Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

 previous    1   2   3   4 

Results 91 to 95 of 95:

Securitology-Teaching about Security and Non-Security

Nonreviewed - Other

Doc. Ing. Josef Janošec, CSc.

Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 3-14

The term "securitology" seems to be appropriate for nomenclative scientific discipline dealing with a research subject, security reality. This article proposes to use Yin- Yang principle and its applications to a philosophy of approach, holistic understanding contrapositive security forces. The classification of selected philosophical and methodological approaches to theme of securitology, the formalization of wide problems of securitology research, are the main items to be done first. The author presents his own approach to measurement in securitology, proposes theoretical models for description of problems connected with security questions, applications of various scenarios. He recapitulates traditional theories and practices of securitology and offers some new information on imaginable problems connected with multiparadigmatic sciences. Finally, he summarises contemporary state of research, including original draft of mathematical formulas to localize security threats. There are also some recommendations for future research in the field of securitology.

Why to Start the Process of Revision of Military Strategy of the Czech Republic

Opinions, controversy

Ing. Vladimír Krulík

Vojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 74-89

We are aware of new and still increasing risks in the world, particularly in connection with the increase in terrorist activities. Broadly speaking, in building our professional army we enforce quality and efficiency, even with restricted means and sources, respecting our potential and on the basis of evaluation of interests of the Czech Republic, engagement in peace, stabilisation and other missions organised by NATO, the EU, or the UN. The author recapitulates all legislative acts, documents and papers, dealing with Czech military strategy, namely the Czech Republic's Military Strategy approved by the governmental resolution No. 578, June 9, 2004, that details principles of our defence policy. Now the author proposes to revise our military strategy in the year 2007, for-first: we successfully completed a phase called Initial Operating Capability; second, from this standard we can unroll further activities: operational engagement of brigade task force; third, in this very year we are evaluating transformation objectives for 2007-2011 (2012). Based upon this level of knowledge, we shall be able to draft new concepts of military strategy, e.g. to substitute current military strategy by defence strategy. The topic is open to discussion.

The Structure of Security System of the Czech Republic

Opinions, controversy

Ing. Vladimír Krulík

Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 77-88

The purpose of this article is to offer readers rather different look at the Czech Security system as that was presented in Vojenské rozhledy No 1, 2007, in an essay by dr. Rašek "Creation of the Foundations of Security Science", in which its author enumerates relevant institutions in Czech society, civilian or armed, involved in this complex security system. It is the definition of security that causes that Mr. Krulík adds other security elements and amends security system by references to basic law and legal norms that are in the background of this system. Even simple summary indicates that our security system is too complicated, tangled, without balance. It is a static picture of institutions, the validity of which could be proved only in practice. It is evident that security process should be more dynamic, as its suitability and effectiveness can be only proved face to face crisis situations. This problem is tied to the question of military expenses. Mr. Krulík hopes that further budget cuts in public sector will produce drawing up real concept of security system.

Main Problems in Building Security of the European Union in the Long-Term Horizont (2020-2050)

Nonreviewed - Other

PhDr. Miloš Balabán, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 3-11

Nowadays we use the term security in a broader sense, covering ecology environment, economic discrepancies between the North and the South, raw material sources, demography, energy. The transfer of economic power from West to East is gathering pace and soon will dramatically change the context for dealing with international challenges - as well as the challenges themselves. Many in the West are already aware of Asia?s growing strength. The author uses data e.g. from The Pentagon?s New Map to demonstrate a cutting-edge approach to globalization that combines security, economic, political, and cultural factors. He predicts and explains the nature of war and peace in the twenty-first century and outlines the role that Western world can and will play in establishing international stability. European governments need to improve their military capabilities and develop their own distinctive approach to warfare. That approach should build on core European military strengths related to post-war stabilization after a military conflict. These approaches include nation-building, peacekeeping and counter-insurgency warfare.

Asymmetric Warfare

Nonreviewed - Other

Doc. dr. Štefan Volner, CSc.

Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 15-26

Most adversaries of our western civilization recognize the information advantage and military superiority of the United States and Euroatlantic area. Rather than acquiesce to any potential Western military domination, they will try to circumvent or minimize US strengths and exploit perceived weaknesses. IT-driven globalization will significantly increase interaction among terrorists, narcotraffickers, weapons proliferators, and organized criminals, who in a networked world will have greater access to information, to technology, to finance, to sophisticated deception-and-denial techniques and to each other. Such asymmetric approaches-whether undertaken by states or nonstate actors-will become the dominant characteristic of most threats to both American homeland and Europe. They will be a challenge for our strategy, operations, force development, and they will require that strategy to maintain focus on traditional, low-technology threats as well as the capacity of potential adversaries to harness elements of proliferating advanced technologies. Among others, the author states 15 variations of plausible asymmetries.

 previous    1   2   3   4