Online first
Current issue
All issues
About
Aims and scope
Peer review process
Publication policy & ethics
Editorial Board
Reviewers
Publisher
Guide for authors
Call for papers
The contemporary problems of management, defence and security
Non-traditional conflicts, non-state actors, and use of proxy forces in modern warfare
Non-military aspects of security in the changing international order
Online first
Current issue
All issues
About
Aims and scope
Peer review process
Publication policy & ethics
Editorial Board
Reviewers
Publisher
Guide for authors
Call for papers
The contemporary problems of management, defence and security
Non-traditional conflicts, non-state actors, and use of proxy forces in modern warfare
Non-military aspects of security in the changing international order
Online first
Current issue
All issues
About
Aims and scope
Peer review process
Publication policy & ethics
Editorial Board
Reviewers
Publisher
Guide for authors
Call for papers
The contemporary problems of management, defence and security
Non-traditional conflicts, non-state actors, and use of proxy forces in modern warfare
Non-military aspects of security in the changing international order
Keywords index
:
&
2
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Y
:
: Iran
&
& League of Nations
2
21 century’s operational environment
A
AAR
Academic Legion
Academy of National Defense
acquisition
actions
administration
Adult Education
aerological system
Africa
air
air defence
air defence systems
air operations
air strikes
air terrorism
air threats
Airborne
airlines
airport
airports
airspace
airspace management agencies
airstrip in Afghanistan
airstrip in Chad
Al Qaeda
all-volunteer force
alliance
anarchy
anti-drone systems
Approaches and Study Skills Inventory
approaches to studying
Arab Spring
Arctic
armament
Armed
armed conflict
armed conflicts
Armed Contractors
Armed Forces
armed protection formation
arms races
arms trade
arms transfer
arson terrorism
assessment model
ASSIST
association agreement
asymmetric threats
asymmetric warfare
attitudes
audience
Auditor
autonomisation
autonomy
aviation
B
background
balance of power
balance of threat
Balkans
ballistic missile
ballistic missiles
Baltic
Baltic Sea Region
baltic security
Baltic States
basic health care
bibliography
blended learning
Boko Haram
Border Guard
boundary
C
C4ISR
Caliphate
Capability-Based Defence Planning
Cardinal de Richelieu
causes
CBRN defence
Central African Republic
Central Europe
Central European security
Central-Eastern Europe
Chain
challenges
change
charter
checking passengers
chemical corps
chemical pollution
chemical weapons
China
city
civil protection
civil-military integration
civil–military relations
climate change
Closed national network
cloud system
co-operating units
cocaine traffic
cognitive script
collective
combat toxic agents
combating terrorist fi nancing
common security
communication technologies
Comparative Analyses
component
comprehensive approach
Concert of Europe
conflict
conflict in Ukraine
conflicting parties
Congress
consequence management
consequences
constructivism
contemporary
Convention
cooperation
core curriculum
corridors in airspace
corruption
counter-insurgency
counterterrorism
covenant
COVID-19
crime
crises management
crisis communication
crisis management
crisis response operation
crisis situation
criteria of evaluation
critical
critical infrastructure
critical situation
Croatian Defence Academy
curriculum
Cyber
cyber attack
cyber defence
Cyber Defense
Cyber Doctrine
Cyber resilience
cyber security
Cyber Strategy
cybercrime
cybersecurity
cyberspace
D
Daesh
de facto state
decisions in past
defeat
defence
defence and security institutions
defence belief
defence diplomacy
Defence economics
defence expenditure
defence industrial base
Defence Industry
defence planning
Defence policy
defence research
defence resource
defence science
defence strategy
defensive organisations
democracy
demography and migration
Deployable forces
destabilisation
destabilising forces
destruction
deterrence
didactics
digital human resources management
discourse analysis
disruptive technologies
dissemination
Donbas
Dr. Franjo Tuđman
drinkable water
dual-use technologies
E
early warning system
East
Eastern Partnership
economic growth
economic security
economy
education
education for safety
effectiveness
electro-mechanical system
emergency management
energy acquisition
energy resources
energy sector
energy security
Enterprise Architecture
Enterprise Resource Management
entrepreneurship
environment
environmental protection
Estonia
EU Battlegroups
EU Common Security and Defence policy
EU CSDP
EU-Africa relations
EU-Ukraine relations
European
European Neighborhood Policy
European security
European Union
Europol
evaluation
Executive Outcomes
expert opinion
F
facebook.com
factors
Far East
Federation
feeling of security
feminism
fighter aircraft
Financial Information
fitness application
flood
for security
for Students
forces
forecasting
foreign and security policy
Foreign missions
foreign policy
form
four pillars
France
FRONTEX
future
future security
future warfare
G
Gaming for peace
GAP
Gap Project
Gaza Strip
gender awareness
General Inspector of
General of Canada
Geneva Convention
geopolitical environment
geopolitical location
geopolitics
geoportals
geostrategic situation
geostrategy
Germany
global education
global security
globalisation
government
grand strategy
great power competition
Greece
grounded theory
H
H2020
Hague
Hezbollah
hijack
history
Holy Roman Empire
hostilities
human being
human health
human traffi cking
humanitarian
Hungarian Defence Forces
hybrid
hybrid security threats
hybrid threats
hybrid warfare
I
ICT tools
illegal immigration
immigrants
immigration
imperial expansionism
imperialism
in Warsaw
incendiary devices
increasing the effi ciency of use of
Industry 5.0
influence
informal institutions
information and
information and communication technologies
information communication
information environment
Information Management
information models
Information Science
information society
information superiority
information war
information warfare
infrastructure
insurgency
integration and disintegration of
integration policy
intelligence
International Balance of Power
international crisis management
International humanitarian law
international law
international relations
international security
international system
internet
ionising radiation
ionizing radiation
Iran
Iraq
ISIS
ISIS and New Middle East
Islamic State
ISOK
Israel
J
jihadist games
joint military units
K
Kaliningrad Oblast
kamikazes
Kato da Gora or Durza Ka
Kosovo
Kurdish Issue
Kurdish Regional Governent
Kurdistan Region
L
land forces
landing zone
large-format retail centres
laser attenuation
laser weapon
Latvia
learning style
legitimation code theory
levels of
Leyte
liberal
liberalism
Libya
Lithuania
logistics
Logistics centre
M
Macbeth
Mali
management
Management safety
manner
maritime campaigns
Marxism
means
measurement
media
Mediation
mediator
medical rescue
meteorological radars
meteorological telegram
Middle
Middle East
Middle East and North Africa
migrant groups
migration
migration governance
militarisation
military
military activities
Military air traffic
Military Capability
military classes
military cooperation
military diplomacy
military doctrine
military education
military intervention
military interventions
military logistics
military operations
Military Recon
Military Supply
military system
military technologies
military technology
military training
Military Transformation
militia
missile defence
missions
mitosis
modern battlefi eld
modern war studies
modern warfare
money laundering
Money Laundering
monitoring
moral norms
motives
multicultural education
multinational operations
N
national contingent
national identity
national resilience capacities
national security
NATO
Near Earth Object (NEO)
negotiations
network security
networking
new dimension of war
new institutionalism
Nigeria
NIMBY groups
Nodal infrastructure
Non-Proliferation Regime
norms
North Korea
northeastern region
Northern Sea Route
NSA
nuclear
nuclear platforms
nuclear triad
nuclear weapon
nuclear weapons
O
obliged entities
oil
open source
open source intelligence
Operation Olympic Games
operational capabilities
operational environment
operational fi res
operations
Organisational Learning Culture
OSINT
outer space
P
Paratroopers
Passport Program
peace
peace operations
peacekeeping
peacekeeping missions
peacekeeping operations
perception of threats
PESCO
planning
pluralism
PMCs
Poland
polemology
police
policymaking
Polish airspace
Polish Army
Polish Police Contingent
political participation
political relationships
political status
political will
popular justice
popular militia
population protection
post-modern army
Potentially Hazardous Asteroids (PHA)
power
powerbroker
Powermetrics
practitioner research
pre-deployment training
prestige
Private Military Companies
private security companies
private security sector
privatization
pro-
production
professional military education
programme “Świerszcz” [English: “Cricket”]
propaganda
property and personal Security Companies
proxy
Proxy force
Proxy Forces
proxy forces
proxy war
proxy warfare
PRT
psychological operations
public
public safety
public security
Q
qualitative
qualitative study
quality
Quick reaction
R
radiation safety
rational choice
realism
reform
refugees
regulations
Rentier State
research
research and development
research and technology
reserve training
reservist associations
reservists
resistance
resource scarcity
revolution
risk
risks
rogue drones
Rokeach Values System
roots
Russia
Russia and Central Europe
Russian
Russian Federation
Russian information confrontation
S
safety
sanitary aviation
satellite communication
satellites
scientific information
scientific research
Sectarian division
Securitization Theory
security
security challenges
security culture
Security Education
Security environment
security guard
security policy
Security Sector Reform
security studies
security system
security threat
Security Threats
security threats
Serbia
Shia armed groups
SMOK system
social economy
social integration
social media
social security
social structure
Society
solution
sovereignty
space
space law
spatial
special operations
special services
Special Staff Assistance Visit
specialised
stabilisation
state
state security
states security
stereotypes
Strategic Airlift Capability
strategic culture
strategic deterrence
strategic documents
strategic security environment
strategic trust
strategy
Strategy and Foreign Policy
structure and tasks of the armed
Stuxnet
subjectivity
Subterranean
Sulek’s Model
superpower
supply chains
support operations
surrogate forces
Suunto
Syria
system
systematics
T
Tactical
teacher
teaching and learning methodologies
teaching process in upper secondary schools
technologic empowerment
technology (ICT)
Terrain and Weather
terrorism
terrorist attacks
terrorist threat
the Arctic Circle
the Arctic Council
the neoclassical realist theory
the Philippines
the Republic of Poland
The Royal Military College of Canada
the Suwałki Gap
Thirty Years War
threat
threats
Three Seas Initiative
tiered risk assessment
TOC
tourism
training
Training Transfer
Transport Battalion
tunnel
Turkey
typology
U
Ukraine
un-conventional security
uniform classes
uniformed classes
Union
Unit 8200
United States
Unmanned Aerial System
unmanned aerial system/vehicle (UAS/UAV)
Unmanned Aerial Vehicle
unmanned aerial vehicles
unmanned aircraft systems
unmanned autonomous systems
USA
V
values
victimisation
violations
virtual reality
Visegrad countries
Visegrad Group (V4)
volunteer reserves
vr
vulnerability
W
war
warfare
Wargaming
warning
Warsaw Summit
weapons of mass
weapons of mass destruction
weather
weather information
Westphalia
wireless security
women
Y
young people
youth
Submit your paper
Guide for authors
All issues
Most read
Fitness OSINT: Identifying and tracking military and security personnel with fitness applications for intelligence gathering purposes
The impact of crime on security in tourism
Defence diplomacy – an important tool for the implementation of foreign policy and security of the state
Indexes
Keywords index
Topics index
Authors index