The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expect...
This study investigates the contents of key documents of international rank regulating the transfer of weapons and military technologies in order to mark the principles that rule this kind of state activity. The followin...
The article is an attempt to analyse the synoptic situation during the major campaigns of the twentieth century, based on the reconstruction of digital weather maps. The analysis presented allows us to determine the weig...
Undertaking to determine scientifically substantiated conditions for the functioning of destabilising forces and methods for countering them in contemporary operations fits in the broad scope of security. This paper repo...
The research objective of the paper is to analyse the recent, ever more pronounced shifts and changes in security dynamics between China and its “Wests”.
The methods used in the study consist of in-depth going qualitati...
Tackling cyberspace threats – The international approach
The fact that NATO has acknowledged cyberspace as the fifth dimension of combat operations indicates that this problem issue is really topical and is pointing at the direction from which the possible threat can be expect...
Rules for the transfer of weapons and military technology in the light of contemporary international law
This study investigates the contents of key documents of international rank regulating the transfer of weapons and military technologies in order to mark the principles that rule this kind of state activity. The followin...
Meteorological elements of selected historical events based on the weather map’s digital reconstruction
The article is an attempt to analyse the synoptic situation during the major campaigns of the twentieth century, based on the reconstruction of digital weather maps. The analysis presented allows us to determine the weig...
Combating destabilising forces in modern operations. Research report
Undertaking to determine scientifically substantiated conditions for the functioning of destabilising forces and methods for countering them in contemporary operations fits in the broad scope of security. This paper repo...
China and its wests – evolution of security dynamics and its consequences for the defence industries of the involved actors
The research objective of the paper is to analyse the recent, ever more pronounced shifts and changes in security dynamics between China and its “Wests”. The methods used in the study consist of in-depth going qualitati...