• Ensuring the ornithological safety of aircraft flights in conditions of deep uncertainty

    pg(s) 25-28

    Analysed the influence of the threat of an aircraft collision with birds as the most important factor in flight safety (bird strike problem). An analytical review of aviation accidents with birds for the period 2010-2022 was carried out. The problem of ensuring ornithological flight safety considered as decision-making under conditions of uncertainty problem. Existing approaches to assessing the level of ornithological danger in aviation and decision-making are discussed. A scenario approach to reducing the risk of bird strike danger as a task of decisions making in conditions of uncertainty is proposed

  • Model of the Whistleblower Protection System

    pg(s) 9-11

    The construction of the system for the protection of whistleblowers is in accordance with the legal framework of the Republic of
    Bulgaria and the EU Directive.
    The report defines a multi-layered model of the protection system, including:
    – Information on violations;
    – Persons who granted protection:
    – Obliged entities, including:
    – Employers in the public and private sector;
    – Institutions, bodies, services and agencies of the EU;
    – European Commission.
    Signaling channels, duties and functional interactions between the main elements of the model are structured. A mechanism for
    synchronizing and controlling signal processing activities s presented. The model is a theoretical basis for the construction and functioning
    of the whistleblower protection system.

  • A coordinated approach to achieve a higher overall level of resilience and protection of critical infrastructure

    pg(s) 6-8

    Developing a coordinated and effective response to critical infrastructure (CI) threats, current and anticipated, requires achieving a higher overall level of resilience and protection. The growing interdependence between physical and digital infrastructure creates opportunities for malicious cyberspace actions targeting critical areas to disrupt functionality or damage physical infrastructure. In this regard, through the application of specific approaches to strengthen the resilience of CIs, it is possible to improve the capabilities to counter physical and hybrid threats.
    Presenting an option for an effective response agai nst CI threats through the development of security systems is the content of this publication.

  • Organizational resilience and critical infrastructure security systems

    pg(s) 3-5

    The identification and protection of critical infrastructure (CI), which provides essential services for the national and European markets, especially in key sectors of the economy, requires priority measures to be taken to increase its resilience. The concept of resilience is closely related to the ability of a CI to prevent, defend against, respond to, withstand, mitigate and absorb, adapt to, or recover from risk events. Here, both the organizational measures and the technical part of the security systems, developed according to the specifics of CI, play an essential role.
    In this regard, this publication presents the framework of the author’s view on the relationship between organizational resilience and CI security.

  • Possible structure of standard operating procedure to ensure the operation of security systems

    pg(s) 55-58

    Standard operating procedures describe the precise steps required to carry out the organization’s security tasks in the operation of security systems and are important both for maintaining the level of competence of personnel performing a particular security job and for training new employees. Reducing errors in security-related activities and mission-critical processes is at the core of these procedures. Also, providing information on identified gaps, together with a survey of emerging technologies, is expected to help critical infrastructure operators seek future capabilities to create security and optimize the content of standard operating procedures.
    Precisely, the presentation of a variant of standard operating procedures for the functioning of security systems is the basis of this paper.

  • Some benefits of building key partnerships to develop security systems

    pg(s) 51-54

    Research and innovation is the part of an organization’s business that shapes the ability of its management and staff to acquire knowledge, design, develop and improve products, services, technologies and processes. Realizing key partnerships in collaborative research and innovation are critical to long-term success for high-tech organizations, while at the same time key to improving business skills, expanding product and service portfolios, and delivering cutting-edge applied research in interest of the country’s security. Presenting some of the benefits of building key partnerships between organizations in the development of security systems is the content of
    this publication.

  • Green Agenda and Green Consumerism in the Function of Plural Society in the Bosnia and Herzegovina and its Energy Security

    pg(s) 47-50

    The problem is the lack of social consensus in Bosnia and Herzegovina (hereinafter B&H), as a plural society (hereinafter PS), which is why it is directed with its segments to the only sustainable joint activity of the segments – the market, and related economic activities. The subject are the characteristics of alternative development solutions – Green Agenda (hereinafter GA), green and circular economy (hereinafter GE, CE) and green consumerism (hereinafter GC), which are in the function of PS. We accept the hypothesis that the unsolved pre-political (cultural) issues of B&H even in the 21st century condition the application of alternative development solutions – GA, GE, CE and GC, which are in the function of PS and its energy security (hereinafter ES). The scientific goals are: 1) description of the peculiarities of PS in B&H, 2) understanding the importance of GA for the Western Balkans and the differences between the linear economic model and GE and CE, and between shallow and deep GC, and 3) explanation of functionality of GA, GE, CE and GC for PS and its ES..Analytical-deductive and comparative methods are used, along with the case study of B&H. The main result is the discovery of the functionality of GA, GE, CE and GC for the functionality of PS in B&H and its ES.

  • A variant of the risk profile of a business model in the development of intelligent security systems

    pg(s) 7-10

    Business models (BMs) are business plans used by an organization to create, deliver, and acquire value. There is a strong need in different areas of business to develop a better understanding of BM’s risks. The appropriate risk framework would support the full range of risk management capabilities, namely identifying key risks, quantifying and, finally, managing those risks.
    Therefore, in developing the organization’s BM, it is necessary to create a better understanding of the risks associated with the development of security systems. The proposal for a variant of the BM risk profile framework for the establishment of security systems is the content of this publication.

  • Flexible business models applied to products and systems in the field of security systems with different Technologiy Readiness Levels

    pg(s) 3-6

    The growing importance of business models (BM) is primarily due to significant changes in competitive conditions for business over the past two decades. The creation of BM in the development of security systems is a structured approach that is consistent with the characteristics of security objects.
    At the same time, in the international aspect, in the field of intelligent security systems, the practice of systematic application of different levels of the Technology Readiness Levels (TRL) scale is required, which allows security systems technology to develop from concept to research, development and implementation. Iterations between different levels of TRL are possible, especially during the development phase.
    Namely the study of the flexible application of BM in the development of security systems and their connection with the TRL i s the purpose of
    this paper.

  • Possible approach for standard operating procedures development for intelligent security systems functioning

    pg(s) 81-84

    Standard Operating Procedures are a common guide to the organization’s activities. Their development and use are an integral part of a successful management system of an organization, as it provides staff with information on the proper per formance of a job and facilitates consistency in achieving the desired end result.
    Standard Operating Procedures describe the exact steps needed to perform the organization’s security tasks and are important both for maintaining the level of competence of the staff performing a particular job and for training new employees. To reduce errors within organisation in terms of security-related activities and the mission-critical processes is the basis of this paper.

  • Multi-Domain Operations – A New Approach in Warfare?

    pg(s) 78-80

    In this paper, the author studies the so-called Multi-Domain Operations, which is a relatively new term in military science. The study focuses on the origin, definition and elements of multi-domain operations. Since the terminology is developing – or at least changing – quite fast from multi-domain battle across multi-domain operations to all-domain operations besides terms like cross-domain operations/effects, this emerging process need to be studied. The paper examines if this term describes a new approach of warfare or it is an old concept in a new guise.

  • Possible integrity framework between the Intelligent Security Systems parameters and the Business Continuity Management processes

    pg(s) 42-45

    At its core, business continuity management (BCM) is a process that identifies potential threats to an organization and the impacts on business operations that they could cause if they happen. This process provides a framework for building resilience of the organization and the ability to respond effectively. BCM can help organizations to reduce the negative effects and to protect business reputation under adverse circumstances, whether internal or external, to reduce downtime and recovery costs.
    Like continuity, sustainability focuses on maintaining the processes and procedures that help businesses survive unexpected threats. Recognizing that businesses operate in an environment of constant change, sustainability focuses on how best to preserve the value in these complex environments.
    But effective BCM process can happen through synergy of administrative and organizational activities (strategies and plans) and operation of flexible, intelligent security systems (ISS). The innovative solutions for the development of the systems are closely related to the requirements formulated in the separate stages of the process of building the BCM of the organization, incl. sustainabili ty, providing warning and prevention of the threats, prevention of terrorist acts and thus ensuring the safety of people and the competitive advantage of business. Understanding the value of connecting different security systems and how they can be integrated is a key component in
    developing more intelligent security.
    The link between risk management and BCM plays a significant role here. Risk management strategies (risk avoidance, risk acceptance or risk mitigation – by risk sharing or risk transfer) are responses to a “preliminary event” of perceived and assessed risks. Most BCM strategies and tactics focus on the processes that must occur after an event or disaster. The goals of these processes are to return the business to normal operation as efficiently and effectively as possible. Namely the relationship between the process of building BCM and ISS development is the subject of this publication