Since September 11, 2001, airport security control procedures have expanded in the face of the increased threat of terrorist attacks on aircrafts and airports. Obligatory and meticulous checks are carried out on all passengers although the overwhelming majority of passengers do not pose any risk. Current airport control procedures are expensive and inefficient; they extend the time spent by passengers at the airport and contribute to increased crowding; they inhibit the development of interconnected transport systems and significantly reduce the comfort of passengers who pose no threat. As the security needs of air transport morph, security experts are considering replacing the existing across-the-board procedures with personalized and more selective control processes based on data and behavioral analysis to reduce the duration of airport check-in procedures and improve the effectiveness of security controls. Such solutions have been successfully tested over the past decades at Israeli airports and check-in terminals by the Israeli state carrier El Al, which has the reputation of being the best-protected airline in the world. The FLYSEC system, developed and tested in 2015-2018 at Luxembourg Airport in cooperation with the local university, operates on similar principles although its implementation is less invasive. Modern computer tools for analyzing travel history data and data from current bookings as well as algorithmic methods of behavioral analysis based on advanced detection, identification, crowdsourcing and tracking systems all feed into such smart, selective and personalized security controls. Smart, selective control systems are based on the basic assumption that passengers can be accurately and effectively sorted into different risk groups (e.g. low-risk/trusted passengers, normal passengers, high-risk passengers), long before they arrive at the airport and create a real threat. There are many effective techniques for profiling and identifying perpetrators already used in criminology, criminalistics and computer forensics that are also suitable for use in smart security systems to better meet the current and future needs of civil air transport. The article presents the idea and general characteristics of smart, selective and personalized security control systems, followed by structuring of the analytical field and problem analysis in terms of their implementation conditions, opportunities, threats, conflict-forming potentials and controversies, as well as the needs for more detailed research and their suggested directions.
Despite the rising recognition and a growing body of literature on sustainability issues in the military, no comprehensive and systematic review on the topic has been published yet. Accordingly, the aim of this paper was to deconstruct the topic of sustainability in the military context by exploring its genesis, state-of-the-art knowledge and future prospects. Furthermore, the study addressed the question of practical importance about where sustainability in the military is ad hoc or institutionalized into management processes and procedures of organizations. The paper relied on the systematic literature review and used a bibliometric data analysis: citation network and keyword network analysis techniques were employed to select, analyse and interpret the genesis and prospects in the field.
The data suggest there are three dominating research streams in the field: (1) environmentally sustainable solutions, (2) economic (un) sustainability of militarization and (3) social cohesion. The recent research on sustainability in the military marks a new trend where all three fields of sustainability are being integrated. It is also apparent form the analysis that a small but significant share of publications indicates institutionalization of sustainability in the military practice. This is particularly evident in relation to environmental issues.
The world faces new challenges and threats to international security environment, among which a key role play different types of cyberthreats. This follows, primarily the global links in a cyberspace in terms of critical infrastructure of the state’s and intergovernment’s objects in the international security environment and the fact that the cyberaggressor’s tools are becoming cheaper, and their skills are more and more advanced. There is an urgent need for the analysis of present and future cyberthreats in the security environment, to understand their impact on everone, States, Nations and organizations and develop effective methods of response in this highly complex reality. The article presents the concept of defining of main types of cyberhreats (i.e. information warfare, cyberterrorism, cybercrime and cyberespionage) on the base of the new theoretical approach of modern security environment model.