications Concept. Based on the differences revealed by the method of ideal modeling, the accents are proposed that should be considered when making changes to the existing document and developing such normative legal acts. Results/Achievements. In 2017, the Ministry of Defense of Ukraine introduced the system of strategic communications as a response to Russian aggression at the state level. In this regard, a document called the Strategic Communications Concept of the Ministry of Defense of Ukraine and the Armed Forces of Ukraine (hereinafter referred to as the Concept) was signed, which was supposed to contain a technological approach to counteracting information challenges, risks and threats, in particular, in the context of ATO / OOS. However, this study showed that the document contained a number of omissions, in particular, the focus was on the issue of the audience of strategic communications, channels of distribution of key messages in accordance with the existing narrative, the narrative in particular, and the use of the latest technologies by the actors in implementation of strategic communications. Consequently,o we have proposed some emphasis for further improvement of this document, which should reflect strategic nature, and can be used to develop such normative acts in the case of information security.


Author(s):  
Michael S. Danielson

The first empirical task is to identify the characteristics of municipalities which US-based migrants have come together to support financially. Using a nationwide, municipal-level data set compiled by the author, the chapter estimates several multivariate statistical models to compare municipalities that did not benefit from the 3x1 Program for Migrants with those that did, and seeks to explain variation in the number and value of 3x1 projects. The analysis shows that migrants are more likely to contribute where migrant civil society has become more deeply institutionalized at the state level and in places with longer histories as migrant-sending places. Furthermore, the results suggest that political factors are at play, as projects have disproportionately benefited states and municipalities where the PAN had a stronger presence, with fewer occurring elsewhere.


Author(s):  
Nancy Kleniewski

Institutions of higher education must respond to the changing landscape of federal and state expectations. This chapter explores how that landscape has changed over the past two decades and how some institutions are responding. At the federal level, changes have affected financial aid, research funding, and government regulation. Changes at the state level include significant reductions in state support and increases in tuition. These changes are occurring as higher education becomes more of a marketplace than a public service. The chapter offers some strategies for institutions hoping to garner increased support, particularly at the state level.


Author(s):  
Петр Юрьевич Филяк ◽  
Виктория Вячеславовна Пименова ◽  
Александр Григорьевич Остапенко ◽  
Сергей Александрович Ермаков

Настоящая статья посвящена информационной безопасности. Точнее, одной из составляющей понятия информационная безопасность, а если говорить более стандартизованно, то одному из ее аспектов, то есть выражаясь корректно, профессиональным языком (используя профессиональную стандартизованную терминологию) - «Гуманитарным аспектам информационной безопасности» (ГАИБ). Если говорить о ГАИБ, то рассмотрении этого термина необходимо начинать с макро уровня сферы информационной безопасности, то есть на уровне обеспечения информационной безопасности в масштабах государства. Если рассматривать информационную безопасность как состояние защищенности личности, общества и государства от внутренних и внешних информационных угроз, то в качестве целей и задач ГАИБ должны рассматриваться прежде всего защищенность как отдельной личности ( humanitas - гуманитарный ), так и всего социума, который и являет собой в итоге и общество и государство в целом, причем рассматривать ее с разных точек зрения ( аспектов ). Отсюда и происходит обозначенный выше термин - гуманитарные аспекты информационной безопасности (ГАИБ). Таковы исходные императивы при рассмотрении вопросов и проблем, затрагиваемых в рамках настоящей статьи. This article is devoted to information security., the term should be considered from the macro level of the information security sphere, that is, at the level of information security at the state level. If we consider information security as a state of protection of the individual, society and the state from internal and external information threats, then the objectives and objectives of the HAIS should be considered first of all the protection as an individual (humanitas - humanitarian) and the whole society, which is in the end both society and the state as a whole, and consider it from different points of view(aspects). Hence the term mentioned above - the humanitarian aspects of information security (HAIS). These are the initial imperatives in dealing with the issues and issues raised in this article.


2017 ◽  
Vol 49 (2) ◽  
pp. 491-512 ◽  
Author(s):  
Bjørn Høyland ◽  
Sara B. Hobolt ◽  
Simon Hix

What motivates politicians to engage in legislative activities? In multilevel systems politicians may be incentivized by ambitions to advance their careers either at the state or federal level. This article argues that the design of the electoral institutions influences how politicians respond to these incentives. Analyzing a unique dataset of both ‘stated’ and ‘realized’ career ambitions of Members of the European Parliament (MEPs), it finds that those who seek to move from the European to the national (state) level participate less in legislative activities than those who plan to stay at the European (federal) level. For MEPs who aim to move to the state level, attendance and participation in legislative activities is substantively lower among legislators from candidate-centered systems. Importantly, the effect of career ambitions on legislative participation is stronger in candidate-centered systems than in party-centered systems. These findings suggest that the responsiveness associated with candidate-centered systems comes at the expense of legislative activity.


2020 ◽  
pp. 22-28
Author(s):  
Svitlana Boiko

The article is devoted to the outline and research of several topical critical questions related to the study of the role of the Ukrainian youth in the development of civil society in terms of the undeclared Russian-Ukrainian war and global crisis caused by the Covid-19 pandemic, as well as the influence of the civilization borderland factor on the mentality and behavior of borderland residents. The article focuses on the fact that the concurrently multidirectional influences, such as geopolitical, cultural, religious and others, make the borderland a zone of attraction and rejection, as well as the space for large-scale manipulations. The formation of civil society in the borderland area has its own specifics, yet scantily explored in the academic research. Special attention is paid to the increase of the civil society’s significance in various spheres from the promotion of reforms at the state level to the voluntary assistance provided to the Armed Forces of Ukraine during the “Joint Forces Operation”, internally displaced persons, and other segments of the population. To successfully solve the problem of building the Ukrainian civil society, it is necessary to fundamentally comprehend the youth’s participation in the solution of various problems of modern Ukraine. Thus, it is important that young citizens be ready for active cooperation with the state and public organizations. The research emphasizes one of the popular ways to transform young people into active citizens of Ukraine, which consists in their encouragement to participate in the process of building civil society at all levels of the educational process in the educational establishments of our state, Ukrainian weekend schools abroad; involvement in the work of the Young Scholars’ Council and various public organizations. This all caused the need to search for fundamentally new approaches to preparing youth for an active life in the Ukrainian society. The author of the article has elucidated the work experience of the scholars of the Research Institute of Ukrainian Studies regarding the effective forms and methods of increasing young people’s activity through the prism of academic, cultural, and educational work.


Author(s):  
Tuan Anh Nguyen ◽  
Kalybek Koblandin ◽  
Shukran Suleymanova ◽  
Vladimir Volokh

In this day and age, information security is becoming a priority not only in the system of international economic relations but also at the state level. This study aims to study the effect of a ‘digital’ country’s information security on its political stability through quantitative analysis. The study is a mixed research design with a focus on the Russian Federation and the Republic of Kazakhstan. Its methodological basis is represented by the collection and analysis of data on the level and nature of cybersecurity threats (Global Cybersecurity Index, the number of cyber incidents) and on the level of political stability (Political Stability and Absence of Violence/Terrorism indicator of the Worldwide Governance Index). The results of the study show that Russia with a GCI 2020 score of 98.06 and Kazakhstan with a GCI score of 93.15 have relatively low levels of political stability. This is evidenced by their 45.7 and 25.7 percentile ranks on Political Stability and Absence of Violence/Terrorism and a high frequency of offenses using information and communication technologies. Findings suggest that with a high level of commitment to information security, the growth in cyber incidents will not necessarily affect political stability. The obtained findings provide countries an insight into cybersecurity within the national system as well as present a great deal of data on best practices to work through gaps in the national culture of cybersecurity at the state level. The results and methodology of this study can be used by officials to develop information security strategies and tactics, as well as by other researchers for quantitative analysis of the relationship between information security and political stability of different countries and regions.


2019 ◽  
pp. 16-25
Author(s):  
Sergiy Zaporozhets

The article is devoted to the study of the state of information security of Ukraine in the military sphere in the context of hybrid warfare, analysis of the role and place of information security of the state and the military sphere in conditions of hybrid warfare. The list of the main threats to the information security of the state in the military sphere is established. The recommendations for neutralization of hybrid threats and the organization of counteraction in solving the hybrid war against Ukraine are given: conducting a systematic analysis of the use of the means, forms and methods of information fighting in the military sphere, determining the directions of ensuring information security of the state in this sphere; improvement of legislation on coordination of activities of public authorities and bodies of military administration in solving problems of providing information security; improving the types and means of protection of information in the information and telecommunication networks involved in the management of troops and weapons from unauthorized access; improving the forms and methods of counteracting information and psychological operations aimed at weakening the state’s defense capability; training of specialists in the field of information security in the military sphere. Establishment of the system of providing information security of the state in the military sphere in the conditions of hybrid war should be carried out in accordance with the following basic principles: high degree of integration of the information system of the Armed Forces of Ukraine into the information security system of the state; the preventive-defensive nature of the activities of information-fighting structures aimed at counteracting the challenges, dangers and threats to the national security of the state in the military sphere in any form of their manifestation; a clear division of information security responsibilities between the Ministry of Defense of Ukraine and the General Staff of the Armed Forces of Ukrain. It is revealed that one of the main tendencies in the development of the military-political situation in the world is the acceleration of the development of information technologies, increasing the capabilities of states to conduct information-psychological operations and operations in cyberspace, increasing the sensitivity of society to the death of civilians and the loss of military personnel in military configurations.


2019 ◽  
pp. 16-25
Author(s):  
Sergiy Zaporozhets

The article is devoted to the study of the state of information security of Ukraine in the military sphere in the context of hybrid warfare, analysis of the role and place of information security of the state and the military sphere in conditions of hybrid warfare. The list of the main threats to the information security of the state in the military sphere is established. The recommendations for neutralization of hybrid threats and the organization of counteraction in solving the hybrid war against Ukraine are given: conducting a systematic analysis of the use of the means, forms and methods of information fighting in the military sphere, determining the directions of ensuring information security of the state in this sphere; improvement of legislation on coordination of activities of public authorities and bodies of military administration in solving problems of providing information security; improving the types and means of protection of information in the information and telecommunication networks involved in the management of troops and weapons from unauthorized access; improving the forms and methods of counteracting information and psychological operations aimed at weakening the state’s defense capability; training of specialists in the field of information security in the military sphere. Establishment of the system of providing information security of the state in the military sphere in the conditions of hybrid war should be carried out in accordance with the following basic principles: high degree of integration of the information system of the Armed Forces of Ukraine into the information security system of the state; the preventive-defensive nature of the activities of information-fighting structures aimed at counteracting the challenges, dangers and threats to the national security of the state in the military sphere in any form of their manifestation; a clear division of information security responsibilities between the Ministry of Defense of Ukraine and the General Staff of the Armed Forces of Ukrain. It is revealed that one of the main tendencies in the development of the military-political situation in the world is the acceleration of the development of information technologies, increasing the capabilities of states to conduct information-psychological operations and operations in cyberspace, increasing the sensitivity of society to the death of civilians and the loss of military personnel in military configurations.


2021 ◽  
Vol 73 (4) ◽  
pp. 999-1016
Author(s):  
Luiz Henrique Anjos Cardim ◽  
Nádia Puchalski Kozievitch

Automated disease tracking has become an increasingly important tool today. This article describes the prototype of a disease tracking system for the Brazilian territory, preliminarily tested at the state level, in Paraná, and at the municipal level, in Curitiba. This study aims to extract and present relevant information in the health segment from unstructured data, extracted from news portals. The system generates data that allows analysis at different levels of granularity, from small municipalities to the national level. The results of the study shows the viability of the system and allows the authors to identify some patterns in the processed data.


Sign in / Sign up

Export Citation Format

Share Document