Table of Contents

  • THEORETICAL FOUNDATIONS OF SECURITY

    • Green Agenda and Green Consumerism in the Function of Plural Society in the Bosnia and Herzegovina and its Energy Security

      pg(s) 47-50

      The problem is the lack of social consensus in Bosnia and Herzegovina (hereinafter B&H), as a plural society (hereinafter PS), which is why it is directed with its segments to the only sustainable joint activity of the segments – the market, and related economic activities. The subject are the characteristics of alternative development solutions – Green Agenda (hereinafter GA), green and circular economy (hereinafter GE, CE) and green consumerism (hereinafter GC), which are in the function of PS. We accept the hypothesis that the unsolved pre-political (cultural) issues of B&H even in the 21st century condition the application of alternative development solutions – GA, GE, CE and GC, which are in the function of PS and its energy security (hereinafter ES). The scientific goals are: 1) description of the peculiarities of PS in B&H, 2) understanding the importance of GA for the Western Balkans and the differences between the linear economic model and GE and CE, and between shallow and deep GC, and 3) explanation of functionality of GA, GE, CE and GC for PS and its ES..Analytical-deductive and comparative methods are used, along with the case study of B&H. The main result is the discovery of the functionality of GA, GE, CE and GC for the functionality of PS in B&H and its ES.

    • Some benefits of building key partnerships to develop security systems

      pg(s) 51-54

      Research and innovation is the part of an organization’s business that shapes the ability of its management and staff to acquire knowledge, design, develop and improve products, services, technologies and processes. Realizing key partnerships in collaborative research and innovation are critical to long-term success for high-tech organizations, while at the same time key to improving business skills, expanding product and service portfolios, and delivering cutting-edge applied research in interest of the country’s security. Presenting some of the benefits of building key partnerships between organizations in the development of security systems is the content of
      this publication.

    • Possible structure of standard operating procedure to ensure the operation of security systems

      pg(s) 55-58

      Standard operating procedures describe the precise steps required to carry out the organization’s security tasks in the operation of security systems and are important both for maintaining the level of competence of personnel performing a particular security job and for training new employees. Reducing errors in security-related activities and mission-critical processes is at the core of these procedures. Also, providing information on identified gaps, together with a survey of emerging technologies, is expected to help critical infrastructure operators seek future capabilities to create security and optimize the content of standard operating procedures.
      Precisely, the presentation of a variant of standard operating procedures for the functioning of security systems is the basis of this paper.

  • NATIONAL AND INTERNATIONAL SECURITY

    • Analysis of barriers to adaptation to climate change

      pg(s) 59-63

      Climate change is causing disasters such as floods, whirlwinds, storms, drought, or other extreme weather events that have not yet occurred in certain areas of the world or have not occurred to such an extent and intensity as it is happening now or is predicted in the foreseeable future. Government and, in particular, crisis management system should reflect these facts in order to prepare itself and the population on such events. People should also be interested in preparing for and adapting to these changes and related crisis events. The aim of the article is to examine preparedness of the population in the Slovak Republic and, in particular, to analyse the barriers to climate change adaptation of the population. For the analysis are used the questionnaire survey results on this topic. The initial results indicate the influence of the population by various barriers and factors.

    • Brief description of the identification of vital areas in nuclear facilities process

      pg(s) 64-67

      The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. Operators have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to effectively respond to nuclear security events. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Identification of vital areas is an important step in the process of protecting against sabotage. Vital area identification (VAI) is the process of identifying the areas in a nuclear facility around which protection will be provided in order to prevent or reduce the likelihood of sabotage.

    • Possible approaches to ensure security of information for nuclear facilities

      pg(s) 68-71

      Sensitive information is information, in whatever form, including software, the unauthorized disclosure, modification, alteration, destruction, or denial of use of which could compromise nuclear security. Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities or processes. Information security not only includes ensuring the confidentiality of information, but also includes ensuring the accuracy and completeness of the information (its integrity) and the accessibility or usability of the information on demand (its availability).

    • Cyber warfare, a new aspect of modern warfare

      pg(s) 72-74

      Cyber warfare nowadays is a new and very important concept of the modern world. After land, sea, air and space, the war has entered the fifth dimension: cyberspace. Some computer glitches or attacks paralyze military e-mail systems, refineries and pipelines explode, air traffic control systems collapse, trains derail, financial data gets misdirected, power grids damaged, satellites go out of control. Worst of all, the identity of the aggressor remains a mystery. The effects of a cyber war are similar to those of a nuclear attack. This requires protective measures and security for the information that circulates in these communication systems and networks and constitutes one of the challenges of today’s time. Threats to communication and information systems have made cyber defense in the field of homeland security an element that must be taken into consideration.

  • INFORMATION SECURITY

    • Information security in archival science

      pg(s) 75-77

      The article with the title “Information security in archival science” focuses on the need for the state archives system to be able to meet the modern needs of archival information users, individuals and legal entities. Modernization and updating of archives cannot happen without using the new technological possibilities. At the same time, a challenge of the modern society of rapidly developing and changing information technologies is to what extent can digital information be trusted? Archival institutions have the opportunity to participate in the creation of the so-called a new architecture of security, trust and reliability.
      The article is divided into an introduction, presented a model of the development and implementation of blockchain technology in the National Archives of South Korea, conclusion and literature.

    • Blockchain based solution for securing real property transaction: a case study for North Macedonia

      pg(s) 78-81

      This paper will focus on the implementation of decentralized technologies, such as blockchain, on the issuance and management of real estate properties, starting with ownership of the certificates. The focus will be the improvement of the actual process, as well as increasing integrity and trustworthiness of ownership certificates. A series of technology and methodology selections will be made, along with the main plan of setting up the decentralized networks and enabling communication with the user. We propose a framework to manage real estate property’s certificates and explain in detail the architecture of the system and each component of the system. This system will be based on Ethereum EVM, where the main execution will take place, the smart contracts will be deployed and the main dataset will be stored. IPFS will be used to store files such as photos or scanned documents and will be attached to the certificate in blockchain.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY