|
References
|
|
*** (2020) Odluka o proglašenju vanrednog stanja. Službeni glasnik RS, broj 29 od 15. marta 2020, Available at https://www.pravno-informacionisistem.rs/SlGlasnikPortal/eli/rep/sgrs/predsednik/odluka/2020/29/1/reg Accessed on January 16, 2022
|
|
Bobric, G.D. (2021) Risks to the National Security Generated By the Widespread Use of Cryptocurrency. Scientific Bulletin, 26(2): 87-97
|
|
Carr, M. (2016) Public-private Partnerships in National Cyber-security Strategies. International Affairs, 92(1): 43-62
|
|
Corradi, E. (2016) Rethinking Islamized Balkans. Balkan Social Science Review, 8: 121-137
|
|
Dalgaard, N.A. (2017) Organizational Resilience in National Security Bureaucracies: Realistic and Practicable. Journal of Contingencies & Crisis Management, 25(4): 341-349
|
|
Denning, D.E. (2001) Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy. in: Arquilla J.; Ronfeldt D.F. [ed.] Networks and Netwars: The Future of Terror, Crime, and Militancy, 239-288
|
|
Dinicu, A. (2020) The Strategic Dimension of the Public Health Sector in the Global Age: The Nexus Between Public Health and National Security. Revista Academiei Fortelor Terestre, 25(2): 100-107
|
1
|
Estevens, J. (2018) Migration Crisis in the EU: Developing a Framework for Analysis of National Security and Defence Strategies. Comparative Migration Studies, 6(1)
|
|
Farbotko, C. (2018) Climate Change and National Security: An Agenda for Geography. Australian Geographer, 49(2): 247-253
|
|
Gečienė-Janulionė, I. (2018) The Consequences of Perceived (In)security and Possible Coping Strategies of Lithuanian People in the Context of External Military Threats. Journal on Baltic Security, 4(1): 5-14
|
|
Gnatyuk, S., Gnatyuk, V., Kononovich, V., Kononovich, I. (2016) Transformation of Information and Social-Psychological Security Paradigms (Part 2) (Transformaciâ paradigm zaŝity informacii, informacionnoj i social'no-psihologičeskoj bezopasnosti (čast' 2)). 6: 322-332
|
|
Greiman, V.A. (2016) National Intelligence, Corporate Competitiveness and Privacy Rights: Co-existing in Cyberspace. Global Studies Journal, 9(3): 43-56
|
|
Heide, M. (2022) From Threat to Risk: Changing Rationales and Practices of Secrecy. Public Integrity, 24(3): 254-266
|
|
Kislyakov, P.A. (2018) Retro-Innovation of 21st Century Education as a Resource for Ensuring National Security. Russian Social Science Review, 59(1): 59-70
|
|
Knezović, S., Cvrtila, V., Vučinović, Z. (2018) Croatia's Police and Security Community Building in the Western Balkans. Eastern Journal of European Studies, 8(2): 167-184
|
|
Kononov, S.V., Zhukov, A.V. (2020) The Philosophy of Security in the Globalizing Culture System. Journal of History Culture and Art Research, 9(3): 415-422
|
|
Kovács, L. (2018) National Cyber Security as the Cornerstone of National Security. Land Forces Academy Review, 23(2): 113-120
|
|
Layton, P. (2015) The 2015 National Security Strategy and Strategic Defence and Security Review choices: grand strategy, risk management or opportunism?. Defence Studies, 15(1): 28-45
|
|
Mara, D., Nate, S., Stavytskyy, A., Kharlamova, G. (2022) The Place of Energy Security in the National Security Framework: An Assessment Approach. Energies, 15(2): 658-658
|
|
Ministry of Defence (2022) Defence Artificial Intelligence Strategy Draft. UK Ministry of Defence, https://www.gov.uk/government/publications/defence-artificial-intelligencestrategy/defence-artificial-intelligence-strategy (Accessed on January 16, 2022)
|
|
Ministry of Defense (2016) Defense Technology Strategy. Japan Ministry of Defense, https://www.mod.go.jp/atla/en/policy/pdf/defense_technology_strategy.pdf (Accessed on January 16, 2022)
|
|
Nacita, I., Reith, M. (2018) Cyber War and Deterrence: Applying a General Theoretical Framework. Air & Space Power Journal, 32(2): 74-83
|
|
Nang, R.N., Martin, K. (2017) Global Health Diplomacy: A New Strategic Defense Pillar. Military Medicine, 182(1): 1456-1460
|
|
Obreja, C. Ștefan, Metea, I.G. (2018) The Implications of the Demographic Decrease on National Security. Land Forces Academy Review, 23(1): 41-47
|
|
Ovčinikov, A.I. (2020) Bezopasnost' ličnosti i gosudarstva v cifrovuû èpohu: politiko-pravovoj aspekt. Journal of Russian Law, 6: 5-21
|
|
Pătra, cu P. (2021) Emerging Technologies and National Security: The Impact of IoT in Critical Infrastructures Protection and Defence Sector. Land Forces Academy Review, 26(4): 423-429
|
|
Republika Srbija (2020) Strategija nacionalne bezbednosti Republike Srbije. https://www.mod.gov.rs/lat/4350/strategije-4350. Accessed on January 16, 2022
|
|
Republika Srbija (2020) Strategija odbrane Republike Srbije. https://www.mod.gov.rs/lat/4350/strategije-4350. Accessed on January 16, 2022
|
|
US Department of Defence (2021) STEM Strategic Plan FY2021 -FY2025. US Department of Defence. Alexandria, VA, https://dodstemassets.dodstem.us/files/DoD_STEM_Strategic_Plan_2021.pdf Accessed on January 16, 2022
|
|
Veebel, V., Ploom, I. (2018) Estonia's Comprehensive Approach to National Defence: Origins and Dilemmas. Journal on Baltic Security, 4(2): 10-22
|
|
White, D. (2020) The National Security Implications of Climate Change: Redefining Threats, Bolstering Budgets, and Mobilizing the Arctic. Journal of International Affairs, 73(1): 321-329
|
|
|