Achieving positive production and economic results in the businesses is no longer a product of the efforts of an organic circle of people, but a result of the activity of the members of the entire organization.Thus, the issue of employee motivation and commitment to the business entity becomes one of the basic prerequisites for the organizational efficiency and success. The lack of motivation and attachment to the goals of the company lead to increased staff turnover and reduced efficiency. This makes the investment of training, qualification and professional development of the human resources meaningless. The aforementioned necessitates the study and analysis of the main factors, which determine the people’s behavior at work, their motivation and involvement in the business entity.The purpose of this research is to investigate the relationship between the motivation of human resources and their commitment to the business organization. Establishing the interaction between the different determinants is essential in practical terms, as it allows one to predict the appearance of a certain attitude or behavior in the presence of the others.
For the last two decades, lone wolf terrorists in Western countries have been significantly changing their modus operandi. Part of these changes and possibly even one of their causes is the increasing use of the internet by lone wolves. This article reviews the role of the internet in the preparation of a terrorist attack as well as during the process of radicalisation of lone wolves. The possibilities and methodical flaws of lone wolf identification on the internet are also discussed. Based on current knowledge, it can be said that the Internet still has a limited role for lone wolves during the preparation of their terrorist attacks. However, it has been demonstrated, that as an efficient communication tool, the internet is of considerable importance in the process of lone wolf radicalisation. The internet is also a place where lone wolves may leak indications of their future actions. These leakages may be utilised for the identification of future lone wolf terrorists on discussion forums or radical websites using semi-automatic methods. However, the biggest drawbacks of these methods is their inability to distinguish between future lone wolf terrorists and common radical authors with no real intention on committing any terrorist act.