rss_2.0Scientific Bulletin FeedSciendo RSS Feed for Scientific Bulletin Bulletin Feed and Disadvantages of Onsite Learning Compared to Online Learning<abstract> <title style='display:none'>Abstract</title> <p>The COVID-19 pandemic has caused people all throughout the world, particularly students, to change their routines. As a result of cutting-edge technology, e-learning is on the increase. Many educational institutions now use virtual classrooms instead of actual classrooms to conduct their lessons. Before the COVID-19 crisis, virtual technology was expanding quickly and becoming more widely used. Before the pandemic, students were taking a variety of online programs, but since then, there has been a significant surge in demand for virtual learning.</p> </abstract>ARTICLEtrue Artificial Intelligence (AI) Replace a Human Commander in the Army?<abstract> <title style='display:none'>Abstract</title> <p>The question of whether artificial intelligence can develop without assistance is a common one, as AI’s popularity continues to rise. Another relevant topic is whether artificial intelligence will replace human commanders in the army. While AI can optimize processes and perform tasks in dangerous situations, the human factor remains crucial for soldiers’ effectiveness. Factors such as leadership, morality, initiative, creativity and endurance are essential for success and the motivation of commanders is responsibility for their soldiers. Additionally, the commander’s influence on organizational culture makes them irreplaceable by AI in the military</p> </abstract>ARTICLEtrue in Healthcare Through the 7-S Model Strategy<abstract> <title style='display:none'>Abstract</title> <p>According to the 2019 HIMSS Cybersecurity Survey, most healthcare organizations are aware of the importance of cybersecurity, with 96% of respondents indicating that cybersecurity was a priority for their organization. Despite this, the survey also found that healthcare organizations are not adequately prepared for cyberattacks, with only 39% reporting that they had a comprehensive cybersecurity plan. This paper uses the 7-S Model strategy as a foundation for strategy development for healthcare organizations in a post-COVID-19 world.</p> </abstract>ARTICLEtrue Constants of the Military Education System<abstract> <title style='display:none'>Abstract</title> <p>The concern for the manifestation of education, the natural displacement of human existence from the past to the future transits through the educational paradigms, successively focusing the center of gravity from the teacher to the educable and the learning results. By transition, the concept of “centered learning” suggests the coherent and organized solar system moving around a central element. If in the solar system there is only one central constant element around which all the others move, in the educational system the central element has periodically changed. However, quality education is represented by the congruence between the three paradigms, with an emphasis on balancing the relationship between the educational institution and the beneficiary.</p> </abstract>ARTICLEtrue Transformation and Technological Innovation in Contemporary Society<abstract> <title style='display:none'>Abstract</title> <p>In this article, I have tried to focus on the issues of need, benefits, advantages, and systemic vulnerabilities brought about by the introduction, development, and changes brought about by artificial intelligence, which is seen as an opportunity to provide quality public services. The article addresses the need to improve creative invention and innovation processes in the public and private sectors, highlighting the importance of digital transformation in the economic, social, technological and managerial fields. In this context, it is noted that digital transformation efforts focus mainly on large-scale changes to processes, systems, and operating models, while digital innovation is applied on a smaller scale and over a shorter period of time. One of the key elements of innovation is that it benefits from the use of artificial intelligence as the hardware and software systems it works with become more powerful. The review has shown that, in addition to the positive effects of the use of AI in different areas of activity, there are many concerns about the creation of a superintelligence that could replace the human factor or limit its access to different areas of activity. Important aspects of technological innovation based on AI were addressed and clarifications were made on the interaction between technology and AI. The article also highlights aspects related to the need to adopt and implement artificial intelligence and technologies based on it at the level of Romanian society, as a prerequisite and necessity on the evolutionary path to survive in a global market based on supply and demand.</p> </abstract>ARTICLEtrue Physiognomy of Modern Multinational Operations<abstract> <title style='display:none'>Abstract</title> <p>In this article we intend to analyze the change in the physiognomy of modern military actions starting from the idea that it is extremely important to present the necessary clarifications on the content and meaning of the phrase physiognomy and, just as importantly, to position this concept in direct relation with the most important characteristics of the contemporary military phenomenon, the evolution tendencies of the military art, its levels and, last but not least, its content. Also a derivative objective would be to highlight the bad role of technology and technology in the changes produced in the last period of time in this field.</p> </abstract>ARTICLEtrue and Drone Action Issues in the War in Ukraine<abstract> <title style='display:none'>Abstract</title> <p>Technological developments in recent decades in multiple fields have revolutionised the actions of armed forces, as recently confirmed in the war in Ukraine where NATO countries’ artillery and missiles have undeniably outperformed the outdated spectrum of previous counter-insurgency actions, and the counter-battery fire of self-propelled weapons systems far exceeded the limits of the Iraq and Afghanistan theatres of operations, where such a response was easy to achieve because insurgent forces had no idea that such precise, coordinated and effective action was available at discovered targets. Drones have also become an inseparable part of military operations and have developed in an unprecedented way, being hardly detectable, precise, equipped with weaponry, radars, optoelectronic search means with sensors and modern communication and computer systems. Today, but especially in the future, the actions of drones and artillery means executing counter-battery fire will become indispensable in military operations to achieve desirable effects, and at the same time modern armies must have active and passive means of engagement and countermeasures against them to achieve effective force protection.</p> </abstract>ARTICLEtrue Security in RDF Terms<abstract> <title style='display:none'>Abstract</title> <p>Databases are perhaps the most attacked and vulnerable elements in the online environment as far as organizations are concerned. The databases contain the most important information of an organization and its confidential data, along with those of its customers. However, little of the effort dedicated to security is intended to protect data. The present paper draws attention to the need to implement a simple and then complex security in a database using RDF (Resource Description Framework) based descriptions. Our example is one implemented for Microsoft Access and covers different security level descriptions considering attack types. We choose to represent the basic concepts and abstract syntax using the RDF data modeling vocabulary and we’re using as a starting point a legacy relational database where the company already catalogued attacks.</p> </abstract>ARTICLEtrue Knowledge Management Internal and External Risk Factors: A Literature Review of Best Practices<abstract> <title style='display:none'>Abstract</title> <p>Used to store, manage, and leverage information, knowledge management systems are becoming increasingly valuable assets within organizations. Organizations must manage knowledge internally (through knowledge risks) and externally (through reputational risks). We define knowledge risks as internal human, technological, and organizational factors, and reputational risks as the effects of knowledge risks and external perils to reputation, credibility, financial status, and future success. An oversight of either risk type can cause significant damage to an organization. This literature review was a means to analyze, categorize, and offer best practices for mitigating risks within a knowledge management system.</p> </abstract>ARTICLEtrue Resilience in Ukraine: Surviving Year One<abstract> <title style='display:none'>Abstract</title> <p>The war in Ukraine, a NATO-Russian proxy war, continues to influence the global security architecture, but the immediate consequences are felt especially by those in the conflict area. The local population decided, through the actions carried out from the very first moment of the invasion, to oppose the Russian occupation and was categorized as an extension of the armed forces and a central pillar of the Ukrainian resistance. The paper analyzes the pressures to which the civilians in Ukraine were subjected during the first year of the conflict, such as: the bombing of residential areas, energy blackmail, torture, killings, rapes, robberies or the deportation of children from the occupied areas. After a year of war, the resilience of the population continues to fuel the morale of frontline troops, and a future peace agreement cannot be concluded without holding those guilty of war crimes or crimes against humanity accountable.</p> </abstract>ARTICLEtrue Coordinates of the Profile of the Future Armed Conflict<abstract> <title style='display:none'>Abstract</title> <p>The importance of the topic in question results from the complexity of the phenomena that mark the evolution of the society that led to the globalization of risks and threats to regional and global stability. A realistic understanding of the conditions under which an armed conflict can take place, coupled with a correct vision of the confrontation environment, makes the chance of success to bow substantially in favour of those who prepare in detail and in advance to effectively manage the possible situations of the armed conflict.</p> </abstract>ARTICLEtrue and Equal Treatment Regarding the Exercise of Fundamental Rights and Freedoms by Military Personnel<abstract> <title style='display:none'>Abstract</title> <p>The principles of equality and non-discrimination are the foundation of the system of protection of human rights, enshrined in every domestic and international instrument. As a visible symbol of national unity for the achievement of defence and security prerogatives, the armed forces can act as a positive force. By successfully implementing inclusive models and integrating recommendations on the fundamental rights and freedoms of military personnel, the armed forces must ensure societal linguistic, cultural, ethnic and gender-specific respect. In this way, the armed forces achieve group cohesion and achieve the common goal of achieving national defence.</p> </abstract>ARTICLEtrue Perspectives in the Military Academic Environment<abstract> <title style='display:none'>Abstract</title> <p>This paper is the result of the Military Gender Studies project. The aim of the project is to analyze the dynamics of gender perspectives in some military institutions in Europe, namely the Military Academy, Lisbon, Portugal, the University of Turin, Italy, “Vasil Levski” National Military University, Veliko Tarnovo, Bulgaria and “Nicolae Bălcescu” Land Forces Academy of Sibiu. The project started with the application of a questionnaire to military students and this paper will present part of the results obtained only in “Nicolae Bălcescu” Land Forces Academy of Sibiu, after analyzing the discrimination dimension.</p> </abstract>ARTICLEtrue of the Financial Equilibrium in the Context of Challenges on the Romanian Energy Market<abstract> <title style='display:none'>Abstract</title> <p>In the context of the last turbulent three years, the energy industry in Romania had to face additional problems, due to the liberalization of the energy market. Despite pursuing profit as the immediate goal of a company, obtaining and maintaining the financial equilibrium becomes more and more important for the survival and the development of a company. The existence and maintenance of a positive Net Treasury over several successive years reflects the success of the company, proofing a good strategic position in relation to its competitors. Its lack is a permanent source of risks for the enterprise, of which long-term persistence can be considered a symptom of the risk of bankruptcy.</p> </abstract>ARTICLEtrue of Static Protection of Word Documents<abstract> <title style='display:none'>Abstract</title> <p>The great achievement of the times we live in is the fact that free access to information is guaranteed by law, but it is still the law that allows it to be restricted in certain situations. Thus, the subject addressed in the paper presented below is to highlight the facilities of text editors, in particular Word, as data protection tools, on the basis of a state in which the security culture is being formed. In the elaboration of the paper, we constantly pursued a synergy of theory with current practice on the chosen subject, demonstrating some of the facilities that the Microsoft Word text processor makes available to all users.</p> </abstract>ARTICLEtrue the Possible Influences of the Russia – Ukraine War on Economic Growth<abstract> <title style='display:none'>Abstract</title> <p>Against the background of a major insecurity event with strong economic and social repercussions, more and more analyses, simulations and attempts are being made to identify possible developments and consequences. The experience of previous conflicts and the results of the models and scenarios used to estimate the trajectories and disruptions caused by conflicts help with the decision-making process, but the variables in the peace equation are numerous and increase the degree of uncertainty in what regards the impact of the economic, social and security policies adopted. Through the prism of developments in the current geopolitical and security environment, with prospects of profound change after the end of the conflict between Russia and Ukraine, the paper highlights some of the economic effects of the Russia – Ukraine war and highlights its possible influences on economic growth at regional and global level, and also analyses growth in the states directly involved in the war or that are connected in various forms (economically-wise, neighbouring countries, etc.) with the two states.</p> </abstract>ARTICLEtrue of Good Educational Practices on the Modernization of Shooting Sessions through the Experimental Construction of a Functional Model of a Shooting Range and of a Mobile Target Device Operated by Radio Waves<abstract> <title style='display:none'>Abstract</title> <p>The authors of the present scientific approach highlight some innovative elements concerning the modernization of practical-applicative educational activities related to shooting sessions carried out by cadets in the Poplaca shooting range. To this end, aspects concerning the design of a software necessary for the remote control of the range, the construction of a functional model of the range at a simplified scale, as well as the practical realization of a technological product, such as a mobile target with the related hardware elements are presented in detail. The implementation (validation and testing) of the proposed solutions aimed at flexibility and at increasing the quality of educational standards related to shooting sessions in the cadet training range are also discussed.</p> </abstract>ARTICLEtrue of Defending International Humanitarian Law at the International Level<abstract> <title style='display:none'>Abstract</title> <p>In an armed conflict the respect for international humanitarian law is the essential element to reduce its destructive effects. The application of international humanitarian law is, however, not always taken into account by states and members of the armed forces. When this obligation is seriously violated, the international community, through the UN, must intervene to restore international peace and security. Unfortunately, current armed conflicts have proven that this system is not effective, especially when it has to be activated against a permanent veto-wielding member of the Security Council, such as Russia. To make this system effective and to make such a state to apply correctly international humanitarian law, the UN must be reformed. But all these reform proposals do not take into account the efficiency of the measures in Chapter VII of the Charter and the strengthening of international authority.</p> </abstract>ARTICLEtrue Continuous Professional Development of Accounting Professionals and the Impact on the Valuation of Accounting Information<abstract> <title style='display:none'>Abstract</title> <p>In the accounting profession, continuous professional development and lifelong learning are essential if we consider the increasingly advanced demands of internal and external users of financial and accounting information. It is certain that professionals who do not have and do not constantly update their necessary general and specialized knowledge will no longer find their place in an increasingly competitive market. The paper highlights, based on bibliographic resources, the fact that national and international professional bodies implement training and professional development programs in accordance with the “International Education Standards” issued by the “International Accounting Education Standards Board”, an independent organization within the “International Federation of Accountants”. Using the selective research, we analyzed the interest of accounting professionals to develop professionally considering the need for continuous training in the conditions where accounting information is indispensable in the decision making process and the financial – accounting field is one that is constantly changing.</p> </abstract>ARTICLEtrue Intelligence (AI): The New Look of Customer Service in a Cybersecurity World<abstract> <title style='display:none'>Abstract</title> <p>Cybersecurity leaders are not adequately developed to guide the re-engineering of quality customer service (QCS) workflows, designed with automation and AI, that interrelate with people through customers' perceptions. Realizing re-engineering processes should be a team effort with well-versed leadership and stakeholders guiding the successful design through a follow-up process. Leaders must shape compelling and straightforward needs to learn and teach employees and chat boxes indispensable customer service skills demonstrating patience, self-discipline, flexibility, and resourcefulness in communication with irritated customers or difficult circumstances. Whether the analysis, design, development, and implementation struggles are vacuums in cybersecurity knowledge, skill, and abilities or a dearth of budget and resource limits, creating thorough QSC workflows and training requires time and purpose. This knowledge must be proactively, not reactively built. QSC re-engineering epitomizes a shift from reactionary behaviors to proactively preparing a well-defined collection of intends, activities, and aims delineating how organizations will contend through products and services. This article should benefit respondents absorbed in the success of updating and implementing QCS actions and workflows, practitioners who guide direct customer services initiatives, enterprise governance strategists, QCS and machine learning trainers, and learners who want to know more about QCS swathed in cybersecurity.</p> </abstract>ARTICLEtrue