scholarly journals Civilian – military interferences in the management of research for the security and defense field

2019 ◽  
Vol 290 ◽  
pp. 13001
Author(s):  
Dorel Badea ◽  
Gabriel Mănescu ◽  
Dumitru Iancu ◽  
Olga Bucoveţchi ◽  
Anca Dinicu

Changes in the security spectrum, in terms of reconfiguring its military content, subsequently involves another approach to security and defense research. Especially the economic aspects have a quantitative and qualitative impact on the management of the research specific to this field, which has long been taken for granted, causing changes in both the interests and the power of influence held by different categories of stakeholders. This article explores the main directions of change within the aforementioned framework, highlighting the major modalities of involving the civilian segment of capabilities and specialized assets, on a track considered for a long time and to a much greater extent compared to the present imperatives, as an area dedicated exclusively to the military. The thematic target approached by the team of authors includes both national and international plans, individualized or clustered, at the current level but also as trends, the main aim of the scientific approach is that of highlighting good practices in the field of research and development of dual-use products. The conclusion is that the possibilities of the civilian-military academic cooperation can be better grounded in order to achieve better results in terms of the operationalization of the security interest in a comprehensive manner, materialized mainly through research projects.

Author(s):  
Maulana Akbar Shah

From an economic and strategic perspective, the Strait of Malacca is one of the most important shipping lanes in the world. It has always been a strategic maritime route that benefitted kingdoms of Tiriwizara, Majapahit, Malakka, Pagan, Hantawaddy and Konbong Kingdoms of Myanmar. Thanks to the long borderland, China and Burma have always engaged in trade and diplomatic relation. Burma, presently called Myanmar, is an important country from the perspective of geo-politics in the region, but never has the situation of 8 million Muslims in this country been worse. Muslims have been living in Myanmar for a long time. The previous Buddhist rulers of the country and the British administration that followed provided rights of citizenship to them without discrimination. In the light of these welcoming circumstances, Muslims were happy to contribute to the nation by joining the army, the police force, government institutions in areas such as health care, education, trade, business, agriculture as well as in politics and as legislators in the parliament of Myanmar. Nevertheless, their unfortunate history began when the military came into power in 1962. All the rights and responsibilities they had enjoyed over the years became restricted. Discrimination policies were applied in every segment of national institutions, thereby threatening their citizenship rights. The discrimination continued to the extent that their racial status as one of the 145 ethnic groups of Myanmar was removed. Consequently, frequent riots, afflictions, and violence against Muslim minorities became the norm, rendering peaceful coexistence between Muslim and Buddhists difficult. The objective of this paper is to research the historical existence and identification of Muslims in Myanmar. Findings of this work will touch upon a theory of peaceful coexistence between Muslims and Buddhists in Myanmar. Keywords Islam, Muslim, identity, rights, discrimination, peace, coexistence. Abstrak Dari perspektif ekonomi dan strategik, Selat Melaka adalah salah satu laluan perkapalan yang paling penting di dunia. Ia sentiasa menjadi laluan maritim strategik yang memberi manfaat kepada kerajaan-kerajaan kerajaan Tiriwizara, Majapahit, Malakka, Pagan, Hantawaddy dan Kerajaan Konbong Myanmar. Disebabkan sempadan yang panjang, China dan Burma sentiasa terlibat dalam perdagangan dan hubungan diplomatik. Burma, yang kini dipanggil Myanmar, adalah negara penting dari perspektif geo-politik di rantau ini, tetapi 8 juta umat Islam di negara ini tidak pernah mengalami keadaan yang buruk. Umat Islam telah tinggal di Myanmar sejak beberapa ribu tahun yang lalu. Para pemimpin Buddha terdahulu dan juga pentadbiran British memberi hak kewarganegaraan kepada umat Islam tanpa diskriminasi. Keadaan ini menyebabkan umat Islam dengan rela hati  tampil memberi sokongan kepada negara dengan menyertai tentera, pasukan polis, terlibat dalam institusi kerajaan dalam bidang kesihatan, pendidikan, perdagangan, perniagaan, pertanian, politik dan penggubal undang-undang dalam parlimen Myanmar. Walau bagaimanapun, sejarah buruk bermula apabila golongan tentera berkuasa pada tahun 1962. Semua hak keistimewaan yang mereka nikmati selama bertahun-tahun menjadi terhad. Dasar diskriminasi telah digunakan pada setiap segmen institusi nasional dan telah mengancam hak kewarganegaraan mereka. Diskriminasi ini berterusan sehingga status mereka sebagai salah satu daripada 145 kaum Myanmar dihapuskan. Akibatnya, kerusuhan, kesengsaraan, dan kekerasan yang sering berlaku terhadap kaum minoriti Muslim menjadi norma dimana tidak mungkin akan wujud kesefahaman antara Islam dan Buddha. Objektif makalah ini adalah untuk menyelidik kewujudan sejarah dan identifikasi umat Islam di Myanmar. Hasil kajian akan menyentuh teori kedamaian antara umat Islam dan Buddha di Myanmar. Kata Kunci: Islam, Muslim, identiti, Hak, diskriminasi, kemanan, coexisten    


Synlett ◽  
2021 ◽  
Author(s):  
Stefan Schulz ◽  
Dennis Poth ◽  
Pardha Saradhi Peram ◽  
Susann Hötling ◽  
Markus Menke ◽  
...  

AbstractFor a long time, frogs were believed to communicate primarily via the acoustic channel, but during the last decades it became obvious that various lineages also use chemical communication. In this Account we present our research on the identification of volatile lactones from Madagascan Mantellidae and African Hyperoliidae frogs. Both possess male specific glands that can disseminate a range of volatile compounds. Key constituents are macrocyclic lactones. They show high variability in structure and occurrence. We focus here on the synthetic approaches we have used to clarify constitution and configuration of the glandular compounds. Key synthetic methods are ring-closing metathesis and nucleophilic epoxide opening. Often, but not always, the natural compounds occurs in amounts that excludes their investigation by NMR spectroscopy. Instead, we use GC/MS analysis, GC/IR, microreactions, and synthesis to identify such components. Several aspects of our work will be described giving some insight in our scientific approach.1 Introduction2 Macrocylic Lactones from the Fatty Acid Biosynthetic Pathway3 Unsaturated Lactones4 Terpenoid Lactones5 Macrolide Occurrence6 Conclusions


2011 ◽  
Vol 26 (S1) ◽  
pp. s120-s120
Author(s):  
K. Chikhradze ◽  
T. Kereselidze ◽  
T. Zhorzholiani ◽  
D. Oshkhereli ◽  
Z. Utiashvili ◽  
...  

IntroductionDuring 2008 Russian Federation realized major aggression against its direct neighbor, the sovereign republic of Georgia. It was Russia's attempt to crown its long time aggressive politics by force, using military forces. EMS physicians from Tbilisi went to the Gori district on August 8 at first light, 14 brigades were sent. At noontime of August 8, their number was increased up to 40. 6 brigades of disaster medicine experts joined them as well.ResultsDestination site for the beginning was the village Tkviavi, where a military field hospital was assembled and a Military Hospital in Gori. Later 6 brigades were withdrawn towards the village Avnevi. During fighting, wounded victims were evacuated from the battlefield, where initial triage was done. Evacuated victims were brought to the military hospital where the medical triage, emergency medical care and transportation to Gori military hospital or to Tbilisi hospitals was done. A portion of the wounded was directly taken to Gori military hospital and later to different civil hospitals in Tbilisi. Corpses were transported to Gori morgue as well. On August 9, the emergency care brigades and field hospital left Tkviavi and moved to the village Karaleti, then to Gori. On August 12, the occupied territory was totally evacuated by civil and military medical personnel. Although withdrawal of wounded was done on following days. Up to 2232 military and civil persons were assisted by EMS brigades during war period (8–12 August), from them 721 patients were transported among which 120 were severely injured.ConclusionClose collaboration between military and civil EMS gave the system opportunity to work in an organized manner. On the battlefield prepared military rescuers were active taking out wounded victims to the field or front-line hospitals from which civil emergency care brigades transported them to Tbilisi hospitals. Only 3 fatalities occurred during transportation.


Problemos ◽  
2011 ◽  
Vol 79 ◽  
pp. 129-140
Author(s):  
Mindaugas Briedis

Nors fenomenologinė filosofija jau kurį laiką daro įtaką psichoterapeutų darbo metodams, galima teigti, kad pastarieji naudojasi egzistencialistinėmis fenomenologijos traktuotėmis, o štai pirminis, dar Edmundo Husserlio inicijuotas projektas išleidžiamas iš akių. Straipsnyje kaip tik ir užsibrėžiama grįžti prie pastarojo fenomenologijos supratimo, nagrinėjant metodologines psichologijos problemas bei nužymint galimas psichoterapijos perspektyvas. Pirmoje dalyje aptariamos metodologinės ir tipologinės psichoterapijos problemos. Teigiama, kad empirinė psichoterapija neteikia galimybių iš esmės užčiuopti ego struktūros – tikrosios žmogiškojo patyrimo ir atitinkamai psichinių konfliktų erdvės. Sykiu pateikiama fenomenologinė žinojimo traktuotė, psichologinio bet transcendentalinio ego perskyra bei kitos pamatinės, psichoterapijos uždavinius reformuluojančios fenomenologijos temos. Antroje dalyje kaip viena iš galimų fenomenologijos ir psichologijos koreliacijos perspektyvų pateikiama kritinė lyginamoji Sigmundo Freudo sąmonės ir pasąmonės bei „atitinkama“ Husserlio impresinės (produktyvios) ir reproduktyvios sąmonės teorijų analizė, nepamirštant, kad Freudo psichoanalizės jokiu būdu negalima tapatinti su psichoterapija apskritai. Parodoma, kad Husserlio žodynas leidžia naujai konstruktyviai perskaityti Freudo pastabas apie instinktyvaus skatulio teorijos dėsningumus bei represavimo mechanizmą. Trečioje dalyje glaustai suformuluojamos bendros fenomenologinės hermeneutikos rekomendacijos psichoterapeutams. Straipsnyje jokiu būdu neteigiama, kad fenomenologija gali ar turi pakeisti psichoterapiją, tačiau numatoma, kad kaip ir kiekviena teorinė-praktinė disciplina, psichoterapija gali ir turi atrasti fenomenologiją kaip savo atspirties ir plėtotės tašką.Pagrindiniai žodžiai: fenomenologija, psichoterapija, psichologinis ir transcendentalinis ego, instinktyvus skatulys, psichiniai sutrikimai, reproduktyvi sąmonė.E. Husserl’s Phenomenological Project and the Problems Concerning PsychotherapyMindaugas Briedis SummaryThough phenomenological philosophy has influenced practitioners of psychotherapy for a long time, it is also true, that it was precisely existentialist approach to phenomenology that was exploited, while the whole initial project of phenomenology initiated by E. Husserl was almost forgotten. In this article I beckon to re-enter this initial understanding of phenomenology, considering methodological problems of psychology and laying down possible perspectives for psychotherapy.First part of the article deals with the methodological problems of psychotherapy while raising the thesis that empirical psychotherapy in principle cannot grasp the ego-structure, misses the true depth of the human experience, which in turn is the real sphere of mental disorders. Hand in hand goes the phenomenological critique of the scientific approach and other phenomenological issues relevant to the reformulation of the goals of psychotherapy.Second part of the article is dedicated to the one of many possible perspectives stemming from the correlation between phenomenology and psychotherapy, i.e. critical comparison of S. Freud’s consciousness and unconsciousness and “corresponding” theory of impressional (productive) and reproductive consciousness presented by Husserl. It is indicated that Husserl’s approach enables new and constructive reading of Freud’s theory of instinctual drive while keeping in mind, that Freud’s psychoanalysis cannot be identified with psychotherapy in general. However, the final part of the article suggests some methodological advices for mental care practice from the perspective of phenomenological hermeneutics.Keywords: phenomenology, psychotherapy, psychological and transcendental ego, instinctive drive, mental disorders, reproductive consciousness.


2020 ◽  
pp. 128-131
Author(s):  
И.В. Баранова ◽  
М.А. Власенко

В статье рассмотрен гособоронзаказ как драйвер развития предприятий оборонно-промышленного комплекса, требования обеспечения финансовой устойчивости предприятий при исполнении ими гособоронзаказа. Диверсификация оборонно-промышленного комплекса РФ и конверсия производства предприятий, входящих в данный комплекс, ориентированные на производство продукции двойного назначения, а также повышение объемов продаж в среднесрочной перспективе рассматриваются как факторы повышения их финансовой устойчивости. The article considers the defense procurement and acquisition as a driver for the development of enterprises of the military-industrial complex; the requirements for ensuring the financial stability of enterprises when they perform a state contract under the state defense order. The diversification of the Russian military-industrial complex and the conversion of production of enterprises included in this complex, focused on the production of dual-use products, increasing sales in the medium term, are considered as factors for increasing the financial stability of enterprises in the military-industrial complex.


Author(s):  
U. A. Padalinski

The article explores the biographies of Peter Kisel and Cimafiej Hurka, who represented the Viciebsk district at the Diet of 1569 and directly participated in the conclusion of the Union of Lublin. For a long time in historiography, attention was paid only to the most influential figures of this Diet. However, the simple, «unremarkable» representatives of the wide circles of the Grand Duchy of Lithuania’ nobility played their role in the negotiations on the union. Interests and ideas, conscious and values, and finally, the personal experience of these people directly determined their social and political position, and therefore, to one degree or another, the life of the entire state. The aim of research is to reflect the most important forms of social activity of the Grand Duchy of Lithuania’ petty and middle nobility in the second half of the 16th century on the example of two Viciebsk noblemen’s unique destinies. It shows the influence of the military and political events of the 1560s on political activities of Peter Kisel and Cimafiej Hurka. The Livonian War’s experience definitely influenced their position on the conclusion of the union between the Grand Duchy of Lithuania and the Polish Kingdom in 1569. The author concludes that it was the cardinal transformations of the 1560s (state reforms, the establishment of the Commonwealth) that allowed them to actively participate in a public life of the Grand Duchy of Lithuania. It also enabled Kisel and Hurka noble families to take a firm place among the political elite of the Viciebsk district for a long time. It is emphasized that a detailed study of «unremarkable» noblemen’s biographies provides advanced research of the noble estate of the Grand Duchy of Lithuania.


2018 ◽  
Vol 21 (3) ◽  
pp. 497-517
Author(s):  
Marcus Schulzke

AbstractThe controversy surrounding military drones has generated many proposals for restricting or prohibiting existing drones, additional autonomous variants that may be created in the future, and the sale of drones to certain markets. Moreover, there is broad interest in regulating military drones, with proposals coming not only from academics but also from NGOs and policymakers. I argue that these proposals generally fail to consider the dual-use character of drones and that they therefore provide inadequate regulatory guidance. Drones are not confined to the military but rather spread across international and domestic security roles, humanitarian relief efforts, and dozens of civilian applications. Drones, their component technologies, the control infrastructure, and the relevant technical expertise would continue to develop under a military-focused regulatory regime as civilian technologies that have the potential to be militarized. I evaluate the prospects of drone regulation with the help of research on other dual-use technologies, while also showing what the study of drones can contribute to that literature. Drones’ ubiquity in nonmilitary roles presents special regulatory challenges beyond those associated with WMDs and missiles, which indicates that strict regulatory controls or international governance frameworks are unlikely to succeed. With this in mind, I further argue that future research should acknowledge that drone proliferation across military and civilian spheres is unavoidable and shift focus to considering how drone warfare may be moderated by countermeasures and institutional pressures.


Author(s):  
Mark Chong ◽  
Murphy Choy

Fake news, which includes both disinformation and misinformation, has been a challenge for many countries in the last few years. Disinformation has been present in modern history as part of the tool kit of PSYOPS for the military. Likewise, misinformation has been part of human history for a long time. Hoaxes, rumors, and urban legends—all of which can be classified as differing types of misinformation, although they are not commonly addressed as such—have been exploited by adversarial organizations for their own benefit. This study will propose a comprehensive taxonomy to tackle fake news, disinformation, and misinformation and assess the level of threat they pose to society. A comprehensive comparison with existing typologies will also be included.


Author(s):  
G. Giacomello

Computers have always caused psychological uneasiness in the human brain. That a computer is the closet thing to a thinking machine can be discomforting. That average users have little understanding of the complexity and intricacies of how computers and software operate only add to the distress. Networked computers further increased the puzzlement of human beings. The media (suffering from the same poverty of information as the public) have picked up catchwords like cyberwar, netwars, cyberterrorism, and cybercrime. Speaking of Electronic Pearl Harbors and comparing modems to bombs have only contributed to increasing the level of media hysteria and confusion in public opinion. Schwartau (1994) is a classic example. Imagine that poorly informed journalists start telling the general public that ruthless hackers (hired by terrorists) could take over the power grid and shut it down, or cause patients’ death after their medical records have been compromised. The mere suspicion that terrorists could perform such acts would be enough to fueling the fear factor, which regularly happens as a result of this crying wolf. Under these circumstances, cyberterrorism seems like a nightmare come true. As Embar-Seddon (2002) noted, the word terrorism brings together two significant modern fears: the fear of technology and the fear of terrorism. Both technology and terrorism are significant unknowns and unknown threats are generally perceived as more threatening than known threats. To some extent, cyberterrorism does not need to be manifested itself in any significant way because many already believe it to be real. This article will try to dispel some of the myths of cyberterrorism, such as the contention that terrorists could remotely take control of critical infrastructure and thus bring a country to its knees. In fact, today, cybercrime and economic damage caused by hackers are far more real and serious threats than terrorists. Misdeeds are more likely to be committed by disgruntled insiders than skilled outsiders (Randazzo et al., 2004). There is no commonly accepted definition of terrorism, hence cyberterrorism has been variously interpreted. For example, Sofaer et al. (2000) defines it as “intentional use or threat of use, without legally recognized authority, of violence, disruption or interference against cyber systems” (p. 26), resulting in death or injury of people, damage to physical property, civil disorder, or economic harm. The probability, however, that cyberattacks may actually cause victims is extremely low. Furthermore, Sofaer et al. tends to exclude states from committing terrorist acts, which is also debatable. Hughes (2004) observes cyberterrorism as a diverse set of technologies whose purpose is to scare people, but scaring people without getting anything in return is simply useless. Paraphrasing a working definition of terrorism, I would identify cyberterrorism as the use of digital means to threat or undertake acts of organized violence against civilians to achieve political advantages. Perpetrators then could be nonstate groups or sovereign states. Terrorists spreading scary stories to terrify the populace via the Internet would also qualify. Finally, because of cost efficiency, information and communication technologies have blurred the distinction that long existed between the noncombatant and the combatant spheres. The technology on which the military now rely is exactly the same commercial off-the-shelf hardware and software products that civilians have in their homes and offices (Department of the Army, 2003). Military and civilians alike use largely the same computer networks, which were designed for ease of use and not for hardened communications. During the Cold War, dual use technology (civilian hardware and software) was considered “dangerous” because it could help the Soviets close the gap with the West. Paradoxically, dual-use technologies are now “good.” One of the many downsides of such a situation is that if terrorists hit computer networks, in theory, they could hit multiple targets: the economy, law enforcement agencies, emergency services, and (albeit to a lesser extent) even the military. For terrorists this scenario would be a dream come true. Reality, however, is substantially different.


Sign in / Sign up

Export Citation Format

Share Document