The topic of this article is the function of sport in Russia's bilateral relations with the Baltic States. The author attempts to define the goals which the Russian Federation wants to accomplish by using sport as a 'soft power' in relations with the Baltic States. The concept of the article is based on an analysis of three forms of sport politicisation described in the subject literature – as a collector (a carrier of certain values or ideas), a catalyst (a factor initiating processes or events) and a facilitator (the means facilitating communication and understanding). The examples provided as an illustration of the theses relate to the events that took place from 2002 to 2018. The source material consists predominantly of information obtained from online information portals, such as Delfi, RIA, Nowosti and Postimees. The analysis has showed that, in its relations with the Baltic States, Russia tries to use sport to strengthen its position and improve its image internationally. It also attempts to implement a historical policy at sporting events as well as use sporting rivalry as a demonstration of its power.
In: International journal of legal information: IJLI ; the official journal of the International Association of Law Libraries, Band 12, Heft 1-2, S. 88-89
Abstract: This research investigates the three main factors that affect the provision, access, and distribution of Information and Communication Technologies (ICT) among senior and junior faculty members in the Faculty of Education at Ain Shams University. These three factors include laws and regulations organizing the procurement of ICT in public universities in general and in the Faculty in particular, the organizational structure of the Faculty, in which the position of ICT can be determined, and the administrative and decision-making mechanisms that help distribute ICT across the departments of the faculty and the determinants that govern the execution of decisions related to ICT. The study conducted interviews with the dean (provost) of the faculty, the three vice-deans (vice-provosts) and seventeen heads of faculty departments and secretaries. The study revealed that the current elected faculty administration has shown real progress. After the election of the new administration, distribution of technologies was carried out according to new demands that priority should be given to departments that had not gotten equipment in the previous year. Under the elected administration, the storekeeper himself calls the departments and informs their secretaries that the shipment of ICT is ready for distribution according to the needs of the departments.
Chemical warfare had played an important enough role in World War I that there was widespread expectation of its use in World War II. Certainly, Germany's army and its chemists had no qualms about adding poison gas to the Third Reich's arsenal. When war began, however, many of the latest chemical warfare agents were not available in deliverable form. The early successes of conventional-war making, combined with an increasing shortage of raw material, led Germany to deemphasize gas warfare even apart from the fear of Allied retaliation that significantly influenced at least the armed forces.
Record is based on bibliographic data in CIS US Congressional Committee Hearings Index. Reuse except for individual research requires license from Congressional Information Service, Inc. ; Indexed in CIS US Congressional Committee Hearings Index Part VIII ; Mode of access: Internet.
In: Vesci Nacyjanal'naj Akadėmii Navuk Belarusi: Izvestija Nacional'noj Akademii Nauk Belarusi = Proceedings of the National Academy of Sciences of Belarus. Seryja humanitarnych navuk = Serija gumanitarnych nauk = Humanitarian series, Band 67, Heft 2, S. 135-148
The state of the military and political situation around Belarus is characterized by the dynamism of negative processes. Factors showing a high degree of military activity of geopolitical centers of power have been noted. The probability of using military force and other non-military measures against the state obliges us to continuously analyze the technologies of military violence. A regular trend of violence is revealed - the change of war paradigms from classical to non-classical. The face of modern military conflicts encompasses all spheres of social life. The main features of U. S. military policy after the end of the "cold war" are demonstrated. The American classification of the states of the world, according to which the U. S. builds relationships in the interests of geopolitical dominance, is considered. They use the technology of non-classical warfare, in which a significant role is given to information, political, diplomatic, ideological, economic and other resources of subordination of the opposite side to its will. The basic concepts of non-classical warfare and their characteristics are considered. Particular attention is paid to hybrid warfare. In military conflicts the most important place is given to information wars. The modern stage is characterized as conscientious warfare. Signs of the transition from "mental warfare" to "noosphere war" are revealed, when the mind is aimed at the destruction and subordination of the will of entire states for egoistic purposes to the will of the "world leader". Western strategists actively use the technology of "gray zone" balancing between war and peace. It is concluded that the concepts of non-classical warfare play a significant role in modern military violence. Given the increase in military violence in the world, it is important to prioritize the military sphere of national security.
If you consider for a second the radical technological evolution, you will realize that our everyday life has changed dramatically the recent years. Not only at the electronic level of evolution but also at the personal communication. A new era has already started and requires crucial reforms to our everyday life, and to the political, social, military, economical aspects. This sudden change of scene has affected significantly the way we work, we communicate and socialize, the way we inform ourselves about the news, and even when we do the housework. From this revolution, the existing structures cannot respond to these technological evolutions, our thoughts and actions should be adapted to the radical changes and create, for example, new political and economic norms. If someone cannot follow the way technology evolves, he or she will stay in the dark and lose the arsenal at the cyber war. Of course, the military security of a state could not stay aside from the technological route. From the 90's, electrical grids, data, malware, hardware and software are some vivid examples of the alterations that had been made in the military area. A state cannot concentrate only on the military's physical appearance, but should consider the intelligence and espionage part of a war. The attacker could be a terrorist, a hacker or maybe an activist that tries to spread his/ her ideas and create panic. It is crucial for a state's security to defend first its citizens and its critical infrastructures. The "sophisticated use of communications" (NATO Website) has altered the way an armed conflict flares. Cyber-attacks, cyber espionage, stealing governments' information are few examples of the new form of terrorism which, most importantly, hides a political motive. The weaponized malware introduces a new type of war, Cyber Warfare and Cyber Terrorism. The attackers with their digital weapons, such as worms, viruses and Trojans can affect not only the defense of a state but also the civilians' life, their opinion on a matter. The leak of vital information to the public may cause panic and armed riots. If people think that the government has manipulated them, they will revolt against it. The attacker may not be limited to cyber-attacks or stealing information, but use public cameras or private ones from laptops for surveillance reasons. He could use the information recorded to threaten the victims with the videos going public. This big new game in cyberspace has many aspects, many that we have not discovered yet, and everyone, especially the states and academic community should plan and promote solutions and defense mechanisms. For the attacker, is not necessary to have a physical appearance in the arena of Cyber War but he needs only a computer for his offense, for his whole plan. Without risking his life and spending a large amount of money, he will offend his target and win the battle. His real identity will remain anonymous by using temporary nicknames and guest names, the Darknet and a variety of cryptography mechanisms, making difficult for the intelligence and security agencies to track down his location and his real personal information. Thus, it is important to address the arising problems of the new era as soon as possible, with the technological evolutions and threats. However, the weaponized malware is not the only aspect of Cyber Warfare that should notice. Social media have entered vividly to personal communications. In a matter of seconds, people can be informed from their mobile phone, their tablets or laptops while they work, walk or entertain. The rapid spread of information has revolutionized the cyber era and made people media consumers and victims of worthless information. Their personal identity and their desires are shaping according to the global trends that social media present. Mobile applications introduce people to national and international news, help them communicate and share their thoughts for a variety of subjects. Unfortunately, their identity is exposed to the internet, shaped from the desires that the international community presents and losing their real personal identity, without knowing the threats. It is well obvious that the variety and number of targets are enormous and the future victims are not aware of the cyber dangers and how vulnerable they are against the new cyber threats. As Brian Solis stated, "Social media is about sociology and psychology more than technology" (Brian Solis, "Social Media is About Social Science Not Technology", March 14, 2012). Because of the multiple audiences, the feelings of terror and the brand awareness, an information vacuum has been created to this new era. Social sciences are now in need to face the current and future challenges in cyberspace. The traditional social sciences will help promote innovative solutions and ideas, evolve the current political framework and improve the current governmental structure. They will be used as a theoretical basis for the analysts to promote their ideas and propose multiple solutions to the threat of cyber –attacks. With respect to human rights, the academic community must set an analytical framework, deepen her research and suggest ideas for the regulation problem in cyberspace. All levels of governance, political, economic, military, and social must be evolved according to the latest technological developments and in parallel with the technological modernization. With the alterations at the international and national framework, many states have emerged as the first cyber powers. States are trying to evolve technologically without losing their national identity and stay behind to the electronic weapon arsenal. In an international system where "war of all against all" dominates (Thomas Hobbes, "Leviathan", 1651), the need for political and social recommendations is demanding. The emerging cyber powers and states trying to follow the technological evolution, in cooperation with the private sector, should share information upon the attackers, their methods and their targets. Secrecy concerning security issues will not help a unified cyber strategy against attackers and develop the necessary structure for the new cyber era of connectivity. Victims of cyber-attacks should go in public and share their experience upon the new threat, how it has affected its function and how the defenders could collaborate with other actors to retaliate against the terrorists. Often people say that those cyber threats are exaggerated and there is no risk for the state's and civilian's security. But who will take the risk and ignore the uprising threats? Who will ignore that these cyber-attacks gain access to many critical infrastructures, steal confidential information, take control and cripple of electronic systems? This ability to attack critical infrastructures such as military electronic documents, water supply infrastructures, banks and many more, in a terrorist's hand or a group of terrorists may have significant consequences to regional and national security - sovereignty. It is unavoidable that new vulnerabilities at electronic systems will be discovered constantly, but that does not mean that governments should stop promote their national defense strategy and build step by step cyber defense measures to prevent further consequences of the cyber-attacks. It is common that an actor (terrorist or hacker) will want to intrude military infrastructure, hack a bank or steal personal information of a well-known person for several reasons (political, religious, ideological reasons). A government cannot defend itself against cyber- attacks. But the damage caused could have irreversible results to the state and its bone structure. Thus, states must harden to the newly threats and prevent denial of services from taking national systems getting done to their knees, prevent the manipulation of national critical infrastructures and the spread of panic. No one can dare to ignore that if cyber weapons are in hands of a terrorist will have immeasurable results to the electronic function of a nation and letting the attacker succeed his target. No one knows how destructive an attack of cyber warfare could be.
Considers (86) S. 586, (86) S. 676. ; Record is based on bibliographic data in CIS US Congressional Committee Hearings Index. Reuse except for individual research requires license from Congressional Information Service, Inc. ; Indexed in CIS US Congressional Committee Hearings Index Part VII ; Considers (86) S. 586, (86) S. 676. ; Mode of access: Internet.
Objectives: Generally, operational military duties are associated with a variety of stressors, such as prolonged physical activity (PA). However, limited information is available on the occupational workload or changes in PA during international military operations. Thus, the aim of the study was to investigate the changes in body composition, stress biomarkers, PA, and heart rate (HR) responses of 79 male soldiers during a 6-month international crisis management operation. Material and Methods: Measurements were conducted 3 times in South-Lebanon during the operation. Body composition was assessed by the bioelectrical impedance method. Blood samples were analyzed for serum testosterone, sex-hormone binding globulin (SHBG), cortisol and insulin-like growth factor. Saliva sampling was used for analyzing stress biomarkers, cortisol and α-amylase. Heart rate and physical activity were monitored by a recordable belt and tri-axial accelerometer, respectively. Results: Increases in muscle mass (39.2±4.1 vs. 39.5±4.2 kg, p < 0.05) and testosterone (15.9±4.6 vs. 17.2±4 nmol/l, p < 0.01), and reductions in PA variables (e.g., daily step count 9472±2547 vs. 8321±2720, p < 0.05) were observed during the first half (i.e., PRE-MID) of the study. The increase in muscle mass remained significant during the latter half (PRE-POST, 39.2±4.1 vs. 39.6±4.4 kg, p < 0.05), but also fat mass increased (MID-POST, 10.6±4.6 vs. 11.0±4.7 kg, p < 0.05) while SHBG (MID-POST, 31.8±12.1 vs. 26.6±13.2 nmol/l, p < 0.01) and cortisol (MID-POST, 445±116 vs. 400±123 nmol/l, p < 0.05) decreased. With the exception of increased concentration of salivary α-amylase (PRE-POST, 36.5±33.7 vs. 55.1±39.7 U/ml), the acute stress biomarkers and HR responses remained unchanged. Furthermore, the low quantity of PA, low HR values and subjective ratings of exertion refer to rather light physical workload. Conclusions: Due to the operatively calm nature of the working environment, the present soldiers did not express any significant signs of physical overload during the study period. ; peerReviewed