RESPONSE TO HYBRID THREATS: POLICIES, CONCEPTS AND STRATEGIC APPROACHES
plugins.themes.bootstrap3.article.main678f7bf60a69e
Santrauka
In a changing security environment in Europe, hybrid threats have become a major challenge that requires a comprehensive and adaptive response. Hybrid threats include conventional and unconventional approaches, such as cyberattacks, disinformation campaigns, conspiracy theories, economic coercion, and external warfare, to undermine security, stability and democratic institutions in the region.
Disinformation campaigns or conspiracy theories can be constructed for strategic purposes (for example: to inform or warn others) in order to manipulate, provoke and target specific people or groups for financial or political reasons. Especially in less democratic countries, the purpose of conspiracy theory is to create a feeling that there is a gap between those citizens who feel excluded from decision making or feel powerless of their choices, while decreasing their intention to be included into the political process of voting. However, on the other hand, conspiracy theory can be used as a tactic for politicians, too. A great example is a example of Hungary, where politicians were using the Great Replacement conspiracy theory against refugees and EU policies mobilizing Hungarians to achieve his political goals.
The changing nature of hybrid threats poses complex challenges to European security, as they blur the boundaries between military and non-military action, state and non-state actors, and the physical and virtual spheres.
This article analyses the possible response to hybrid threats, introducing the main actors, under discussions true the policies, concepts and strategic approaches, main focusing on the case of Europe. The article reviews different theories, discussing key concepts and possible cooperation frameworks and the analysis of the legal regulation.
plugins.themes.bootstrap3.article.details678f7bf60d59b
Authorship Responsibility and Authors' Statements
The authors must submit the Author's Guarantee Form, declaring that the article submitted to Public Security and Public Order is an original work and has neither been published nor is under consideration for publication elsewhere. More so, the work has been carried out by the authors and the article does not contravene any existing copyright or any other third party rights. The AUTHOR'S GUARANTEE FORM could be found HERE
Authors contributing to Public Security and Public Order agree to publish their articles allowing third parties to share their work (copy, distribute, transmit) and to adapt it with a condition of proper referencing; the authors contributing agree to transfer all copyright ownership of the manuscript to the Public Security and Public Order.