- volume: 2024
- number: 2
- type: Vědecký / Research
Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added – O´VA is established as qualitative dynamic information about productivity
of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation.
- volume: 2019
- number: 3
- type: Přehledový / Peer-reviewed
The article focuses on information and psychological operations as a challenge for the security and defence establishments of NATO member states. A conceptualisation of the terms ‘information operations’ and ‘psychological operations’ is discussed in the contexts of reshaping the war-and-peace dichotomy, and of resilience and deterrence. It is suggested that these terms suffer from a normative approach to the paradigm of war and peace, and to the use of non-military means. This may lead to the greater vulnerability of security and defence systems in confrontation with an adversary. Also, special attention is paid to the vulnerabilities of security and armed forces, being overlooked in concepts of resilience.
Read more: Information and Psychological Operations as a Challenge to Security and Defence
- volume: 2014
- number: 4
- type: Přehledový / Peer-reviewed
The article presents the theory of information operations on the background of contemporary armed conflicts in Ukraine, Iraq and Syria. In the introduction, information is presented as a phenomenon and the accelerator of social development. It outlines basic information channels that deliver security information to their recipients. Furthermore, the article discusses security and operational environment and also vulnerabilities being caused by increasing dependence on information. The core of the article are information operations presented in theory with the author's commentary on real application in military practice and in terms of the Czech Armed Forces. As part of information operations are subsequently introduced psychological operations, computer network operations and electronic warfare. The article ends with real examples of information and psychological operations in modern warfare, and conditions of their management in the Czech Armed Forces. The conclusion summarizes the general idea of the security environment and information operations, and stresses the importance of information operations in current and future conflicts.
Read more: Information Operations on the Background of Contemporary Armed Conflicts
- volume: 2009
- number: 4
- type: Přehledový / Peer-reviewed
The change of security situation in the world, international ties and last but not least changes in operational environment, exploitation of new technologies are reflected by changes in defence planning, military organization, forces engagement and operational assessment. Time, flexibility, cooperation in coalition operations, interoperability in technology spheres play incommutable roles together with trained personnel. Command and control (C2) is self-contained system depending on many factors provided by the so-called System of Communication and Information. At present it is the very base for information collection, decision-making process, preparing variants of operation for both commander and his staff. Among others the author writes about Network Enabled Capability system introduced into Czech armed forces. C2 programme is also a part of educational curriculum at Defence University Brno.
Read more: Information Process as a Part of Command and Control System (Part I)
- volume: 2022
- number: 4
- type: Vědecký / Research
The article describes an innovative view of a possible methodical process of access and protection against disinformation. The ever-increasing digitization and use of cyberspace to disseminate all kinds of data and information provides users with an indisputable number of associated benefits associated with rapid access, distribution or sharing of current knowledge. However, this development trend also reciprocally generates a number of related threats that need to be faced. Our own resilience and effective tools against information campaigns and information actions of all relevant actors play the key role here. The critical thinking itself and the process mechanisms used to access information are the focus of overall resilience to this type of security threats. Thus, the methodical process can help a wide range of readers broaden their view of the complexity of the problem and partially minimize the associated security risks.
Read more: Innovative view of the methodical process of facing disinformation