Fulltext search in archive
Results 31 to 60 of 3034:
Relevance of Transactional Leadership in Czech Armed Forces: Case of Military StudentsReviewed - ResearchJakub Stříbrný, František Milichovský, Veronika Koleňáková, Lenka ČadováVojenské rozhledy / Czech Military Review Nr. 3/2022, Vol. XXXI. (LXIII.): 101-120 | DOI: 10.3849/2336-2995.31.2022.03.101-120 Leadership and its styles have been in the spotlight for many years. The changing military environment and demands on army readiness bring new questions and perspectives to leadership. Leaders now face constant changes and specifications of the new modern era. Concerning these changes and transformations in society and the Army, there are new demands on soldiers and leaders at all levels of the Army of the Czech Republic. This paper provides insight and muse about both transactional and transformational leadership styles and investigates an approach to these styles by Czech military students. This paper aims to identify what leadership style Czech military students prefer at the University of Defence. This research focused on evaluating the personal characteristics required for a leadership position. To verify the relevance of the gained results, we employed paired t-test. |
Is the Transatlantic Bond a Permanent Constant for our Security?Opinions, controversyZdeněk PetrášVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 159-165 |
Border Defense against Infiltration and Guerilla AttacksReviewed - ResearchMichael BátrlaVojenské rozhledy / Czech Military Review Nr. 3/2015, Vol. XXIV. (LVI.): 102-118 | DOI: 10.3849/1210-3292.24.2015.03.102-118 The text deals with the use of border defense as a means of protection against guerrilla attacks and infiltration, through a combination of principles of modern stationary fortifications and forward area defense. These are discussed on the case study of the Northern Border Security Project of Saudi Arabia. The role of attacker takes quasi-state formation the Islamic State (IS, ISIS, ISIL). The aim is to analyze whether the project would endure distinctive types of asymmetric attacks. Vulnerability prioritization for each component determines the most likely targets and their characteristics. This is a subjective semi quantitative method known as CARVER matrix. Subsequently, based on established premises, the text discusses three selected scenarios that use guerrilla tactics with elements of terrorism against selected targets. Attack scenarios show some of the possible ways of improvement for the project. In conclusion, the author makes recommendations for possible adjustments and assess the potential of using the project as a protection against asymmetric attacks. After reading the text, the reader is informed about the project, its components, as well as recommendations that can be applied in the further use of this type of defense. |
Risk Management in the Food Service OperationMilitary professionalProf. Ing. Aleš Komár, CSc., Ing. Boris Šroll, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 133-148 The aim of this work was to make an analysis of current state of catering services in the forces, to define risks of possible harms, damages, losses, or another prospective disasters, in order to propose a systematic approach to the risk management. Identified risks are being completely analysed. Author's team drafted a risks catalogue to make their identification easier. Among others, upon this analysis, they compiled the chart of risks in catering process within the section of the Ministry of Defence of the Czech Republic. A user manual for monitoring and risk control was created, so that we can adopt suitable procurement measures for avoiding or minimizing risks, their occurrences, eventually lowering unwanted results generated by the above mentioned analysed risks. |
Reviewed - Research |
Reviewed - Research |
Threats and Hazards of Grey Rhino ParadigmReviewed - ResearchOlga Burianová, Jiří F. UrbánekVojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 85-96 | DOI: 10.3849/2336-2995.33.2024.02.085-096 Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added - O´VA is established as qualitative dynamic information about productivity of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation. |
Review of the Author´s Monography - Petr RožňákBook reviewJan EichlerVojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 262-264 |
Reviewed - Research |
Proposal of Legal Status of the Expert Valuation Institute Objectifying the Acquisition ProcessReviewed - ResearchJan Hak, Pavel Foltin, Dagmar Pospíšilová, Karel PospíšilVojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 97-115 | DOI: 10.3849/2336-2995.33.2024.02.097-115 The process of procuring military equipment, technology, material, and associated services (VM) is frequently shrouded in concerns about cost-effectiveness and, in some instances, even becomes the focus of law enforcement investigations. This often leads to delays in strategic investments and exposes involved individuals to the risk of criminal charges. Additionally, there is a notable lack of capacity to impartially evaluate the overall investment's efficacy. Consequently, the "Znalec" (Expert Witness) project was initiated as a part of the defense research program. Its objective is to explore the feasibility of establishing an expert institute that could impartially assess the value of the military procurements, set a standard for evaluating these assets, and outline a training program for relevant experts. This paper specifically addresses the first objective of the project, proposing a legal framework for the expert institute based on an extensive systems analysis. |
The Operating Environment and Selected Functionalities of Intelligence Support in the Czech Armed Forces - Opportunities and ChallengesReviewed - ResearchPetr Hlavizna, Radovan Vašíček, Daniele BrugioniVojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 155-170 | DOI: 10.3849/2336-2995.32.2023.04.155-170 The article presents selected functionalities of intelligence support in the Czech Armed Forces, which are addressed in the context of opportunities and challenges of the future operating environment. Its aim is to formulate, in parallel reflection with the current approaches of the North Atlantic Treaty Organization, the possibilities of implementing intelligence, surveillance, reconnaissance and electromagnetic warfare in national conditions. Military practice is presented with a direction on how to respond to changes in the nature of the operational environment, including changes in the physical and non-physical domains of the battlespace to which all components of modern military forces must adapt while maintaining the necessary interoperability. The article is a response to differing and often not entirely correct understandings of the issue, which can be found even among specialists. It summarizes what has been learned so far and suggests where the discussed functionalities should go. |
Social Media as a Tool for Profiling Potential Intelligence Service Sources. How are the Military Students Doing?ReviewedLibor KutějVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 24-36 | DOI: 10.3849/2336-2995.34.2025.01.024-036
|
Weapon System Acquisition Process Utilizing Design Simulation as Decision SupportReviewedJan Drozd, Josef ProcházkaVojenské rozhledy / Czech Military Review Nr. 4/2024, Vol. XXXIII. (LXV.): 37-50 | DOI: 10.3849/2336-2995.33.2024.04.037-050 The selection of optimal weapon systems is crucial for national defense. Traditional empirical methods struggle to address the complexities of modern warfare. This article explores the potential of constructive simulation for informed decision-making in this domain. Simulating tactical operations with complex variables, such as terrain, enemy actions, and system interoperability, provides valuable insights into weapon effectiveness. This enables the optimization of acquisitions in line with strategic goals. Design simulation allows for the exploration of factors difficult to test comparison of armament configurations, analysis of enemy tactics, and optimization of unit composition and deployment, saving costs and time. Simulation enables the safe exploration of even high-risk scenarios. |
Czech Defence Policy Response to Dynamics in Security Environment DevelopmentReviewed - ReviewJosef PROCHÁZKA, Ph.D., Mgr. Lukáš DYČKA, Jakub LANDOVSKÝ, Ph.D.Vojenské rozhledy / Czech Military Review Nr. MC/2016, Vol. XXV. (LVII.): 3-17 | DOI: 10.3849/2336-2995.25.2016.05.003-017 The paper assesses the conceptual framework for Czech defence policy formulation in the wake of a rapid change in its security environment after Russia's annexation of Crimea in March 2014 and the subsequent Russian support for separatists in Ukraine's eastern provinces and growing instability in the Middle East and North Africa. The article examines key measures taken in the political, military, administrative, economical and societal domains in order to evaluate the overall effectiveness of Czech defence policy. Finally, the authors offer several strategic level recommendations to enhance responsiveness and preparedness of the Czech defence system and Armed Forces as one of its most significant components both in short- and long-term perspective. |
Efficiency of Language Education at the Language Center of the University of DefenceReviewed - ResearchMária Šikolová, Vladan HolcnerVojenské rozhledy / Czech Military Review Nr. 2/2020, Vol. XXIX. (LXI.): 37-48 | DOI: 10.3849/2336-2995.29.2020.02.037-048 During the period between 2016 and 2019, the efficiency of language courses was scrutinized by invention methods. In 2019, the language requirements were set to 14 958 positions in the Czech Armed Forces (60.69 %). Out of the given number of positions, the language requirement was met by only 6 414 professional soldiers, i.e. 42.88 %. The results of the language courses vary a lot depending on the required level of language proficiency; the courses designed to prepare the learners for SLP 1111 and SLP 2222 had the success rate around 60 %, however, the success rate of the courses for SLP 3333 was rather lower (38 %). Out of five groups of factors affecting the success rate, the relative significance of 22 factors was assessed. Most of the critically significant factors concerned the organization of language education; some of the critically significant factors were as follows: placement testing, flexibility of the syllabus and familiarization with the exam format and assessment criteria. |
Impact of the New Technologies on CBRN Terrorist Threats: General Perspective and Perspective of Republic of CroatiaReviewed - ReviewIvana Cetina, Jugoslav JozićVojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 119-139 | DOI: 10.3849/2336-2995.31.2022.04.119-139 Although the level of the overall CBRN threat in the world is currently considered to be low, there is a trend of a growing concern about CBRN terrorism. Various terrorist groups have shown interest in using CBRN materials to disrupt the global order and economy. The motivation and factors that influence the potential use of CBRN agents in terrorist attacks arise from the fact that CBRN agents have potentially high mortality and can cause serious consequences. A large number of potential dual-use (military and civilian) items as well as the introduction of new technologies in use can be utilized for the CBRN attacks and create a wide range of new possible terrorist (and military) threats. This paper provides a general overview of the past and current situations regarding CBRN terrorism, analyses some of current widely known new technologies that can be utilized for CBRN terrorist attacks and analyses the biggest potential threats from CBRN hazards. |
Testing of Pilots Abilities on Flight SimulatorsReviewed - ResearchRudolf JaloveckýVojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 127-144 | DOI: 10.3849/2336-2995.33.2024.01.127-144 The article presents more than ten years of experience in testing the abilities of pilots during flight control on flight simulators. A hypothesis is stated about the possibilities of finding common features in flight control, the basic mathematical apparatus for evaluation is presented, the flight simulators used and, of course, the achieved results are presented. 110 pilots have already been tested and a total of 2360 missions - test flights - have been simulated. Subsequent mathematical analysis provided approximately 40,000 results suitable for further statistical processing. This amount of data obtained from realistically simulated flights provides a prerequisite for defining applicable conclusions to the proposed mortgages. For the needs of subsequent certification, a proposal for the pile measurement methodology was also prepared, which summarizes both the theoretical approach to pile testing and the procedure for carrying out tests on individual simulators. Part of the proposed methodology includes an overview of the software created to facilitate the recording of data from individual missions, as well as software for own analysis of the measured data from the missions. |
Deepfake as an Advanced Manipulative Technique for Spreading PropagandaReviewed - ReviewMartin HavlíkVojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 3-16 | DOI: 10.3849/2336-2995.32.2023.01.003-017 The article describes the basic foundations and significance of the manipulative technique called Deepfake, which in the environment of technological and informational expansion is also becoming a widely used tool for spreading propaganda. This advanced manipulation complements a wider spectrum of forms of disinformation and is increasingly being used as a means of conducting information operations, often as part of wider hybrid warfare. Effectively combating this kind of manipulation places high demands on consumers of information, both on the part of the detection tools used and on the part of the cognitive human approach based on critical thinking. The expansion and sophistication of similar manipulative techniques will continue, in connection with the development of modern technologies and the interconnectedness of the information environment. Although the Deepfake technique is not only associated with security-military aspects, its influence on information operations and hybrid warfare cannot be neglected. |
Leadership development in the conditions of the Czech Armed ForcesReviewed - ResearchMilan Marek, Aleš TesařVojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 50-70 | DOI: 10.3849/2336-2995.31.2022.04.050-070 The aim of this article is to define leadership as a process required in the Czech Armed Forces. To this end, the nature of military leadership is first identified by analyzing similarities and differences of the widely accepted theoretical concepts (schools) of leadership, including approaches used in selected alliance armed forces. Based on the current state of affairs analysis, the components of leadership and the relationship among them are identified, as well as general conditions for their application. In accordance with the knowledge gained, a general leadership model of the Army of the Czech Republic is proposed. |
Review of the Author´s Monography - Jiří FidlerNonreviewed - OtherJan EichlerVojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 145-148 The personality of the seventh Czechoslovak president, army general Ludvík Svoboda, is well known to older generations, younger generations are aware of him because of the controversies of recent times. Although there are many biographies of Svoboda, they are mostly determined by the time of their creation and the effort to avoid naming the problems of the time. |
Liability for Health Damage - Public vs Private AreaReviewed - ReviewOndřej Horák, Leopold Skoruša, Radim Vičar, Tomáš ZbořilVojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 110-128 | DOI: 10.3849/2336-2995.33.2024.03.110-128 The article deals with the comparison of refunds of non-material damage in public and private area. In the public area is analyzed legal regulation on health injuries in service relations, in private area is discussed legal regulation on health injuries in civil law and labour law. Particular attention will be focused on the transfer of compensation in the event of injury to the heirs - while in service relationships, such claims are extinguished by death (not transferred on the heirs), which was taken over from the 1960s legislation, in current private law, do not cease if they have been recognized or at least brought in court. The aim of the paper is a critical analysis for the current state of legal regulation and the proposals de lege ferenda (approximation to labour law regulation). The issue has increased importance for public finances and functioning of public sector and enforcement of the rule of law. |
Czech Defence Policy Assessment in 2017/2018Reviewed - ReviewLukáš Dyčka, Josef ProcházkaVojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 3-19 | DOI: 10.3849/2336-2995.27.2018.04.003-019 The research described in this paper was conducted in the framework of institutional research project Strategic Alternatives (STRATAL) within the Centre for Security and Military Strategic Studies of University of Defence, The Czech Republic. Article assesses the development of Czech Defence policy in 2017 and first half of 2018. Authors analyse key change drivers in external environment (security threats, EU strategic autonomy, transatlantic link). In second step authors evaluate measures taken in political, military, administrative, economical and societal domain in response to key change drivers and highlight related risks to effective defence policy formulation and implementation. |
Laser Weapons as a New Entity to Small FirearmsReviewed - ReviewLadislav KulhánekVojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 48-62 | DOI: 10.3849/2336-2995.32.2023.03.048-062 Laser weapons have long been the subject of debate. The article discusses the potential adoption of laser weapons by infantry units and the future of small firearms. The text analyses these weapons in selected categories that subsequently support the evaluations and the conclusion. If miniaturisation is successfully managed, the comparison reveals an interesting paradox. While laser weapons and firearms do not rival each other as distinct functionalities, given the right conditions, they can actually complement each other and compensate for any disadvantages within their respective categories. Today's complex battlefield is placing ever greater demands on small arms, pushing conventional weapon mechanisms - combined with ammunition that guarantees accuracy and lower recoil, albeit at the expense of penetration - towards the limits of further possible advancement in technology. Improved passive individual protection restricts the wounding potential of pistol ammunition, reducing it to below 150 m for rifle cartridges, while guided ammunition tends to be prohibitively expensive. Under the right conditions, laser weapons could compensate for any of these drawbacks. |
Evaluation and Certification CZE/SVK Battle Group EUMilitary artIng. Jaroslav KulíšekVojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 11-40 To fulfil Czech obligation as an EU Battle Group Framework Nation according to the regulating document EU BG Training and Certification, the Czech Army is to certify that the CZE/SVK Battle Group EU meet the standards and criteria stated in Standards and Criteria for EU BG. It is recommended that the CZE/SVK Battle Group EU certification process should be analogous with NATO Response Force (NRF) certification procedure and practical methods. Further it is suggested that the CZE/SVK Battle Group EU certification procedure is divided into several evaluation procedures: preparation planning evaluation, war-fighting evaluation, and technical evaluation. Each procedure will be developed by specialized teams with representatives in the sub-working group to ensure that the different procedures harmonize. The views expressed in this assessment are those of the author and do not reflect the official policy or position of EU Military Structure or the Czech Ministry of Defence. All information and data for this paper were drawn from unclassified sources. The written sources are listed in the matrix above. |
NATO After the End of the Cold WarReviewed - ReviewJan EichlerVojenské rozhledy / Czech Military Review Nr. 2/2021, Vol. XXX. (LXII.): 3-25 | DOI: 10.3849/2336-2995.30.2021.02.003-025 The article analyses the process of the NATO enlargement after 1990. It starts by a detailed analysis of the secret negotiations which have been started just after the end of the Cold War. In the light of the institutional liberalism, the NATO enlargement is a positive process which satisfied especially new member states. But in the light of the American neorealism, this process resulted into profound changes in the balance of the security threats and into a large militarisation and tension at the new Eastern frontier of NATO in a direct neighbourhood with the Russia. New military units with the modern arms systems are deployed over there and we are witnessing a growing number of dangerous military incidents. As a result, the contemporary situation needs new political negotiations between two competitors and a shift from the contemporary negative Peace towards the positive Peace. |
From Plan Gideon to Plan Tnufa: Israeli defense strategy and the buildup of the Israeli Defense Forces in the wider context of the Middle East after the Arab SpringReviewed - ResearchĽubomír Zvada, Jiří LachVojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 24-44 | DOI: 10.3849/2336-2995.32.2023.04.024-044 Based on the content analysis method, this study analyzes the first ever published security strategy of the Israel Defense Forces, which was published in 2015. The main objective of the paper is not only to present the circumstances of its creation and discuss the main objectives of this strategic security document, but also to outline the broader geopolitical context from which it emerged. The authors argue that the document primarily emphasized two areas - the use of force and capacity building of the Israeli military. Among other things, the publication of the strategy was intended to have a deterrent effect. In the conclusion, the authors compare the Gideon Plan and its follow-up, the Tnufa Plan, and point to the considerable importance that consensus among political and military elites has in the implementation of such a document and reflect on what lessons and inspiration can be drawn from this case in our geographic space in the process of formulating or reformulating strategic security documents. |
Evaluation of Oil Security of the Czech RepublicNonreviewed - OtherRené NastoupilVojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 134-143 The article deals with the evaluation of the state of oil security in the Czech Republic and measures, which should be taken to increase it. The attention is payed to the importance of the crude oil in the energy mix of the Czech Republic, its oil dependency and international cooperation in the area of oil security. Further, it focuses on the emergency stocks of the crude oil and petroleum products and to their use and to the oil demand restraint measures. |
Risk Catalogue: Software Instrument for Risk Management in Defence DepartmentReviewedIng. David Řehák, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 40-44 Risk management covers the identification, assessment, and prioritisation of risks, which is followed by coordinated preventive operations to minimize negative impacts on society. The most demanding is the so-called risk assessment (risk identification, risk analysis, risk evaluation). The Risk Catalogue consists of introductory page, and twenty cards for risks register. With the assistance of this catalogue, defence analysts acquire general knowledge about number of risks and their frequency. The level of risk is calculated by summation according to its probability, gravity, and unwanted effects. In case of defence department, actual tasks are assigned to manage to Defence Ministry, Division, Branch, and Section accordingly. Possible risks are represented at a chart accompanying the article. The purpose of Risk Catalogue, its principles, guidelines for implementation, is to make the work of analysts easier. |
Current Approaches of the Czech Republic, the EU and NATO to Hybrid ThreatsReviewed - ResearchMartin HavlíkVojenské rozhledy / Czech Military Review Nr. 2/2022, Vol. XXXI. (LXIII.): 3-16 | DOI: 10.3849/2336-2995.31.2022.02.003-016 The article discusses the current approach of the Czech Republic to the phenomenon of hybrid threats and analyses the fundamental shortcomings that determine the effective management of these threats. As part of a comprehensive approach, the text is supplemented by the current view of the European Union and NATO on addressing the issue of hybrid action by hostile actors. A summary comparison of the approaches of the Czech Republic, the European Union and NATO points to the need for mutual institutional synergy among these entities. Although the current approaches of the mentioned subjects are relatively sufficiently doctrinally anchored, the absence of a complex and especially practically functioning apparatus and specific operational tools that would be able to face a wide range of hybrid threats persists. |
Consequences of the Changes in Czechoslovakia in November 1989 for the Teaching of Social Sciences at Military Universities Using the Example of the Military University of the Ground Forces in VyškovReviewed - ResearchFrantišek HanzlíkVojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 188-205 | DOI: 10.3849/2336-2995.32.2023.04.188-205 The article deals with the consequences of changes in society and the army after the "Velvet Revolution" in 1989 for teaching social sciences at military schools. The changes are illustrated by the example of the Military University of the Ground Forces in Vyškov, which trained most of the officers for the ground troops. The first part of the article shows the use of social science teaching at military schools to ideologically indoctrinate students in favour of the ruling Communist Party of Czechoslovakia before November 1989. The next part of the article deals with the reflection of changes in society and in the army after the abolition of the article on the leading role of the Communist Party of Czechoslovakia in the Constitution in the system of teaching social sciences, in their content and scope. The content of the article also shows individual milestones in the process of changes in the teaching of social sciences on the way from their use for communist indoctrination to the formation of democratic army officers. |

