18 results on '"BĂLĂCEANU, Ion"'
Search Results
2. VALORI COMUNE ALE ORGANIZAȚIEI MILITARE ȘI ALE DOMENIULUI EDUCAȚIE FIZICĂ ȘI SPORT
- Author
-
ISTRATE, Marius Constantin, primary and BĂLĂCEANU, Ion, additional
- Published
- 2021
- Full Text
- View/download PDF
3. CYBER TERRORISM AND THE EFFECTS OF THE RUSSIAN ATTACKS ON DEMOCRATIC STATES IN EAST EUROPE
- Author
-
MOȘOIU, Ovidiu, primary, BĂLĂCEANU, Ion, additional, and MIHAI, Eduard, additional
- Published
- 2020
- Full Text
- View/download PDF
4. CURRENT CONSIDERATIONS ABOUT INSURGENCY AND COUNTERINSURGENCY IN AFGHANISTAN
- Author
-
MAGHERCA, Traian and BĂLĂCEANU, Ion
- Abstract
Currently, the insurgency as a fact is most present in the country that seems to live in an endless conflict - Afghanistan. Insurgent groups are very active in this area of the world, and nothing seems to stop them. As a natural reaction to this phenomenon, the Afghan authorities are responding with actions that fall more or less in the counterinsurgency category. At the level of the international military coalition that acts in support of the Afghan security forces, were mentioned the main causes that contribute to the perpetuation of this conflict. From the latest analysis, Western specialists say the main cause of the failure of counterinsurgency action is the support given to insurgent groups by Afghanistan”s neighbors by providing those safe areas within their territory where members of the organizations are sheltering the actions taken by the Afghan security forces., BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY, Vol. 8 No. 4 (2019)
- Published
- 2020
- Full Text
- View/download PDF
5. CONSIDERAȚII ACTUALE DESPRE INSURGENȚĂ ȘI CONTRAINSURGENȚĂ ÎN AFGANISTAN
- Author
-
MAGHERCA, Traian and BĂLĂCEANU, Ion
- Abstract
La momentul actual, insurgența, ca fenomen, este cea mai prezentă în țara care pare că trăiește într-un veșnic conflict – Afganistan. Grupările insurgente sunt foarte active în această zonă a lumii și pare că nimic nu le poate opri. Ca o reacție firească la acest fenomen, autoritățile afgane răspund prin acțiuni care se înscriu mai mult sau mai puțin în categoria contrainsurgenței. La nivelul coaliției militare internaționale care acționează în sprijinul forțelor de securitate afgane, au fost menționate principalele cauze care contribuie la perpetuarea acestui conflict. Din ultimele analize, specialiștii occidentali afirmă că principala cauză a insuccesului acțiunilor contrainsurgente îl constituie sprijinul acordat grupărilor insurgente de către vecinii Afganistanului prin stabilirea acelor zone sigure, pe teritoriul lor, în care membrii organizațiilor se adăpostesc de acțiunile întreprinse de forțele de securitate afgane., Buletinul Universității Naționale de Apărare „Carol I”, Vol. 6 No. 4 (2019)
- Published
- 2020
- Full Text
- View/download PDF
6. PROLIFERAREA RACHETELOR BALISTICE ȘI DE CROAZIERĂ, O AMENINȚARE ÎN CREȘTERE ASUPRA MEDIULUI OPERAȚIONAL EST-EUROPEAN.
- Author
-
PETRESCU, Valentin and BĂLĂCEANU, Ion
- Subjects
AGGRESSION (International law) ,CRUISE missiles ,BALLISTIC missiles ,ARMS race ,THREATS - Abstract
Copyright of Bulletin of the 'Carol I' National Defence University / Buletinul Universitatii Nationale de Aparare 'Carol I' is the property of Carol I National Defence University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
7. CENTRELE DE PUTERE MILITARĂ CU MANIFESTARE ACTIVĂ ÎN ARCUL DE INSECURITATE EST-EUROPEAN.
- Author
-
PETRESCU, Valentin and BĂLĂCEANU, Ion
- Subjects
BALANCE of power ,LAND settlement ,INTERPERSONAL confrontation ,PENINSULAS ,FEDERATIONS ,SEAS - Abstract
Copyright of Bulletin of the 'Carol I' National Defence University / Buletinul Universitatii Nationale de Aparare 'Carol I' is the property of Carol I National Defence University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
8. Using the Capital Asset Pricing Model in Information Security Investments.
- Author
-
MOSOIU, Ovidiu, CIOACA, Catalin, and BĂLĂCEANU, Ion
- Subjects
CAPITAL assets pricing model ,REAL options (Finance) ,INVESTMENT information ,INVESTMENT analysis ,NET present value ,INVESTMENT software ,FINANCIAL databases - Abstract
Interest in real option theory has intensified over the last decade due to the high uncertainty faced by some private and public organizations when deciding to make a strategic investment (competitive environment) or when faced with an external requirement of the organizational environment (ensuring security standards). Traditional methods of investment analysis define the existence of investment opportunity by net present value (NPV), ignoring the possibility that an investment will start from a certain moment in the future. In this way, it is not possible to capture the phenomenon in dynamics, which leads to limiting the possibility of solving the existing uncertainty over the time regarding the optimal use of resources. The need to optimize managerial strategies and give some flexibility to decision-makers in relation to the changes in the organization's external environment has triggered the real options analysis (ROA). By using ROA, a win-win situation is created in which the available policy options mitigate uncertainty fluctuations of updated net worth (based on new information available) and, at the same time, by applying the best strategy, maximize earnings. Information security systems are designed on a layered architecture and the decision to improve performance on each layer is the responsibility of strategic management. Being a modular system, it is recommended to build the architecture by stages, depending on the value of the assets. Also, the relatively long duration and costs of implementation, limited resources, irreversible character, and project risks determine the value and evaluation of the investment, involving its representation as a combined option associated with a succession of decisions. The proposed model is inspired from the theory of financial and real options, but also from the fuzzy logic. This approach seeks to anchor specific mechanisms for the study of asymmetric risk events in the security market (perfect market assumptions are of course limiting but provide a quick overview, which is essential for the proposed application). Using the capital asset pricing model (CAPM), the return on investments in the security of IT & C systems, by reference to the investment risk as the estimated value, is defined. Investors can take risks that can be broken down into two components: systematic risks and non-systemic risks. Systematic risk refers to the variability of income caused by external factors (macroeconomic conditions), being a measure of the relative market volatility of relative incomes. Unsystematic risk refers to income variability caused by unpredictable factors (mismanagement decisions, abrupt technologies overtaken). The depreciation of security investments is inherent and leads to the dilemma of small and frequent investments or major and rare investments. On this issue, the proposed model can provide solutions to decision-makers. Uncertainty, irreversibility, growth potential and competition are factors that influence the behavior and investment decision. We consider that by using the capital asset pricing model in the security investments associated with eLerning training systems, we can increase the precision of optimal investment in terms of risk and opportunity balancing. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
9. Using the Capital Asset Pricing Model in Information Security Investments.
- Author
-
MOSOIU, Ovidiu, CIOACA, Catalin, and BĂLĂCEANU, Ion
- Subjects
CAPITAL assets pricing model ,INFORMATION technology security ,DATA protection ,MOBILE learning ,RISK exposure - Abstract
Interest in real option theory has intensified over the last decade due to the high uncertainty faced by some private and public organizations when deciding to make a strategic investment (competitive environment) or when faced with an external requirement of the organizational environment (ensuring security standards). Traditional methods of investment analysis define the existence of investment opportunity by net present value (NPV), ignoring the possibility that an investment will start from a certain moment in the future. In this way, it is not possible to capture the phenomenon in dynamics, which leads to limiting the possibility of solving the existing uncertainty over the time regarding the optimal use of resources. The need to optimize managerial strategies and give some flexibility to decision-makers in relation to the changes in the organization's external environment has triggered the real options analysis (ROA). By using ROA, a win-win situation is created in which the available policy options mitigate uncertainty fluctuations of updated net worth (based on new information available) and, at the same time, by applying the best strategy, maximize earnings. Information security systems are designed on a layered architecture and the decision to improve performance on each layer is the responsibility of strategic management. Being a modular system, it is recommended to build the architecture by stages, depending on the value of the assets. Also, the relatively long duration and costs of implementation, limited resources, irreversible character, and project risks determine the value and evaluation of the investment, involving its representation as a combined option associated with a succession of decisions. The proposed model is inspired from the theory of financial and real options, but also from the fuzzy logic. This approach seeks to anchor specific mechanisms for the study of asymmetric risk events in the security market (perfect market assumptions are of course limiting but provide a quick overview, which is essential for the proposed application). Using the capital asset pricing model (CAPM), the return on investments in the security of IT & C systems, by reference to the investment risk as the estimated value, is defined. Investors can take risks that can be broken down into two components: systematic risks and non-systemic risks. Systematic risk refers to the variability of income caused by external factors (macroeconomic conditions), being a measure of the relative market volatility of relative incomes. Unsystematic risk refers to income variability caused by unpredictable factors (mismanagement decisions, abrupt technologies overtaken). The depreciation of security investments is inherent and leads to the dilemma of small and frequent investments or major and rare investments. On this issue, the proposed model can provide solutions to decision-makers. Uncertainty, irreversibility, growth potential and competition are factors that influence the behavior and investment decision. We consider that by using the capital asset pricing model in the security investments associated with eLerning training systems, we can increase the precision of optimal investment in terms of risk and opportunity balancing. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
10. CONSIDERAȚII ACTUALE DESPRE INSURGENȚĂ ȘI CONTRAINSURGENȚĂ ÎN AFGANISTAN.
- Author
-
MAGHERCĂ, Traian and BĂLĂCEANU, Ion
- Subjects
COUNTERINSURGENCY ,INSURGENCY ,AUTHORITY ,NEIGHBORS ,SPECIALISTS - Abstract
Copyright of Bulletin of the 'Carol I' National Defence University / Buletinul Universitatii Nationale de Aparare 'Carol I' is the property of Carol I National Defence University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
11. COLLABORATIVE SYSTEMS FOR THE PROTECTION OF CRITICAL INFRASTRUCTURES - COMPONENT OF EUROPEAN SECURITY STRATEGY.
- Author
-
MOȘOIU, Ovidiu, GHERMAN, Laurian, and BĂLĂCEANU, Ion
- Subjects
NATIONAL security ,INFRASTRUCTURE (Economics) ,EUROPEAN communities ,HAZARDS ,RISK assessment - Abstract
Identifying, analyzing, correlating and evaluating the dynamics of strategic critical infrastructure works closely with time evolution of society, which has generated and has boosted the development of large cities and economical objectives, always searching for new architectural solutions, both for the civilian constructions and for those with defensive character. Unlike security environment, specific previous stages of human development, the contemporary security environment is characterized by a multitude of hazards and risks, challenges, threats and vulnerabilities that have generated a greater impact concerning the vital elements of strategic critical infrastructure system. For this reason, the protection, the safety and the security of strategic critical infrastructure, will represent, also in the future, a priority area for all countries, organizations and international bodies. Creating a collaborative system for the protection of critical infrastructure has become an important concern of all states and a reference chapter of their security strategy. At European level in line with the directive 2008/114/CE of the Board, from december, 8th, 2008, concerning identification and designation of critical infrastructures, the productivity of strategic critical infrastructure protection system involved developing a timeline plan to ensure the functionality, continuity and integrity of critical infrastructures, in order to discourage, decrease and neutralize specific threats, risks and vulnerabilities. At national level, according to the National Strategy for Critical Infrastructure Protection 2011, such targets can be achieved only through collaboration, cooperation and partnership in interdisciplinary system, based on strategies, techniques, tactics and uniform procedures, largescaleed, which, in turn can facilitate the development of concrete actions and measures of protection, timely and effective. In this article we want to detail the main aspects of the strategic critical infrastructure, in a hybrid security environment pointed by the risks, threats and vulnerabilities that require collaborative systems between protection institutions of critical infrastructure and joint efforts by all the national responsible, in line with European democratic structures, measures and guidelines. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
12. THE HIERARCHICAL INFORMATION MODEL WITHIN INFORMATIONAL SOCIETY.
- Author
-
BĂLĂCEANU, Ion
- Subjects
- *
COMMUNICATION & technology research , *INFORMATION technology research , *DETECTORS , *INFORMATION storage & retrieval systems , *MATHEMATICAL models - Abstract
The specific opportunities offered by information and communications technology for the military field aim at ensuring the necessary conditions for substantial improvement of planning and engagement manner of modern war. It is about available informational systems that integrate sensors, cameras and other equipment for obtaining information and which are continuously perfected. These equipments show step by step the rising level of connectivity with the informational networks for ensuring an appropriate visibility of the battlefield, including placement of each fighter or means of fighting. In this article the analysis effort will be focused on detailing the information hierarchical model within the informational society with an emphasis on the main effects of the impact of informational era on the social environment. [ABSTRACT FROM AUTHOR]
- Published
- 2013
13. ORGANIZED CRIME, SUPPORT FOR TERRORIST PHENOMENON.
- Author
-
BĂLĂCEANU, Ion and DIN, Mihaela
- Subjects
- *
TERRORISM , *TERRORISTS , *ORGANIZED crime , *INTERNATIONAL police , *BORDER security - Abstract
The attack of September 11, 2001 has changed the approach to the concepts of terrorism and organized crime. Terrorism and organized crime are daily threats to international security and, therefore, it was seriously necessary to study the links between these two phenomena. By their nature, especially the objectives sought and the effects generated in society, activities in the field of organized crime and terrorism are placed, obviously, among offenses. [ABSTRACT FROM AUTHOR]
- Published
- 2012
14. TRENDS IN THE INTERNATIONAL SECURITY ENVIRONMENT.
- Author
-
BĂLĂCEANU, Ion and CASIAN, Adrian
- Subjects
- *
NATIONAL security , *GLOBALIZATION , *TRANSNATIONAL crime , *INTERNATIONAL security , *INTERNATIONAL relations - Abstract
The current security environment is very dynamic and constantly changing. Regionally, in the Central, Eastern and South-Eastern Europe there are tensions that persist or grow, caused either by transnational criminality or by old ethnic, religious, territorial or separatist disputes to contest existing borders. [ABSTRACT FROM AUTHOR]
- Published
- 2012
15. MUTATIONS AND LINES OF EVOLUTION OF MILITARY SYSTEM IN THE CONTEXT OF GLOBALIZATION.
- Author
-
Moşoiu, Ovidiu, Bălăceanu, Ion, and Bălos, Dănuţ
- Subjects
- *
GLOBALIZATION , *POPULATION , *POLITICAL parties , *CIVIL society , *CRISIS management , *NATURAL disasters - Abstract
The army represents in the vast majority of countries around the world, one of the important state institutions. It is appreciated and perceived by both population and the public, political parties and civil society as a state structure of trust, which behaves like a strong arm preserving a high- quality of the civic, and the national traditions. At the same time, it is considered by both public authorities, and the population as a substantiated support, the need in natural disasters, critical social status or crisis, both for the entire nation, as well as local communities. Because of the nature and content of the tasks entrusted to it, the army plays an important role in society in which it activates. [ABSTRACT FROM AUTHOR]
- Published
- 2011
16. MONEY LAUNDERING, EXPRESSION OF TRANS-BORDER ECONOMIC CRIME WITH IMPACT ON INTERNATIONAL TERRORISM FINANCING.
- Author
-
BĂLĂCEANU, Ion and POROJAN, Eugen
- Subjects
MONEY laundering ,ORGANIZED crime ,TERRORISM ,CRIMINOLOGY ,SOCIAL conflict ,ETHNIC conflict - Abstract
In the present geopolitical and socioeconomic context, organized crime, money laundering and terrorism have extended their sphere of action at an alarming level, aiming to exploit vulnerabilities of constitutional states and democracy. Most specialists and researchers in the field of criminology believe the source of these actions resides in the perpetuation of political, economic and normative structures that are found lacking, in the support and accentuation of social and economical differences between individuals, groups and communities and in the intensification of social and ethnic tensions and conflicts. [ABSTRACT FROM AUTHOR]
- Published
- 2012
17. METHODS, INSTRUMENTS AND SOURCES OF MONEY LAUNDERING USED FOR FINANCING INTERNATIONAL TERRORISM.
- Author
-
BĂLĂCEANU, Ion and POROJAN, Eugen
- Subjects
MONEY laundering ,CORPORATE profits ,BUSINESS enterprises ,BUSINESS revenue - Abstract
In order to study the way in which in the contemporary world profits are 'washed' as a result of illegal activities and the routes that money go through, involves complex investigations and a considerable amount of work. Countries that have regulated as a independent criminal offense, the offense of money laundering, have also included in its scope those actions taken to achieve hiding the illicit origin of values from committing this offense. The mixing of legal and illegal profits and the reporting of the total earnings from the business as the legal means for money laundering. Through this practice, all cycle stages of money laundering are combined .Financial funds are spaced from crime, hidden in legitimate business accounts and then brought back to the surface as legal earnings of a company. The reason is plausible: maximizing profits and available cash. [ABSTRACT FROM AUTHOR]
- Published
- 2012
18. THE ROLE OF INFORMATION IN IDENTIFYING, INVESTIGATING AND MONITORING CRISES.
- Author
-
BĂLĂCEANU, Ion
- Subjects
MILITARY intelligence ,INTERNATIONAL relations ,CRISES ,INTERNATIONAL security ,POWER (Social sciences) ,PEACE - Abstract
Intelligence information is not different from common information. Nevertheless, the effect is that of optimizing state power and international influence at different levels. During crisis times, these two support the efficient use of force. Sometimes, during a crisis situation the effect goes further and it is done most of all in diplomacy in order to implement foreign policy and less in conceiving it. In both times of peace or war the most significant impact of the informative activity is materialized in its cumulative character and in its less surprising contribution in increasing efficiency and its capacity to influence. [ABSTRACT FROM AUTHOR]
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.