Have a personal or library account? Click to login
The Concept of a Method for Predicting the Cascade Effect Under Conditions of Hybrid Warfare Cover

The Concept of a Method for Predicting the Cascade Effect Under Conditions of Hybrid Warfare

Open Access
|Sep 2024

References

  1. ACLED, 2024. Armed Conflict Location & Event Data (ACLED), Project Ukraine Q & A 2024. [online] Available at: <https://acleddata.com/acleddatanew/wp-con-tent/uploads/2024/03/Ukraine-QA-2024.pdf>
  2. Babbie, E., 2005. Badania społeczne w prak-tyce (The Practice of Social Research). Warszawa: Wydawnictwo Naukowe PWN.
  3. Banasik, M., 2015. How to understand the hybrid war. Securitologia, 1(21), pp. 19-34. [online] Available at: <https://www.civi-tas.edu.pl/wp-content/uploads/2015/03/Secu-ritologia-1-21-2015_019-034.pdf>
  4. Benjamin, N., 2021. How effective is blockchain in cybersecurity? ISACA Journal, 4. [online] Available at: <https://www.isaca.org/resources/isaca-journal/issues/2021/volume-4/how-effective-is-blockchain-in-cybersecurity>
  5. Bennett, M. and Gupta, V., 2010. Dealing in Security: understanding vital services and how they keep you safe. [online] Available at: <http://resiliencemaps.org/files/Dealing_in_Security.July2010.en.pdf>
  6. Caliskan, M., 2019. Hybrid warfare through the lens of strategy theory. Defense and Security Analysis, 35(1), pp. 40-58. https://doi.org/10.1080/14751798.2019.1565364.
  7. Council on Foreign Relations, 2024. Global Conflict Tracker, Council on Foreign Relations. [online] Available at: <https://www.cfr.org/global-conflict-tracker> [Accessed 9 October 2023].
  8. Cybersecurity and Infrastructure Security Agency, 2019. National Critical Functions. [online] Available at: <https://www.cisa.gov/topics/risk-management/national-critical-func-tions>
  9. Fabian, E., 2004. Authorities name 713 soldiers, 66 police officers killed in Gaza war. The Time of Israel. [online] Available at: <https://www.timesofisrael.com/authorities-name-44-soldiers-30-police-officers-killed-in-hamas-attack/> [Accessed 8 July 2024].
  10. Fox, A.C., 2017. Hybrid Warfare: The 21st Century Russian of Warfare. Master’s Thesis. https://doi.org/10.13140/RG.2.2.35922.38086.
  11. Gaynor, K.M., Cherry, M.J., Gilbert, S.L., Kohl, M.T., Larson, C.L., Newsome, T.M., Prugh, L.R., Suraci, J.P., Young, J.K. and Smith, J.A., 2021. An applied ecology of fear framework: linking theory to conservation practice. Animal Conservation, 24(3), pp. 308-321. https://doi.org/10.1111/acv.12629.
  12. Habib, G., Sharma, S., Ibrahim, S., Ahmad, I., Qureshi, S. and Ishfaq, M., 2022. Blockchain Technology: Benefits, Challenges, Applications, and Integration of Blockchain Technology with Cloud Computing. Future Internet, 14, 341. https://doi.org/10.3390/fi14110341.
  13. Hoffman, F.G., 2007. Conflict in the 21st Century: The Rise of Hybrid Wars. Arlington, VA: Potomac Institute for Policy Studies.
  14. Hoffman, F.G., 2018. Examining complex forms of conflict: Gray zone and hybrid challenges. Prism, 7(4), pp. 30-47.
  15. Hosanagar, K., 2021. How the Blockchain Will Impact the financial sector, Knowledge at Wharton. [online] Available at: <https://knowledge.wharton.upenn.edu>
  16. Hosseini, S., Barker, K. and Ramirez-Marquez, J.E., 2016. A review of definitions and measures of system resilience. Reliability Engineering & System Safety, 145, pp. 47-61. https://doi.org/10.1016/j.ress.2015.08.006.
  17. Iskandarov, K. and Gawliczek, P., 2023. Hybrid Warfare as a new type of War. The evolution of its conceptual construct. In: M. Banasik, P. Gawliczek and A. Rogozińska, eds. 2020. The Russian federation and international security, Poland: Difin, pp. 96-107 <https://www.researchgate.net/publication/373118996_hybrid_warfare_as_a_new_type _of_war_the_evolution_of_its_concep-tual_construct>
  18. Itich-Drabarek, I., Misiuk, A., Mitkow, Sz. and Bryczek-Wróbel, P., 2023. Encyklopedia Bezpieczeństwa Narodowego (Encyclopedia of National Security). Warszawa: Dom Wydawniczy ELIPSI. [online] Available at: <https://en-cyklopedia.revite.pl/>
  19. Joshi A., 2017. Comparison between Scopus & ISI Web of science. Journal Global Values, 7(1), pp. 1-11.
  20. Kabir, S. and Papadopoulos, Y., 2019. Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review. Safety science, 115, pp. 154-175. https://doi.org/10.1016/j.ssci.2019.02.009
  21. Kisilowski, M., Skomra, W., Smagowicz, J., Wiśniewski, M. and Szwarc, K, 2021. Zarządzanie bezpieczeństwem infrastruktury krytycznej i ciągłością usług kluczowych państwa (Management of critical infrastructure security and continuity of essential services of the state). Warszawa: Oficyna Wydawnicza Politechniki Warszawskiej.
  22. Krupa, T. and Ostrowska, T., 2012. Decision making in the flat and hierarchical decision problem. Foundations of Management, 4(2), pp. 23-36. https://doi.org/10.2478/fman-2013-0008.
  23. Krupa, T. and Wisniewski, M., 2015. Wykorzystanie wiedzy w zarządzaniu sytuacyjnym bezpieczeństwem infrastruktury krytycznej Polski (Use of knowledge in situational management of critical infrastructure security in poland). Logistyka, 5, pp. 1027-1033.
  24. Landucci, G., Argenti, F., Cozzani, V. and Reniers, G., 2017. Assessment of attack likelihood to support security risk assessment studies for chemical facilities. Process Safety and Environmental Protection, 110, pp. 102-114. https://doi.org/10.1016/j.psep.2017.06.019.
  25. Landucci, G., Khakzad, N. and Reniers, G.L.L., 2020. Physical security in the process industry: theory with applications. Cambridge, MA: Elsevier.
  26. Leonhard, R. and Philips, S., 2015. Little Green Men: A Primer on Modern Russian Unconventional Warfare, Ukraine 2013-2014. Fort Bragg, NC: US Army Special Operations Command.
  27. Linebarger, C., 2021. Preventive medicine: domestic repression and foreign revolutionary states. Dynamics of Asymmetric Conflict, 14(1), pp. 3-24.
  28. Moosavi, N. and Taherdoost, H., 2023. Blockchain technology application in security: A systematic review. Blockchains, 1(2), pp. 58-72. https://doi.org/10.3390/blockchains1020005.
  29. Moteff, J., Copeland, C. and Fischer, J., 2003. Critical Infrastructures: What Makes an Infrastructure Critical? [online] Available at: <https://irp.fas.org/crs/RL31556.pdf>
  30. North Atlantic Council, 2016. Deklaracja końcowa szczytu NATO w Warszawie (The Warsaw declaration on Transatlantic Security). [online] Available at: <https://www.bbn.gov.pl/ftp/dok/03/37-40_KBN_Deklaracja_ szczytu.pdf>
  31. OHCHR, 2024. Office of the United Nations High Commissioner for Human Rights (OHCHR), Gaza Report on the Ground, OHCHR Press Briefing notes. [online] Available at: <https://www.ohchr.org/en/press-brief-ing-notes/2024/01/gaza-report-ground>
  32. PAP, 2024. Mieszkańcy Mariupola z głodu jedzą gołębie, brakuje wody pitnej (Mariupol residents eat pigeons out of hunger, drinking water is in short supply). Polish Press Agency (PAP). [online] Available at: <https://www.pap.pl/aktualnosci/news%2C1269876%2Cmieszkancy-mariupola-z-glodu-je-dza-golebie-brakuje-wody-pitnej.html>
  33. Peterson, N., 2023. The Chinese Communist Party’s Theory of Hybrid Warfare. [online] Available at: <https://www.understand-ingwar.org/sites/default/files/The%20Chi-nese%20Communist%20Party%27s%20The-ory%20of%20Hybrid%20Warfare_0.pdf>
  34. Singh, S.K. and Kumar, S., 2021. Blockchain technology: introduction. Integration and Security Issues with IoT. https://arxiv.org/abs/2101.10921.
  35. Statista Research Department, 2024. Number of civilian casualties during the war in Ukraine 2022-2024, Statista. [online] Available at: <https://www.statista.com/statis-tics/1293492/ukraine-war-casualties/>
  36. Tamplin, T., 2023. Blockchain transaction verification, Meaning and how it works. Finance Strategists. [online] Available at: <https://www.financestrategists.com>
  37. The Wall Street Magazine, 2023. How are transactions verified in Blockchain: The ultimate guide to trust. [online] Available at: <https://thewallstreetmagazine.com/how-are-transactions-verified-in-blockchain/>
  38. UN News, 2024. Ukraine: Report reveals war’s long-term impact which will be felt for generations, UN News, 22 February. [online] Available at: <https://news.un.org/en/story/2024/02/1146842>
  39. Visser, M., van Eck, N. and Waltman, L., 2021. Large-scale comparison of bibliographic data sources: Scopus, Web of Science, Dimensions, Crossref and Microsoft Academic. Quantitative Science Studies, 2(1). https://doi.org/10.1162/qss_a_00112.
  40. VOA, 2024. As Israel-Hamas War Reaches 100-Day Mark, Here’s the Conflict by Numbers. [online] Available at: <https://www.voanews.com/a/as-israel-hamas-war-reaches-100-day-mark-here-s-the-conflict-by-num-bers-/7439224.html> [Accessed 18 July 2024].
  41. Walecki, O.B. and Niejełow, B.M., 2015. Ocoōehhocmu napmu3aHCĸux u npomuB-onapmu3aHCKUX òeŭcmeuŭ b xode Mpaĸcĸoŭ doiuibi 2003-2011 (Features of guerrilla and anti-guerrilla actions during the Iraq War 2003-2011). Moscow.
  42. WHO, 2024. Emergency Situation Update, Issue 28, 7 October 2023 - 20 April 2024. [online] Available at: <https://www.emro.who.int/images/stories/Sitrep_-_is-sue_28b.pdf?ua=1>
  43. Wiśniewski, M., 2020. Methodology of Situational Management of Critical Infrastructure Security. Foundations of Management, 12(1), pp. 43-60. https://doi.org/10.2478/fman-2020-0004.
  44. Wiśniewski, M., Marczewski, M. and Kisilowski, M., 2016, Zasady budowy scenariuszy zdarzeń niekorzystnych w publicznym zarządzaniu kryzysowym (Rules ror Construction Scenarios Adverse of Events in the Public Crisis Management). [in] M. Ćwiklicki, M. Jabłoński I S. Mazur, red., Współczesne koncepcje zarządzania publicznego. Wyzwania modernizacyjne sektora publicznego (Contemporary concepts of public management. Challenges of public sector modernization). Fundacja Gospodarki i Administracji Publicznej. pp. 97-110.
  45. World Health Organization Eastern Mediterranean Regional Office, 2024. Emergency Situation Reports. [online] Available at: <https://www.emro.who.int/opt/information-resources/emergency-situation-reports.html>
  46. Xu, J.J., 2016. Are blockchains immune to all malicious attacks? Financial Innovation, 2(25). https://doi.org/10.1186/s40854-016-0046-5.
  47. Zio, E., 2018. The future of risk assessment. Reliability Engineering & System Safety, 177, pp. 176-190. https://doi.org/10.1016/j.ress.2018.04.020
  48. Zubaydi, H.D., Varga, P. and Molnár, S., 2023. Leveraging Blockchain technology for ensuring security and privacy aspects in internet of things: A systematic literature review. Sensors, 23(2). https://doi.org/10.3390/s23020788.
  49. Zwęgliński, T., Smolarkiewicz, M. and Gromek, P., 2020. Efekt kaskadowy współczesnym wyzwaniem zarządzania kryzysowego (The cascading effect a modern challenge of crisis management). Szkoła Główna Służby Pożarniczej, ISBN 978-83-957235-9-9.
DOI: https://doi.org/10.2478/fman-2024-0014 | Journal eISSN: 2300-5661 | Journal ISSN: 2080-7279
Language: English
Page range: 233 - 246
Published on: Sep 30, 2024
Published by: Warsaw University of Technology
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2024 Wojciech WRÓBLEWSKI, Michał WIŚNIEWSKI, published by Warsaw University of Technology
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.