Fulltext search in archive
Results 1 to 30 of 46:
Reviewed - Research |
Cognitive Warfare as a New Dimension of Security. A Fictional Concept or a Real Silent Threat?Reviewed - ReviewKristýna Drmotová, Libor KutějVojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 63-83 | DOI: 10.3849/2336-2995.33.2024.01.063-083 Cognitive warfare is a new phenomenon that differs from any forms of action previously used in the information space aiming to affect the thinking of target groups. The main difference consists in the targeted and sophisticated use of scientific knowledge from neuroscience, with special attention on consciousness and perception of reality. This deeper understanding of how the human mind works has impacted distributed narratives and the choice of the most suitable technological platforms for their distribution to the target audience. This article presents a conceptual classification of cognitive warfare and defines its three core segments: neuroscience, technology and aspects of social science. |
Reviewed - Research |
Strategic Communications: From a Reactive Fight Against Disinformation Towards Comprehensive Use in Support of National Security and DefenceReviewed - ReviewVendula DivišováVojenské rozhledy / Czech Military Review Nr. 2/2022, Vol. XXXI. (LXIII.): 34-53 | DOI: 10.3849/2336-2995.31.2022.02.034-053 The concept of strategic communications rose to prominence especially with the events linked to the Crimea annexation and Russian intervention in Eastern Ukraine. As such it has been mostly related to the reactive fight against disinformation and propaganda or other elements of the hybrid campaign. This paper aims to point to the much broader potential for the tool of strategic communications in support of goals in the realm of national security and defence, while it is understood as proactive efforts and specific mindset using the information effect to advance national interests. Based on the literature review, benefits of strategic communications beyond hybrid campaigns are identified also in the fields of foreign military operations, counterinsurgency, counter-terrorism, deterrence and crisis management. It describes the informational, particularly, the cognitive, dimensions of these security threats as well as of the measures to counter them. |
Issues of Resilience to Cyber-Enabled Psychological and Information OperationsReviewed - ReviewPetra MlejnkováVojenské rozhledy / Czech Military Review Nr. 1/2022, Vol. XXXI. (LXIII.): 38-50 | DOI: 10.3849/2336-2995.31.2022.01.038-050 This article discusses the transformation of the information environment, which allows an adversary to exploit cyber-enabled psychological and information operations. It presents the options currently available to an adversary to exploit the vulnerability of the information environment, chiefly the cognitive vulnerabilities of target groups. Thus, hostile interests are often pursued through manipulation, using disinformation, propaganda, algorithms and artificial intelligence. In the light of these developments, the article defines a society-centric approach, in which societal and human resilience are emphasised. |
Perspectives of Clausewitz’s Center of GravityReviewedJán SpišákVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 70-84 | DOI: 10.3849/2336-2995.34.2025.01.070-084 The center of gravity in military affairs represents a dominant element of military art, used in the planning and conduct of military operations. The doctrine defines it as the main source of power that provides the actor with his strength, freedom of action and/or the will to fight. This article examines Clausewitz’s concept of center of gravity through selected philosophical perspectives and clarifies its significance in military theory and practice. It presents the doctrinal development of the concept, discusses its context, and concludes that the concept of the center of gravity remains a key doctrinal and practical element of operational art. |
Are There Real Global Catastrophic Biological Risks?ReviewedAleš Macela, Vanda BoštíkováVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 55-69 | DOI: 10.3849/2336-2995.34.2025.01.055-069
|
Challenges for Teaching Foreign Languages (French, German, Russian) at the Ministry of Defence of the Czech Republic in the Current Geopolitical SituationNonreviewed - OtherLadislav Baumgartner, Iveta Macháčková, Zbyněk Rektořík, Jana TomšůVojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 129-144 The language training within the Ministry of Defence [MoD] of the Czech Republic is primarily focused on English. However, in accordance with the Concept of Personnel Training for the Needs of the MoD, the MoD provides language training in other foreign languages as well. The language teaching is the responsibility of the Language Centre of the University of Defence Brno [CJV UO] and includes English, French, German and Russian. The aim of this article is to compare the activities of the CJV UO with similar language centres in the defence departments of Germany, Austria and France and to present the teaching of French, German and Russian within the MoD through examples of good practice. In the context of the current geopolitical situation, the teaching of French, German and Russian becomes more important, and the CJV UO responds flexibly to the demands of the MoD regarding the provision of the teaching of these languages including professional language and electronic teaching support. |
Deepfake as an Advanced Manipulative Technique for Spreading PropagandaReviewed - ReviewMartin HavlíkVojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 3-16 | DOI: 10.3849/2336-2995.32.2023.01.003-017 The article describes the basic foundations and significance of the manipulative technique called Deepfake, which in the environment of technological and informational expansion is also becoming a widely used tool for spreading propaganda. This advanced manipulation complements a wider spectrum of forms of disinformation and is increasingly being used as a means of conducting information operations, often as part of wider hybrid warfare. Effectively combating this kind of manipulation places high demands on consumers of information, both on the part of the detection tools used and on the part of the cognitive human approach based on critical thinking. The expansion and sophistication of similar manipulative techniques will continue, in connection with the development of modern technologies and the interconnectedness of the information environment. Although the Deepfake technique is not only associated with security-military aspects, its influence on information operations and hybrid warfare cannot be neglected. |
Constructive Simmulation: An Effective Tool for an Assessment of the Operational Effectiveness within the Cability Planning ProcessReviewed - ResearchJan Drozd, Josef ProcházkaVojenské rozhledy / Czech Military Review Nr. 2/2022, Vol. XXXI. (LXIII.): 54-70 | DOI: 10.3849/2336-2995.31.2022.02.054-070 The article outlines the outcome of a comprehensive researche aiming at the enhancement of decision making within the defence and operational planning processes. Both processes differ in purpose, neverthelles they are challenged by the very same problém to find solutions with maximum operational effectiveness of armed forces capabilities at minimum cost to achieve objectives. It applies constructive simulation namely the software instruments of MASA SWORD and assess its potential to support the process of capability requirements identification and validation of potential alternatives to achieve objectives. It provides reasonable evidence that constructive simulation is a valuable instrument to support the evidence based decision making within in the processes of defence planning and operations planning proces. Constructive simulation allows to identify the most suitable solutions in terms of both operational effectiveness and costs. |
Leadership development in the conditions of the Czech Armed ForcesReviewed - ResearchMilan Marek, Aleš TesařVojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 50-70 | DOI: 10.3849/2336-2995.31.2022.04.050-070 The aim of this article is to define leadership as a process required in the Czech Armed Forces. To this end, the nature of military leadership is first identified by analyzing similarities and differences of the widely accepted theoretical concepts (schools) of leadership, including approaches used in selected alliance armed forces. Based on the current state of affairs analysis, the components of leadership and the relationship among them are identified, as well as general conditions for their application. In accordance with the knowledge gained, a general leadership model of the Army of the Czech Republic is proposed. |
Relevance of Transactional Leadership in Czech Armed Forces: Case of Military StudentsReviewed - ResearchJakub Stříbrný, František Milichovský, Veronika Koleňáková, Lenka ČadováVojenské rozhledy / Czech Military Review Nr. 3/2022, Vol. XXXI. (LXIII.): 101-120 | DOI: 10.3849/2336-2995.31.2022.03.101-120 Leadership and its styles have been in the spotlight for many years. The changing military environment and demands on army readiness bring new questions and perspectives to leadership. Leaders now face constant changes and specifications of the new modern era. Concerning these changes and transformations in society and the Army, there are new demands on soldiers and leaders at all levels of the Army of the Czech Republic. This paper provides insight and muse about both transactional and transformational leadership styles and investigates an approach to these styles by Czech military students. This paper aims to identify what leadership style Czech military students prefer at the University of Defence. This research focused on evaluating the personal characteristics required for a leadership position. To verify the relevance of the gained results, we employed paired t-test. |
Innovative view of the methodical process of facing disinformationReviewed - ResearchMartin HavlíkVojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 23-36 | DOI: 10.3849/2336-2995.31.2022.04.023-036 The article describes an innovative view of a possible methodical process of access and protection against disinformation. The ever-increasing digitization and use of cyberspace to disseminate all kinds of data and information provides users with an indisputable number of associated benefits associated with rapid access, distribution or sharing of current knowledge. However, this development trend also reciprocally generates a number of related threats that need to be faced. Our own resilience and effective tools against information campaigns and information actions of all relevant actors play the key role here. The critical thinking itself and the process mechanisms used to access information are the focus of overall resilience to this type of security threats. Thus, the methodical process can help a wide range of readers broaden their view of the complexity of the problem and partially minimize the associated security risks. |
Cognitive Hierarchy and IntelligenceReviewed - ReviewJozef Vojtek, Josef Říha, Miroslav ŠuhajVojenské rozhledy / Czech Military Review Nr. 2/2022, Vol. XXXI. (LXIII.): 88-105 | DOI: 10.3849/2336-2995.31.2022.02.088-105 The article deals with the issue of the cognitive pyramid and the possible use of intelligence analysis in the context of gaining the understanding and wisdom of users of information using this pyramid. The cognitive pyramid is used to define the terms date, information, knowledge, understanding and wisdom that make up the various levels of the pyramid. The paper attempts to discuss concepts in different models of the pyramid. It briefly describes intelligence in the context of the use of intelligence by means of a cognitive pyramid. Intelligence is a special kind of knowledge. This article also seeks to explore how intelligence creation can be explained using a cognitive analytical pyramid model. |
Identification of factors for the prevention and elimination of undesirable forms of impulsive behavior in the context of solving difficult situations under conditions of professional activities of military leadership studentsReviewed - ResearchDavid Ullrich, František Milichovský, Veronika Koleňáková, Lenka ČadováVojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 37-49 | DOI: 10.3849/2336-2995.31.2022.04.037-049 The effective leadership and the effectiveness of a leader reflect, as the strongest factor, the degree of his transformational approach, which influences the objectively measured performance of the led group. The main goal of the pilot research study was to identify personality and psychophysiological factors that could be monitored in the prevention and elimination of undesirable forms of impulsive behavior in the context of solving difficult situations in real conditions for professional leadership students according to the Big Five theory. The chosen research design made it possible to effectively combine the advantages of a behavioral and personalized approach to the study of impulsivity. The results of the study carried out on the final sample of subjects N=63, aged 21 to 26 years (r=21.7 years; 34.9% women and 65.1% men) are currently being processed. However, it can already be stated that the degree of impulsivity in military leadership students is related to the level of conscientiousness. |
The Information War in Ukraine as a Part of the Military StrategyReviewed - ReviewJan MěřičkaVojenské rozhledy / Czech Military Review Nr. 1/2022, Vol. XXXI. (LXIII.): 21-37 | DOI: 10.3849/2336-2995.31.2022.01.021-037 This paper assesses the information war in Ukraine in the context of the military strategy. An influence of the information operation (disinformation and deception) presents the strategic tool. The author pragmatically analyses the information war from the military art perspectives and as a part of the strategy used for support of the combat operations. He identifies phases of the information war in the context of the war. The author expects and confirms the opinion that the information war is led by both external actors (the USA and the Russian Federation). Their top representatives are involving in the information war because they support their own interests. This paper has been written as a neo-realist case study. The balance of power concept is in accordance with the used theory, as well as with the key interests of the external actors. |
Experiment of Using Structured Techniques in Intelligence AnalysisReviewed - ReviewJozef VojtekVojenské rozhledy / Czech Military Review Nr. 4/2019, Vol. XXVIII. (LX.): 32-43 | DOI: 10.3849/2336-2995.28.2019.04.032-043 Research into the use of structured analytical techniques has shown that analysts use specific structured techniques to achieve better analysis results than using traditional intuitive approaches. The experiment was based on solving the analytical tasks of two intelligence scenarios in a set of 32 people. To verify the null hypothesis, a chi-square test of independence was performed at a 5% significance level. In the control/intuitive and experimental/structured technique groups, responses were evaluated in four criteria, in an overall qualitative intelligence analysis, in rank corps, depending on the time of service and education. The number of correct answers was the highest in the experimental group when dealing with the intelligence analysis criteria for both scenarios. Improved analysis of the experimental group in the second scenario solution was statistically significant. The null hypothesis, using structured methodology improves qualitative intelligence analysis, is not rejected. In the experiment, other test criteria are below than the critical value. The results of the research have shown that the success of the problem solution is influenced by the correct use of the Hypothesis Testing technique. The use of structured techniques depends on the level of knowledge and the type of intelligence problem. At the same time, the conduct of research has shown the influence of analysts' cognitive biases. |
The Approach to Defining the Competencies for Military Professionals in Command and Control in Military OperationsReviewed - ReviewRichard SaibertVojenské rozhledy / Czech Military Review Nr. 1/2019, Vol. XXVIII. (LX.): 30-47 | DOI: 10.3849/2336-2995.28.2019.01.030-047 The author presents the results of the research in the field of defining the competencies for military professionals in command and control in military operations. The main purpose of the article is to familiarize the readers with the proposal of the recommendations for implementing an integrated approach to defining the competencies needed for military personnel within the Ministry of Defense of the Czech Republic. On the basis of the analysis of the national strategic documents, analysis of the system of management of educational and training activities and evaluation of the current competency model for the members of the Czech Armed Forces, the recommendations were drawn up to introduce a conceptual approach to defining the competencies for military personnel. This set of proposed measures provides a baseline for applying the competency model as a human resource management tool. |
Some Aspects of Structured Intelligence AnalysisReviewed - ReviewJozef VojtekVojenské rozhledy / Czech Military Review Nr. 1/2019, Vol. XXVIII. (LX.): 59-72 | DOI: 10.3849/2336-2995.28.2019.01.059-072 Structured analysis is a systematic approach to solving intelligence analytic problems. Methodology and analytical techniques in the intelligence analysis include the selection of structured techniques from the point of view of the analytical task and the use of the analytical spectrum. Basic structured analytical techniques ensure transparency and reduce personality bias. Taxonomy is the basis for quality analysis. There are 55 types of techniques that complement expert judgment and intuition. A properly structured analysis contains twelve questions supplemented by a number of analytical techniques. The method of analytical spectrum in strategy leads to the split of the process into the phase of analysis, synthesis, selection of information and argumentation, and the analysis itself consists of four sub-stages. The basic parameters that negatively affect the use of structured analytical techniques by intelligence analysts are the analytical and collective approach, the patterns and the level of education. |
Experiment in the Military DomainReviewed - ReviewJan HodickýVojenské rozhledy / Czech Military Review Nr. 2/2018, Vol. XXVII. (LIX.): 19-31 | DOI: 10.3849/2336-2995.27.2018.02.19-32 The article deals with the experimentation in the military domain. It is anchored by the experiment explanation in the NATO context paying special attention to the capability development. Basic principles and terminology of design, execution and analysis is discussed in the following part employing 5W approach. The main focus is aimed at the experiments' examples from the NATO and Nations environment. The article is closed by the explanation of the role of the experiment in the decision making process under the uncertainty in the complex environment. |
Operational Adaptability and Human Dimension of the Armed ConflictNonreviewed - Othermjr. Ing. Tomáš NovákVojenské rozhledy / Czech Military Review Nr. 3/2016, Vol. XXV. (LVII.): 102-112 The article discusses the operational adaptability, which will be needed, in accordance with US, in future armed conflicts. The capability of operational adaptability has a significant impact particularly on the operations of land forces, which are still considered as a paramount military power. One of the prerequisites for achieving operational adaptability is effective influencing the dynamics of the human environment in armed conflict. Current development and emphasizing technology over the course of armed conflict detached too fare the War from its intangible political, cultural and psychological context. Human, psychological, political and cultural dimensions of armed conflict create a lot of uncertainty, which land forces should deal with in the future military operations. A partial solution applicable for Czech Armed Forces also outlines this article. |
Islamist Territorially Anchored Violent Non-State Actor in the International SystemReviewed - ReviewMgr. Zdeněk LudvíkVojenské rozhledy / Czech Military Review Nr. 3/2015, Vol. XXIV. (LVI.): 62-80 | DOI: 10.3849/1210-3292.24.2015.03.062-081 Islamist territorially anchored violent non-state actors (ITAVNSAs) seeking to change the status quo of the current international system constitute one of the greatest challenges the international order based on mutual respect of equal sovereign states. These actors in areas without the presence of power states use explicit cross-border violence to achieve their objective in accordance with universal Islamist ideology - the construction of a caliphate. The paper presents in the theoretical and modern historical perspectives methods of reduction of anarchy in the international system - power, economic, legalistic and normative - and highlights the reasons why face to face of these actors, these heretofore functional ways, be it on a regional or system level of analysis, fail. |
Milan Rastislav Štefánik - Scientist, Soldier, Diplomat and Politician An Unconventional LookNonreviewed - OtherJUDr. et PhDr. Jaroslav Padrnos, CSc.Vojenské rozhledy / Czech Military Review Nr. 2/2014, Vol. XXIII. (LV.): 154-163 The life and work of General Dr. Milan Rastislav Štefánik is without doubts the life and work of one of the three leading crisis managers of extraordinary skills operating in an enviroment of first escalating global crisis of the 20th century. The phenomenal result of their activivities was the establishment of the Czechoslovak Republic. The author concludes that Štefánik´s work is timeless, from which we ought to draw a continual inspiration. |
Cyberspace as a "Fifth Domain"?Reviewed - ReviewMgr. Martin Bastl, Ph.D., Zuzana GruberováVojenské rozhledy / Czech Military Review Nr. 4/2013, Vol. XXII. (LIV.): 10-21 | DOI: 10.3849/2336-2995.22.2013.04.010-021 The aim of the article is to present an up-to-date discussion on cyberspace as a new, fifth domain of warfare. The reader is provided with the concept of cyberspace, its current interpretation, primarily in American doctrines and military theory. The army mission is contextually mentioned as well, explicitly the limits of Czech forces capacity. The paper deals with the form of cyberspace and its characteristics in the context of military operations. It advocates the idea of cyberspace as a war domain, which is presented together with the criticism to such approach. The article concludes with the summary and evaluation of both sides' arguments, taking into account the specific role and abilities of armed forces. |
Competing Hypotheses Analysis: Practical ApplicationsReviewed - ReviewIng. Pavel Zůna, MSS., Ph.D.Vojenské rozhledy / Czech Military Review Nr. 1/2013, Vol. XXII. (LIV.): 65-75 | DOI: 10.3849/2336-2995.22.2013.01.065-75 In 2007 and 2010, this Czech Military Review Vojenské rozhledy published several articles, discussing analytical thinking and analytical methodologies in the field of military intelligence. The authors among others mentioned the methodology ACH, Analysis of Competing Hypotheses. The methodology is not suitable only for intelligence, but it can be used further for solving a variety of military decision-making problems. The article in its first part describes ACH philosophy, including some academic considerations both by supporters and critics to this methodology. The second part demonstrates an example of its implementation and usage during support other problems tied with decision-making in defence planning process. The method is simple to explain, but difficult to introduce to real practice. The article explains both the theory and modifications of ACH and underlines some pitfalls connected with putting methodology into practice. |
Operational Art: Theory for PracticeMilitary artIng. Ján SpišákVojenské rozhledy / Czech Military Review Nr. 4/2012, Vol. XXI. (LIII.): 45-54 The aim of the article is to provide the readers information related to the theory of fundamental elements and tools of operational art, which are for the preparation and conduct of military operations, particularly at the operational level of war, critical. The operational level of war depends on methods that will create appropriate conditions to achieve the closing state, set by a superior commander, in accordance with the complex strategy of military and non-military instruments of state power. Although the methods of application of specific operational art components rest mainly in the mind of the English Annotations and with several acts tied with civil emergency preparation. |
Operational Analysis: Key Capability Supporting Decision-makingMilitary artIng. Pavel Zůna, MSS, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2012, Vol. XXI. (LIII.): 35-44 The defence environment is complex and dynamic. This is a result of the nature of modern conflict, rapid changes in technology, the need to deal with uncertainty in the face of limited sources, changed attitudes to risk and the sheer diversity of actors from different cultural backgrounds. Defence-decision makers are confronted with an increasing operational complexity that has strategic implications. Decisions on defence policy and strategy are characterized by uncertainty and risks. This Article describes differences in Hard and Soft Operational Analyses, and presents some examples and conclusions for military practice. |
The Lines of Operation Concept (Part II)Military artIng. Ján SpišákVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 53-64 The fundamentals of this concept, as they were explained in previous Military Review No 1, 2011, have stayed unchanged, up to the present. There still exist operational bases, directions, courses, lines, upon which military convoys transfer by the plan or in disorderly manner. Such picture corresponds to linear wars of first, second and third generations. The wars of fourth generation are characterized by the speed and initiative. The frontiers between war and politics are blurred, so are between civilians and combatants. They are mostly wars with and among non-state actors, counter-insurgency operations (COIN) Based on doctrinal analysis; author describes concepts philosophy in functional and logical aspects. This might help the commander and staff to visualize the arrangement of military capabilities in time, space, and purpose to accomplish the mission. The concept might be successfully applied in connection with stability and COIN operations. |
Two Monographs on Security from SlovakiaBook reviewVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 137-143 Prof. Dr. Štefan Volner, CSc., is a very diligent and prolific author. He is the author of many monographs, books, papers and articles in the field of security and defence policy published worldwide. Now we have his latest two books: Security of Mankind (Bezpečnosť ĺudstva) and Security for the 21st Century (Bezpečnosť 21. storočí). In the former one, he comes out of a broad concept of security. Dr. Volner regards the theory of securitization as a lingual and socially determined construct, and so does analyses of security topics. The purpose of his first monograph is to familiarize experts and students with new theoretical concepts, ideas, methodological approaches and paradigms. The latter monograph has a classical structure tied with security studies; it contains theoretical fundaments, dealing with global risks and classifies wars of 21st century. He regards human security as a multifaceted phenomenon, at macro- and micro- levels. |
Predictive Methodology in Intelligence ServicesReviewedBc. Petr ZelinkaVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 29-39 This article aims at building a bridge upon a gap, which separates academic sphere and intelligence community in the issue of predictive methodology. The author tries to accomplish this objective by presenting intelligence predictive methods based on open-source literature research. First, the question of uncertainty and probability in prediction is introduced (Cynefin template). Then follows basic introduction to predictive methods in civil and military intelligences, so that the reader might grasp the fundamentals of early warning systems. The academics and above all journalists should know the risks and perils in forming intelligence forecasts, estimates, foresight and warning scenarios, e.g. the so-called Black Swan scenario, the author explains potentials failures of the Delphi method. This study ought to be regarded as an introductory to predictive intelligence concurrently done by governmental agencies for purposes of national security and defence. |

