scholarly journals Swimming buses

2018 ◽  
Vol 19 (9) ◽  
pp. 193-196
Author(s):  
Agnieszka Zdanowicz

The article presents innovative concepts of the construction of ,,swimming buses” as a means of transport, both on land and on water. Amphibian is a dual-use vehicle. It can be used for various applications in the military area, rescue operations, as well as tourism. The article focuses on the description of the concept of an ,,swimming buses” in various countries. The success of each concept is largely based on research and development, although amphibious buses are already known, and vehicles of this type still have a long way to go through innovative development.

2020 ◽  
pp. 128-131
Author(s):  
И.В. Баранова ◽  
М.А. Власенко

В статье рассмотрен гособоронзаказ как драйвер развития предприятий оборонно-промышленного комплекса, требования обеспечения финансовой устойчивости предприятий при исполнении ими гособоронзаказа. Диверсификация оборонно-промышленного комплекса РФ и конверсия производства предприятий, входящих в данный комплекс, ориентированные на производство продукции двойного назначения, а также повышение объемов продаж в среднесрочной перспективе рассматриваются как факторы повышения их финансовой устойчивости. The article considers the defense procurement and acquisition as a driver for the development of enterprises of the military-industrial complex; the requirements for ensuring the financial stability of enterprises when they perform a state contract under the state defense order. The diversification of the Russian military-industrial complex and the conversion of production of enterprises included in this complex, focused on the production of dual-use products, increasing sales in the medium term, are considered as factors for increasing the financial stability of enterprises in the military-industrial complex.


2020 ◽  
Vol 95 (11) ◽  
pp. 1652-1657
Author(s):  
Todd E. Rasmussen ◽  
Arthur L. Kellermann ◽  
Terry M. Rauch

Author(s):  
Heorhii Khvichiia-Duve

The study addresses the research component used to provide infrastructure facilities for enhancing innovative development in Ukraine. More specifically, the article considers the main infrastructure facilities, which accelerate innovative development. The paper also evaluates preconditions for building research capacity in the country and its funding by structuring expenditures on research and development by sources of funding. The issues of creating intellectual capital are put forward and examined. The article introduces a number of factors, which hinder providing investment support for the infrastructural development of the economy. Finally, the paper formulates a set of measure to be taken in order to integrate the innovative infrastructure of the national economy into the world economic system.


2018 ◽  
Vol 21 (3) ◽  
pp. 497-517
Author(s):  
Marcus Schulzke

AbstractThe controversy surrounding military drones has generated many proposals for restricting or prohibiting existing drones, additional autonomous variants that may be created in the future, and the sale of drones to certain markets. Moreover, there is broad interest in regulating military drones, with proposals coming not only from academics but also from NGOs and policymakers. I argue that these proposals generally fail to consider the dual-use character of drones and that they therefore provide inadequate regulatory guidance. Drones are not confined to the military but rather spread across international and domestic security roles, humanitarian relief efforts, and dozens of civilian applications. Drones, their component technologies, the control infrastructure, and the relevant technical expertise would continue to develop under a military-focused regulatory regime as civilian technologies that have the potential to be militarized. I evaluate the prospects of drone regulation with the help of research on other dual-use technologies, while also showing what the study of drones can contribute to that literature. Drones’ ubiquity in nonmilitary roles presents special regulatory challenges beyond those associated with WMDs and missiles, which indicates that strict regulatory controls or international governance frameworks are unlikely to succeed. With this in mind, I further argue that future research should acknowledge that drone proliferation across military and civilian spheres is unavoidable and shift focus to considering how drone warfare may be moderated by countermeasures and institutional pressures.


Author(s):  
Alex Roland

‘Technological change’ presents three perspectives on the nature of change in military technology: research and development, dual-use technologies, and military revolutions. World War II ushered in two momentous transformations in the world’s relationship with military technology: the nuclear revolution and modern, institutionalized, routinized research and development. Non-weapons dual-use technologies include fortifications, roads, steam engines, the internal combustion engine, electric and electronic communication, and computers. Weapons dual-use technologies include the Schöningen spear, the bow and arrow, the chariot, nuclear power, explosives, and automatic firearms. Military revolutions have been divided into two arcs of analysis: the role of military revolutions in history and the revolution in military affairs.


Author(s):  
G. Giacomello

Computers have always caused psychological uneasiness in the human brain. That a computer is the closet thing to a thinking machine can be discomforting. That average users have little understanding of the complexity and intricacies of how computers and software operate only add to the distress. Networked computers further increased the puzzlement of human beings. The media (suffering from the same poverty of information as the public) have picked up catchwords like cyberwar, netwars, cyberterrorism, and cybercrime. Speaking of Electronic Pearl Harbors and comparing modems to bombs have only contributed to increasing the level of media hysteria and confusion in public opinion. Schwartau (1994) is a classic example. Imagine that poorly informed journalists start telling the general public that ruthless hackers (hired by terrorists) could take over the power grid and shut it down, or cause patients’ death after their medical records have been compromised. The mere suspicion that terrorists could perform such acts would be enough to fueling the fear factor, which regularly happens as a result of this crying wolf. Under these circumstances, cyberterrorism seems like a nightmare come true. As Embar-Seddon (2002) noted, the word terrorism brings together two significant modern fears: the fear of technology and the fear of terrorism. Both technology and terrorism are significant unknowns and unknown threats are generally perceived as more threatening than known threats. To some extent, cyberterrorism does not need to be manifested itself in any significant way because many already believe it to be real. This article will try to dispel some of the myths of cyberterrorism, such as the contention that terrorists could remotely take control of critical infrastructure and thus bring a country to its knees. In fact, today, cybercrime and economic damage caused by hackers are far more real and serious threats than terrorists. Misdeeds are more likely to be committed by disgruntled insiders than skilled outsiders (Randazzo et al., 2004). There is no commonly accepted definition of terrorism, hence cyberterrorism has been variously interpreted. For example, Sofaer et al. (2000) defines it as “intentional use or threat of use, without legally recognized authority, of violence, disruption or interference against cyber systems” (p. 26), resulting in death or injury of people, damage to physical property, civil disorder, or economic harm. The probability, however, that cyberattacks may actually cause victims is extremely low. Furthermore, Sofaer et al. tends to exclude states from committing terrorist acts, which is also debatable. Hughes (2004) observes cyberterrorism as a diverse set of technologies whose purpose is to scare people, but scaring people without getting anything in return is simply useless. Paraphrasing a working definition of terrorism, I would identify cyberterrorism as the use of digital means to threat or undertake acts of organized violence against civilians to achieve political advantages. Perpetrators then could be nonstate groups or sovereign states. Terrorists spreading scary stories to terrify the populace via the Internet would also qualify. Finally, because of cost efficiency, information and communication technologies have blurred the distinction that long existed between the noncombatant and the combatant spheres. The technology on which the military now rely is exactly the same commercial off-the-shelf hardware and software products that civilians have in their homes and offices (Department of the Army, 2003). Military and civilians alike use largely the same computer networks, which were designed for ease of use and not for hardened communications. During the Cold War, dual use technology (civilian hardware and software) was considered “dangerous” because it could help the Soviets close the gap with the West. Paradoxically, dual-use technologies are now “good.” One of the many downsides of such a situation is that if terrorists hit computer networks, in theory, they could hit multiple targets: the economy, law enforcement agencies, emergency services, and (albeit to a lesser extent) even the military. For terrorists this scenario would be a dream come true. Reality, however, is substantially different.


2019 ◽  
Vol 290 ◽  
pp. 13001
Author(s):  
Dorel Badea ◽  
Gabriel Mănescu ◽  
Dumitru Iancu ◽  
Olga Bucoveţchi ◽  
Anca Dinicu

Changes in the security spectrum, in terms of reconfiguring its military content, subsequently involves another approach to security and defense research. Especially the economic aspects have a quantitative and qualitative impact on the management of the research specific to this field, which has long been taken for granted, causing changes in both the interests and the power of influence held by different categories of stakeholders. This article explores the main directions of change within the aforementioned framework, highlighting the major modalities of involving the civilian segment of capabilities and specialized assets, on a track considered for a long time and to a much greater extent compared to the present imperatives, as an area dedicated exclusively to the military. The thematic target approached by the team of authors includes both national and international plans, individualized or clustered, at the current level but also as trends, the main aim of the scientific approach is that of highlighting good practices in the field of research and development of dual-use products. The conclusion is that the possibilities of the civilian-military academic cooperation can be better grounded in order to achieve better results in terms of the operationalization of the security interest in a comprehensive manner, materialized mainly through research projects.


Sign in / Sign up

Export Citation Format

Share Document