Victimization is the process of assuming the role of a victim. Even early criminological theories indicated how important an individual’s personality can be in this process. In contemporary theories of the psychopathology, the causes of vulnerability to becoming a victim lie in maladaptive schemas, i.e. dysfunctional patterns of thinking, behaviour and experiencing emotions. Research indicates that, in particular, the area of disconnection / rejection that develops in early childhood in relationships with parents and / or peers promotes susceptibility to victimization. The article describes the cases of three patients who were diagnosed with the indicated patterns in the area of disconnection / rejection, as a result of experiencing direct violence in their childhood. Their examples show how the tendency to become a victim continues in adulthood. It seems important to recognize maladaptive schemas, also in the context of the victimization process. Proper work with the victims of crime can be the basis for environmental change, which will be important both for avoiding victimisation in the future, but also for stabilizing the negative behaviour of the perpetrators themselves.
The article presents an in-depth identification of the polemological aspects of research on the subject of wars and armed conflicts of the 21st century. Moreover, it discusses the evolution, scale and nature of contemporary, as well as future wars and armed conflicts. The article refers to the essence, properties and characteristics of ‘new wars’ and the possibility of studying them by using appropriate instruments. Based on the conducted research, an attempt is made at forecasting wars and armed conflicts of the future. The article also highlights the activities and functioning of contemporary research institutes and facilities engaged in the analysis of war and armed conflicts, and focuses on the legitimacy and needs of implementing the polemological approach to the research of the presented subject in the present global-informational security conditions.
Since September 11, 2001, airport security control procedures have expanded in the face of the increased threat of terrorist attacks on aircrafts and airports. Obligatory and meticulous checks are carried out on all passengers although the overwhelming majority of passengers do not pose any risk. Current airport control procedures are expensive and inefficient; they extend the time spent by passengers at the airport and contribute to increased crowding; they inhibit the development of interconnected transport systems and significantly reduce the comfort of passengers who pose no threat. As the security needs of air transport morph, security experts are considering replacing the existing across-the-board procedures with personalized and more selective control processes based on data and behavioral analysis to reduce the duration of airport check-in procedures and improve the effectiveness of security controls. Such solutions have been successfully tested over the past decades at Israeli airports and check-in terminals by the Israeli state carrier El Al, which has the reputation of being the best-protected airline in the world. The FLYSEC system, developed and tested in 2015-2018 at Luxembourg Airport in cooperation with the local university, operates on similar principles although its implementation is less invasive. Modern computer tools for analyzing travel history data and data from current bookings as well as algorithmic methods of behavioral analysis based on advanced detection, identification, crowdsourcing and tracking systems all feed into such smart, selective and personalized security controls. Smart, selective control systems are based on the basic assumption that passengers can be accurately and effectively sorted into different risk groups (e.g. low-risk/trusted passengers, normal passengers, high-risk passengers), long before they arrive at the airport and create a real threat. There are many effective techniques for profiling and identifying perpetrators already used in criminology, criminalistics and computer forensics that are also suitable for use in smart security systems to better meet the current and future needs of civil air transport. The article presents the idea and general characteristics of smart, selective and personalized security control systems, followed by structuring of the analytical field and problem analysis in terms of their implementation conditions, opportunities, threats, conflict-forming potentials and controversies, as well as the needs for more detailed research and their suggested directions.