national security state
Recently Published Documents


TOTAL DOCUMENTS

232
(FIVE YEARS 53)

H-INDEX

11
(FIVE YEARS 1)

Author(s):  
Oleksandr Zaikivskyi ◽  
Oleksandr Onistrat

Keywords: national security system of Ukraine, subjects of the national securitysystem, threats to national security, intellectual property The system of national security of Ukraine is defined as the interactionof the individual, society, public authorities and local governance in the processof ensuring national security, taking into account the relationships between them andtheir environment. It is an open, dynamic, social system, the main purpose of which isto integrate efforts of the individuals, society and the state for the realization of nationalinterests, ensuring the integrity of the social organism and the ability of thestate to defend these interests.It is noted that the issue of intellectual property is an integral part of the nationalsecurity system of Ukraine, as they are present in all objects of the national securitysystem of Ukraine, and their non-compliance or violations pose a threat to these objects,including national interests in the defense sphere of Ukraine.Theoretical aspects of the national security system of Ukraine, components (elements)of this system and their relationship, the main tasks and functions of strategicsubjects of the national security system are considered. The influence of intellectualproperty on the system of threats to national security and defense capabilities ofUkraine is studied. The need to define the system of intellectual property protectionas a component of national security and defense of Ukraine and to take into accountintellectual property issues in the development of national security state policy, aswell as the importance of further research on the role of intellectual property in nationalsecurity and defense of Ukraine are defined.The structural scheme of the national security system of Ukraine is proposed. Itincludes the objects of national security; subjects of national security; threats to nationalsecurity.Insufficient attention is paid to the study of the role of intellectual property in thefield of national security, as well to the identification of threats to state security inthis area. Therefore, there is a growing need for theoretical research that would conceptuallydefine and substantiate the role of intellectual property in the field of nationalsecurity and defense.


Author(s):  
Harry Blain

Abstract How powerful are national security bureaucrats? In the United States, they seem to be more than mere administrators, while remaining subordinate to elected politicians. However, despite a rich literature in American political development on bureaucratic autonomy across a variety of policy areas, national security remains undertheorized. Although the origins and evolution of the national security bureaucracy have received substantial scholarly attention, the individuals within this bureaucracy have not. In this article, I examine a case study of how one of these individuals bluntly ran up against the limits of his power. After the Second World War, J. Edgar Hoover's plans for a “World-Wide Intelligence Service” were swiftly shot down by the Truman administration, which adopted a sharp distinction between domestic and global intelligence instead. I pin this abject defeat on three interrelated factors: the resistance of President Truman, the array of bureaucratic competitors emerging from the Second World War, and deep aversion among key decision makers to the prospect of an “American gestapo.” While tracing this historical narrative, I also challenge accounts of Hoover as a near-omnipotent Washington operator, question the extent to which war empowers national security bureaucrats, and foreground the role of analogies in shaping the national security state.


2021 ◽  
Vol 04 (02) ◽  
pp. 24-28
Author(s):  
Svirko Svitlana Svirko Svitlana

The article considers the issue of state security in the context of the objective attention of public administration. Based on the semantics of the concepts of "state" and "security", elaboration of a set of approaches to the interpretation of these definitions, analysis of options for different authors in favor of certain approaches to the interpretation of the concept of "state security" formed and motivated the author's vision of this term such a state of protection of various vector interests of the state and its simple cluster unit - the citizen - which ensures the effective functioning of all spheres, industries, institutional sectors (including their units), mechanisms in general and the implementation of the functions and powers of the state institution in particular for their further development in a changing environment, external and internal threats. The proposed in some way unification approach allows emphasizing the content of the concept, as a logically related set of relevant objects, in the context of the prevailing philosophical nature of the phenomenon of "security", leaving open the "scope" of the concept for further more detailed detailing of its characteristics in the segment. theoretical foundations of the science of public administration in the field of public security concerning its elemental components. This approach provides a focus on the most general object-subject features of the concept while avoiding minor characteristics. Keywords: state, society, public administration, national security, state security, threats.


2021 ◽  
pp. 196-224
Author(s):  
Peter Drahos

The success of the project of survival governance, which requires states to focus on the repair of ecosystems, depends on the success of China’s experimental cities and whether China can manage to develop core technologies in the face of opposition from the US national security state. The technologies that are central to the construction of the bio-digital energy paradigm are also the ones that matter to US military power. The United States is using regulatory mechanisms such as intellectual property and export controls to block or slow China’s acquisition of core technologies. The United States has already created a technological fork in global technology markets, making it more or less impossible for companies like Google to deal with Chinese companies like Huawei. Less clear is whether multinational capital will support this fork. It may choose to support the new circuits of accumulation that emerge as states embrace survival governance.


2021 ◽  
pp. 1-17
Author(s):  
Linda Weiss

Abstract After almost two decades of dealing with asymmetric threats, America's strategic focus on technological superiority carefully honed during the Cold War, began to fracture, eroding its military and economic advantage. But China's recent emergence as a credible geopolitical rival has reinvigorated US efforts to sustain high-tech leadership as the basis of its military primacy. At the center of these efforts are the defense and defense-related agencies of the national security state (NSS) whose mission is to dominate the new technological frontiers of military power and achieve future competitive advantage. Alongside the quest for breakthroughs in foundational technologies, NSS agencies are seeking to correct long neglected deficiencies in advanced manufacturing, by rebuilding the industrial ecosystem's supply chains depleted after decades of offshoring. With this suite of initiatives, the US is following a course of action more consistent with the exercise of (economic) statecraft than industrial policy. However, unlike its authoritarian rival, the US faces the challenge of having to balance security imperatives with commercial interests and, not least, having to contend with a dysfunctional and maladapted presidency.


Author(s):  
O. Skriabin ◽  
Yu. Chernykh ◽  
O. Chernykh

The article is based on the analysis of the main factors taking place at this time, substantiates the relevance of determining (clarifying) the requirements for professional training of military specialists trained in higher military educational institutions in the field of knowledge "Military Sciences, National Security, State Border Security". The study is based on the fact that at present the general list of requirements for military specialists is defined in the relevant professional standards, standards of higher education and educational programs for their training in each specialty at certain levels of education. These requirements are formulated in terms of competencies and learning outcomes. The purpose of the study is to try to justify the feasibility of implementing the experience of the anti-terrorist operation (ATO) and the Joint Forces (JFO) operation of the Armed Forces of Ukraine in determining the requirements for professional training of officers. It is established that the level of training and the general list of competencies that a graduate of a military educational institution has does not fully meet the needs of the modern army. This is clearly evidenced by the experience of hostilities in eastern Ukraine. Analysis of hostilities has shown that the list of tasks to be solved by the military is constantly expanding. Today, in addition to combat missions, they are increasingly involved in solving problems of a socio-humanitarian nature, which requires the formation of both professional and social components of the potential of the soldier's personality. Along with the increase in the requirements for the general level of professional training of military specialists, new requirements for their social and humanitarian training appear. The following new requirements for training are considered: raising the level of leadership qualities of an officer; formation of his personal values and clear personal goals; the ability to counteract the information and psychological influences of the enemy within the information confrontation; ability to establish communications between military units and the local population in the area of hostilities, etc. The analysis is carried out and the essence of the specified requirements is revealed. To solve the research tasks, a system of general scientific and special methods of theoretical and empirical research was used, namely theoretical and methodological analysis of the problem, systematization and generalization of information concerning the essence and content of certain tasks, monitoring of the existing system of military training. system approach, expert evaluation, analysis and interpretation of the obtained empirical data.


Sign in / Sign up

Export Citation Format

Share Document