Totalitarian past is not the only tie bringing together Lithuania and the Czech Republic nowadays. Both countries are young democracies that underwent dynamic social, legal and political changes during the 90s to ensure transition toward becoming modern democratic states. Now, both countries are members of the European Union and NATO and they share common interest of the small European countries. However, the totalitarian past remains present and it has certain influence on recent issues arising from the current information society. Totalitarian regimes in both countries left some of the political approaches twisted beyond recognition and adversely affected the very core of the society and ways it approaches itself and the others. The autho...
The topic of this thesis covers the cyber security development in the Baltic Sea Region, namely in F...
Darbā tiek aplūkota un salīdzināta Latvijas, Lietuvas un Igaunijas situācija kiberdrošības jomā, lai...
The research paper discusses different issues of interpretation and qualification of illegal access ...
Totalitarian past is not the only tie bringing together Lithuania and the Czech Republic nowadays. B...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
Gyvendami globalizacijos amžiuje susiduriame su naujų teisės šakų atsiradimu. Viena iš tokių teisės ...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
The key question of this thesis was to find out how did the cyber space securitization process in Li...
Lithuania's Strategic Preparation for Cyber Security Challenges The paper analyses how Lithuania is ...
Tikslas – išanalizuoti Lietuvos Respublikos ir Rusijos Federacijos elektroninės informacijos saugos ...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...
Given the global nature of cyber threats, assurance of a cyber security policy is very important not...
The purpose of this thesis is to analyze the relevance of cybersecurity in the overall context of na...
Online ISSN 1822-9638The paper addresses the security threat perception and securitization of existe...
The topic of this thesis covers the cyber security development in the Baltic Sea Region, namely in F...
Darbā tiek aplūkota un salīdzināta Latvijas, Lietuvas un Igaunijas situācija kiberdrošības jomā, lai...
The research paper discusses different issues of interpretation and qualification of illegal access ...
Totalitarian past is not the only tie bringing together Lithuania and the Czech Republic nowadays. B...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
Gyvendami globalizacijos amžiuje susiduriame su naujų teisės šakų atsiradimu. Viena iš tokių teisės ...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organi...
The key question of this thesis was to find out how did the cyber space securitization process in Li...
Lithuania's Strategic Preparation for Cyber Security Challenges The paper analyses how Lithuania is ...
Tikslas – išanalizuoti Lietuvos Respublikos ir Rusijos Federacijos elektroninės informacijos saugos ...
The paper aims to analyse how information warfare can be conducted in cyberspace and to look at this...
Given the global nature of cyber threats, assurance of a cyber security policy is very important not...
The purpose of this thesis is to analyze the relevance of cybersecurity in the overall context of na...
Online ISSN 1822-9638The paper addresses the security threat perception and securitization of existe...
The topic of this thesis covers the cyber security development in the Baltic Sea Region, namely in F...
Darbā tiek aplūkota un salīdzināta Latvijas, Lietuvas un Igaunijas situācija kiberdrošības jomā, lai...
The research paper discusses different issues of interpretation and qualification of illegal access ...