Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

    1  2   3   4   5   6   7   8   9   10   11   ...    next 

Results 1 to 30 of 2971:

Internet of Things Vulnerabilities in Military Environments

Reviewed - Review

Andras Toth

Vojenské rozhledy / Czech Military Review Nr. 3/2021, Vol. XXX. (LXII.): 45-58 | DOI: 10.3849/2336-2995.30.2021.03.045-058

IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.

The Internet as a Tool of "Sacred War"

Informational pages

Vojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 81-84

It is said that at present, all means and knowledge necessary for any terrorist attacks are aviable on Internet network. Islamists regard Internet as a university of a special sort, without territorial boundaries, suitable for schooling and preparation of "sacred war". Internet users are decentralized, which is suitable for guerrilla fighters. By studying Qur?an (Koran), people are opened to indoctrination with global jihad. The Qur'an states that those who die in this type of jihad automatically become martyrs of the faith and are awarded a special place in heaven. Islamic law alleges that all nations 174 must surrender to Islamic rule. Indoctrinated terrorists could be and are united in their beliefs via electronic Internet pages, anywhere in the world, into one global cyber space. Electronic jihadists use notebooks and small electronic cameras to view and study suicide bomb attacks. The fight against such threat is endless, marked only by partial victories. Original article by Rolf Tophoven, Österreichische Militärische Zeitschrift, No 2, 2008


Military or Militancy: How to Navigate Media Objectivity in Reporting on National Security

Reviewed

Sidra Agha

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 37-54 | DOI: 10.3849/2336-2995.34.2025.01.037-054


This study aimed to explore the media’s perception of the military and militant activities, focusing on journalists’ professional conduct and their commitment to the national cause. In-depth interviews were conducted with Pakistani journalists reporting from conflict zones. The findings suggest that Pakistan is engaged in a war on terror and that the media plays a key role in glorifying the security forces in their fight against militants who challenge the authority of the state. Journalists expressed the view that the government and military should take realistic measures to combat this threat. While journalists described militants as terrorists, they also noted that their professionalism is often influenced by patriotism and a national duty to serve the country. However, objectivity remained a key element of their reporting. The media, considered the fourth pillar of the state, should have the necessary freedom to report on conflicts. At the same time, self-censorship was considered necessary to prevent content that could lead to radicalization.

Islamists Online

Informational pages

Jiří Hodný, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 70-78

Like hundreds of millions of other people, Islamic terrorists and their supporters use the Internet. In many ways, the Internet is a tool tailor-made for these Islamic extremists, who use it covertly and overtly to plan attacks, raise money, and spread anti-Semitic and anti-American propaganda written in English, Arabic, and other languages. There is sufficient information to believe that in the future, terrorists may even turn the Internet itself into a weapon, using it to wreak havoc on America's critical infrastructure. Because these militants are global, rather than being located in a single geographical area (Pakistan, Indonesia, Somalia, Iraq), the Internet provides them with a new and effective way to attain their goals. It may be difficult to catch extremists planning or coordinating an attack if they are using encryption, steganography, or some other method of hiding their online activities.

Are There Real Global Catastrophic Biological Risks?

Reviewed

Aleš Macela, Vanda Boštíková

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 55-69 | DOI: 10.3849/2336-2995.34.2025.01.055-069


Biosafety and biodefense (i.e. all countermeasures preventing the spread of biological agents in the environment and population) are on the regular agenda of states and their militaries. Somewhat aside are global catastrophic biological risks (GCBR), which can destroy human society as a biological species. Although a precise definition of what constitutes a global catastrophic biological risk is still being sought, it can be considered the impact of potential global catastrophic risks (GCR) on the social, economic and biological structure of human existence. This implies that GCBRs are a subset of GCRs. It is also open to discussion whether in the case of GCBRs the risk must necessarily be biological agents, from viruses to humans, or whether anthropogenic threats can also be accepted as risk factors, or what the impact must be for a risk to be included under the designation GCBR.

Perspectives of Clausewitz’s Center of Gravity

Reviewed

Ján Spišák

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 70-84 | DOI: 10.3849/2336-2995.34.2025.01.070-084

The center of gravity in military affairs represents a dominant element of military art, used in the planning and conduct of military operations. The doctrine defines it as the main source of power that provides the actor with his strength, freedom of action and/or the will to fight. This article examines Clausewitz’s concept of center of gravity through selected philosophical perspectives and clarifies its significance in military theory and practice. It presents the doctrinal development of the concept, discusses its context, and concludes that the concept of the center of gravity remains a key doctrinal and practical element of operational art.

Is the Transatlantic Bond a Permanent Constant for our Security?

Opinions, controversy

Zdeněk Petráš

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 159-165

Resistance Operating Concept as a Tool for Increasing the Resilience of the State

Reviewed

Radek Dubec, Eva Nezvalová, Markéta Licková

Vojenské rozhledy / Czech Military Review Nr. 4/2024, Vol. XXXIII. (LXV.): 3-19 | DOI: 10.3849/2336-2995.33.2024.04.003-019

The article describes the issue of implementing the Resistance Operating Concept as part of a comprehensive approach to ensuring the defense of the state and its resilience. The basic conditions necessary for the introduction of that instrument are sought, and a comparative analysis of selected European countries that started to build a resistance movement is carried out. The article further describes the strategic definition of the resistance movement in the conditions of the Czech Republic, the legislative definition of the resistance movement and its anchoring in the framework of mental law, and the connection of the resistance movement to individual phases of the conflict. It analyzes the relationship of the resistance movement to individual phases of the conflict and categorizes the actors of the resistance movement, their roles and the methods used. In conclusion, it defines the necessary conditions for the implementation of the resistance movement into the security and defense system of the state.


Cognitive Resilience Education in the Czech Military: SWOT Analysis

Reviewed - Research

Vladimír Bízik, Dominika Kosárová, Vendula Divišová, Adam Potočňák

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 98-116 | DOI: 10.3849/2336-2995.34.2025.02.098-116


This article presents the first systematic analysis of cognitive resilience education within the Czech Ministry of Defence, which is growing in importance in the context of contemporary hybrid threats. Through methodological triangulation (document analysis, questionnaires, interviews), the research maps the coverage of relevant topics across all levels of formal military education. The SWOT analysis reveals both existing foundations for cognitive resilience development and the absence of a systematic approach to this issue. The results highlight three main challenges for transforming the educational system: systematisation of the approach, personnel resources, and infrastructure modernisation. The study establishes an empirical basis for strategic recommendations to strengthen military personnel resilience against information and psychological operations.

Social Media as a Tool for Profiling Potential Intelligence Service Sources. How are the Military Students Doing?

Reviewed

Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 24-36 | DOI: 10.3849/2336-2995.34.2025.01.024-036


The article addresses the use of social media intelligence (SOCMINT) as a tool for recruiting and selecting souces by foreign intelligence services, with an emphasis on the risks it poses to students in military studies at national military universitiy. It analyzes the specific ways in which SOCMINT enables foreign intelligence agencies to effectively gather personal data and profile potential collaborators from both public and private information shared online. Research conducted among students of the University of Defense and other institutions revealed that military students share comparable types of information on social networks as their civilian peers, making them equally vulnerable to the activities of foreign intelligence services. However, military students are preparing for careers in defense and security, making them a significantly more attractive target for foreign intelligence agencies than other categories of employees.

Cognitive Warfare as a New Dimension of Security. A Fictional Concept or a Real Silent Threat?

Reviewed - Review

Kristýna Drmotová, Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 63-83 | DOI: 10.3849/2336-2995.33.2024.01.063-083

Cognitive warfare is a new phenomenon that differs from any forms of action previously used in the information space aiming to affect the thinking of target groups. The main difference consists in the targeted and sophisticated use of scientific knowledge from neuroscience, with special attention on consciousness and perception of reality. This deeper understanding of how the human mind works has impacted distributed narratives and the choice of the most suitable technological platforms for their distribution to the target audience. This article presents a conceptual classification of cognitive warfare and defines its three core segments: neuroscience, technology and aspects of social science.

Threats and Hazards of Grey Rhino Paradigm

Reviewed - Research

Olga Burianová, Jiří F. Urbánek

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 85-96 | DOI: 10.3849/2336-2995.33.2024.02.085-096

Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added - O´VA is established as qualitative dynamic information about productivity of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation.

Crowdsourcing as an Element of Strategic-Operational Intelligence. How NATO Used it and Changed the Game

Reviewed - Review

Karel Pešek, Jozef Vojtek, Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 84-104 | DOI: 10.3849/2336-2995.33.2024.01.084-104

The article focuses on the concept of crowdsourcing in the social networking environment as a new phenomenon involving civilians in the intelligence process, enabling the use of their intelligence potential during armed conflict. Crowdsourcing of the civilian population is introduced by the example of NATO intervention during the first civil war in Libya. The article presents its use during the intelligence process at the strategic-operational level of command and control of the armed forces. It establishes its possible definition as a collection method of the intelligence process, and as a collection method which is disjunctively separable from similar intelligence collection methods.

Proposal of Legal Status of the Expert Valuation Institute Objectifying the Acquisition Process

Reviewed - Research

Jan Hak, Pavel Foltin, Dagmar Pospíšilová, Karel Pospíšil

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 97-115 | DOI: 10.3849/2336-2995.33.2024.02.097-115

The process of procuring military equipment, technology, material, and associated services (VM) is frequently shrouded in concerns about cost-effectiveness and, in some instances, even becomes the focus of law enforcement investigations. This often leads to delays in strategic investments and exposes involved individuals to the risk of criminal charges. Additionally, there is a notable lack of capacity to impartially evaluate the overall investment's efficacy. Consequently, the "Znalec" (Expert Witness) project was initiated as a part of the defense research program. Its objective is to explore the feasibility of establishing an expert institute that could impartially assess the value of the military procurements, set a standard for evaluating these assets, and outline a training program for relevant experts. This paper specifically addresses the first objective of the project, proposing a legal framework for the expert institute based on an extensive systems analysis.

Yomkippur War from the Perspective of Czechoslovak Diplomacy

Reviewed - Review

Eva Taterová

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 3-23 | DOI: 10.3849/2336-2995.32.2023.04.003-023

This study presents the perspective of Czechoslovak diplomacy on the events of the Yom Kippur War (1973) in the context Czechoslovak foreign policy towards the Arab-Israeli conflict in early 1970s. The research is based on so far rather underexplored archival sources. Despite Czechoslovakia's declared unequivocal support for the Arab side of the conflict, Czechoslovak Middle Eastern policy since the mid-1950s was not entirely unconditional in relation to the Arab countries. Internal documents of Czechoslovak government occasionally revealed criticisms of Arab representatives. The Yom Kippur War represented a significant moment in this regard, as it was a military confrontation initiated not by Israel but by the Arab coalition, posing a challenge for Czechoslovak propaganda. Simultaneously, this armed conflict presented an opportunity for Communist Czechoslovakia to further deepen its relations with its Arab allies.

Military Will in the Czech Civil Code

Reviewed - Review

Pavel Salák

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 116-129 | DOI: 10.3849/2336-2995.33.2024.02.116-129

The text is dedicated to the analysis of the legal regulation of military wills in the new Civil Code (Law No. 89/2012 Coll.). It places it in a historical legal context. However, priority attention is paid to a detailed analysis of the current legal regulation and potential issues that this regulation brings. It also briefly mentions other options for last dispositions that a soldier could use. The legal regulation of military wills in the Civil Code can be characterized as very well conceived, reflecting the reality of foreign missions. The fact that it takes the form of a public document is also significant if the relevant requirements are met. However, the question is how the application practice of the courts will approach the adjustment.

A Special Military Operation in the Context of Russia's Interpretation

Reviewed - Review

Jaroslav Galba, Ján Spišák

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 50-68 | DOI: 10.3849/2336-2995.32.2023.01.050-068

The Russia has presented the ongoing war in Ukraine by the term special military operation, whose goals were declared by Russian President Putin in terms of demilitarization and denazification of Ukraine. In the wider context, there is an imperial effort of Russia to enforce its power and influence in the region by an offensive and aggressive war. The authors define the fundamental difference between a special operation and the so-called special military operation in the context of contemporary interpretation of the Kremlin. They further argue the way in which Russia is trying to justify the war and discuss its reality in terms of international law.

Arson Attacks in Israel - History and Options for the Elimination of Inincendiary Balloons

Reviewed - Review

Alena Slavíková, Martin Křepský, František Racek, Antonín Novotný

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 130-146 | DOI: 10.3849/2336-2995.33.2024.02.130-146

The article concerns the issue of arson attacks in Israel.The issue of terrorism in Israel is quite broad, given that it is a very common phenomenon here and Israel deals with terrorism on a daily basis. The paper therefore focuses on incendiary balloons, a weapon that repeatedly caused fires around the Gaza Strip between 2018-2023. It examines their history, their design, outlines the possibilities of their elimination, the advantages and disadvantages of possible technical solutions, and a reflection on the future of their usage.

Liability for Health Damage - Public vs Private Area

Reviewed - Review

Ondřej Horák, Leopold Skoruša, Radim Vičar, Tomáš Zbořil

Vojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 110-128 | DOI: 10.3849/2336-2995.33.2024.03.110-128

The article deals with the comparison of refunds of non-material damage in public and private area. In the public area is analyzed legal regulation on health injuries in service relations, in private area is discussed legal regulation on health injuries in civil law and labour law. Particular attention will be focused on the transfer of compensation in the event of injury to the heirs - while in service relationships, such claims are extinguished by death (not transferred on the heirs), which was taken over from the 1960s legislation, in current private law, do not cease if they have been recognized or at least brought in court. The aim of the paper is a critical analysis for the current state of legal regulation and the proposals de lege ferenda (approximation to labour law regulation). The issue has increased importance for public finances and functioning of public sector and enforcement of the rule of law.

Active Measures Concept Deconstruction Through the Lenses of Information Influence

Reviewed - Research

Miroslava Pačková

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 40-62 | DOI: 10.3849/2336-2995.33.2024.01.040-062

This study deconstructs the concept of active measures through the prism of information influence. It understands it as sophisticated methods of influencing public opinion and political decisions, originally used by the Soviet Union and now adapted to cyberspace by the Russian Federation. In the analysis, the concept is contrasted with the general abstraction of information influence. This helps to better understand the proximity of active measures to similar concepts. We conclude that abstractions of information influence are also valid for conceptual understanding and practical examples of contemporary Russian active measures. Active measures are subsidiary to information influence, serving as tactical means to achieve the latter's strategic goals. Furthermore, the author states that the information environment is the operational theatre for active operations, cyber operations can be its manifestation, information operations support as a key component of a broader information operations strategy, and psychological operations are its critical element.

The UN and NATO as the Main Pillars of the International Security Architecture with a Focus on the Middle East Region

Reviewed - Research

Yvona Novotná-Šabacká

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 18-35 | DOI: 10.3849/2336-2995.33.2024.02.018-035

This study provides a summary overview of the creation and the activities of the international security architecture in the form of their two main pillars, i.e. the United Nations and the North Atlantic Treaty Organization in the Near and Middle East region. Within the framework of international security relations, this is a very unstable and conflictual region, where this instability has lasted practically since the establishment of the State of Israel in 1948. The global UN, its overall activity and importance, especially humanitarian and peace-building activities not only for the Near and Middle East region, is very beneficial, through out the Cold War period up to the present day. As a security organization, NATO is among the most important global actors influencing current international security relations. Through their activities, both of these organizations represent a essential means of ensuring world peace and security.

Strategic Surprise and Implications for State Defense

Reviewed - Research

Radek Dubec, Roman Janda

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 140-154 | DOI: 10.3849/2336-2995.32.2023.04.140-154

The article is based on a study carried out as part of the Long-Term Organizational Development Plan project by the Center for Security and Military-Strategic Studies of the University of Defense entitled "Armed Conflict". As part of the study, the issue of strategic surprise was analyzed and assessed, the aim of which was to find causal mechanisms and connections between the security of state defense and the phenomenon of surprise in the conditions of the 21st century. The article deals with the issue of surprise and its impact on state defense security. It describes strategic surprise as a principled aspect with implications and impacts on state defense. It examines the issue of surprise as a principle of military art in the context of contemporary strategic thinking.

From the Common Security and Defence Policy to the Common Army of the European Union?

Reviewed - Review

Vojtech Jurčák, Radoslav Ivančík

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 18-34 | DOI: 10.3849/2336-2995.32.2023.01.018-034

Voices about the need to build a joint European Union army have been appearing on the European scene for several years, but recently these voices have become stronger, especially after the Russian invasion of Ukraine. Therefore, in the article, the authors deal with the issue of the possibility of creating a common European army. They draw on from socio-scientific political science approaches to current security frameworks, examine the current state, and at the same time point out that, despite the threats Europe is facing, there is still no clear plan for how such an army should be created. Considering the facts mentioned in the article, the authors state that the creation of a common European army, at least for now, seems unlikely, as a supranational model of the European army would require the transfer of sensitive national competences from the member states to the EU level.

Some Legal Aspects of Western Military Aid to Ukraine

Reviewed - Review

Martin Tomaštík

Vojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 3-18 | DOI: 10.3849/2336-2995.32.2023.03.003-018

The article deals with the some legal aspects of Western military aid to Ukraine. The first part briefly analyzes the Russian Federation's attack on Ukraine from a "just war" perspective. The following part is devoted to individual perspectives of different branches of international law on military aid to Ukraine - the law of neutrality, ius ad bellum, ius in bello, issues of co-belligerency and state responsibility for complicity in internationally illegal actions. The conclusion summarizes the findings and gives an answer to the question why Western aid to Ukraine mostly does not violate the norms of international law.

Analysis of Taiwan Guerilla Potential - A Real Possibility or a Naive Notion?

Reviewed - Review

Richard Oubělický

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 35-49 | DOI: 10.3849/2336-2995.32.2023.01.035-049

Existing research about China and Taiwan deals primarily with bilateral relations, military doctrines, etc. They don't pay much attention to the consequences of the potential China-Taiwan war. The article examines conditions for emerging and activity of guerillas with paramilitant signs in the case of China's domination over Taiwan. The analysis is based on the present general, socio-economic, political, geographical, and technological environment. A substantial part of the analysis is also argumentation about the potential of urban guerilla. The article is based on data, pieces of information, polls and academic and analytical texts relevant to the main research questions. Those questions are the potential for emerging, sustainability, and effectiveness of guerilla. The article comes with findings, that argue the relatively high potential for the emergence of guerilla primarily because of the suitable environment in Taiwan and possible effectiveness and sustainability based on existing variables, which can however also limit this potential.

Present Trends, Emergencies and Their Impact on Supply Chain Security

Reviewed - Research

Dušan Repík, Natálie Hanáková, Jan Kotisa, Pavel Foltin

Vojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 63-81 | DOI: 10.3849/2336-2995.32.2023.03.063-081

The article examines the impact of recent geopolitical, economic, and security changes on logistics support capabilities in EU and NATO member states. The study analyzes the effects of the COVID-19 pandemic and the armed conflict in Ukraine on logistics supply chains, considering environmental, social, and security concerns. The research questions focus on identifying the main changes and assessing their implications for commercial, military, and humanitarian logistics. The prolongation of the conflict in Ukraine and the economic sanctions imposed on Russia have been found to have a significant impact on logistics capabilities, perceptions of the structure of supply chains and the risks arising from this. The impact of these events is also producing third-country poverty and dehumanizing the UN SDG goals. On the other hand, improvements in NATO troop readiness and weaponry have been noted. The study highlights the need for further research to investigate specific threats for different types of supply chains and to consider the complex and evolving nature of the issue. Ultimately, this research provides insights into the challenges and opportunities facing logistics capabilities in the context of ongoing geopolitical and environmental changes.

Impact of the New Technologies on CBRN Terrorist Threats: General Perspective and Perspective of Republic of Croatia

Reviewed - Review

Ivana Cetina, Jugoslav Jozić

Vojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 119-139 | DOI: 10.3849/2336-2995.31.2022.04.119-139

Although the level of the overall CBRN threat in the world is currently considered to be low, there is a trend of a growing concern about CBRN terrorism. Various terrorist groups have shown interest in using CBRN materials to disrupt the global order and economy. The motivation and factors that influence the potential use of CBRN agents in terrorist attacks arise from the fact that CBRN agents have potentially high mortality and can cause serious consequences. A large number of potential dual-use (military and civilian) items as well as the introduction of new technologies in use can be utilized for the CBRN attacks and create a wide range of new possible terrorist (and military) threats. This paper provides a general overview of the past and current situations regarding CBRN terrorism, analyses some of current widely known new technologies that can be utilized for CBRN terrorist attacks and analyses the biggest potential threats from CBRN hazards.

The "Women, Peace and Security" Agenda and Integrating Gender Perspective in the Environment of the Armed Forces of the Slovak Republic

Reviewed - Research

Mária Blehová

Vojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 96-110 | DOI: 10.3849/2336-2995.32.2023.03.096-110

The measures adopted on the soil of the North Atlantic Alliance to support the integration of gender perspective are discussed in the article, as well as the way in which these were subsequently reflected in the legislative measures of the Ministry of Defense of the Slovak Republic and examines the approach of the Armed Forces of the Slovak Republic (hereinafter referred to as "OS SR" ) to the integration of gender perspective. The article further focuses on how the OS SR integrate and support these principles in the real life of professional soldiers. The analysis of available statistical data as well as of research previously conducted in this area serves as a basis for formulating conclusions on whether the Slovak Republic fulfills its obligations regarding the integration of gender perspective towards the North Atlantic Alliance, and at the same time formulates starting points for possible future research.

From Plan Gideon to Plan Tnufa: Israeli defense strategy and the buildup of the Israeli Defense Forces in the wider context of the Middle East after the Arab Spring

Reviewed - Research

Ľubomír Zvada, Jiří Lach

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 24-44 | DOI: 10.3849/2336-2995.32.2023.04.024-044

Based on the content analysis method, this study analyzes the first ever published security strategy of the Israel Defense Forces, which was published in 2015. The main objective of the paper is not only to present the circumstances of its creation and discuss the main objectives of this strategic security document, but also to outline the broader geopolitical context from which it emerged. The authors argue that the document primarily emphasized two areas - the use of force and capacity building of the Israeli military. Among other things, the publication of the strategy was intended to have a deterrent effect. In the conclusion, the authors compare the Gideon Plan and its follow-up, the Tnufa Plan, and point to the considerable importance that consensus among political and military elites has in the implementation of such a document and reflect on what lessons and inspiration can be drawn from this case in our geographic space in the process of formulating or reformulating strategic security documents.

The use of modeling and simulation in the development process optimization of the Armed Forces of the Czech Republic

Reviewed - Research

Jan Mazal, Jan Zezula, Josef Procházka, Dalibor Procházka

Vojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 140-158 | DOI: 10.3849/2336-2995.31.2022.04.140-158

The article contributes to a more efficient use of the theoretical, technological and application base, especially to the improvement of decision-making processes at the strategic level. It offers a methodological framework for solving the armed forces capability optimization problem by implementing modeling, simulation and operations research tools and theories.

    1  2   3   4   5   6   7   8   9   10   11   ...    next