The article discusses the problems of state regulation of tariffs for gas transportation services through gas distribution networks, which minimize losses and the need to create reasonable verifiable principles for establishing tariffs. The absence in the spheres of natural monopolies of effective competitive mechanisms poses a challenge for the state to create a special system for regulating their activities, which includes legal and organizational components. In each industry where natural monopolies operate, there are some pricing features that are reflected in the legal regulation. This article focuses on the structure of contractual relations in the field of gas supply during the transportation and sale of gas, which allows you to clearly demonstrate the reflection of the regulatory framework reflecting the state’s requirements to keep a separate record of products (services) and costs of its production by an organization engaged in the extraction, transportation and sale of natural gas.
Cryptocurrency market is developing fast during the past few years. Cryptocurrency now is available as a form of payment for retail goods, as an instrument for a wholesale international transaction a mean of exchange for whatever goods and is available through ATM’s. Moreover, it is developing as a possibility for fundraising a) as a private debt b) as seed capital. Companies like Facebook are discussing launching own cryptocurrency. Bank UBS is developing its blockchain based virtual currency as well. However, scientist agrees that cryptocurrency has an important impact to national security. It became a relevant instrument for illegal good transactions, a mean of exchange in the darknet and an instrument for money laundering or infrastructure for new kind of money-laundering practices (for example - “Smurfing” phenomena (EU Observer, 2019)) European Union is launching AML and KYC procedures for the cryptocurrency market. Would it be efficient? Why are we implementing KYC and AML procedures for cryptocurrency? Is it able to minimize risks?
The research paper discusses different issues of interpretation and qualification of illegal access to an information system (IS), taking into account international instruments and European Union legislation as well as the relevant case law of Lithuania. Analysis of criminal cases and legal regulation shows that such cases require an appropriate combination of the technical and legal sides of such criminal offences. In this context, it is also important that criminal liability for illegal access to an IS must be underpinned not only by the principles of technological neutrality and equivalent assessment but also must ensure respect for the ultima ratio (last resort) principle. It is this principle which in particular is the subject of considerable attention in the research paper in terms of over-criminalisation of illegal access to an IS. While solving the puzzle of technology and terminology alignment, the paper also explores the elements of illegal access to an IS. In the light of developments in Lithuanian case law, more emphasis is placed on the debatable infringement of security measures, as an element, and on possible interpretation of its content.
Advanced studies on artificial intelligence increase the concerns of many non-governmental organizations regarding the possibility of their use in combat systems. Even now, there are many weapon systems that can interact with the enemy in an automated manner. However, the concerns are raised due to the potential emergence of autonomous combat systems, which will independently make decisions about life or death on the battlefield, both in relation to military personnel and civilians. This article provides a review of terminological issues associated with the concept of automation and autonomy in the context of combat systems. It was concluded that the absence of a commonly accepted definition of “lethal autonomous weapon system” within international law contributes to many interpretations in this field. On the basis of source literature, the second part of this article presents current proposals aimed at a preventive ban on the design and use of lethal autonomous weapons systems. The essential deduction leads to the conclusion that introduction of a total ban on the design and use of this type of weapon systems is impossible, nevertheless as much as possible should be done in order to make sure that the critical decisions, especially those about life and death, will remain in the scope of human control and that they will not be made by the machines.
Economic security of each country is determined by array of different factors. Some factors seem obvious and are measurable, while other factors, such as entrepreneurship and, especially social entrepreneurship, are tacit and hard to measure. Anyway, social entrepreneurship is accepted globally as a bridge between business and benevolence. It attempts to find solution to local sustainability issues that are normally not addressed by traditional organizations. The problems faced by the Middle East society in general and Saudi Arabia in particular is unique in nature. Most of such problems cannot be addressed by the Government or the traditional organisations. The utility of social entrepreneurship arises here. There are many social enterprises in Saudi Arabia that have succeeded in nurturing a band of new leaders who are attempting to enhance the region’s global competitiveness, with a social touch. The present paper presents a few social entrepreneurs who have made their mark in Saudi society, and provides suggestions for nurturing and sustaining social entrepreneurships.
Given the global nature of cyber threats, assurance of a cyber security policy is very important not only at the local organisation level, but also at national and international level. Currently, cyber security as such is not suitably regulated internationally; therefore, the role of national cyber security strategies has become particularly significant. Lithuania is among the leaders in the EU and globally in the development of the optical fibre network. FTTP coverage has already reached 95%, the highest in the EU. Regardless of that, the cyber security programme effective in Lithuania does not provide conditions to ensure an appropriate level of cyber security and may not be regarded as a high-level contemporary strategic document in the area of cyber security. This article presents a study the main outcome of which are guidelines for a contemporary model of the Lithuanian national cyber security strategy. Based on comparative and historical studies as well as expert interviews conducted by authors and on the best practice of other countries, the article presents the elements of a model of the Lithuanian national cyber security strategy as well as guidelines on the content of these elements of the model. The article also reveals which elements of the model of the national cyber security strategy should most of all reflect the national situation and which elements may be unified and possibly also adapted in the cyber security strategies of other countries.
A good knowledge of terrain characteristics and movement possibilities within it are crucial conditions for operations success. If a commander and his staff have enough information about the terrain, he can optimize a combat formation and its movement in an open terrain. Such as optimization can finally spare manpower as well as equipment and decrease probability of loss of life. This paper deals with a complex mathematical model of terrain passability, which respects both geographical and meteorological conditions in the terrain and with its adaptation to calculation in the environment of geographic information systems (GIS). Such a model can be directly implied into command and control system to support decision-making processes.
The main problem of an off-road vehicle movement in an open terrain consists in considering the properties of a given surface; also, technical properties of a particular off-road vehicle have to be considered. The model of terrain passability is based on measurable factors that characterize the natural environment, which is possible to calculate using the data saved in GIS databases. While calculating parameters for a complex model, it is necessary to consider data quality, which influences the level of vagueness of the resulting calculations. In order to express this level of vagueness, a method of fuzzy functions was selected and applied while calculating the individual deceleration coefficients given by the natural factors. The method of cost map was selected for the final evaluation of possibilities of vehicles movement. The complete procedure was debugged in the environment of ArcGIS 10.
This paper is devoted to tracing contemporary perceptions of energy security. Energy security, as a concept started its evolution from a point, where it was identified with secure oil provision for countries, which did not possess energetic resources and were increasingly dependent on oil imports. Gradually, the concept of energy security started to be repeatedly used in the scientific papers, popular press and media and even colloquial language. Energy security has become an argument in making political decisions. Nevertheless, despite the exaggerated attention to energy security, still there is no unanimous agreement on what the concept of energy security means, what facets it embraces and, consequently, how it could be measured and controlled. The paper aims to distinguish the main perceptions of energy security and foresee plausible implications of one or another approach adopted.
In contemporary economy innovations by the scientists are seen as a driving force of the economic development. Innovation performance is vital to achieve sustainable country’s competition and to stay in pace with other developed economies (Grossmann 2009).
The paper aims to reveal theoretical aspects of innovation activity, to systemize and analyze the key elements of measurement framework and relationship between the innovative activity and patents, research and development (R&D). The study is devoted to describing the conceptual elements of innovation, assessing if prevailing understanding about innovation performance approves theoretical approaches and reviewing innovation tendencies in Lithuania. Obtained results lead to get the general view about the innovation activity development. The research methodology is based on theoretical approaches’ comparative analysis, academics’ survey examination and generalization.
Presented paper aims to investigate internationalization of multinational company by exploring the main proactive and reactive factors impacting internationalization process. The authors strive to reveal the patterns of internationalization taking into account the aspects of the main theoretical models. The research is based on the main ideas of stage, learning and contingency approaches. The main proactive and reactive factors impacting internationalization process are based on the previous studies. The authors develop a research methodology and discuss main findings of the case study and survey. Results of the empirical investigation allow concluding that internationalization of a multinational company was initiated by several factors, namely environment, market, home and production.