UNIVERSITY OF DEFENCE / CZECH REPUBLIC
ECONOMICS AND MANAGEMENT
2015 1
Economics and Management - p. 1 - 2015 Brno 30th September 2015
Published by University of Defence in Brno
EDITORIAL BOARD
EDITOR IN CHIEF
Martin VLKOVSKY
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
EDITORIAL BOARD
Ladislav ANDRASIK
Faculty of Electrical Engineering and Information Technology, Slovak University
of Technology in Bratislava, Slovak Republic
Ghita BARSAN
“Nicolae Balcescu“ Land Forces Academy, Sibiu, Romania
Vasile CARUTASU
“Nicolae Balcescu“ Land Forces Academy, Sibiu, Romania
Miroslav CEMPIREK
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
Marijana CINGULU
Faculty of Economics & Business, University of Zagreb, Chorvatsko
Petr CECH
Institute of Hospitality Management, Prague, Czech Republic
Monika MOTYCKOVA
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
Frantisek HANZLIK
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
Hubert HRDLICKA
Language Training Centre, University of Defence, Brno
Czech Republic
Miroslav KRC
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
Oto KUBIK
Academy STING – Private College, Brno, Czech Republic
Marek KULCZYCKI
The Tadeusz Kosciuszko Land Forces Military Academy, Poland
Stefan KURINIA
National Defence University, Warszaw, Poland
Ivan MALY
Faculty of Economics and Administration, Masaryk University, Brno, Czech Republic
Ivan MRAZ
General Staff, Prague, Czech Republic
Arpad POHL Faculty of Military Science and Officer´s Training, National University of Public
Service, Budapest, Hungary
Ladislav POTUZAK
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
Milan SOPOCI
Armed Forces Academy of General Milan Rastislav Štefánik, Liptovský Mikuláš,
Slovak Republic
Oleg STANEK
The University of Quebec at Rimouski, Canada
Jiri URBANEK
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
Cezar VASILESCU
Regional Department of Defense Resources Management Studies (DRESMARA),
Brasov, Romania
Jaroslav ZELENY
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
Iva ZIVELOVA
Faculty of Business and Economics, Mendel University of Agriculture and Forestry in
Brno, Czech Republic
EXECUTIVE EDITOR
Vitezslav JAROS
Faculty of Military Leadership, University of Defence, Brno
Czech Republic
Copyright © 2015
All rights reserved. No part of this publication may be reproduced without the prior
permission of University of Defence in Brno University Press.
5
C O N T E N T S
Dorel BADEA, Dumitru IANCU, Ghiţă BÂRSAN, Vasile CĂRUŢAŞU and Florin ILIE
CONCEPTUAL MODEL AND USEFUL APPLICATIONS IN INVESTIGATING
THE LEVEL OF PROTECTION OF CRITICAL INFRASTRUCTURES IN THE
TRANSPORT SECTOR ............................................................................................ p. 6
Tomáš BINAR, Jiří SUKÁČ, Radim UŠEL, Stanislav ROLC, Jan KŘESŤAN and Regina
MIKULÍKOVÁ
NEW PACKAGING MATERIALS TECHNOLOGIES AND THEIR IMPACT ON
MILITARY VEHICLES AND MATERIALS LIFE CYCLES ............................ p. 13
Marian BRZEZIŃSKI, Mariusz GONTARCZYK, Szymon MITKOW and Andrzej
ŚWIDERSKI
EVALUATION OF QUALITY OF DEFENCE INDUSTRY ENTERPRISES AS AN
ELEMENT OF LOGISTICAL NETWORK ......................................................... p. 19
Harald GELL
MOTIVATION OF STUDENTS …........................................................…………. p. 28
Dumitru IANCU, Dorel BADEA and Ghiță BÂRSAN
USING THE TOPSIS METHOD IN DECISION-MAKING PROCESS
CONCERNING LOGISTIC TRANSPORTS ........................................................ p. 38
Vítězslav JAROŠ
COMMAND AND CONTROL FOR PEACE OPERATIONS ........................... p. 45
Jaroslav KOMÁREK
CURRENT PITFALLS OF MANAGEMENT STUDIES ..................................... p. 51
Csér ORSOLYA
ASYMMETRIC WARFARE - THE SIEGE OF FALLUJAH ......................…... p. 60
Harald PÖCHER
ECONOMIC WARFARE: HEAVY LOSSES WITHOUT BLOODSHED ........ p. 72
Tajudeen Olalekan YUSUF and Sunday Stephen AJEMUNIGBOHUN
EFFECTIVENESS, EFFICIENCY AND PROMPTNESS OF CLAIMS
HANDLING PROCESS IN THE NIGERIAN INSURANCE INDUSTRY ......... p. 80
The Authors´ Bibliographies: .................................................................................... p. 89
The Reviewers´ Bibliographies: ................................................................................ p. 91
The language revision has not been made. The authors are responsible for the papers content.
6
CONCEPTUAL MODEL AND USEFUL APPLICATIONS IN
INVESTIGATING THE LEVEL OF PROTECTION OF CRITICAL
INFRASTRUCTURES IN THE TRANSPORT SECTOR
Dorel BADEA, Dumitru IANCU, Ghiţă BÂRSAN, Vasile CĂRUŢAŞU and Florin ILIE
Abstract: Generally, the transport infrastructure of a country, region, geographical area, etc.
represents an area of critical infrastructure (based on the modalities of defining it) both by its
contribution to the economic development of the geographic area under consideration and by
the consequences of its non-functionality relative to its social component. From a historical
perspective, since ancient times, the most prosperous regions were located either along major
communication routes or at their junction, representing growth poles and, based on the modern
theories of sustainable development, centers of societal sustainability. The article analyzes the
risks specific to transport as critical infrastructure using the CARVER method.
Keywords: transport, critical infrastructures, conceptual model, risk
1. Conceptual systematization
Returning to the above statements, it should also be mentioned the fact that blocking,
securing or even destroying transport capabilitiesis commonly used in military art as the
key factor for the success of a mission. In economic theory, it is stated that money is the
blood that irrigates the economy. Similarly, with regard to the field of critical
infrastructures, there exists the possibility of extrapolating this statement, the candidate
sectors being (taking into consideration multiple criteria, without minimizing the role of
others and not in any particular order) first, the field of telecommunications, of energy
and, of course, that of transport. In the same registry of analysis, the construction and
the maintenance of transport capacities are activities with a strong multiplying social
effect, creating numerous jobs and driving economic development horizontally, a fact
that is otherwise highlighted in the national development strategies or in those at the EU
level. In broad lines, in terms of the role of transport, we can say that, as activity, it
ensures the good carrying out of production in industry and agriculture, facilitates the
connections between the regions with raw materials and those where these are
processed, simplifies the convergence between human communities and even helps
regions that are located far away to get out of their isolation. Managing transport related
activities as critical infrastructure means finding the best means and applying them
accordingly so as to ensure their high protection. Reported to the meaning of
"criticality", it is a very good exemplification of the social function of management (to
act through people for people).
2. Creating a conceptual model
When considering transport as a critical infrastructure, given the complexity of the
domain (the diversification of the existing resources, the transport geography, the
7
automation, the infrastructure and the related logistics, the possible threats, the risk
analysis methods, etc.) simplifications are needed in order to create conceptual working
models. For the present paper it is envisaged three aspects that would lead to an
integrating representation, useful in the management of critical infrastructure protection.
A first such analysis that is necessary to consider is the one regarding the taxonomy of
transport and the relevant particularities. In accordance with the title of this paper,
without providing an exhaustive radiography, the relevant aspects taken into
consideration can be the following [1]:
- according to the traffic intensity, the railways can be main, secondary and local
(the main ones have large cargo and passenger traffic and are of fundamental
importance for the economy of certain countries and regions, connecting major
industrial centers, either within states or in neighboring countries);
- a component of the railways are the stations, which are classified into transit
stations and railway nodes (the common or transit stations predominate and unlike
railway nodes they represent stations where lines coming from at least three
directions intersect);
- in road transport (with two main elements-roads and vehicles), unlike in the case
of railways, the length of motor roads continues to increase, and the geographical
distribution of the road network is more balanced than that of the railways;
- water transport, with the two-components –maritime and river, is the cheapest of
all the types of contemporary transport because it does not require expenses for
the maintenance of the routes on which ships moving cargo travel and vessel
capacity is much higher than that of the units of road, rail and air transport and
hence the cost of transporting a unit of weight will be lower;
- air transport (having as main elements: air fleet, airports and navigation
directions) takes most of the long distance passenger traffic and a certain type of
goods (such as perishable goods, post parcels, precious items, high precision
technical equipment, medicines, etc.) being for some hard to reach regions
(northern regions, deserts, mountains, rainforests), the only possible type of
transport;
- the transport via pipelines (consisting of various tubes, final and intermediate
pumping stations, connection points and storage facilities) is one of the most
modern and cheapest means of transporting liquid and gaseous products (water,
oil, gas, petroleum products, brines, certain chemical products etc. ).
Of course, in addition to these means of transport, given the current practical needs of
the population and industries, there is the tendency of increasing the use of intermodal
transport.
A second aspect to be considered in creating a conceptual model of transport as critical
infrastructure is the typology of possible threats defined as any circumstance or event
with the potential to damage or destroy the critical infrastructure or any of its elements.
To summarize, the main threats to critical infrastructure for transport can be:
- terrorism through the systematic use of offensive violence against public and
private property, to compel certain individuals, groups and communities to change
their behavior and the promoted policy;
- the waterfall effect produced by the perturbation (the creation of malfunction) by
other critical infrastructure elements (e.g. - components of the energy or IT
sector);
- extension of the intensity and frequency of manifestation of extreme weather
phenomena or natural hazards (earthquake, hurricane, flood, landslides, etc.).
8
A special case of manifestation of the threats caused by terrorism is that of the large
urban areas (or other large towns) in which various events are organized (Olympic
Games, major sports competitions, meetings of international officials, concerts, etc.)
involving the participation of large masses of people. There is increased pressure in
these situations on the local transport networks that can be exploited as threat, the most
important vulnerabilities being: the faulty organization of security, the lack of effective
measures to decongest traffic, the schedule and the intensity of the circulation of the
inadequately adapted means of transport.
As special events recorded in the field of transport, one has to mention the intermodal
railway stations confronted in recent years with serious terrorist attacks and their
consequences: Madrid (2004, 13 bombs out of which 10 exploded, 4 commuter trains, 3
affected stations, 192 dead, 1,500 wounded); London (2005, 3 subway lines affected in
the King's Cross area - St. Pancras and a double-decker bus, 56 dead, 700 injured);
Moscow (2004, 2010, three suicide attacks with explosive devices, 4 subways stations
affected, 91 dead and 252 injured).
The third aspect considered for the proposed conceptual model covers the CARVER
methodology of analysis from outside to the inside, used for the first time by the US
special forces in Vietnam. The CARVER selection factors help select the best targets or
components to attack. For the factors under consideration a numerical value
representing the opportunity to attack the targetis allocated. The values are then placed
in a decision matrix that will lead to the achievement of certain prioritizations. The
significance of the acronym of the method is given the six letters as follows:
- criticality (C) means the value of the target (the primary consideration in directing
the actions), a target is critical when its destruction or damage has a significant
impact on military, political, economic or social aspects;
- accessibility (A) refers to the independence of a target from the possibility
of achievement (collecting intelligence, the attack itself and leaving the area) of
an attack by a threat agent, the main factors taken into consideration in evaluating
the accessibility including: active and passive early warning systems, road and rail
transport systems, the type of terrain and its use, population density, other natural
or synthetic obstacles and the weather conditions;
- recoverability (R) of a target assesses how long it will take to replace, repair or
rebuild the destruction or the damage to the target, it is variable depending on the
sources and the types of the involved components and the availability of the
required spare parts (reserves);
- a target is vulnerable (V) or easy to attack if the operational element has the
means and the expertise to successfully attack the target, taking into consideration
the fact that in determining the vulnerability of a target, the complexity of the
critical component must be compared with the capacity of the attacking element in
order to destroy or damage the respective target;
- the effect (E) in this context refers to the significant impact, wanted or not, that
could result once the selected target component is attacked. Traditionally, this
component has addressed the effect on the local population, but now broader
considerations are associated;
- a target has a high degree of recognition (R) if it can be observed (identified) by
an operational element and/or collection of intelligence without confusion (the
existence of characteristic features and the complexity of the target have
a decisive role) as compared to other targets.
9
Considering the elements described above, a possible representation that could form the
basis of a conceptual model for the subject under discussion is depicted in Figure 1. Of
course, in this demarche, we refer to the fact that the model is a simplification, only a
partial reflection of the real phenomenon or subject, certain unessential elements being
neglected, for the study of which it is intended, in order to provide an instrument more
accessible to the theoretical and (or) experimental investigation.
Figure 1: Conceptual model in investigating the level of protection of critical
infrastructures in the transport sector
Source: [2]
3. The application of the CARVER method
Like other instruments for risk assessment, it is evident that the CARVER method
involves a certain degree of subjectivity, which can manifest itself mainly through the
interpretation or estimation of a probability as a personal judgment. At the same time, it
is debatable the degree of trust about how likely it is that a certain event should happen,
based on the stage of specific knowledge at a certain time. Thus, in terms of
methodology, in the representation in Figure 1, were essentialized 6 dimensions of the
three presented categories of interest (types of transport, threats and CARVER
components). Like in the case of the Rubik's Cube, there is the possibility of the one
with each-other type of analyses (6 x 6 x 6), what we achieved next only for the rail
transport (1 x 6 x 6). Making a synthesis, were evaluated the respective dimensions
using the hierarchy CARVER type of matrix [3], maintaining the same components of
the rail transport seen as a system. Basically, the analysis was done for a railway node
taking into account its essential elements technically and operationally. The results are
outlined in Tables 1-6. Although there are many points of view when grading, in this
paper we used the point of view according to the American methodologies [4].
10
In Tables 1, 2 and 3 were calculated and ranked the scores obtained for cyber attacks
(CB) CBRN attack (NB) and bombing (BM).
Table 1
Total Rank
Objectives components "C" "A" "R" "V" "E" "R"
The main center for
traffic management10 9 5 9 9 10 52 1
Electricity system 8 9 3 2 6 9 37 2
Main infrastructure
(railways) 6 6 1 1 1 9 24 3
Spaces for travelers
(waiting halls) 2 4 2 1 1 9 19 6
Spaces for commercial
services for travelers2 5 2 1 2 9 21 5
Spaces for
transportation services
(transshipment
merchandise,
information)4 5 2 1 2 9 23 4
CARVER Matrix for Rail Transport (case of cybernetic attack)
Table 2
Total Rank
Objectives components "C" "A" "R" "V" "E" "R"
The main center for
traffic management8 8 1 7 9 10 43 3
Electricity system 1 9 1 2 2 9 24 5
Main infrastructure
(railways) 1 4 1 1 1 1 9 6
Spaces for travelers
(waiting halls) 10 10 3 7 10 9 49 1
Spaces for commercial
services for travelers10 10 3 7 9 9 48 2
Spaces for
transportation services
(transshipment
merchandise,
information)9 9 2 7 4 8 39 4
CARVER Matrix for Rail Transport (case of CBRN attack)
11
Table 3
Total Rank
Objectives components "C" "A" "R" "V" "E" "R"
The main center for
traffic management9 8 10 7 9 10 53 3
Electricity system 8 9 9 2 8 9 45 5
Main infrastructure
(railways) 9 4 8 1 7 1 30 6
Spaces for travelers
(waiting halls) 10 10 9 7 10 9 55 1
Spaces for commercial
services for travelers10 10 9 7 9 9 54 2
Spaces for
transportation services
(transshipment
merchandise,
information)9 9 9 7 8 8 50 4
CARVER Matrix for Rail Transport (case of bomb attack)
In Tables 4, 5 and 6 were calculated and ranked the scores obtained for flood (IN),
hurricane (UR) and earthquake (SE).
Table 4
Total Rank
Objectives components "C" "A" "R" "V" "E" "R"
The main center for
traffic management9 8 9 8 7 10 51 1
Electricity system 8 6 7 5 7 9 42 6
Main infrastructure
(railways) 9 9 9 10 8 1 46 5
Spaces for travelers
(waiting halls) 7 8 8 8 8 10 49 3
Spaces for commercial
services for travelers7 8 8 8 8 10 49 3
Spaces for
transportation services
(transshipment
merchandise,
information)8 7 8 8 9 10 50 2
CARVER Matrix for Rail Transport (case of flood)
Table 5
Total Rank
Objectives components "C" "A" "R" "V" "E" "R"
The main center for
traffic management9 6 5 7 5 9 41 2
Electricity system 10 10 6 10 9 3 48 1
Main infrastructure
(railways) 1 2 2 1 4 1 11 6
Spaces for travelers
(waiting halls) 2 4 4 6 1 9 26 3
Spaces for commercial
services for travelers2 4 4 6 1 9 26 3
Spaces for
transportation services
(transshipment
merchandise,
information)2 4 4 6 1 9 26 3
CARVER Matrix for Rail Transport (case of hurricane)
12
Table 6
Total Rank
Objectives components "C" "A" "R" "V" "E" "R"
The main center for
traffic management9 10 8 9 8 9 53 4
Electricity system 9 8 8 8 6 3 42 6
Main infrastructure
(railways) 10 9 10 10 10 9 58 1
Spaces for travelers
(waiting halls) 9 10 9 9 10 8 55 2
Spaces for commercial
services for travelers9 10 9 9 9 8 54 3
Spaces for
transportation services
(transshipment
merchandise,
information)8 10 9 9 8 8 52 5
CARVER Matrix for Rail Transport (case of earthquake)
4. Conclusions
Risk assessment of critical infrastructure in the transport sector is still quite difficult,
primarily because of the lack of statistical data leading to a high accuracy in estimating
probabilities or the subjective errors of the scalability assessment. This is the case of the
CARVER method in the sense stated above. One can notice that for the first three
evaluated threats, the applicability is pretty good, the results being confirmed by what
happens in practice (maximum risk associated to the operational center for traffic
management in case of the cyber attack, respectively associated to the crowded spaces
of a railway node, for bombing and CBRN). In relation to the initial area of applicability
of the method, in a way, the results were expected. At the same time, it was noticed the
difficulty of the application (Tables 4, 5, 6) when the threat is represented by extreme
natural events.
References
[1] PLĂMĂDEALĂ, GHE., Geografie economică mondială. Note de curs, Bălţi,
2009; http://tinread.usarb.md:8888/tinread/fulltext/plamadeala/geog_mond.pdf
[2] http://cuboscubik.com/MF8/todos-los-cubos
rubik?sort=p.model&order=ASC&limit=50&page=2
[3] http://images.brighthub.com/media/FC64B0_carver-matrix-template.xls
[4] ATTP 3-39.20 (FM 3-19.50), 5-20.
13
NEW PACKAGING MATERIALS TECHNOLOGIES AND THEIR
IMPACT ON MILITARY VEHICLES AND MATERIALS LIFE
CYCLES
Tomáš BINAR, Jiří SUKÁČ, Radim UŠEL, Stanislav ROLC, Jan KŘESŤAN and Regina
MIKULÍKOVÁ
Abstract: The paper is concerned with new packaging materials technologies convenient for
military vehicles storage both under the climatic conditions of the Czech Republic, and
potentially, areas with increased relative humidity, high dustiness and fluctuating temperature
gradient during the day. The results of applied research into short-time storage of a military
vehicle, namely TATRA 815, are presented herein. Furthermore, the paper outlines possible
applied research directions taken by the Department of Logistics at the University of Defence,
concentrating on testing the parameters of packaging materials to be possibly used in the
transportation and storage of military vehicles and materials during foreign operations, having
direct effect on the materials life cycles.
Keywords: military vehicles, humidity, packaging material, short-time storage,
transportation, logistic support, Tatra 815
1. Introduction
In order to secure foreign peace/humanitarian missions, the Armed Forces of the Czech
Republic (ACR) have support vehicles available capable of transporting material at the
place of destination for the troops carrying out specific tasks. These vehicles must be
ever-ready for the logistic support of the troops deployed. The efficiency and quickness
of assigned tasks completion is directly related to efficient logistic support. Unless
employed in foreign peace missions, the vehicles are permanently exposed to weather
conditions when parked in the military vehicles park. Hence, individual groups,
subgroups and parts of the vehicles are exposed to differing temperatures and relative
humidity in various seasons of the year. These conditions result in atmospheric corrosion
in certain groups, subgroups and parts of vehicles, which may lead to changes in the
material characteristics; neither, the impact of UV radiation on parts containing rubber
materials may be ignored [1-3]. In consequence of the corrosion of certain military
vehicles parts and premature deterioration of rubber materials, unexpected faults may
eventually occur considerably increasing preventive maintenance-related expenditures.
Thus, financial means are inefficiently managed at a cost centre in the planning process
for individual budget subitems [4, 5].
2. Programs of short-time storage of military vehicles
For the short-time storage, a TATRA 815 military support vehicle, representing the most
widely used vehicle for material transportation in the ACR, was selected.
14
For such purpose, nanotechnology was made use of, which is based on corrosion
inhibitors picture 1 forming ionic bond on the material surface. In an enclosed
environment in a special film, protective gas atmosphere is created, which “condenses”
on all metal surfaces. The advantage of the technology used, which is based on VpCi
corrosion inhibitors, is the possibility of all-year open-air parking of vehicles, and
consequently eliminating expenditures related to storing in roofed buildings with
considerable overhead costs.
Picture 1 The principle of corrosion inhibitor technology
Source: [7]
2.1 A TATRA 815 short-time storage procedure Stage 1
Prior to the storing itself using the VpCi corrosion inhibitor nanotechnology, the
condition of groups, subgroups and main parts of the vehicle was checked (defectation)
aimed to document and evaluate the pre-storage technical condition of the vehicle. Picture
2 shows an example of the engine visual inspection.
Picture 2 TATRA 815 engine visual inspection
15
Stage 2
Parts of the vehicle were treated with special environment-friendly preservation agents
not requiring depreservation after removal from storage picture 3. All necessary electrical
wiring in the vehicle was also treated with a special agent containing the VpCi inhibitor.
Batteries were disconnected and removed from the vehicle. Additives containing
corrosion inhibitors were admixed to the fuel and oil filling of the engine in order to
protect the unprotected parts in the fuel and greasing system.
Picture 3 Preservation of a part of the engine and electrical wiring
Picture 4 shows the preservation of tyres and rubber parts (e.g. axle shaft rubber sleeve,
the windscreen sealing) using a special agent.
Picture 4 Preserving TATRA 815 rubber parts
Prior to storing, the vehicle was placed on a special mat. Temperature and relative
humidity shall be measured during storage using data loggers recording the temperature
and relative humidity values in the interval of 30 minutes’ picture 5.
16
Picture 5 Position of data loggers
Stage 3
For the purpose of storage, special covers were prepared in advance made of heat-shrink
film; upon welding by means of special pliers, enclosed atmosphere with corrosion
inhibitors is created picture 6. The final step was the film heat shrinking. Thus, a perfect
system protecting the vehicle from weather conditions and related corrosion and UV
radiation degradation effects was created.
Picture 6 The vehicle covered with heat-shrink film
The advantages of nanotechnology in military vehicles storing:
- efficient corrosion protection independent of the ambient conditions requiring no
depreservation;
- environment-friendly;
- considerable savings if compared to a traditional corrosion protection;
- short-term corrosion protection for max. 2 years;
- total application time in two persons max. 5 hours;
- total storage costs amounting to approx. CZK 14,000, including the material, and
made as a public contract, as against approx. CZK 35,000 expended using the
current method, including administrative costs (annual stored vehicles maintenance
and inspection schedule, a preserved vehicles overview, prospective vehicle storage
plan, overall maintenance schedule, maintenance plan, a planning table for stored
military vehicles and materials, stored vehicles recorder) and costs related to the
storage proper (storage preparation, storing, removal from storage). Nevertheless,
it must be noted that the price of CZK 35,000 does not include the storage material
and related logistic processes (material purchase, accounting, registration, storage
and environment-friendly disposal of preservation agents after depreservation).
17
3. The direction of development of packaging materials for materials transportation
and storage More and more often, war conflicts, requiring peace and humanitarian missions, affect
adversely not only local inhabitants but also the environment; since it is often the case of
coastal states, the conflicts impact the world’s ecosystem.
The logistics support group at the Department of Logistics deals with a new research
direction in the sphere of packaging materials usable for materials or vehicles transported
by air, sea, railway and road. During transportation, materials are exposed to a number of
outer factors (different temperature gradient, pressure, unexpected falls) having potential
negative effect on the quality of the material transported. One of the research directions
is the use of compostable packages in foreign peace and humanitarian missions.
Compostable package is [6]:
- made of natural biomaterials (e.g. cornflour or potato starch);
- it decomposes due to soil bacteria in damp and warm environment;
- its decomposition does not pose ecological burden; it decomposes into CO2, water
and biomass.
Picture 7 Life cycle scheme
Source: [6]
18
The research in the sphere in question shall be directed towards the determination of
parameters of packaging materials suitable for air, sea, railway, and road transportation.
The research shall also examine possible production of the packaging materials in the
areas (countries) affected by war conflicts or a natural disaster.
4. Conclusion
The Armed Forces of the Czech Republic dispose of hundreds of millions of CZK worth
of property that requires maintaining maximum use value with minimum operating costs
during its service life.
The goal of the new storing technologies application as against contemporary storing
methods in the ACR is to optimize expenditures, and reallocate saved financial means to
other budget sub items. The application of nanotechnologies in the storage process
minimizes overhead costs (e.g. for storage, energies,), and no financial means are
expended on the environment-friendly disposal of hazardous substances when preserving
and depreserving military vehicles and materials.
5. Acnowledgements
The work was supported by Ministry of Education, Youth and Sports of the Czech
Republic, project No. SV14-FEM-K104-04-BIN.
The work was supported by the Ministry of Defence of the Czech Republic, project
No.1201 4 3110.
References
[1] MILCORR. Asset Preservation System for the Military. Documents/Guides –
Restricted Area [online]. © 2013 [cit. 2013-04-08].
Availableat http://www.milcorr.com
[2] Vesuv 130 – výdaje na pořízení (Vesuv 130 – acquisitioncosts). Informační
systém logistiky ACR a MO [online]. © 2008-2011 [cit. 2013-04-02].
[3] Regulationofthe Ministry ofDefence no. 274/1999 Coll., Determining the Types
and Categories of Military Vehicles, the Approval of their Technical Competence,
Performance of Technical Checkups of Military Vehicles, and Tests of the
Technical Equipment in Military Vehicles, as of 15 November 1999.
[4] ESMAILI M., SHAHABI-NAVID M., SVENSSON J.-E., HALVARSSON M.,
NYBORG L., CAO Y., JOHANSSON L-G. Influence oftemperature on
theatmosphericcorrosionofthe Mg-AL alloy AM50. Corrosion Science, Volume
90, 1 January 2015, Pages 420-433.
[5] ROSTRON P., BELBARAK C. Atmosphericcorrosionissues in AbuDhabi.
Materials Performance, Volume 54, Issue 1, 1 January 2015, Pages 56-62.
[6] http://www.tart.cz/files/download/download/katalog-envira-e-mail.pdf
[7] http://www.tart.cz/files/download-katalogy/2013/katalog-cortec-cz-2013-2-
email.pdf
19
EVALUATION OF QUALITY OF DEFENCE INDUSTRY
ENTERPRISES AS AN ELEMENT OF LOGISTICAL
NETWORK
Marian BRZEZIŃSKI, Mariusz GONTARCZYK, Szymon MITKOW and Andrzej
ŚWIDERSKI
Abstract: The authors present in this paper the concept of interpretation of the quality of the
technical system and one of the possible methods of evaluating quality of logistical systems. This
evaluation has been carried out using numerical taxonomy method. The basic model of evaluation
has been shown in the form of the proposed sequence of conduct and the exemplary results of the
calculations in the form of a table have been presented.
Keywords: logistics, systems evaluation, taxonomy
1. Introduction
The problem of evaluating the quality of logistical systems and processes is a very
important issue. It is hard to imagine a rational management of logistical processes in the
Army and the national economy without its objective evaluations. The search for methods
to evaluate quality of logistical systems is a very important problem, both theoretical and
practical.
The aim of this paper is to analyse the qualitative characteristics of the logistical system
and to assess the quality of the logistical system of the defence industry company. In order
to solve a research problem the study incorporates was both theoretical and empirical
research methods: analysis of the research subject literature, comparison, analogy,
generalization, interview, synthesis and reasoning, as well as mathematical methods. To
evaluate the logistical system of the defence industry company, the numerical taxonomy
method was used.
2. Nature of the quality of logistical systems
Quality is a concept comprehended in the following categories: philosophical,
psychological, sociological, technical, economic and marketing. In a general sense, it
means the characteristics, sort, value of the given object (phenomenon), or an attribute or
set of attributes relevant in terms of its structure, internal interaction and relationships
with the environment. A meaningful definition is given in [1]: "Quality of service is the
ability of the supplier to produce an activity, at the beginning intangible and requiring
client’s participation, in accordance with his expectations, at least at the level required by
him". This definition shows that the customer can decide whether and to what extent the
service corresponds to his expectations and meets his needs. It is him who defines
demands (requirements, expectations), confirming the quality of the logistical system.
20
Quality is a set of characteristics which determine the assessment of a particular product1.
Quality is the degree of compliance with the requirements or approach perfection 2.
Quality is the set of attributes making the object which it is, and not any other 3. From an
economic point of view, the quality of products (...) is the intensity of the economic
characteristics (...) determining the ability of the given goods to satisfy the needs of users
4.
Currently, there are three areas identifying quality:
- technical - based on meeting the technical parameters of the individual elements of
the system,
- economic - based on economic criteria,
- comprehensive - based on considering not only technical and economic factors but
also technological, operational, ergonomic ones, etc.
The quality of logistical systems can be evaluated according to their hallmarks.
Classification of these features may therefore be done with regard to:
- object of evaluation,
- subject of evaluation,
- aspect of evaluation,
- scope of evaluation,
- way of expressing the evaluation result.
As far as the object of evaluation (the one who formulates the problem) is concerned, one
can distinguish, among the others, following features characterising the system:
- features formulated by customers,
- features formulated by competition,
- features formulated by suppliers of goods and services,
- official characteristics (e.g. of the legislation),
- features formulated by the state administration and local governments.
As far as the subject of the assessment (what is being evaluated) is concerned, one can
distinguish, among the others, following characterising features:
- characteristics used to evaluate the quality of the individual components of the
system,
- characteristics used to evaluate the whole of a system.
As for the aspect of the evaluation being considered one can distinguish, among the
others, the following characteristic features: technical characteristics, deficiency features,
time -accuracy characteristics and quality costs characteristics.
Regarding the scope of the assessment there can be following features distinguished:
- comprehensive features (additive) - expressing as a whole the particular aspect of
assessment, e.g. overall costs of quality, punctuality criteria,
- partial characteristics (single- subject), which are used to evaluate the system
components.
In order to give an assessment of the quality of a product, service or process of their
implementation, it is necessary first to establish a set of attributes (criteria), according to
which the assessment is issued. Taking into account the ability to make measurements
and the method of expressing the result of the evaluation, the features can be divided
into5:
1 Dunaj B.(red.), Popularny Słownik Języka Polskiego, Wyd. Wilga, Warsaw 1999, p.196. 2 Kolman R., Ilościowe określanie jakości, PWE, Warsaw 1973, p. 22, 37. 3 Mały Słownik Języka Polskiego, PWN, Warsaw 1968, p.3. 4 There in, p.3. 5 Hamrol A., Zarządzanie jakością z przykładami, PWN, Warsaw 2008, p.28.
21
- measurable - can be measured and expressed in an appropriate unit of
measurement;
- not-measurable - can be described only in words, in the scale:
- two-stage (two-state) - there are only two states of the attribute,
- multi-stage (multi-state) - there are more than two states.
The measurable features are also called quantities and not-measurable qualities,
attributes 6.
In assessing the quality of logistical systems one needs to bear in mind that the
characteristic features do not need to be fixed and may vary. The variability can be
inspired by:
- change of the customer’s requirements,
- changes on the market and the competitors,
- changes in the legislation,
- technological and scientific progress, etc.
Proper selection of the characteristic features of logistical systems is an essential element
of quality assessment (Figure 1). The most common irregularities in assessing the quality
of logistical systems include, among the others, the following:
- improper selection of characteristic features, as a result, what is being assessed is
not the problem formulated to be tackled,
- lack of parameterization of the evaluation, which prevents its objectification.
During the quality assessment by the customer, one can assume the following objectives:
- client evaluates functioning of the logistical system from a personal point of view,
- client perceives all elements of the system as a whole,
- weaknesses of the system functioning adversely affect its assessment,
- to the customers, the internal organization of the system is of no importance.
Fig.1. Action in the process of assessing the quality of the system
Source: Hamrol A., Zarządzanie jakością z przykładami, PWN, Warsaw 2008, p.28.
3. Taxonomy method for evaluation of quality of logistical systems
The numerical taxonomy method of is designed to compare the systems characterized by
an identical or similar functional purpose. The systems are being compared using the
same characteristics that can be described quantitatively [2, 3, 4].
This method, as the criterion of comparison of the systems, adopts the state of quality,
which is a function of the essential features of the compared systems. The components of
the quality status determine appropriate relationships of domination.
The absoluteness of the comprehensive evaluation indicator measurement should be
interpreted as a deviation of the systems’ state of quality from the beginning of a
numerical scale. In contrast, the relativity of measure indicates the degree of deviation
6 There in, p.29.
22
from the object quality indicator regarded as a model system. The quality indicator of the
model system is a certain number indicating the optimum (extreme) - desired value of the
characteristics. Hence, determination of a comprehensive indicator takes place by
aggregating characteristics using model or non-model method. The model method
involves analytical interdependencies determining the distance of the tested system from
the reference system. In turn the non-model method the aggregation of characteristics
involves averaging normalized values of characteristics describing a given system. The
algorithm of proceeding in the numerical taxonomy method is shown in Figure 2.
Identification of the system constraints is to determine the boundaries of the values of the
attributes characterising the system in which it will operate. They will be qualitative
constraints, quantitative, spatial, temporal, information, economic ones and others. There
are internal and external constraints. The internal constraints are a function of the
potential of the logistical system. In contrast, external constraints, independent of the
system tested, the result from the dynamics of environmental change.
As a result of the analysis of requirements and system constraints there will be a sub-set
of admissible variants created, in which there will be variants possible to be applied and
a sub-set of variants impossible to apply.
Figure 2. Algorithm of proceeding using numerical taxonomy method for testing the systems.
Source: Brzeziński M., Systemy logistyczne, WAT, Warsaw 2007, p. 121.
In the next step, it is necessary to specify the set of all characteristics of the systems
studied, and then select a sub-set of features relevant to evaluated systems, which
represent evaluation criteria. Each system compared can be described by any number of
features. The choice of features has the greatest impact on the outcome of a comparative
assessment, and thus on the accuracy of the decisions made.
23
The essential features characterizing the systems can be measured directly or indirectly.
The measured values are real figures with denomination, i.e. measurable in the physical
sense. The indirectly measurable trait is a one of the values contained in the set of integers.
The verbal description is, in this case, the output form of expression of the value of a
feature, then assigning to it the numerical attributes. The set of essential features should
only contain only ones that are of sufficient variation of the value while transiting from
variant to variant. Thus, the condition of sufficient variability is another formal postulate
of the selection of relevant features.
The essential parameters are characterized by varying direction of affecting the
comprehensive system quality indicator. This impact can be positive, negative or neutral.
From this point of view the characteristics can be divided into stimulants, destimulants
and nominants. As a stimulant we will call such diagnostic variable, whose increase must
be associated with an increase, and a decrease with a decrease in the assessment of the
phenomenon. In contrast, the destimulant will be such a diagnostic variable whose
increase should be associated with the decline, while the decline with the increase in the
assessment of a complex phenomenon. The nominant, in turn, is such a variable that has
a specified, the most advantageous (from the point of view of assessing a complex
phenomenon) value called the nominal value. Nominant takes on values lesser or greater
than the nominal value, respectively, with a decrease in the assessment of a complex
phenomenon. Encountered in practice are the situations where the nominal values form
specified numerical interval. Any deviations of the nominants from the normal level are
negative phenomenon from the perspective of the efficiency indicator examined. The
nominants can be easily converted into destimulants by setting the absolute deviation of
a given value from the level considered to be the nominal one.
Establishing a set of characteristics relevant to the systems being compared, as well as
their classification is the basis for implementing later stages of the method.
In order to establish a uniform denominationless grading scale of the systems features one
conducts their normalization. It is based on converting absolute values of the
characteristics into relative values. The normalization is carried out according to the
equation:
𝐶 𝑖𝑛 =𝐶𝑖𝑛 −𝐶𝑖
𝑆𝑖 𝑓𝑜𝑟 𝑖 = 1,2, … , 𝐼 𝑎𝑛𝑑 𝑛 = 1,2, … , 𝑁 (1)
Where: 𝐶 𝑖𝑛 – normalized value of the feature, Cin – the value of the i-th features of the
process of the number n, Ci – average value of the i-th characteristics of the calculated
from the equation:
𝐶𝑖 =1
𝑁 𝐶𝑖𝑛
𝑁𝑛=1 (2)
The standard deviation Si of the i-th characteristics is calculated from the equation:
𝑆𝑖 = 1
𝑁 (𝐶𝑖𝑛 − 𝐶𝑖)
2𝑁𝑛=1 (3)
where: l- number of features by which we evaluate the system; N- number of system
Then it is necessary to make a choice of, so called model (reference) system, i.e. an
abstract system established by the collection of the best values of the characteristics - Coi
from the set of all the features of the systems.
𝐶𝑜𝑖 = min
𝑛𝐶 𝑖𝑛 𝑤ℎ𝑒𝑛 𝐶𝑖𝑛 𝑖𝑠 𝑑𝑒𝑠𝑡𝑖𝑚𝑢𝑙𝑎𝑛𝑡
max𝑛
𝐶 𝑖𝑛 𝑤ℎ𝑒𝑛 𝐶𝑖𝑛 𝑖𝑠 𝑠𝑡𝑖𝑚𝑢𝑙𝑎𝑛𝑡 (4)
24
After determining the reference system it is necessary to calculate dispersion between of
the standardised values of features and model characteristics according to the equation:
𝛿𝑖𝑛 = 𝐶𝑜𝑖 − 𝐶 𝑖𝑛 2
𝑓𝑜𝑟 𝑖 = 1,2, … , 𝐼 𝑎𝑛𝑑 𝑛 = 1,2, … , 𝑁 (5)
Determining a comprehensive efficiency indicator based on the specified features of the
system requires establishing relative weights of the individual characteristics.
Determining relatively objective weights is important for the final result. Determining the
weight values can be determined using the preferences of experts or statistically.
Taking into account the weighting factors, one can calculate the "distance" between the
characteristics don of the system under consideration and a model solution from the
equation:
𝑑𝑜𝑛 = 𝛼𝑖𝐼𝑖 ∙ 𝛿𝑛𝑖 (6)
where i – weight coefficients for the characteristics of i number.
Aggregation of the system characteristics is an operation allowing to obtain a
comprehensive assessment segregating systems compared. Aggregation can be made by
the model method or non-model method. The model method uses analytical
interdependencies to aggregate attributes determining the distance of the tested system
from, so-called, model system. The model system may be an ideal system, or so called
anti-model, which is potentially the worst system. However, in the non-model method the
operation of aggregating characteristics of the system is based on averaging the
normalized values of characteristics describing the given system. Aggregation of the
parameters can be done from the analytical inter-dependences determining averages:
arithmetic, geometric and harmonic mean.
In order to establish a uniform, denominationless scale of assessments, the
standardization of them is carried out. The calculations made using one of the methods -
the model or non-model one, of the comprehensive systems evaluation indicators - are
subject to the normalization to the interval [0,1]. For this purpose, the average value and
the variance, needs to be determined in a set of distances, from the equation:
𝑑𝑜 =
1
𝑁 𝑑𝑜𝑛
𝑁𝑛=1 (7)
𝐷𝑜
2 =1
𝑁 (𝑑𝑜𝑛 − 𝑑𝑜
)2𝑁𝑛=1 (8)
Then the limit value is determined in the form:
𝑑𝑜∗ = 𝑑𝑜
+ 3 𝐷𝑜2 (9)
The comprehensive system evaluation is determined from the equation:
𝜒 = 1 −𝑑𝑜𝑛
𝑑𝑜∗ (10)
As mentioned earlier, comprehensive system evaluation indicators are numbers from the
interval [0,1].
The numerical taxonomy method may be used e.g. for comparison of logistical systems,
selection of logistical concept according to the criteria adopted by the evaluator. It allows
a quantitative assessment of systems based on an identical set of measurable and
immeasurable qualities. The greater the number from the interval [0,1], the higher the
quality of the logistical system.
Numerical taxonomy method was used to assess the quality of four logistical systems,
which are characterized by fourteen following attributes:
1 - indicator of ensuring the needs of the operating system by the logistical system [%];
25
2 - duration of the implementation of the logistical system for the enterprise’s needs [h];
3 - deviation from the date of supply [h];
4 - the number of customer complaints about the functioning of the logistical system [1
/ year];
5 - indicator of the transport means technical readiness [%];
6 - indicator of the transport means utilization time [%];
7 - indicator of the transport means mileage utilization [%];
8 - indicator of damage to the goods in transit [%];
9 - warehouse space utilization indicator [%];
10 - indicator of damage to the goods during storage and loading work [%];
11 - coefficient of the internal transport means utilization [%];
12 - management span in the logistical system [Quantity];
13 - logistical staff turnover [%];
14 - logistical costs in relation to sales results [%].
The values of the parameters of characteristics and the results of logistical systems
evaluation are shown in Table 1. The analysis conducted shows that the highest
comprehensive evaluation index received system 4. (ᵡ4 = 0,357), slightly lower, system 1.
(ᵡ1 = 0,348). The evaluation used parameters that have been quantified so that the
assessment outcome was objective, to the highest degree, and independent of the
evaluator. In contrast, the evaluator could influence the selection of features of the
evaluated systems and the weight coefficients (weights adopted were i = 1). However,
the algorithm of proceeding in the numerical taxonomy method allows a little subjectivity
of proceeding.
4. Conclusion
The issues raised in the article on the evaluation of the quality of logistical systems are
not exhaustive of all relevant, mainly from the perspective of clients, issues in this area.
Other methods and issues require separate consideration:
improving the quality of logistical systems and the use of appropriate methods and
tools in the area of quality Qualitology, described in the literature [5],
mathematical modelling of quality assessment, enabling its parametric evaluation,
the use of taxonomy method in the integrated logistics design process in the context
of the weapons systems lifecycle management,
including in the evaluation of hardware the preferences for requirements of the
decision makers and the logistical systems end users.
Table 1. Logistical system quality evaluation
1 2 3 4 5 6 7 8 9 10 11 12 13 14
1 98 12 3 10 95 80 50 3 75 3 62 20 10 25
2 95 13 0 15 93 71 46 1 53 4 70 18 8 15
3 96 11 1 8 97 68 48 2 60 5 90 8 12 20
4 94 10 0,5 6 98 75 52 1 78 2 85 10 10 35
Average value Ci 95,750 11,500 1,125 9,750 95,750 73,500 49,000 1,750 66,500 3,500 76,750 14,000 10,000 23,750
Standard deviation Si 1,281 0,854 1,252 3,010 1,675 5,105 1,708 0,826 9,375 0,854 11,856 5,292 1,414 4,492
Standardized feature Si*
1,757 -0,586
0,195
-1,366
0,586 1,757
-0,586
-1,757
1,498 -0,899
-0,100
-0,499
0,083 1,744
-0,581
-1,246
-0,448 -1,641
0,746
1,343
1,273 -0,490
-1,077
0,294
0,586 -1,757
-0,586
1,757
1,513 -0,908
0,303
-0,908
0,907 -1,440
-0,693
1,227
-0,586 0,586
1,757
-1,757
-1,244 -0,569
1,118
0,696
1,134 0,756
-1,134
-0,756
0,000 -1,414
1,414
0,000
0,278 -1,948
-0,835
2,504
Model set-feature Coi 1,757 -1,757 -0,899 -1,246 1,343 1,273 1,757 -0,908 1,227 -1,757 1,18 1,134 -1,414 -1,948
Dispersions dni
0,000
5,486
2,438 9,752
5,486
12,343
1,371 0,000
5,746
0,000
0,638 0,160
1,767
8,943
0,442 0,000
3,206
8,905
0,356 0,000
0,000
3,108
5,525 0,959
1,371
12,343
5,486 0,000
5,863
0,000
1,466 0,000
0,102
7,111
3,686 0,000
1,371
5,486
12,343 0,000
5,578
2,846
0,000 0,178
0,000
0,143
5,143 3,571
2,000
0,000
8,000 2,000
4,955
0,000
1,239 19,819
Weights i 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Distance don
do1
do2
do3
do4
6,119
8,168
6,938
6,037
Average value do
6,815
Variance Do2 0,734
Limit value do* 9,385
System evaluation ᵡn
ᵡ1
ᵡ2
ᵡ3
ᵡ4
0,348
0,130
0,261
0,357
Features Xi
Systems Sj
27
It must be stated unequivocally that the continuous monitoring of the quality
characteristics of logistical systems listed in the article, is crucial in providing services at
the level required by customers.
References
[1] BRUHN M.: Qualitätsmanagement für Dienstleistungen, Springer, Berlin 2003,
s.31.
[2] BRZEZIŃSKI M, FIGURSKI J., KOCHAŃSKI T., Jakość systemu
logistycznego, „Logistyka” 2012 nr 4, płyta CD, s. 133-140.
[3] Brzeziński M., Rozwój sieci logistycznych w wojsku, „Biuletyn WAT” 2010, nr 1,
s. 377-388.
[4] BRZEZIŃSKI M., Systemy logistyczne, WAT, Warszawa 2007.
[5] DUNAJ B.(red.), Popularny Słownik Języka Polskiego, Wyd. Wilga, Warszawa
1999, s.196.
[6] KOWALSKA – NAPORA E., TKACZYK ST., Strategia zarządzania jakością,
Wydawnictwo Difin, Warszawa 2012.
[7] KOLMAN R., Ilościowe określanie jakości, PWE, Warszawa 1973, s.22, 37.
[8] KOLMAN R., Kwalitologia, wiedza o różnych dziedzinach jakości,
Wydawnictwo Placet, Warszawa 2009.
28
MOTIVATION OF STUDENTS
Harald GELL
Abstract: Within this essay the author combines the theoretical elaborations concerning
motivation of students with results from questionnaires conducted with Officers Cadets
at the Austrian Theresan Military Academy. Mainly intrinsic and extrinsic motivation
factors can be identified. Apart from these motivation factors, not only for military
education institutions but also for all other institutions which are teaching students, the
leadership skills and competences apart from special knowledge of Lecturers seem to be
important to motivate them. In the conclusions the author gives some proposals which
steps must be done to motivate students and consequently to increase their performance.
Keywords: intrinsic motivation, extrinsic motivation, leadership, officers’ skills and
competences
1. Introduction
“People often say that motivation doesn’t last. Well, neither does bathing – that's why we
recommend it daily” (Ziglar, n. d.). The topic “motivation of students” should be taken
seriously by all those persons who are being responsible for education – independently
which echelon and which field of responsibility they have – according to the citation
above – on a daily basis.
This short essay leads from some principal motivation theories via the description of
methodology to the results of research which are based on past and actual questionnaires
conducted with Officer Cadets of the Austrian Theresan Military Academy in April 2015
– to achieve up-dated results for the XXXIII International Colloquium in Brno. The essay
should answer – based on a comparison of available literature with questionnaires
conducted with students of the Theresan Military Academy – the following two questions:
Which are the expected skills and competences of Officers teaching at the Theresan
Military Academy from students’ point of view to increase their motivation?
Which are the students’ motivating factors before and during the Basic Officer
Education?
The author would like to express his gratitude to the Faculty of Military Leadership at the
University of Defence in Brno – especially to the Dean, Col Assoc. prof. Ing. Vladan
Holcner, Ph.D. – for the possibility to participate an event with such an important aspect.
2. Theoretical Part
Taking a closer look at the literature, in principle the subject of motivation can be divided
into two parts. Intrinsic motivation is the self-desire to seek out new things and new
challenges, to analyse one's capacity, to observe and to gain knowledge (Ryan & Deci,
2000). Extrinsic motivation comes from influences outside of the individual. This could
be a motivation to earn more money or the fear of punishment in a case that the
expectations are not fulfilled (Dewani, 2013).
29
Author’s comment: Inside military forces – consequently also inside their education
institutions – it seems that e.g. because of their well elaborated punishment systems the
extrinsic motivation is the more important one because the rules are available in a written
form, therefore can be distributed easily and – as a general rule – have not to be adopted
to individuals because of the general validity of regulations. From the author’s point of
view this can be seen contradictory because motivation of students implies behaviours
concerning reaching learning outcomes during study periods and not only behaviours
concerning military training where extrinsic motivation may have a place under certain
circumstances. We also have to take into consideration that students inside military
education institutions concerning their learning circumstances do not differ that much
from other – civilian – education institutions.
Hereinafter some relevant theories are presented and – as a consequence – those parts are
commented and taken out which are worth to be compared on a later stage with the
questionnaires conducted with Austrian students.
Taking into consideration Maslow’s hierarchy of needs (Maslow, 1943, revised 1970)
of human beings – it seems to be clear that the intrinsic motivation is the only one which
creates the basis for long-lasting and therefore more effective motivation – meaning
motivation of students to achieve proper learning outcomes. The figure hereinafter shows
Maslow’s hierarchy created in 1943.
Figure 1: Maslow’s hierarchy of needs.
Author’s comment: Whereas responsible persons for students’ education for the first three
steps of Maslow’s hierarchy of needs may create an ideal organisational frame, for the
last two steps the intrinsic motivation has an extreme importance.
McClelland developed the theory of needs – with connection to Maslow’s hierarchy of
needs. In his approach not only social and development factors play a role but also more
the achievement motive and the desire to avoid failure (McClelland, 1961). According to
him we all have – regardless of gender, culture or age – three motivating drivers, out of
them one is the dominated one which is dependent on culture and life experience. The
three motivating drivers and the characteristics of the person as explanation of the
motivating drivers are listed within the following table:
30
Table 1: McClelland’s three motivators and persons’ characteristics – table is arranged by the
author.
Motivator Person’s characteristics
Achievement
Has a strong need to set and accomplish challenging goals.
Takes calculated risks to accomplish their goals.
Likes to receive regular feedback on their progress and achievements.
Often likes to work alone.
Affiliation
Wants to belong to the group.
Wants to be liked, and will often go along with whatever the rest of the
group wants to do.
Favours collaboration over competition.
Doesn't like high risk or uncertainty.
Power personal
Wants to control and influence others.
Likes to win arguments.
Enjoys competition and winning.
Enjoys status and recognition.
institutional Organize the efforts of a team.
Author’s comment: McClelland’s motivators refer mainly to intrinsic motivation factors.
He assumes that human beings have different motives and – consequently – different
motivating factors.
In 1959 – with some connection to Maslow’s hierarchy of needs – Frederick Herzberg
published the so-called dual-factor theory or with another name motivation-hygiene
theory (Herzberg, 1959). Herzberg differs between two influencing factors, on the one
hand factors concerning the content of the work – called motivators and comparable with
intrinsic motivation – on the other hand factors referring to the context of the work –
called hygiene factors and comparable with extrinsic motivation. According to Herzberg,
satisfaction and dissatisfaction must be seen independently or in other words, the lack
dissatisfaction does not necessarily cause satisfaction. Only if both, motivators and
hygiene factors cause satisfaction, the motivation can be seen entirely satisfactory. The
combination of these motivators and hygiene factors cause four possible situations
according to the following table: Table 2: Herzberg’s motivation combinations – table is arranged by the author.
Hygiene factors:
Salary.
Human resource policy and leadership
style.
Labour conditions.
Interpersonal relations.
Security of employment.
Influence onto the private life.
Low
hygiene
High
hygiene
Motivators:
Achievements and
success.
Appreciation.
Content of the work.
Responsibility.
Promotion and growth.
Low
motivators
Unmotivated,
major complaints.
Low motivated,
minor complaints.
High
motivators
Highly motivated,
major complaints.
Highly motivated,
minor complaints.
31
Author’s comment: Herzberg’s theory aroused criticism because of his method and
moreover, other empirical researches led to results that also motivators or hygiene factors
alone may cause satisfaction or dissatisfaction – not necessarily a combination of both is
needed (Semmer & Udris, 2007 and Buettner, 2013). In spite of this criticism all results
showed a certain importance of the listed factors and motivators; some of them – intrinsic
motivators and extrinsic hygiene factors – will appear again when a comparison with
students’ questionnaires will be made.
According to Vroom’s expectancy theory individuals’ performance is considered as
desirable if the wished goal can be achieved. The motivation for the effort is the relative
benefit (Vroom, 1964). Concerning the effect onto motivation, Vroom takes three factors
into consideration: expectancy, instrumentality and valence. Expectancy is the
probability of occurrence of a certain result – conceived subjectively and measured on a
scale from 0 to 1. Instrumentality is the relationship between an action’s outcome and
the resulting action’s consequence. It may lead to advantageous or disadvantageous
impacts. Valence is the degree of a certain condition for an individual and how much this
condition is desirable or important. As a basis for a motivational decision the three factors
are calculated according to a formula taking into consideration the interaction between
expectations and value of the acting outcome.
Author’s comment: According to Vroom’s theory individuals would achieve a good
performance if a high probability of achieving the goal can be considered – this means
that an individual’s work performance is extrinsically motivated.
Nilson describes some credible theories of motivation (Nilson, 2010). He writes that if
talking about motivation of students within this context – actually we all mean
stimulating of students’ interest in the subject matter. Nilson’s theories are simplified
by the author in a table hereinafter:
Table 3: Nilson’s positive and negative theories of motivation – simplified by the author.
Theory Positive motivation Negative motivation
Behaviourism Students are rewarded for their
behaviour.
Students are punished for their
behaviour.
Goal
orientation
Students are allowed to take risks and
make mistakes without any
disadvantages, therefore they can
improve.
Students work just for good
grades, they are afraid of
mistakes and this creates
insecurity.
Relative value
of the goal
Integrate students into the learning
process; give them responsibility – even
to the course content – and increase
social learning.
Make the content more
stimulating, interesting and
emotionally engaging – from the
Lecturer’s point of view.
Expectancy of
goal
achievement
Give students tools – e.g. learn how to
learn – to achieve their goals. Do not
overwhelm them. Give students the
feeling that Lecturers like them.
Lectures which are just
requesting reproduction of
knowledge without critical
thinking.
Author’s comment: According to Nilson we should concentrate our efforts just onto
positive motivation to achieve the goal – meaning the intrinsic motivation. The question
is, if within our study systems this is the only option because students are to be evaluated
to determine if they reach a certain level, therefore the extrinsic motivation must have a
certain place as well – even if in Nilson’s theory this can be considered as just negative
motivation.
Especially the positive motivation of the last theory – “give students the feeling that
Lecturers like them” – forges a bridge to one of the most numerous researches which has
ever been done within this perspective.
32
John Hattie, a professor of the University of Melbourne, issued the study “Visible
Learning” – he based his results concerning the question “what is a good lecture?” on
researches with 250 million students and pupils (Hattie, 2008). He comes to the
conclusion that the Lecturer has the vital impact onto students’ performance – all the other
circumstances he sees not that important. The following table describes Hattie’s results
concerning increasing fruitful frames for and motivation of students: Table 4: Hattie’s results listed according to priorities.
What really helps
Feedback of the Lecturer.
Problem-solving Lessons.
Advanced specialised
education for Lecturers.
Programmes to stimulate
reading.
Trust between Lecturer and
student.
What helps
Regular performance review.
Pre-study assistance
measures.
Lecturer-managed lessons.
Additional offers for
outstanding Students.
What helps a little
bit
Small groups.
Expensive equipment of the
classroom.
Discovering learning.
Homework.
What does not
help but does not
harm either
Open lessons.
Inter-year lessons.
Web-based teaching and
learning.
What harms
Repetition of years.
Excessive watching
television.
Long breaks (summer
holidays).
Author’s comment: Because of Hattie’s priorities, in the military education context this
means that leadership skills and competences of Lecturers must be the priority number
one when talking about motivation of students. That is why the author concentrates the
results of the first questionnaire onto this topic – it will be presented in the chapter “results
of research”.
Taking the above mentioned theories into consideration, of course we have to think about
different circumstances at different education institutions and different cultures
(Dambeck, 2013) and we have to find the golden mean, but in all cases – when it comes
to motivation of students – the Lecturer and his/her leadership performance seems to be
one of the central points. That is why we have to concentrate our means onto the education
of the educators – the increasing motivation of students should be the logical result then.
3. Methodology
According to Nilson, the literature does not come to a clear conclusion concerning the
relationship between intrinsic motivation, extrinsic motivation and students’ performance
(Nilson, 2010). The author elaborated results from questionnaires conducted with
students of the Theresan Military Academy for this essay to find out how from the
students’ point of view these motivation factors are seen and – on a later stage – how
these answers fit to the theories described above. It is worth to mention that all education
goals of the Austrian Basic Officer Education are connected to Heyse’s and Erpenbeck’s
model of competences (Heyse & Erpenbeck, 2004). According to this model, all lectures,
classes and modules must aim at increasing the four basic competences, which are the
personal competence, the special knowledge, the activity & acting competence and the
social & communicative competence. If there is a lack of one of the competences at the
end of education, an Officer Cadet cannot graduate. As a consequence this theory also
aims at Lecturers; having a certain level of all these competences is the best pre-condition
to act as a Lecturer who has the ability to motivate students.
33
3.1 Skills and competences of Officers teaching at the institution
The author asked five classes of the Master and Bachelor Programme Military Leadership
at the Theresan Military Academy which of the leadership skills and competences of
Officers teaching at the institution are important. The Officer Cadets had total freedom
for their written answers; the only task was to list them according to priorities and to
describe in short words the respective skill and competence to avoid misunderstandings
of terminology. By purpose the Officer Cadets were not framed with their answers to
Heyse’s and Erpenbeck’s model of competences because the author saw possibilities for
“thinking out of the box”. Out of 1,308 answers given by 327 Officer Cadets the author
gave them points according to the Officer Cadets’ priorities, calculated the percentage in
comparison with all answers and listed them on a scale from zero to 100 (Gell, 2011).
3.2 Intrinsic and extrinsic motivation factors
Just some weeks before the start of the 2015-colloquium in Brno, the author asked
representatives from three classes of the Bachelor Programme Military Leadership at the
Theresan Military Academy which factors motivate them and which factors demotivates
them. The questionnaire was to be answered by one branch- representative from each
class – in total by 21 Officer Cadets. Again, they had a total freedom for their written
answers; in some cases the author asked them verbally more deeply on a later stage to be
sure what they exactly meant. The answers were to be given concerning the motivation
before the study – meaning what motivated them to start the education to become an
Officer – and during the education – meaning which factors motivate them to increase
their performance. Afterwards, the answers were clustered into intrinsic and extrinsic
motivation factors.
4. Results of Research
4.1 Skills and competences of Officers teaching at the institution
In chapter 2 of this essay the author describes the importance of leadership skills and
competences of Lecturers (Hattie, 2008). Out of all the answers given by the 327 Officer
Cadets just 36 skills and competences could be clustered which are listed in the following
table according to priorities. Table 5: Answers of Officer Cadets concerning importance of skills and competences of Officers
teaching at the institution.
01 Special knowledge and
ability 13 Inspiring confidence 25 Authority
02 Expert in knowing people 14 Fairness 26 Life experience
03 Power to convince 15 Responsible-minded 27 Reliability
04 Resilient and calm 16 Motivator 28 Intelligence
05 Decision-making ability 17 Directness 29 Self-criticism
06 Role-model 18 Loyalty 30 Humour
07 Charism 19 Comradeship 31 Command language
08 Analytical thinking 20 Discipline 32 Creativity
09 Honesty 21 Sportsmanship 33 Self-reliance
10 Purposefulness 22 Behaviour 34 Ability to teach
11 Self-assurance 23 Courage 35 Moral & ethics
12 Flexibility 24 Capacity for teamwork 36 Punctuality
If now the importance of given answers is listed on a scale, we can see that for Officer
Cadets – being students of a higher education programme at the same time – the first
eleven skills and competences have a more important significance. Because of better
overview just these eleven skills and competences are shown in the following figure 2:
34
Figure 2: Importance of skills and competences from Officer Cadets’ point of view.
Discussion: We can see that for Officer Cadets a good Lecturer should have a variety of
skills and competences. According to Heyse’s and Erpenbeck’s model of competences,
special knowledge – meaning that from the Lecturer it is expected that he/she is an expert
– is important but it is not the only ability, other skills and competences – especially those
ones which military personnel subordinate under the term leadership – are important as
well. Taking the motivation theories into consideration which are described in the
theoretical part the following connections can be made:
- Students expect from Lecturers according to McClelland’s motivators mainly
personal and institutional power.
- Herzberg’s motivators apply a bit concerning appreciation and responsibility.
- Nilson’s theories and Hattie’s results obviously apply mostly because their theories
focus more on how to motivate others – in the sense of extrinsic motivation – than
on the other theories which m focus onto self-motivation.
- A lot of answers can be integrated into Heyse’s and Erpenbeck’s model of
competences and their detail-characteristics.
The added value of this questionnaire’s results is that Officer Cadets expect from
Lecturers specific skills and competences to be motivated – this refers more to the
extrinsic motivation. When selecting Lecturers the results may be taken into consideration
on the one hand – on the other hand a specific Lecturers’ education may focus onto
increasing skills and competences listed in table 5.
4.2 Intrinsic motivation factors
It is described in chapter 3.2 how the following answers were achieved. The first part of
the answers refers to those motivation factors which motivated the students to start the
education to become an Officer. Logically, all of these factors are intrinsic ones, since it
is difficult to imagine that aspirants are punished if they do not start the education.
The author could neither identify certain priorities out of the answers nor in a personal
talk to the students any of them were determined as vital ones; therefore, the answers of
the following table can be considered as of equal importance:
35
Table 6: Answers of Officer Cadets concerning motivation factors to start the education.
Accept a challenge. Possibilities to go abroad.
Climbing up a hierarchy. Varying education.
Convey interest in military matters. Thirst for adventure.
Interest to take over responsibility. Reputation of the Officer’s profession in
society.
Knowing what a Student can expect. Possibility to know more than the average
population. Occupational safety.
The question “what motivates students during their education” resulted just in a few
intrinsic answers. They are listed in the following table – again – because of the students’
answers the factors can be considered as of equal importance:
Table 7: Answers of Officer Cadets concerning motivation factors during their education.
Appreciation of performance. Ranking list among the students.
Comradeship. Taking over of responsibility.
Imitation of a role-model. Variety of the education.
4.3 Extrinsic motivation factors
All of the extrinsic motivation factors which the Officer Cadets mentioned can be
summarized as negative motivation (Nilson, 2010). Therefore, one of the fasted avenues
of approach to motivate students could be to eliminate those negative factors (Semmer &
Udris, 2007 and Buettner, 2013). The extrinsic motivation factors are listed in the
following table and can be considered as of equal importance:
Table 8: Answers of Officer Cadets concerning extrinsic motivation factors.
Additional tasks not coordinated with the study
programme. Lack of responsibility.
Just a means to an end of Officer education. Mental underload.
Discussion: In times of decreasing interest for the military Officer’s profession it is
important to know which intrinsic motivation factors attract possible future students.
Even if the Basic Officer Institutions fulfil the students’ expectations during the study
period it may be considered if the advertisement methods are aiming at the right priorities.
According to McClelland’s three motivators it can be stated that the expectations during
the study period can be fulfilled; also Herzberg’s motivators fit to the students’ answers.
Nilson’s positive and negative motivators apply as well as Hattie’s results. In contrary to
Herzberg’s theory – which is criticised anyway in this particular case (Semmer & Udris,
2007 and Buettner, 2013) – the elimination of demotivating factors cause motivation –
we can underline this argument when taking the intrinsic motivation of “taking over of
responsibility” in comparison with the extrinsic one “lack of responsibility”. The
elimination of the extrinsic one consequently leads to motivation.
Coming back to the intrinsic motivation before starting the education, just an example
illustrates the further steps to be done: One of the students’ answers was that they start
the education to become an Officer because of the possibilities to go abroad. The reality
according to the valid accreditation paper for the studies of military leadership is that 100
percent of the students have to spend an entire semester as well as an internship abroad.
If the advertisement expresses this fact explicitly, probably more aspirants may consider
starting the education. This situation also refers to the other motivating factors mentioned
by the Officer Cadets.
36
5. Conclusions
Within this essay the author tries to combine the theoretical elaborations concerning
motivation of students with results from questionnaires conducted with Officers Cadets.
Two research questions were determined; the first one aims at skills and competences of
Officers – answered in chapter 4.1 – and the second one aims at motivating factors before
and during the Basic Officer Education – answered in chapter 4.2 and 4.3. Following the
results, some appropriate actions can be taken how to motivate students for the purpose
of increasing their performance.
1. Educate the educators: Just to have an excellent knowledge about a certain topic
in a special field is not enough. Professors, Lecturers and Officers need more. In
general it can be summarized as a mix of skills and competences according to
Heyse’s and Erpenbeck’s model of competences (Heyse & Erpenbeck, 2004) – just
one of them is special knowledge. Other competences aim at social ones; especially
the trust between students and Lecturers seems to be an important one (Hattie,
2008). Moreover, Lecturers should be seen and act as role-models – then it will be
much easier for them to motivate the students. Leadership skills – in the military
context this is more seen as the ability to lead troops in combat – are essential for
university and academy Lecturers as well. If all these – mentioned before – a
Lecturer does not have, it should be logical that he or she must undergo an education
to reach all these competences. Then it will be much easier to motivate students.
2. Give students room for achieving their intrinsic motivation: In this context the
handover of responsibility seems to be important – especially for future military
Officers. It goes hand in hand with (new) learning methods, even to such methods
where the students are allowed to take over the role as a Lecturer. A proper feedback
of the experienced Lecturer is a must to increase students’ performance for the
future.
3. Eliminate de-motivation: First of all the institutions have to know which the real
de-motivating factors are. In all higher education institutions evaluation systems
exist as part of the quality assurance system. The question is – is this enough to
discover the de-motivating factors? Only trust and open-minded talks may help –
the students have to have the feeling not to face negative consequences if they are
telling the truth. As soon as the de-motivating factors are identified, it is the fasted
way to motivate students because of eliminating them.
Finally, it can be said that motivation of students always requires a bunch of actions to be
taken to increase their performance. But that is why Lecturers’ jobs at education
institutions exist – we are there for our students!
References
[1] BUETTNER, Ricardo, 2013. Spezifische Kritik zur 2-Faktoren-Theorie von F.
Herzberg. Translated into English the title means: Specific criticism towards the
dual-factor theory of F. Herzberg. 2013 [2015-10-03]. Available from:
http://www.lulu.com/shop/ricardo-buettner/spezifische-kritik-zur-2-faktoren-
theorie-von-f-herzberg/ebook/product-20748576.html.
[2] DAMBECK, Holger, 2013. Pisa-Spitzenreiter: Das Geheimnis von Asiens Mathe-
Genies. Translated into English the title means: Pisa-frontrunners: The secret of
Asia’s Maths-genies. [2015-04-26]. Available from:
http://www.spiegel.de/schulspiegel/wissen/pisa-studie-2013-mathematik-
erfolgsgeheimnis-asiatischer-schueler-a-935718.html.
37
[3] DEWANI, Vijay, 2013. Motivation. Slideshare. [cit. 2015-04-26]. Available from:
http://de.slideshare.net/vijaydewani7/motivation-15959567.
[4] GELL, Harald, 2011. Führungskräfteauswahl – Optimierung der
Führungskräfteauswahl für Einsatzorganisationen (First Responder) durch neue
Methodiken mit besonderer Berücksichtigung der Auswahl beim Militär. Translated
into English the title means: Selection of Leaders – Optimisation the Selection of
Leaders for Emergency Organisations (First Responder) by new Methods, with
special Consideration onto the Selection within Military. Berlin. 2011.
[5] HATTIE, John, 2008. Visible Learning. Melbourne 2008. [cit. 2015-04-26].
Available from: http://www.zeit.de/2013/02/Paedagogik-John-Hattie-Visible-
Learning. Remark of the author: The table is translated into English by Col Dr. Gell.
[6] HERZBERG, Frederick and Mausner, Bernard and Snyderman, Barbara Bloch,
1959. The motivation to work. New York, 1959.
[7] HEYSE, Volker and ERPENBECK, John, 2004: Kompetenztraining. Translated
into English the title means: Training of Competences. Stuttgart, 2004.
[8] MASLOW, Abraham, 1943. A Theory of Human Motivation. [cit. 2015-04-26].
Available from: http://www.simplypsychology.org/maslow.html. Remark: Figure
1 is re-arranged and created by Col Dr. Gell.
[9] McCLELLAND, David C., 1961. The Achieving Society. New York, 2010.
[10] NILSON, Linda B., 2010. TEACHING AT ITS BEST – A Research-Based Resource
for College Instructors. San Francisco, 2010.
[11] RYAN, Richard M. and DECI, Edward L., 2000. Self-determination theory and the
facilitation of intrinsic motivation, social development, and well-being. Washington
DC, 2000.
[12] SEMMER, Norbert K. and UDRIS, Ivars, 2007. Bedeutung und Wirkung von
Arbeit. Translated into English the title means: The meaning and the effects of work.
Bern, 2007.
[13] VROOM, Victor H., 1964. Work and Motivation. San Francisco, 1995.
[14] ZIGLAR, Zig, n. d. Zig Ziglar Quotes. [online]. [cit. 2015-04-26]. Available from:
http://www.brainyquote.com/quotes/quotes/z/zigziglar387369.html.
38
USING THE TOPSIS METHOD IN DECISION-MAKING PROCESS
CONCERNING LOGISTIC TRANSPORTS
Dumitru IANCU, Dorel BADEA, Ghiță BÂRSAN
Abstract: The decisions are the trigger of all human action and it calls to choice the
optimal variant based on multiple criteria or multiple decision-makers. TOPSIS method
leads to facilitate this process and generates a solution for final decision-maker, closer
to the reality of one specific context. The military actions are dependent on the ways in
which logistic transports manage to maintain an adequate level of logistical support for
military structures involved, thus decisions in this area must be at the highest possible
quality.
Keywords: topsis method, decision making process
1. Introduction
In the last years, NATO military actions have undergone profound transformations in
relation to their characteristics. On the one hand the problems are related to the dynamic,
scale and structural components involved, and on the other hand, to the types of missions
followed and the geographic area where were conducted. Without these aspects be
detailed, it is quite obvious that the challenges arising out of these perspectives of modern
military action call for military logistics to find solutions that increase in a more efficient
manner to the achieving of support and assistance logistics.
2. Logistic transport – essential component of contemporary military logistics
Military logistics has as its fundamental mission planning and operationalization of the
movement and supporting forces carrying out military action and aims:
a) the planning and development, acquisition, storage, transport, distribution,
maintenance, evacuation of the materials and their removal from service;
b) the transport of personnel;
c) the acquisition, construction, maintenance, operation and decommissioning, of
buildings;
d) the acquisition or providing services;
e) the medical support.
The short analysis of some theoretical explanation of the concept of military logistics
unequivocally shows that for the implementation of its, the transport activity is essential
and, subsequently, that all other supporting element of specific activities need to be
undertaken to ensure the forces with which they need in order to fulfill successfully the
tasks entrusted. The complexity and diversity of military actions that was developed by
NATO in recent years (eg. Iraq, Afghanistan, Libya, etc.) requested a continuous and
adequate logistical support in accordance with the requirements of the specific context of
these theaters, based on planning, organizing and conducting efficient transport,
regardless of level or category.
39
The importance of transport logistics can be highlighted by:
a) the need to reduce the duration of military action as a whole - the time necessary to
accomplish military action must be as short for the social, economic, cultural etc.
area of conflict will not be reconfigured or distorted by such action;
b) the need to reduce the responsiveness of the logistics forces to support combat
forces - stocks of materials may be consumed, depending on the dynamics of
military action at random and nonlinear, which calls for reference applications for
their completion and response of the logistics forces must be firmly and quickly so
that it not jeopardize the achievement of the mission;
c) the need to reduce expenses related to conduct military actions - in the manner of
optimization / efficiency of transport logistics can achieve substantial savings in the
budget for these military actions, is a mandatory requirement in relation to the
downward trend in military budgets of both the nations involved as well as in
NATO.
The final decision of military commanders regarding to how they conduct the military
action includes, mandatory, the subsequent decisions relating to transports in logistic
field, those underpinning to the planning process of that military action, because requires
movements of troop and materials until the start of it.
In this context, NATO Logistics Handbook sets, related to movement and transport
(M&T), that it is a requirement that a flexible capability exists to move forces in a timely
manner within and between theatres to undertake the full spectrum of the Alliance’s roles,
operations and missions. It also applies to the logistic support necessary to mount and
sustain operations.
M&T planning is a distinct, but integral part of logistic planning and should be consistent
with force and operational planning. Also, into the planning process transport should have
considered the mobility levels, specific to context of military action:
a) Strategic mobility. Strategic mobility is the capability to move forces and their
associated logistic support quickly and effectively over long distances. This can be
between JOAs, between regions (inter-regional), or beyond the NATO Area of
Responsibility.
b) Operational mobility. Operational mobility is the capability to move forces and
their associated logistic support quickly and effectively within a region (intra-
regional). It also embraces the capability to concentrate regional forces against the
major enemy thrust and to counter-concentrate operational reserves.
c) Tactical mobility. Tactical mobility is the quality or capability to concentrate
regional in-place forces up to division level against the major local enemy thrust
and to counter-concentrate tactical reserves.
In addition, in the design process of M & T activities in military actions could be used, to
provide the essential elements of military logistics, SCOR model (Supply Chain
Operation Reference), frequently met in the supply chain-delivery of civil firms:
a) planning - setting a course of action, linking supply and demand, ensuring
integration of activities and organizations;
b) supply - purchase of goods and services to satisfy the planned and actual
application, consisting in a set of activities that connect the organization with its
suppliers;
c) production - the process of transforming the inputs into final product in order to
meet the planned and actual application;
d) delivery - supply of goods and services to meet planned and actual application,
through activities involved in the management of orders, transport and distribution;
40
e) return - upstream transmission products (raw materials, components, etc.) the
supplier or receipt of goods returned by customers, including post-delivery services
to customers.
It is clear that the decisions of transports in logistic are influenced from two directions:
multiple criteria analysis with strict reference to transport issues (quantity, time, speed,
etc.) and emergency supply of the structures involved in the pursuit military action; that
creates difficulties in choosing the best transport solutions.
3. TOPSIS method – theoretical particularities
The TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) method
was developed by Hwang and Yoon in 1981. This method involves the concepts of
calculating Euclidian distances. TOPSIS method gives the solution that is closest to the
hypothetically best. This method is used to solve multi-criteria decisions under
deterministic conditions.
The algorithm for application TOPSIS method:
a) establish the variants (V1, V2,…Vi), where i = (1,p), the criteria/ attribute (Q1, Q2,
…Qj), where j = (1,t) and the decision-makers (D1, D2, …Dd), where d = (1,m);
b) determine the scales of assessment criteria / attributes and variants;
c) determine the size (importance) criteria / attributes depending on the scale of
assessment established:
𝑘𝑖 = (∑𝑛𝑖𝑑)/𝑚
𝑚
𝑑=1
where ki – average score of each decider for the variant Vi
nid – note of the decision maker d given to version Vi
m – number of decision makers
after will normalized the importance of each criterion as against ki, obtaining the
ki*.
d) calculate the average marks given by each decision maker for each variant,
according to each criterion / attribute based on the assessment scale established:
𝑙𝑖 = (∑𝑁𝑖𝑑)/𝑚
𝑚
𝑑=1
where li – the average marks given by each decision maker for variant Vi,
under the criterion / attribute Qj
Nid – Note the decision maker d given to version Vi under the
criterion / attribute Qj
m – number of decision makers
e) build the decision table with variants versus criteria / attributes xij;
f) determine the normalized matrix, such:
𝑟𝑖𝑗 = 𝑥𝑖𝑗/√∑𝑥𝑖𝑗2
𝑝
𝑖=1
g) calculate the normalized weighted matrix, using the formula:
𝑎𝑖𝑗 = 𝑟𝑖𝑗 ∗ 𝑘𝑖 h) determine the ideal solution and the negative ideal solution:
The ideal solution: Vj+:
41
min)(min
max)(max
1
1
isitCifa
isitCifa
vjij
pi
jijpi
j
The negative ideal solution: Vj-:
min)(max
max)(min
1
1
isitCifa
isitCifa
vjij
pi
jijpi
j
i) calculate the distances from the ideal solution and negative ideal solution:
t
j
jiji
t
j
jiji
vaS
vaS
1
2
1
2
)(
)(
j) calculate the near of ideal solution and carry out a hierarchy of variants in
descending order:
ii
ii
SS
SC
4. Possibilities of applying the TOPSIS method in order to choose the decision
related to logistic transport
a) Suppose we have the following data:
a.1. Transport variants: V1 – transport by means of equipping subunit logistics,
V2 – transport by means of equipping subunits beneficiary, V3 – transport
by means of local transport operators;
a.2. Criteria / attributes. Q1 – transport cost, Q2 – delivery time, Q3 – the degree
of masking, Q4 – quantity transported;
a.3. Decision makers; D1 – logistics officer, D2 – staff officers, D3 – officer in
the transport unit, D4 – officer from a beneficiary unit.
b) Determine the scales of assessment criteria / attributes and alternatives
Table no. 1 Assessment grid of the criteria’s importance
Quality Very
very low
Very
low Low
More
than low Medium
Less than
high High
Very
high
Very very
high
Notation 0,05 0,10 0,15 0,20 0,25 0,30 0,35 0,40 0,45
Table no. 2 Assessment grid of variants
Quality Minimum More than
minimum Satisfying
Less than
extraordinary Extraordinary
Notation 1 3 5 7 9
c) Determine the size (importance) criteria / attributes depending on the scale of
assessment established:
42
Table no. 3 Determine the importance of the criteria
Decidents \
CriteriaD1 D2 D3 D4 k i k i
*
Q1 0.4 0.1 0.3 0.15 0.24 0.209
Q2 0.3 0.3 0.4 0.25 0.31 0.275
Q3 0.15 0.45 0.25 0.4 0.31 0.275
Q4 0.25 0.2 0.35 0.3 0.28 0.242
d) Calculate the average notes given by each decision maker for each variant,
according to each criterion / attribute based on the assessment scale established:
Table no. 4 Calculate the average notes for criterion Q1
Decidents\
VariantD1 D2 D3 D4 l i
V1 4 5 3 5 4.25
V2 7 7 9 5 7.00
V3 8 7 6 5 6.50
Table no. 5 Calculate the average notes for criterion Q2
Decidents\
VariantD1 D2 D3 D4 l i
V1 3 6 5 4 4.50
V2 6 7 5 6 6.00
V3 5 8 6 6 6.25
Table no. 6 Calculate the average notes for criterion Q3
Decidents\
VariantD1 D2 D3 D4 l i
V1 6 8 7 7 7.00
V2 6 7 8 7 7.00
V3 4 3 2 4 3.25
Table no. 7 Calculate the average notes for criterion Q4
Decidents\
VariantD1 D2 D3 D4 l i
V1 4 5 6 6 5.25
V2 6 7 8 7 7.00
V3 8 7 8 6 7.25
e) Construct the decision table „variants versus criteria / attributes”xij;
43
Table no. 8 Decision table
Criteria \
VariantsQ1 Q2 Q3 Q4
V1 4.25 4.50 7.00 5.25
V2 7.00 6.00 7.00 7.00
V3 6.50 6.25 3.25 7.25
f) Determine the standard matrix, such: Table no. 9 Standard matrix
Criteria \
Variants Q1 Q2 Q3 Q4
V1 0.406 0.461 0.672 0.462
V2 0.670 0.615 0.672 0.616
V3 0.622 0.640 0.312 0.638
g) Calculate the normalized weighted matrix:
Table no. 10 Standardized weighted matrix
Criteria \
Variants Q1 Q2 Q3 Q4
V1 0.085 0.127 0.185 0.112
V2 0.140 0.169 0.185 0.149
V3 0.130 0.176 0.086 0.154
h) Determine the positive ideal solution and the negative ideal solution:
Considering the criteria, it will follow:
- Maximizing the criterion Q3 and Q4
- Minimize the criterion Q1 and Q2
Ideal solution: Vj+:
154,0;185,0;127,0;085,0
jv
Ideal negative solution: Vj-:
112,0;086,0;176,0;140,0
jv
i) Calculate the distances from the positive ideal solution and negative ideal:
)0437,0;1059,0;1234,0(
)1192,0;0695,0;0426,0(
i
i
S
S
j) Calculate approximation of the ideal solution and provides a ranking of variants
in descending order:
44
Table no. 11 Determination of the distance from the ideal solution
Variant V1 V2 V3
Si+ 0.0426 0.0695 0.1192
Si- 0.1234 0.1059 0.0437
(Si+)+(Si-) 0.1659 0.1754 0.1630
(Si-)/(Si+)+(Si-) 0.744 0.604 0.268
Resulting the hierarchy variants V1>V2>V3
Thus, based on the views of decision makers, chosen criteria and types of variants
delimited the best option is using TOPSIS methodV1 – transport by means of equipping
subunit logistics.
5. Conclusions
We believe that if it builds a common set of criteria (accepted by all functional areas of a
military structure) and through timely submission of information necessary for
introduction in using TOPSIS method, decisions related to the modalities, forms and
structure of logistic transports structure will have effectiveness and will be a real support
for the best decisions of commanders of military structures.
References
[1] Allied Joint Movement And Transportation Doctrine, AJP-4.4(A), 2005,
http://everyspec.com/NATO/NATO-ATP/download.php?spec=AJP-
4x4A.016609.PDF , accesat la 07.04.2015
[2] NATO Logistic Handbook, 2012, www.nato.int/docu/logi-
en/logistics_hndbk_2012-en.pdf, accesat la 06.04.2015
[3] Regulamentul logisticii operațiilor întrunite, Ordinul nr. 36/ 2008 al Ministrului
Apărării, published in Monitorul Oficial al României nr. 353 din 07.05.2008, partea
I, www.dreptoline.ro/legislatie/ordin_pentru_aprobare_regulament_ logistica_
operatii_ intrunite_36_2008.php , accesat la 07.04.2015
[4] Bălan, C, Analiza comparativă a modelelor de implementare a managementului
lanțului de aprovizionare-livrare, in Rizea, C., Minculete, Gh., (coord.), Abordări
și determinări funcționale ale logisticii, Editura Universității Naționale de Apărare
”Carol I”, București, pp.173-174, 2007, ISBN 978-973-663-493-2
[5] Mares, J., Cempirek, M., Korecki, Z., Nyszk, W., Savu, T., Multinational
Logistics in Missions, ”Nicolae Bălcescu” Land Forces Academy, 2011, pp. 20-
21, ISBN 978-973-153-105-2
[6] Sameer Kumar, D., Radhika, S., Suman, K.N.S., MADM Methods for Finding The
Right Personnel in Academic Institutions, in International Journal of u- and e-
Service, Science and Technology, Vol.6, No.5 (2013), p. 137, ISSN: 2005-4246,
http://www.sersc.org/journals/IJUNESST/vol6_no5/12.pdf , accesat la 05.04.2015
45
COMMAND AND CONTROL FOR PEACE OPERATIONS
Vítězslav JAROŠ
Abstract: With the end of the Cold War many Armed Forces has found itself involved in a number
of “peace operations.” These are complex, untraditional missions that are as much political as
they are military. While there are many differences between these untraditional operations and
more customary combat missions, they share the requirement for effective command and control
(C2). By almost any measure, the military experience shows that traditional C2 concepts,
approaches, and doctrine are not particularly well-suited for peace operations. This paper (1)
explores the reasons for the mismatch between traditional C2 and peace operations, (2) examines
alternative command arrangements approaches, and (3) describes the attributes of the command
arrangements needed to manage peace operations effectively.
Keywords: command and control, peace operations, command arrangements
approaches
1. Introduction
Command and control (C2) is the military term for the management of personnel and
resources. Because warfare is qualitatively different from other aspects of society, C2
concepts both pre-date and have evolved separately from industrial management. Few
human endeavours have either the time criticality or the high cost of error of warfare.
These two crucial characteristics have shaped our thinking about C2.
We can have defined “Command” as the authority that a commander in the military
service lawfully exercises over subordinates by virtue of rank or assignment. [4]
Command includes the authority and responsibility for effectively using available
resources and for planning the employment of, organizing, directing, coordinating, and
controlling military forces for the accomplishment of assigned missions. It also includes
the responsibility for health, welfare, morale, and discipline of assigned personnel.
2. Principles of war and peace operations
Neither command arrangements nor C2 systems (including commanders, staffs, and the
equipment they use to perform C2 functions) actually carry out military missions. Rather,
they perform the functions that organize, direct, and enable others to carry them out. But
while they have no intrinsic value, their role is instrumental—they facilitate mission
accomplishment.
Effective command arrangements result in effective military operations. One way the
quality (effectiveness) of military operations has traditionally been assessed has been in
terms of the proper balancing of the “principles of war” that have been used as shorthand
guidelines by generations of military leaders.
46
For a variety of reasons, no single list of principles of war has gained universal
acceptance. According to Hughes (1986), we can identify seven principles:
- Objective,
- Simplicity,
- Unity of command,
- Offensive,
- Concentration of superior force,
- Surprise, - Security. [3]
The principles of war are both interrelated (concentration of force depends on objective,
simplicity, and unity of command) and somewhat contradictory. For example,
concentration of force is always balanced against security; surprise almost always
requires more complexity in the battle plan, etc.; however, effective C2 succeeds in
balancing these different elements and making them mutually reinforcing. Similarly,
effective command arrangements for peace operations must balance principles related to
peace.
While they may involve the use of force, peace operations are not warfighting operations.
As a consequence, both of their different purposes and the different environments in
which they take place, peace operations often force commanders to violate principles of
war, which both increases the short-term military risk to the peace forces and makes their
military commanders very uncomfortable. These conditions are exacerbated when the
operations in question become coalition operations.
All of this having been said, however, forces with missions such as peace imposition may
well be conducting classic military operations. They will be relying on traditional
principles of war except where that reliance makes it more difficult to achieve their
overall mission. Such forces may well need to concentrate superior forces, rely on
surprise, take measures to ensure the security of their forces and operating bases, and
seize the military initiative. However, the goals of their operations will typically be
limited and their offensive operations designed to establish the credibility of their forces
and induce the parties to make greater efforts to find political solutions.
They are unlikely to include the destruction of major forces or the creation of dangerous
situations in which military force will be continually required to ensure peace.
The realistic principles for coalition peace operations therefore might best be stated as:
- Unity of Purpose;
- Consensus Planning;
- Simplicity;
- Adaptive Control; and
- Transparency of Operations. [1]
The first three of these principles are closely interrelated. Unity of purpose is created and
maintained by adopting consensus planning. This permits the interaction necessary both
to “hear” the range of national agendas relevant to the operation and to build confidence
within the coalition. At the same time, simplicity is essential both to ensure that consensus
can be built and to make it easy to maintain the clear objectives and procedures on which
effective unity of purpose depends. The other two principles are derived primarily from
the nature of peace operations and the environments in which they are undertaken.
Command and control and principles of war are not substitutes for having the full suite
of military capabilities required for success. These include the basic military functions:
- Force structure appropriate to the mission,
- Personnel with appropriate experience and training,
- Intelligence about the situation and potential adversaries,
47
- Capacity for planning and coordination,
- Logistics support,
- Communications systems, and
- Effective capability for civil-military relationships. [1]
These, in turn, must be applied in the heavily political context predominant in peace
operations, as well as in concert with associated humanitarian efforts.
3. Results
Designing an appropriate set of command arrangements for coalition peace operations
requires a clear understanding of the essential functions to be performed and the qualities
desired—the objective criteria for success.
Command arrangements are the systems by which military and political-military
organizations make and implement decisions in an operating environment.
The command arrangements always exist in the context of a larger environment, which
includes military elements (own, enemy, and potentially other forces that are not directly
included in the network), physical and ecological factors (terrain, weather, and so forth),
as well as political, social, and economic factors.
The purpose of the system of command arrangements is to control some selected features
of this environment (for peace operations, this might include keeping military forces out
of demilitarized zones, preventing the flow of arms across a border, or other explicit
tasks), which is the equivalent of accomplishing assigned missions.
Figure 1: Command Arrangements
Source: ALBERT, S., D. and HAYES, E., R. Command Arrangements for Peace Operations.
CCRP Publications Series. 1995, p. 85.
However, the system of command arrangements and the decision makers it serves do not,
in and of themselves, execute operations or accomplish missions. Rather, they create
favourable circumstances, develop plans, ensure that the materials needed are available,
coordinate activities, and undertake representational and decision functions that enable
other (usually subordinate) organizations to accomplish missions.
48
The plans they create consist of five key elements:
- missions (or objectives) to be accomplished;
- assets (resources) to support each mission;
- boundaries that organize these efforts in space;
- schedules (either explicit times or sequences) that organize the efforts over time;
and
- contingencies under which the first four elements change.
Success (effectiveness) consists of creating directives and coordinating requests for
assistance from actors who are not subject to military command. Such directives should:
(1) reflect the planning process,
(2) be implemented successfully without change beyond the contingencies explicitly built
into them, and
(3) have the desired impact on the environment.
The processes inherent in command arrangements (which are always part of the process,
whether explicitly or not) are also illustrated in Figure 1. They include:
- monitoring the environment (i.e., developing facts about it);
- understanding the larger patterns that the facts describe or imply such that, if no
new initiatives are undertaken, the command understands how the future is likely
to unfold
- (including multiple possible futures when the information is incomplete,
inconsistent, or ambiguous);
- identifying alternative courses of action (including doing nothing or continuing
with the existing course of action) that could influence which future(s) occur;
- assessing each alternative course of action, including predicting the likely
consequences of following each, as well as their feasibility;
- deciding (i.e., choosing from among the available courses of action); and
- directing, in other words, preparing and issuing guidance to those organizations that
are responsible for execution or whose cooperation is needed.
While these six steps are inherent aspects of any system of command arrangements, four
other processes are also normally involved and contribute to success:
- information seeking, which is undertaken when a commander recognizes the need
for some specific information;
- reporting to inform superiors, subordinates, those in lateral positions, or the general
public (through the media);
- inquiries to clarify directives or reports received, or to resolve inconsistencies
within and among the elements of information received; and
- coordination undertaken to synchronize activities.
These four additional activities are particularly crucial in peace operations where the
number and variety of actors, their lack of prior experience working with one another,
and the absence of common, reliable communications systems often make timely
information collection and dissemination very difficult.
4. Discussion
The fundamental question is, how command arrangements might be designed and the
range of situations (or operating environments) in which different approaches might
prove wise.
Few serious analyses of alternative approaches to command arrangements have been
conducted, partly because C2 community research has been preoccupied with
communications and computer systems, and partly because command has generally been
understood as an art, often driven strongly by the personalities and styles of individual
49
military leaders. The major exception to this neglect has been a long-running discussion
concerning the degree of centralization in command arrangements. Historically,
command arrangements have gone from more centralized to more decentralized
approaches, in large measure because of the complexity of the warfighting environment
and the limits on the technologies available for gathering information and distributing
directives. [1]
Figure 2: Evolution of Approaches to Command Arrangements
Source: ALBERT, S., D. and HAYES, E., R. Command Arrangements for Peace Operations.
CCRP Publications Series. 1995, p. 65.
Figure 2 illustrates the evolution of approaches to command arrangements. The vertical
axis ranges from the simple battlefields of classical armies, which were commanded by
individuals who took into consideration only the immediate terrain, weather, and forces
to the combat of modern warfare in which relevant actors are spread over vast distances,
from space to undersea and underground locations. The horizontal axis represents the
degree of centralization inherent in the dominant command arrangements.
In the twentieth century, they developed more decentralized approaches that exploited the
speed and firepower of modern forces by permitting—even requiring—initiative at lower
levels.
Results of historical and comparative research was the identification of three major types
of C2 approaches, each with at least two important subtypes. All six approaches have
been successful, but each is more appropriate for some types of warfare than others.
Figure 3 shows these subtypes and the relative headquarters capacity (information
processing and military art capability) required to apply them successfully.
50
Figure 3: Types of Command and Control
Source: ALBERT, S., D. and HAYES, E., R. Command Arrangements for Peace Operations.
CCRP Publications Series. 1995, p. 68.
The existence of these six distinct types of command and control systems in prominent
military establishments helps to explain why coalition operations are plagued by
interoperability problems at the cultural, organizational, and procedural (doctrinal) levels,
to say nothing of the technical communications systems they use.
5. Conclusion
Military forces are blunt instruments. Peace operations involve subtle missions. This
fundamental mismatch between the classic functions of military forces and those required
for successful peace operations makes the careful design of command arrangements an
essential step toward achieving effectiveness. This article has reviewed (a) the unique
demands and requirements for successful command arrangements in peace operations,
(b) a range of experience in recent coalition warfare and peace operations, (c) the state-
of-the-art knowledge of alternative approaches to command arrangements, and (d) the
approaches necessary to assess alternative command arrangements.
References
[1] ALBERT, S., D. and HAYES, E., R. Command Arrangements for Peace
Operations. CCRP Publications Series. 1995.
[2] HOUCK, W., J. The Command and Control of United Nations Forces in the Era of
"Peace Enforcement". Faculty Works at Penn State Law eLibrary. 1993.
[3] HUGHES, Capt. Wayne P. Jr., USN (ret.). (1986). Fleet Tactics: Theory and
Practice. Annapolis, MD: Naval Institute Press.
[4] JCS Pub. 1, Dictionary of Military and Associated Terms. Department of Defence,
USA, 2010.
51
CURRENT PITFALLS OF MANAGEMENT STUDIES
Jaroslav KOMÁREK
Abstract: Management studies in the Czech Republic are still considered as a part of Business
Economics compared with independent study programs of Management abroad. Business
Economics and Management have undergone divergent evolution; Business Economics
unchanged and Management developed into number of separate disciplines. Graduate
education in military can have different conceptions; the preparation of officers for smaller
armies is characterized by a less expensive model that integrates education and military
training in the four-year bachelor program Military Management.
Keywords: Management, Business Economics, study program, Military Science,
Military Management
1. Introduction
The quarter of a century in the new social-economic environment entitles to look back,
but at the same time encourages reflecting on how to proceed. Not accidentally we have
encountered already with critical reflections how the transfer of Management teachings
from the world of market economy has contributed [1]. In recent years, however, gain
contributions that the home state of the Management teachings assess negatively and
point to the lack of support for the practice by theory [2]. Bookstores are indeed full of
other books on management, but those from abroad bring more stories than the methods
and the home (usually by means of grants) recycle generally known knowledge,
sometimes not fully understood. Questions about the current and especially future
development of the Management teachings are relevant also in the environment of
traditional market economy. There are opinions that management development is
similar to that of many other phenomena logistic curve [3]. The influence of the first
methods on productivity was significant, while the influence of a multitude of
postmodern approaches, which quickly spread and were soon replaced by "more
successful", was problematic one. Many of the "bestsellers" were based on the principle
of retrospective carry of their accomplishments on the method used, but which may not
guarantee success in other conditions. Moreover, some companies issued for success
story already failed, and the once admired methods nobody even remembers.
Even more significant is domestic criticism directed to education because it does not
meet the needs of the labour market and does not prepare properly managers. These are
often subjective opinions of practice, but are also supported by objective evaluation. The
current study "The needs of employers and readiness of school leavers" [4] is based on
more than a thousand questionnaires completed by employers from various practice
areas. Employers look on the preparation of college students mainly negatively and
affirm that schools do not prepare adequately for entering employment.
52
2. The higher education of managers in the Czech Republic
How are actually prepared graduates in Management for the crucial area of the first
application in practice, namely for the position of manager at a basic level? Separate
management study program for bachelor's degree does not exist, codified is the
economic study program "Economics and Management", in which are accredited
various fields of managerial focus. The concept of the program is based on the principle
that management is an integral part of business and thus of the teaching of Business
Economics.
The origin of the business economics approach is in German environment, which until
recently has been reluctant to accept the term management. Wöhe‘s "Introduction to
Business administration teachings" [5] presents a comprehensive view of all business
decisions undertaken in the enterprise, including basic theoretical rationale and
overview of the methods used. This therefore includes decisions on enterprise objectives
and form, method of manufacturing and appreciation, and just business management
(planning and decision making, organization, human resources management, control,
information management). An important part of Business administration teachings is
also investment policy, corporate finance and especially reporting and costing. Above
mentioned business management but does not feature leadership and therefore not all of
what is generally regarded as the content of management.
Because management is in business administration's approach considered as a part of
economic science includes study program Economics and Management obligatory quota
of mainly theoretical economic subjects. To make this approach more consistently
applied, the Accreditation Commission approved in 2013 „The standards for study
programs in the field of applied management“ in the interpretation: „Applied
management means degree courses that combine specific professional disciplines
(engineering, arts etc.) with the education of experts in the (economics and)
management. In addition to the management in the certain theoretical level
supplemented with methods and techniques of management, human resources
management, management skills and the basics of psychology and sociology, must be
included other economic subjects - Principles of Economics, Marketing, Law (in the
form of law basics) or Statistics"[6]. Principles of Economics are but Microeconomics
and Macroeconomics, and the question is how memorizing dozens of macroeconomic
graphs (some valid just to another Nobel laureate in Economics) will contribute to the
success of the business. But if have been in all the non-economic fields of study
included Fundamentals of Business Economics, so it would contribute to increasing the
international competitiveness more than ten thousand partial projects of the Operational
Programme Education for Competitiveness funded in amount of CZK 52 billion [7].
Study programs focused on entrepreneurship have abroad similar content [8], but the
emphasis on the practical application of theoretical background and training in
managerial skills, and there is a problem. The preparation of managers for the current
practice requires its knowledge, of that is at universities still less because the results
achieved in practice are not counted in the hunt for impacts. But there is increasing
share of academic staff with qualification obtained exclusively within the continuous
studies Bachelor-Master- PhD.
3. The essence of Management teachings
Binding of Management on entrepreneurship is common in the business world
(Business Management, Business Administration), but with Business Economics at the
same level [9], not as a pendant. But Management is fully applicable in public
53
economics and technical fields, not only on the enterprise but on the organization
generally. The basic question what is the essence of Management from a theoretical
perspective tried to answer already in the 80s Harold Koontz [10], whose textbook of
Management significantly influenced the teaching of Management at Czech higher
studies. Professor Koontz was not only one of many authors of books on management,
but the long-time president of the International Academy of Management, a global
organization currently helping to develop Management teachings in 114 countries. By
him recommended and now the most widely used approach is to establish the
Management teachings on typical activities (functions) that are necessary for the
organizations generally: planning, organizing, human resources, management and
controlling (in this context should be pointed analogy with Fayol´s administrative
functions!). These features are unique to the core teaching of management, but
decidedly not theoretical, but rather eclectic - in different functions is used theoretical
knowledge from a variety of sciences, such as psychology, sociology, economics,
mathematics, industrial engineering or system science.
Although Harold Koontz has been unquestionably one of the "gurus" of Management,
his approach cannot be considered for a universal solution. Joseph L. Massie added later
further two function - decision making and communicating [11]. Koontz namely
included communicating to the function leadership, although he writes, "even though
communication accompanies all areas of management, especially for leadership has an
extraordinary importance" [12]. Management but without communicating cannot
operate at all, only through communicating the entire process is set in motion: the
manager receives intention or directly task, completes necessary information, and after
selecting a specific alternative solution his decision gets through communicating with
subordinates. Even the feedback controlling of realization can be ensured by
communicating.
And it is also clear that the most important intellectual legacy of Harold Koontz is
systemic approach, which is characteristic of his entire textbook. At home, however
small response, the functions are declared only and no system. According to general
systems theory is the control a deliberate process of influencing behaviour of the system
to achieve a certain target. Management teachings but can be defined analogically as a
mental tool for the achieving of a target in group work. Let us try to characterize the
core of Management by a bit simplified systemic model of target behaviour (Fig. 1).
54
Fig. 1 The simplified systemic model of Management
Planning is not ranked as the first managerial function for its own sake; it is the starting
point for achieving the time-distant objective. The objective is communicated to a
manager either directly or he has the power to determine it himself according to his
purpose. To meet the objective, it is necessary to determine the time sequence of
corresponding actions, but their identification and coordination in relation to the
arrangement of resources is contained in organizing, closely related with planning but
different methodically and time independent. The fulfilment of the organization by
human resources is staffing and the essence of leadership is influencing subordinates in
order to perform tasks as they want (to best) and not only must. Controlling is
essentially comparing achieved and desired state (objectives, plans, parameters) and
represents a feedback conditioning the function of system with target behaviour in
general.
If the check reveals that current state does not ensure the successful achievement of the
objective, it is necessary to take appropriate action (e.g. to change terms in plan or to
restructure resources, to choose better staff, to change the style of leadership, to
introduce appropriate controlling or communicating). But there can be a situation that
even the best variant of managerial functions does not ensure the achievement of
objective. Why, the objective has been determined incorrectly? Every plan is based on
certain assumptions about the future state of the environment (both external and
internal). But when in the course of implementation, the originally anticipated state has
changed significantly (mostly beyond our control), objective must be corrected (and not
to waste resources in order to meet the objective „at any cost “). Each of these functions
usually contains more variants of solution and therefore it is necessary to determine
which one will bring the greatest effect. Decision making is so intertwined with all
managerial functions; it is always about choosing the best solution from several options.
D e c i s i o
n m
a k i n
g
Target (intention)
Leadership
Controlling
Staffing
Organizing
Planning
C o
m m
u n
i c a t i n g
NO
YES
Environment
Toward target?
55
Therefore, decision making has the key role between managerial functions and when
some decision is followed by an implementation, the way back may demand a
significant cost, loss of authority or may not be possible at all (it is said that managers
are paid for making decisions!).
But what are crucial, Business Economics and Management have undergone divergent
evolution over thirty years. Business Economics as a description of the enterprise
functions essentially unchanged [13], and Management from the original ambiguously
defined teachings entitled "Management theory jungle" [14] developed into number of
separate disciplines. The new status as a higher education's subject and even study
program have strategic-, human resources-, crisis-, risk-, change-, knowledge-, project-,
and of course business management, others have more interdisciplinary nature such as
information-, business process-, operational-, safety-, environmental- or quality
management.
And what was originally conceived as a "management" is currently distinguished as the
core of management consisting of the typical functions and called General Management
in reminiscence of the Fayol‘s Administration industrielle et générale. Only in Great
Britain the General Management is doctrine for top management, but there is also
everything different and that is why some reformers of the Czech higher education take
pattern from there. General management itself is a sufficient tool for line managers and
other managements are actually add-on application of this general principle to a specific
area of practice. These specialized for middle-level mainly and strategic management
for the top level. The role of general management is not limited to the basic
organizational level. Whether is a problem in any field of human labour, and at any
level, its solution requires always setting goals, planning, organizing resources, staff
motivation, controlling and without communication and decision-making cannot work.
4. Study program Management
Management as an independent bachelor's and master's degree program is widespread in
the US, Western Europe and Asia, common is also doctoral study program in
Management Science. Doctoral studies are a crucial precondition for the autonomy of
study program, because it has "its own" science. The foundations of Management
Science are analytical and simulation models to support decision-making (Operations
Research), with emphasis on the methodology of systems modelling and the application
of advanced mathematical and statistical methods [15]. Due to the content are
essentially analogous to the management the study programs in Organizational Science
and Administration Science, usually aimed more generally at any kind of organization
[16].
Orientation in foreign study programs is not easy, because they are not rigidly arranged
(accredited is the institution, not the study program) and they can be considerably
individualized by wide selection of elective courses. In general, can be accepted, if
degree programs in management are not focused on business, economic subjects are just
additional or missing at all [17].
Actual efforts to reform higher education in the Czech Republic create the chance for
the innovation of the system of study programs, where could be utilized the results of
the project "Q - RAM" focusing inter alia on the new definition of the areas of
education. But no good news for the management, the key branches of economic area
should include: Economics and Economic Policy, Finance, Accounting, Business and
Management [18]. In this context, it is interesting that in the system of study programs
of the Slovak Ministry of Education the Management is also under economic science,
56
but separately from the program Business Economics and Management with the
explanation: The current study courses are not engaged exclusively in management with
the aim of educating the general manager primarily for line managing position. They
combine the profession of manager with the enterprise economist's profession. They
orientate graduate on the values of business processes and suppress comprehensive and
integrated perception of the enterprise. Universal manager such as integrator and
coordinator is a separate control profession “sui generis” [19]. It is worth noting that
the so-called "core knowledge" in the ongoing master's degree program comprises
managerial subjects only, except for one economic (Financial analysis). The principal
problem is that the small entrepreneur can also act in the role of a line manager, but on
the contrary it does not apply.
5. Military Management as a study program
Term Military management emerged in the US based on the experience of World War II
and from the beginning was emphasized usefulness of the knowledge transfer from the
industrial management and declared the nature of Military management based generally
on the functions of planning, organizing, leading and controlling applied to the military
environment [20]. Also attention was paid to its semantic definition to Business
management and to Command, as well its inclusion in the military education system
[21]. But the Military management "eo nomine" as an independent degree program has
not spread in the US, its content is mainly focussed on lifelong learning programs
accredited (graduate-level, non-degree) at a number of staff colleges, but the credits
obtained are even transmissible, e.g. for Master of Military Art and Science [22]. Real
graduate programs are generally oriented more broadly into defence environment, such
as Master of Science in Defence Systems Management, Defence Systems Analysis, and
Manpower Systems Analysis [23].
The role of graduate education in the preparation of officers illustrates an example of a
prestigious United States Military Academy at West Point [24]. The four-year bachelor's
program of this school is based on the assumption that graduates will work both with
people and with machines and therefore they are offered a balanced mix of human and
engineering education based on a broad base of natural sciences. In the first common
two years there are subjects: mathematics, physics and chemistry supplemented with
social and behavioural sciences, foreign languages and informatics. In the next two
years there are subjects for any of two hundred optional fields and obligatory subjects:
military history, military law and military leadership. But if a cadet chooses non-
engineering field (e.g. languages, history, law, political science, economics, and
leadership), he must still undergo three "core" engineering subjects and information
technology. This broad focus allows continuing education in a wide range of technical
and non-technical fields according to the needs of military. Maintaining the appropriate
scope of academic staff but obviously requires a considerable expense. In parallel with
studies is carried out military training (from basic training up to brigade level), which
does not have a credit rating, but together with the physical preparation determines the
overall evaluation. Similar broad-based graduate education provides for the army also
the elite Ecole Spéciale Militaire de Saint-Cyr in three master's degree programs:
International Relations and Strategy, Management of people and organizations, and
Engineering sciences. In the Management of people and organizations are optional
fields: Management, Law, Economics, Sociology, Communication and History, in
Engineering sciences: Engineering and Energy, Computers and Simulation, and
Electronics [25]. The expensiveness of this graduate preparation of an officer -
57
generalist, is not just right in the study but in the need for additional one-year training in
application schools for entry into practice.
The preparation of officers for smaller armies is characterized by a less expensive model
that integrates education and military training in the four-year bachelor program Military
Management / Leadership, for example in Austria [26], Hungary [27] or Croatia [28].
Credit ratings have not only military mutations of general subjects (history, law,
psychology, sociology, geography, management, logistics), but also Tactics and Military
technology and Armament. The Military management has its place also in the System of
study programs of the Slovak Ministry of Education, namely in the subgroup Defence
and Military. Bachelor's degree program Management of military systems contains in
addition to basics of natural and social sciences, managerial and informatics subjects,
but also System engineering, Mechatronics, Tactics and Weapons systems [19].
6. Conclusion
Accreditation of independent study program Management outside the Business
Economics framework is currently not realistic due to the dominant influence of the
Prague School of Economics in the Accreditation Commission and in the project
Q-RAM even so. Change could bring until the intended transfer of accreditation
competencies on the educational institutions, which would give more flexibility in
creating programs to the needs of particular social practice, and that is the cardinal
problem of higher education in the Czech Republic at all.
But what is possible at present, is the accreditation of study program Military
management beyond the Business Economics. Preparation of officers is not preparation
for business, but for the "control of humans and machines in a specific defence
environment" and it should match the content of the program. The legislative framework
for this change still exists in the classification code 9 Military Science [29], but the
terminology needs some upgrading.
References
[1] KOŠTURIAK, J. Česká škola managementu. Moderní řízení, 2006, 41 (1), 6-7.
ISSN 0026-8720.
[2] SOUČEK, Z. Oddělme zrno od plev. Moderní řízení, 2012, 47 (9), 6-9. ISSN
0026-8720.
[3] HAMEL, G. Moon shots for Management. Harvard Business Review, February
2009, 1-9.
[4] ÚLOVEC, M. Potřeby zaměstnavatelů a připravenost absolventů škol –
komparační analýza. Praha: Národní ústav pro vzdělávání, 2014.
[5] WÖHE, G. Einführung in die Allgemeine Betriebswirtschaftslehre. München:
Verlag Franz Vahlen, 1960.
[6] AKREDITAČNÍ KOMISE. Standardy Akreditační komise pro studijní programy
z oblasti aplikovaného managementu. [online] © 2013 – 2014 MŠMT [vid. 2014-
10-15]. Available from: http://www.akreditacnikomise.cz/attachments/
article/459/Management. pdf
[7] Operační program Vzdělávání pro konkurenceschopnost. [online] © MŠMT [vid.
2015-01-15]. Available from: http://www.op-vk.cz
[8] Bachelor’s Degree in Business Administration. bachelorsportal.com [online] ©
2007–2015 StudyPortals B.V. [vid. 2015-04-15]. Available from:
http://www.bachelorsportal. eu/ disciplines/45/business-administration.html
58
[9] JEL Classification Codes Guide. aeaweb.org. [online] American Economic
Association. [vid. 2015-04-16]. Available from: https://www.aeaweb.org/jel/
guide/jel.php
[10] KOONTZ, H. The Management Theory Jungle Revisited. Academy of
Management Review, 1980, 8 (2), 175-187. Available from:
http://www.iluv2teach.com/mgt 304/jungle.pdf
[11] MASSIE, J. L. Essentials of Management. 4th ed. New Jersey: Prentice Hall,
1987. ISBN 0-13-286337-5.
[12] KOONTZ, H. - WEIHRICH, H. Management. Praha: Victoria Publishing, 1993.
ISBN 80-85605-45-7.
[13] WÖHE, G.– DÖRING, U. Einführung in die Allgemeine Betriebswirtschaftslehre.
25. Aufl. München: Verlag Franz Vahlen, 2013. ISBN 978 3 8006 4687 6.
[14] KOONTZ, H. The management theory jungle. Academy of Management Journal,
1961, 4 (3), 174-188.
[15] Management Science PhD Degree Plan. In: jindal.utdallas.edu. [online] © 2015 -
The University of Texas at Dallas [vid. 2015-04-20]. Available from:
http://jindal.utdallas.edu/phd-programs/management-science/degree-plan/
[16] Organizational sciences. orgsci.columbian.gwu.edu. [online] © 2015 - The George
Washington University [vid. 2015-04-20]. Available from:
http://orgsci.columbian. gwu.edu/organizational-sciences
[17] Bachelor of Science in Management Science and Engineering. stanford.edu.
[online] © Stanford University. [vid. 2015-04-26]. Available from:
http://exploredegrees.stanford.
edu/schoolofengineering/managementscienceandengineering/#bachelorstext
[18] ČERNIKOVSKÝ, P. et al. Národní kvalifikační rámec vzdělávání, Díl. 2. Oblasti
vzdělávání. Praha: MŠMT, 2012. ISBN 978-80-87601-10-5.
[19] Sústava študijných odborov. In: akredkom.sk. [online] Last update 06.03.2013.
[vid. 2015-01-26]. Available from: http://www.akredkom.sk/index.pl?tmpl
=odbory
[20] BEISHLINE, J. R. Military Management for National Defense. New York:
Prentice Hall, 1951.
[21] ECCLESS, H. The study of military management. Naval Research Logistics
Quarterly. 1966, 13 (4), 437–445.
[22] Master of Military Art and Science (MMAS) Degree. In: usacac.army.mil.
[online] Last update 06.03.2013. [vid. 2015-03-26]. Available from:
http://usacac.army.mil/ organizations/cace/cgsc/mmas
[23] Naval Postgraduate School academic catalog. In: nps.edu. [online] Last Updated:
4/27/2015. [vid. 2015-03-26]. Available from: http://www.nps.edu/Academics/
Admissions/Registrar/AcademicCatalog/docs/catalogs/NPS%20Academic%20Cat
alog.pdf
[24] Academic program class of 2016. In: usma.edu. [online] Last update 05/14/2014.
[vid. 2015-04-26]. Available from: http://www.westpoint.edu/curriculum/
SiteAssets/ SitePages/Course%20Catalog/RedBook_GY2016_20140509.pdf
[25] La formation académique à l’Ecole Spéciale Militaire de Saint-Cyr. In: st-
cyr.terre.defense.gouv.fr. [online] Copyright Ministère de la Défense [vid. 2015-
04-24]. Available from: 2011http://www.st-cyr.terre.defense.gouv.fr/index.php/
Formation-academique/Les-filieres/ESM
[26] Fachhochschul-Bachelorstudiengang Militärische Führung 2011. In:
campus.milak.at [online] [vid. 2015-04-27]. Available from:
59
http://campus.milak.at/ medien/ WebEdition_extern/download/pdf/Studieninfo_
BaStg_08_d.pdf
[27] A hadtudományi és honvédtisztképző kar képzési programja. In: hhk.uni-nku.hu.
[online] Copyright 2013 © [vid. 2015-04-25]. Available from: http://hhk.uni-
nke.hu/oktatas/kepzesi-program
[28] Guide to study programs. In: vojni.unizg.hr. [online] © Croatian Defense
Academy. [vid. 2015-04-25]. Available from: http://vojni.unizg.hr/_download/
repository/GUIDE_HVU_2015.pdf
[29] Kódy studijních programů vysokých škol. In: msmt.cz. [online] © 2013 – 2015
MŠMT. [vid. 2015-04-27]. Available from: http://www.msmt.cz/vzdelavani/
vysoke-skolstvi/kody-studijnich-programu-vysokych-skol-stav-k-7-brezen-2015
60
ASYMMETRIC WARFARE - THE SIEGE OF
FALLUJAH
Csér Orsolya
Abstract: Asymmetric warfare is a tactical process based on policy objectives which can be used
to force our will upon the enemy. The non-traditional, inexpensive actions involving material
damage and human casualties (such as terrorism, deployment of weapons of mass destruction,
threat of using them, information warfare); guerrilla- and partisan-type raids implemented with
simple tools and techniques are considered its basic advantages. All these are usually the
weapons of the party fighting in the occupied territories (eg. bombings, suicide attacks, actions
against logistics, command posts, attacks against officers, command staff, destruction of supply
routes and transportation routes). The detection of these weapons and the psychological
preparation of the soldiers is very difficult, because the offenders do not comply with the
conventions of warfare. The siege of Fallujah in Iraq, which wrote itself into the history books as
one of the most infamous and serious insurgencies and in which the media and propaganda played
a major role, is regarded as an example of asymmetric warfare.
Keywords: asymmetry, insurgency, guerrilla, civilians, civilian victim, propaganda,
military gain
1. Introduction
Asymmetry doesn't mean anything other than the lack of symmetry between the
belligerents, partially or wholly. Asymmetric warfare is: "A warfare for the sake of
precisely outlined political aims, often based on ideological, religious, ethnic community
of several organizations, implementing military and non-military operations, tactics and
techniques building upon direct and indirect effects and intensifying each other's effects,
endangering different dimensions of security, mainly tactical procedures, with whose
effect altogether we may force our will upon the enemy." All of this is such an activity
that can be connected to asymmetric challenges, when the executors - in most cases not
even sparing their own lives - execute military actions, and is usually done against a
belligerent on a higher technological level. Their basic characteristics can be summarised
as below:
- non-traditional, inexpensive - an action causing material damage and human
casualties (for example terrorism, deployment of weapons of mass destruction,
threat of using these, information warfare);
- guerrilla, partisan type raids, carried out with simple tools and techniques;
- Usually these are the weapons of the party fighting in the occupied territories (e.g.
bombings, suicide attacks, actions against logistics, command posts, attacks against
officers, command staff, destruction of supply routes, transportation routes);
- The detection of these weapons and the psychological preparation of the soldiers is
very difficult, because the offenders do not comply with the conventions of warfare.
61
2. Guerrilla warfare culture and asymmetric warfare
The guerrilla warfare culture characterises not the state, or the regular belligerents, but in
many cases the self-organising ones with poor facilities and logistics, whose aim is to
intimidate or overthrow the state or foreign authority considered to be the enemy and rise
to power. Guerrilla warfare is characterised by its long-drawn-out, hidden and
unpredictable nature. Its primary resource is the local people, whose support is crucial to
the success of the guerrilla action. The guerrilla warfare culture practices military
defence, while using its information superiority to destroy law enforcement, troops, or
the state facilities with strategically offensive operations.
In the new paradigm of warfare (4th generation warfare) it is not possible to
unequivocally distinguish the periods of war and peace, there is no relatively safe
hinterland, there is no front and there is no separate battlefield where the armies
encounter. Often, there are no armies either: the belligerents are not state actors, but
ethnic, religious militias, criminal organisations, with whom it is difficult (or impossible)
to find the necessary compromise to reach a political solution. Methods and behaviour
forms that do not comply with the conventions of warfare emerge (for example hostage
taking, execution of captives), and methods that previously didn't rate as methods of
warfare: legal political activity, agitating the masses, demagogy, taking politics to the
streets and rioting, litigation; organised and unorganised crime, terrorism. The battlefield
is the population itself – the people on the streets, in the fields, in the buildings – all the
people, everywhere, anytime. Battles may happen anywhere - in the presence of civilians,
among the civilians, against the civilians and in defence of them, with the voluntary or
forced participation of civilians. The civilians equally can be targets, human shields,
reachable aims or belligerents, and often it is difficult to decide in a given moment which
role they are playing. The nature of the battle has also changed: their aim is propaganda
instead of destroying the resources of the enemy.
Guerrilla warfare as a warfare method is definitely not a new phenomenon. The history
of guerrilla warfare is as old as the history of warfare, and is a method frequently used by
the weaker belligerent party. The great, well-organised armies usually look down on
guerrilla techniques. It is true that the belligerent party implementing guerrilla techniques
often gives the impression of unorganised free corps, at the same time it is a fact that the
guerrilla warfare culture is one of the dominant existing, and in many cases surprisingly
successful, cultures of warfare appearing in more and more shapes and forms.
The belligerent implementing this 4th generation warfare approach is using techniques
which belong to the party less well-equipped and in a strategically weaker position. It is
important to note that guerrilla warfare is a conscious choice on the part of the belligerent,
and does not necessarily mean disadvantage. The party implementing guerrilla warfare
often also has that advantage that they may secede from the enemy, fall back and return
to the fight at another place and time (under conditions which are much more favourable
for them). The belligerent implementing classic guerrilla warfare is carrying out an
operational defence, but on a tactical level it is trying to collect strength to reach the
requested psychological effect and the final political victory. As a result of the initial
disadvantage of resources, the guerrilla army in the first and second phase of the warfare
is not able to implement open war and defeat armies organised in a classic way.
Examining the characteristics of the warfare culture, two basic factors, the political
orientation and the use of violence, must be taken into consideration. Politically orientated
activities may include sharing information (propaganda), organising demonstrations, and
recruiting activities, training members and infiltrating the current organization, ensuring
the support of outside forces, financing activities for the social support of the people, and
making strategic plans.
62
The success of guerrilla warfare depends on the support of the people, at the same time
the raising and the adequate distribution of the resources has an important role. Related
to the organizational structure, two categories can be basically distinguished: the selective
system, whose characteristic is that small elite units implement the struggle and the
violent attacks; and the mobilization system, whose base is that the leading elite is trying
to involve the people in the fight to the highest possible degree. Another significant
characteristic of guerrilla warfare culture is the use of violence. Among others this
characteristic distinguishes guerrilla war culture from political resistance movements (for
example Ghandi's movement in India) or human rights movements.
Thus guerrilla movements are equally characterised by both factors (political aspect and
use of violence). The two factors (even if occasionally to a different degree) are present
in guerrilla warfare culture in all cases, although depending on certain factors
(environment, popular support, organizational structure, solidarity, exterior support,
reaction of law enforcement organisations) the representatives of the guerrilla warfare
culture put different emphasis on politics and use of violence in different situations.
Returning to the basic principles of asymmetric warfare, it’s most important military
characteristic is that there is an enormous power and asset difference between the
belligerents in the conflict. In general, it can be said that the military power of the smaller
party is so limited that it cannot attain military victory using only traditional means, but
to win the war, guerrilla fighting, sabotage, and terror are needed. Hereby its necessary
accompaniment is violating convention, or leaving the norms behind. The final aim is to
force the enemy, the occupant - by several military methods - to give up. The more drawn-
out an armed conflict like this is, the more probable it is that asymmetric warfare occurs.
For victory, the army of the enemy must be defeated, its territory must be occupied, and
the will of the nation must be broken (from which in Iraq only the first two materialized!).
Asymmetric warfare is ascribed to have serious political character, as war in general. It
can be described with the following characteristics:
- high level of violence;
- the lack of statehood;
- the monopoly of violence gets privatised;
- the difference between combatants and non-combatants disappears;
- wars and armed conflicts approach conventional wars;
- abandonment of morals;
- the emergence of child soldiers and female suicide bombers;
- the aim is annihilation.
Among the factors determining the success of this type of warfare, establishing
information superiority is primary, emphasizing the role of intelligence. Besides this, the
isolation of the guerrillas, termination of guerrilla shelter by the civilians, and forming
control over the civilians (safety zones), and on this level the maintenance of the long-
term presence takes place. Hereby the concept of the field is re-evaluated, since in contrast
to preserving the territory the priority of the human field is recognised.
In point of control and leadership there is only one managing authority, the law
enforcement organisations have the leading role, military organizations have only a
supporting role, and special operation forces have an emphasized role. Psychological
warfare is also an important criterion of these operations, therefore effective, persuasive
psychological operations have outstanding importance, and the introduction of positive
persuasive regulations is crucial. Among the factors endangering the success of
asymmetric warfare are primarily the leading place of military leadership, uncontrolled
state borders, and the emphasised role of capturing the enemy as against winning the
civilians. Besides this, it is important to mention the use of military units of battalion size
63
or larger, the concentration of armed forces in large bases, the wrong approach of special
operation forces.
In this form of warfare it is important to distinguish the quality and quantity of violence.
In asymmetric warfare quality is the more effective - only against defined targets, with
the minimization of collateral damage, assuring the safety of the people, and winning
their trust. For military operations it is necessary to know the enemy and form the
appropriate orientation. The centre of gravity of asymmetric confrontations is the civilian
population, and on the basis of this, establishing and maintaining control over the civilians
is a factor of key importance to the military efforts, which can be achieved in three phases:
- achieving local information superiority, establishing control over the people,
- isolating the guerrilla infrastructure,
- destroying the guerrilla cell.
1st phase:
- distinguishing the enemy from the population using information gained by human
resources (HUMINT), importance of intelligence,
- in case of incomplete support by the civilians, information is only partial and
incomplete,
- in the absence of sufficient information quality, violence cannot be implemented,
collateral damage will be significant at the search and rescue operations,
- the numerical superiority of the guerrillas, since a part of the civilian population
always supports them - the aim is isolating them from the guerrilla cell,
- one of the most important military components of the controlling of the civilians is
forming safe zones.
2nd phase:
- increasing the control over civilians - one of the proven methods of achieving this
is to assess the level of the support of the state in a given area (it is rewarding to
start where it is the highest, for example the capital and its neighbourhood, where
the state infrastructure is more established),
- process: isolated population → guarantee their safety → local information
superiority → isolating the guerrilla infrastructure (that way they cannot get new
supporters).
3rd phase:
- in the first two phases the state law enforcement organisations created the
conditions for eliminating the guerrilla cell,
- getting information superiority in addition to power superiority,
- military operations recognised in orthodox warfare (eliminating the enemy),
- but the principle of quality violence should be followed here as well (if civilians get
hurt, it generates support for the guerrilla movement).
The asymmetric approach is based on the thorough evaluation of the vulnerability of the
enemy. It often uses innovative, non-traditional military methods, weapons or
technologies that may appear in the full spectrum of military operations can be tactical,
operational and strategic as well. In practice, asymmetry represents different acting
variations (operations), organisations, and ways of thinking different from the belligerent,
for the purpose of maximizing its own advantage, exploiting the weaknesses of the
enemy, and to take the lead or to win greater freedom to act. The asymmetry can be
political-strategic, military-strategic or a combination of these as well. In practice it
means different methods, technologies, organisational frameworks, time perspectives,
and various combinations of these, and it can be described with a series of other
characteristics, like for example the dimensions, levels, and forms of asymmetry. The
strategic asymmetry can be positive or negative as well. As a matter of fact, it is
64
determined by the point of view, and relative position of the belligerents. From the aspect
of positive asymmetry, for example in Iraq, the United States puts a strong emphasis on
high level training, professional leadership, and the management technique infrastructure
representing state-of-art technology, and their arsenal of military technology. This
strategy builds upon the exploitation of relevant superiority, while negative asymmetry
doesn't build upon its own strengths, but aims to achieve results by exploiting the
weaknesses of the enemy. From these concepts, it results that coalitions led by the United
States must prepare for the prevention of the threats represented by negative asymmetry.
Asymmetry has a certain temporality that assigns a time horizon, a time frame.
Asymmetry can equally cover a short or a long time horizon. Military history can show
countless examples of both types. For short-term asymmetry, a good example is the Blitz
in the Second World War that ensured positive asymmetry for the Nazi German war
machine in the beginning, but after one or two years the Soviet Union balanced its
disadvantages originating from the asymmetry. In the NATO bombing of Yugoslavia in
1999, the Serbians, with a primitive anti-aircraft system as compared to that of the
Alliance, found a remedy in the fight with the enemy using their advantages of headcount
and technology: they significantly degraded the efficiency of air attacks with scattering,
camouflage, and deception. Long-term asymmetry materializes much more rarely,
although some great powers in certain historical periods successfully kept their
superiority originating from positive asymmetry, but in the long run the balance moved
towards equalization most of the time. Strategic asymmetry can be induced intentionally,
or long-standing starting asymmetry may result from the relative situation of the
belligerents. Existing superiority in the baseline often doesn't guarantee success, for
example, the Viet Cong successfully implemented its guerrilla warfare based on
asymmetry against South Vietnam and the United States. Asymmetric threats are usually
extremely complex, therefore the counter steps must be driven by complex, agreed and
coordinated strategies. Diplomatic, economic, military and other type of actions must be
harmonized so that their interference leads in the direction of intensification.
Consequently, irregular, asymmetric warfare is a potential alternative for small countries
against an enemy superior in numbers and/or in technology. The possibilities of irregular
warfare can be exploited more effectively if these types of armed conflicts are led by
official soldiers. The biggest chance for the success of the irregular warfare is if the armies
are prepared for this type of strategy before armed conflict is initiated. As the analysis
showed, irregular warfare must be accepted as a strategy before the armed conflict. The
infrastructure to support it must be created. When organising the support it must be taken
into consideration that the course of the armed conflict might be significantly different
from the conventional one. For example: significant territorial losses may occur in a short
period of time, the aggressor might march into the territory of a small country without
armed conflict. The warfare becomes drawn-out, the civilians are exposed to increased
pressure.
To summarize it can be said that if a small state does not want to assure its security along
the four conventional defence strategies, it can be a logical choice to prepare its defence
concepts, and its army in peacetime for asymmetric warfare, instead of investing
significant power and resources into an army that will most likely not be able to intercept
the aggressor. That is to say, learning from history, it should not wait for the fall of its
army according to conventional principles, but tries to gain advantage by an initiative in
time.
65
According to Mao Zedong, guerrilla warfare can be divided into three phases. In the first
phase the organisation builds up, in the second, operations based on guerrilla warfare
begin, in the third phase comes the complete annihilation of the enemy. Mao considers
the support of the civilians as an underlying principle.
The asymmetry can be financial or psychological, although these are in relation to each
other. Financial asymmetry often results in psychological as well. The belligerents
implementing manipulative techniques aiming at psychological asymmetry could achieve
significant success. (Mongolians, Aztecs, Zulus, etc.) The most effective is the
combination of the two, although the psychological advantage can at many times be
ensured with less input.
3. Counter-insurgency operations In general, it can be said that at the outbreak of an insurgency, the power of the state
ceases to exist within the given territory, and hereby the control as well – even if it was
only symbolic earlier. The existing barely- (or non-) working administration, resulting
from the legitimacy of the state, in case of military intervention, at least there is someone
to turn to, somewhere to start from. At the outbreak of an insurgency, a complex
environment consisting of offences and other motivations is created, and disturbing them
causes other events at unexpected places at unexpected times. That happened in the
example of Fallujah as well after the Iraq Freedom operation in 2003.
The American experiences in the Iraqi war can be outlined with the following points:
- the major political aim was overthrowing the Saddam regime, and in addition
preventing the the members of the ruling regime from returning to power,
- the deployment of the weapons of mass destruction in the possession of the
dictatorship had to be prevented,
- the resistance of the Iraqi armed forces had to be broken by shock and decapitation
strikes,
- the military and political management capability of the Iraqi regime had to be
destroyed,
- the civil population had to be protected,
- the separation of the state government, the Ba'ath Party and the civilians had to be
achieved,
- the destruction of the oil facilities, the lightning up of the oil wells had to be
prevented, and hereby avoid a natural disaster.
4. The siege of Fallujah
The siege of Fallujah in Iraq which wrote itself into the history books as one of the most
the most infamous and serious uprising can be regarded as an example of asymmetric
warfare. Hereinafter its events, causes and more important characteristics will be
examined.
4.1. Fallujah
Fallujah is located in the middle of a Sunni triangle, some 70 kilometres away from the
capital, Baghdad. It is a typical Arab town with narrow alleys, short buildings, with
residential area and mosques on the North, industrial parks on the South. The motorway
(number 10) can be found near the town, and the Euphrates also flows here.
About the counter insurgency operations of the post Iraqi war times, it can be said that
the community perception of the society is more important than the efficiency of the
operation itself.
66
These long-drawn-out conflicts and insurgencies put a very large burden on democracies,
that examples in Fallujah as well the risks of the non-aligned operations and the necessity
of the long term planning.
Initially Fallujah was rated as a calm town, since the mayor elected after the Iraqi war
prevented the chaos and the looting. Only towards the end of the 'Iraq Freedom' operation,
on the 23rd April 2003, did soldiers enter the town with the 82nd Airborne Division,
occupying an elementary school. A few days later, they fired upon the crowd protesting
for the return of the local school, which resulted in 20-30 human fatalities and many
injuries. The US army justified its activity by alleging that they were returning fire on
rebels hiding in the crowd, but the evidence showed the opposite. (The US suffered no
casualties from the incident.)
Later a similar operation took place in front of the former Ba'ath Party headquarters, the
headquarters of the American forces in Fallujah. In May and June the attacks became
more severe, and the replacement division 101 was strengthened with the 2nd Brigade of
the 3rd Infantry Division (4-5 thousand people). Then the Americans launched Operation
Desert Scorpion Operation, which was primarily directed against the supporters of the
previous regime, to break down the armed resistance. It indicated the weakness of the
Americans that from the soldiers in Fallujah only a few hundred participated in the
operations; the high number of attacks carried out on motorbikes against the Americans,
explosions in mosques. For the rest of the year and in the beginning of 2004 the number
of attacks continuously increased, therefore several forward operating bases were set up
around Fallujah with the aim of decreasing the losses. On the whole it can be said that the
attack claiming the highest number of human fatalities took part in Fallujah. The strategy
of the coalition, the lightning raids made the relationship between the locals and the troops
of the coalitions even worse. Because of the implemented methods the civilians started to
consider the soldiers of the coalition forces as invaders. In all these operations the general
military logics does not prevail, since in such cases, as we could see in Fallujah, the
civilians themselves are fighting, and the belligerents are not acting based on operational
principles, but aiming for the support of the civilians.
Information, and information superiority has key importance. Getting this superiority
seems impossible over the rebels hiding among the civilians, building upon their
sympathy but it is possible to overcome them with reasoned, consistent provisions aiming
at stable settlement. The aim of all insurgency is to win the support of the civilians,
namely the acceptance of the military presence, in whom the civilians should not see the
invader but the temporary helper. Media and mass communication plays an important
role in establishing information superiority.
In Fallujah, the series of operations became permanent. In April 2004, Operation Vigilant
Resolve took part, in which after several minor incidents the rebels raided contractors
ensuring a food cargo with fewer staff than required by the safety standards, attacking
them with grenades and automatic weapons, then hung two bodies out of the four upside
down over a bridge crossing the Euphrates River.
Photos of the event spread all around the world. This prompted the announcement of a
punitive expedition campaign in Fallujah for the termination of the insurgency, and
initially less violent methods were used, with a relatively small headcount and started the
liquidation of the insurgents with military force only on explicit command. On the 4th of
April, 2004 the marines closed all the roads to the city with barbed wire and tanks, built
camps for fleeing locals at the checkpoint, which were attacked by the rebels using
mortars.
67
As a response, an air strike followed, in course of which four buildings collapsed. And
they started to distribute flyers, in which they were asking for help of the civilians to
identify the participants in the attacks against the employees. On the radio, they promised
to eliminate anarchy and punishing the aggressors, since they broke the laws of Islam. On
the next day the marines and 505th Battalion of the Iraqi Civil Defense Corps started to
enter the town, and due to the resistance of the insurgents they launched another air strike.
Its inaccuracy claimed a huge number of human fatalities among the civilians. Only one
quarter of the town was successfully retaken, and the command given to attack was
withdrawn – the rapid withdrawal gave the impression of losing.
The coalition officially and unilaterally suspended the operation, fights sporadically
continued for weeks, but at the beginning of May the withdrawal of the American corps
from the town was announced. Then, after the silence before the storm, in November
2004 the New Dawn Operation was launched. Then the coalition forces invested the town,
and established checkpoints again, which closed the town to the outside world. It was
obvious that a serious attack was imminent, and as a result of it, a huge part of the civilian
population left Fallujah. The aims of the operation were primarily political, since to secure
the elections in the beginning of 2005, the forces of the insurgents had to be destroyed.
In this operation the coalition mainly played securing roles. On the 7th of November 2004
they occupied the hospital that played an important role during the previous events and
the bridges in its neighbourhood – towards further investment. They then turned the
electricity off in the whole town, and on the next day, following 12-hours of air strikes
and artillery bombardment preparation, the land campaign started. As a result of this,
based on the information provided by the coalition forces, by the 16th of November
resistance ceased to exist in Fallujah.
The intensity of the fights and the level of resistance can be seen well by the facts that in
terms of damages between March 2003 and February 2005 most Iraqi civilians died in
Fallujah, and more than half of its homes were destroyed.
Fallujah marks the location of the most infamous urban confrontations of the asymmetric
warfare form in military history. When the American and Iraqi forces started the siege of
the town, they exactly knew what and whom they were facing: the resolute insurgents had
been preparing for this battle for weeks. The town was full of buildings transformed into
bunkers, camouflaged fire position and ammunition depots.
The fight started with the occupation of two bridges and a hospital at Fallujah in the
November of 2004. At that time Iraqi Prime Minister Ayad Allawi had not given the
command to overrun the besieged centre of the Sunni insurgents, but skirmishes were
already going on. The biggest attack of the American army in the last 36 years was
imminent. The American marines entered Fallujah. Prime Minister Ayad Allawi gave
command for the attack, after ordering curfew in the town. Allawi ordered the Baghdad
International Airport closed down, and the borders of the country as well in several places.
The Americans attacked on the Western edges of the town, where they came under heavy
fire. The night before the attack marines occupied two strategically important bridges and
a hospital. The American marines investing the town under siege occupied the bridges
located in the Western edges of the town. One of the bridges was the location of the
lynching of the four American civilians in April. The American army besieged the town
considered to be the centre of the Sunni insurgents after the brutal murders for the first
time - unsuccessfully.
Jordanian terrorist leader Abu Musab al-Zarqawi, allied with the Al-Qaeda international
terrorist network, called on all Muslims to join the insurgency against the United States.
This manifesto was published on an Arab internet site frequently used by Muslim
extremists. The manifesto, published in the name of al-Zarqawi prompted the Muslims
68
to jihad (holy war). According to its text, the Muslims were "suffering agonies" from their
enemies. The manifest on the internet encouraged them to stand up against their enemies
with all their strengths, because "it is just a question of time before victory comes".
It was the biggest battle in 36 years. Although the offensive had not yet started, the
American and Iraqi corps were only waiting for the command of Prime Minister Ayad
Allawi. Allawi did not command the attack, but he ordered curfew in the town.
The head of the government a few days earlier still talked about the restart of the attempt
for peaceful settlement, but according to the reports by the correspondents staying with
the besieging corps, the offensive was imminent. The American corps initially did not
enter the city centre, during their preparatory bombings and the occupation of the two
bridges, 12 Iraqi insurgents and two American marines lost their lives. The commanders
of the corps were expecting house to house fights in the densely populated areas, and
suicide attacks. Several experts compare the siege of Fallujah to the offensive against the
town of Hue in Vietnam in 1968. In the last huge siege of the American army, 142
American and several thousand Vietnamese soldiers lost their lives.
The insurgents also prepared for the siege of Fallujah. 300 suicide bombers were waiting
for the American attack. The insurgents tried to distract the attention of the besiegers by
attacks implemented in the other parts of the country. During the weekend, their attacks
claimed more than sixty fatalities altogether, in their attack in Hadita, west of Baghdad,
they executed 21 Iraqi policemen. Because of the wave of violence over the weekend and
the siege of Fallujah on Sunday, Ayad Allawi declared a state of emergency for 60 days
in the parts of the country primarily inhabited by Arabs.
In the times before the events of Fallujah developed, everyone was surprised by the rapid
collapse of Saddam's regime. Since the ruling Ba'ath party consisted of the Sunni Arabs
composing only the 20-25 % of the county's population, Iraq shook off the regime built
by them with unusual speed. This way, by April in the bigger cities - including Fallujah -
public order seemed to exist.
Because of the unrest spreading everywhere, such disorder was formed in the whole
country that, as a result of the chaos lasting for weeks, even that part of the civilians that
initially sympathised with them turned against the coalition. According to the plan of the
Americans, in the framework of the „de-Ba'athification programme”, the Coalition
Provisional Authority (CPA) was created to serve transitional administration duties, its
first two acts were to issue order of de-Ba'athification of Iraqi society, and formally
disbanded the Iraqi army.
This proved to be a serious mistake, since it made the state organisation become
impossible, and made several thousands of trained people unemployed, paying only a
very small amount of redundancy money. Later, with the forming of the Iraqi Governing
Council, long exiled Iraqi opposition members were invited, but the members of the
Council were not taken seriously by even the locals, therefore its efficiency was not
adequate.
In correlation with these events, in the August of 2003 started attacks on masse which
claimed more and more victims, and by October they reached 30-40 attacks a day. These
typically were significant in the Sunni Triangle, where initially criminals paid by the
unemployed former Ba'athists committed the attacks. In connection with these, the higher
political and military management did not listen to the information provided by the
intelligence service, and did not take steps to stop the insurgencies spreading in bigger
and bigger measure. According to military intelligence data, the number of insurgents had
already reached 12-16 thousand people by the beginning of 2014, who beyond that also
had widespread support. The motivation was coming from many sources, such as Iraqi
nationalism, Sunni disapproval caused by the Western occupation, Shia islamist and
69
Salafi radicals. All of these were so deeply present in Iraqi society that the insurgents had
their supporters in the government offices, aid organisations, the media and among the
Iraqis working for the coalition as well.
4.2 Six days in Fallujah – as a summary, or through the media's approach The most controversial confrontation of 2003 Iraq war was the siege of the town of
Fallujah. Previously it had been one of the most peaceful places in the country, where
looting and breaches of peace hardly occurred. But unfortunately it changed, when during
a demonstration American soldiers killed 17 unarmed civilians.
Later, after a couple of smaller but bloody atrocities, the radical citizens of Fallujah raided
a convoy carrying food, beat up and killed four of the staff, then their charred corpses
were dragged through the city streets before being hung over a bridge crossing the
Euphrates River. They also took photographs of the event, which they sent to renowned
newspapers, which caused a storm of indignation. Because of this, the American army
decided to teach a lesson to the ones responsible, blockading the town under siege with
the support of the Iraqi National Guard, but those responsible escaped on the eve of the
attack.
During the short intensive siege, 40 American soldiers died, while on the other side more
than 200 Iraqi soldiers lost their lives, but the worst was yet to come: although the
occupying forces allowed 70000 civilians to leave the town, at the same time they were
given that order that after sunset they were allowed to shoot at any adult males, whether
armed or not. However, the soldiers didn't observe the rules. Several cases were reported
when snipers shot innocent children, women and elderly citizens dead, and what is more,
they even closed down a hospital.
After a short ceasefire, the fights still continued for a long time, claiming many human
lives - especially on the Iraqi side. Despite all of this, after a large scale attack in
November of 2004, the Americans occupied the majority of the town, however
unfortunately during this attack they killed at least 800 civilians and 1200 rebels, and
destroyed the 60% of the infrastructure of the town.
Therefore the case of Fallujah can be regarded as an example of asymmetric warfare in
which the media and propaganda played a major role.
4.3 Fallujah in the hands of al-Qaeda In January 2014 it was announced once again that the Iraqi government had lost control
over Fallujah, and the town in its entirety was under the control of the fighters of the Al-
Qaeda international terrorist network – according to a high ranked informant. Based on
the information given by an unnamed informant, Fallujah in its entirety is under the
control of the jihadist group named The Islamic State of Iraq and the Levant (ISIL).
The districts surrounding the town are controlled by the Iraqi police. Many civilians and
armed people died in the fights between the extremist Sunni group allies with Al-Qaeda
and the government forces, and the various tribal militias allied with the army. The
extremist organisation gained control over numerous districts in another town in al-Anbar
province, Ramadi, as well.
Fights broke out in two Northern Iraqi towns after the authorities dismantled the tent camp
of the Sunnis protesting against the government in Ramadi. The government, giving into
the demands of the protesters, withdrew the army from the area, and following this the
armed fighters of Al-Qaeda overran several towns in al-Anbar province. Anti-government
demonstrations had already been going on for over a year in the majority Sunni Anbar
province that was considered as the hotbed of the dissatisfaction against Nouri al-Maliki,
the Shiite prime minister. The Sunnis, a minority in Iraq - who were in power during the
70
reign of the late dictator Saddam Hussein - had been complaining for a long time that
after the American intervention the Shiite majority that took over the ruling of the country
had been treating them unfairly.
At the same time, the Sunni tribal leaders made it obvious that they condemned Al-Qaeda
that was representing itself as the protector of the Sunni, and they were ready to fight the
terror organization and its Iraqi cell. The army and the Sunni tribal militias fought
shoulder to shoulder against ISIL.
At the weekend, the Iraqi army deployed cannons and tanks around Fallujah, fallen to the
hand of the Al-Qaeda insurgents. They wanted to seize back the town, but first they gave
time to the locals, to the leaders of the town, to persuade the militants to leave themselves
before they mounted an offensive
The Iraqi fighters of the Al-Qaeda international terrorist network accumulated enough
military hardware in the occupied parts of the al-Anbar province in the Western part of
the country to capture all of Baghdad.
Iraqi deputy Prime Minister Adnan al-Assadi reported that the Iraqi army fought hard
against militias, armed to the teeth, to recapture the parts of the capital of al-Anbar
province, Ramadi, and from the East of it, Fallujah, occupied by the extremists.
According to Assadi's description, with the arms of those close to Al-Qaeda and other
extremist Sunni groups fighting against the authority of the government ruled by the
Shiite, even Baghdad could have been captured. The Iraqi government announced the
start of an extensive operation, the purpose of which was to to expel the allies of Al-
Qaeda from the aforementioned towns.
The Islamic State of Iraq and the Levant (ISIL) nested itself in Ramadi and Fallujah at
the beginning of the month, taking advantage of the chaos developing after the
confrontations between the security forces and the local Sunni tribal armed fighters.
The fighters of the ISIL introduced Islamic law in the areas controlled by them. In
Fallujah an Islamic court was established, and several formerly high ranked officials of
the legislature were kidnapped, amongst them a police officer and a few sheikhs as well
- reported local eyewitnesses and tribal leaders. Besides this, through the loudspeakers of
the mosques, ISIL called upon the civilians to join its fight against the Iraqi security
forces.
A local resident reported to the AFP French news agency that the insurgents introduced
strict regulations in several districts. For example they forbade women to go to markets,
and for men to wear Western clothes and shave their beards off.
The new operation announced by the Iraqi government, according to prime minister Nouri
al-Maliki, was supported by the majority of the international polity, except - as he put it
- "certain Satanic states". With this, among others, he referred to Saudi Arabia that he
accused recently with financing the Sunni terror organisation fighting in the area.
Meanwhile near Ramadi an Iraqi journalist lost his life, and another was seriously injured
after armed locals attacked a police patrol. The attack took part when the journalists were
heading to a new local police station together with the policemen to attend its opening
ceremony. Two policemen were also killed in the attack, and another two were injured.
For journalists, Iraq still belongs among the most dangerous countries in the world.
On the whole therefore it can be said that the militants took Fallujah under their control
again, and the government wanted to occupy the town back from the insurgents. This
confrontation is considered to be among the biggest ones since the United States
overthrew Saddam Hussein.
71
References
[1] BELLAVIA David: House to house – An epic of urban warfare, 2009.
[2] BODORÓCZKI János: Gondolatok az aszimmetrikus hadviselés logisztikai
támogatásáról, Bolyai Szemle 2013. http://uni-nke.hu/downloads
/bsz/bszemle2013/1/08.pdf (letöltés ideje: 2014. május 20.)
[3] KEEGAN John: A hadviselés története, 2009.
[4] KISS Álmos Péter: Átvihetők-e az aszimmetrikus hadviselés tapasztalatai?
http://mhtt.eu/hadtudomany/2009/2009_elektronikus/2009_e_8.pdf (letöltés ideje:
2014. június 1.)
[5] KRAJNC Zoltán: Az aszimmetrikus hadviselés, fenyegetés alapkérdései
http://www.szrfk.hu/rtk/kulonszamok/2008_cikkek/Krajnc_Zoltan.pdf (letöltés
ideje: 2014. május 20.)
[6] PORKOLÁB Imre: Aszimmetrikus hadviselés, az ortodox és a gerilla hadikultúra
összecsapásai http://www.zmne.hu/dokisk/hadtud/Porkolab.pdf (letöltés ideje:
2014. május 17.)
[7] RESPERGER István, KISS Álmos Péter, SOMKUTI Bálint: Aszimmetrikus
hadviselés a modern korban, Zrínyi Kiadó, 2012.
[8] SOMKUTI Bálint: A 4. generációs hadviselés, Hadtudományi Szemle 2009.
http://uni-nke.hu/downloads/kutatas/folyoiratok/hadtudomanyi_szemle/szamok/
2009/ 2009_2/2009_2_hm_somkuti_balint_42_51.pdf (letöltés ideje: 2014. május
29.)
[9] Falludzsa az al-Kaidáé http://www.honvedelem.hu /cikk/
41775_Fallujah_az_al_kaidae (letöltés ideje: 2014. június 3.)
[10] Hat nap Falludzsában http://www.pcguru.hu/hirek/hat-nap-Fallujahban/11637
(letöltés ideje: 2014. május 20.)
[11] Megkezdődött Falludzsa ostroma http://index.hu/kulfold/flj6308/ (letöltés ideje:
2014. június 1.)
[12] Már iszlám jog van FalludzsaJo egyes részein
http://www.hir24.hu/kulfold/2014/01/20/mar-iszlam-jog-van-Fallujah-egyes-
reszein/ (letöltés ideje: 2014. június 6.)
[13] Tankok sorakoznak Falludzsánál http://www.origo.hu/nagyvilag/20140107-
tankok-sorakoznak-Fallujah-hataran.html (letöltés ideje: 2014. június 3.)
72
ECONOMIC WARFARE
HEAVY DAMAGE WITHOUT BLOODSHED
Harald PÖCHER
Abstract: The essay discusses economic warfare on the basis of the author’s definition. To
introduce the reader to this topic, the author gives some examples of economic warfare in history
for a better understanding of the deeper meaning of the term economic warfare. Based on the
introductory information, the paper lists and explains the methods and weapons used in economic
warfare in present at a glance. Just like conventional wars, fought with military means, the
importance of leadership and the professional training of estimate of the situation also play an
important role for a successful warfare; therefore the author discusses in a separate chapter these
fundamental basic conditions and furthermore gives some advice what kind of leader is best
qualified to plan and lead operations in economic warfare as well as what kind of training
institutions are best suitable to train leaders for economic warfare. In the final chapter, the author
summarizes his ideas and gives some advices to public institution how to prepare the country best
possible for economic warfare.
Keywords: definition, methods and weapons, leadership and training-system of
economic warfare
Preliminary remarks
The main purpose of this essay is to present the results of the research work of the author
within the last decades on a few available pages. The author published his first ideas about
this topic in the Austrian Military Journals (ÖMZ-Österreichische Militärische
Zeitschrift) in 2005 for the first time and later after his habilitation at Hungarian Military
University in Budapest. A secondary purpose is to persuade policy-makers to deal with
the topic critically. To reach a very large readership, the author points out, that the essay
therefore may have some deficiencies considering the scientific structure. An additional
reason is to emphasize the importance of Military Universities which have a training
institute for economics to train and educate future leaders for economic warfare.
1. Introduction
Conflicts and wars are like laws of nature an integral part of humankind. During all
epochs of humankind these conflicts and wars were not only fought by well armed and
equipped soldiers but also with weapons created by economic scientists. It wasn’t
analyzed until now, which from both kinds of war were more successful in the long
history of humankind, but it is evident that both different kinds of warfare led to heavy
damage to the society. Because of the use of different weapons or weapon-systems, the
war with military weapons mostly goes hand in hand with bloodshed while the economic
warfare leads to heavy damage without bloodshed. This fact is one of the most important
differences between the two different systems of warfare.
73
The following essay discusses “Economic Warfare” as a whole beginning with the
presentation of a definition, developed by the author as a result of his research work on
this topic within the last decade. Based on the definition the author explains three
interesting historic examples of economic warfare. The following chapter four - the
centrepiece of the essay - discusses the most important weapon systems of economic
warfare and their efficiency in the target area. In every kind of warfare important is the
education and training of leaders and the estimate of the situation. To underline the
importance of this fact, the author therefore discusses the estimate of the situation for
economic warfare and leadership in economic warfare in a separate chapter. In a
concluding chapter the author summarizes the results of his research work and gives some
advices how sovereign states should deal with economic warfare.
2. What does the misleading expression “Economic Warfare” stand for?
The war, Carl von Clausewitz once wrote, is an act of power to force an enemy (opponent)
fulfilling the own intention [1]. Wars which were fought with military methods were the
objects of many scientific surveys. Special kinds of wars like “economic warfare” haven’t
been extensively analyzed until now. Therefore it exist no detailed entire description what
economic warfare really means. Economic warfare in the sense of the survey will not
include the warfare against the enemies’ armament industry and important facilities for
the daily life during a war with military forces.
In the essay economic warfare will be discussed on the basis of the authors own definition:
“Economic Warfare is a warfare based on non- military methods and means with the
purpose to hit the opponent economy. At the end of the warfare the opponent’s economy
should have lost market shares and the own economy should be better off.”
As the definition shows no battle-tanks, fighter planes or submarines are the bearer of the
fighting in such a war and in normal case no high ranking generals or admirals are the
protagonists in the warfare and head of the war-rooms of economic warfare, except
generals or admirals studied economic science besides their higher military education.
3. Economic Warfare in the past-Selected classic examples
Human history is full of interesting examples of successful or less successful economic
warfare. For the purpose of the essay the author discusses three outstanding examples,
the biological warfare against Mongols in 14th century, the continental system of
Napoleon at the beginning of the 19th century and the Operation Bernhard of Third Reich
against Great Britain during World War Two.
Biological Warfare against Mongols
On the basis of a 14th century report, the Black Death is widely believed to have reached
Europe from the Crimea as a result of a biological warfare attack [2].
In 1343 the Mongols under their leader Janibeg besieged Caffa at the Crimea peninsula.
The siege of Caffa lasted until February 1344, when it was lifted after an Italian relief
force killed 15,000 Mongol troops and destroyed their siege machines. Janibeg renewed
the siege in 1345 but was again forced to lift it after a year, this time by an epidemic of
plague that devastated his forces. During the siege the Mongols hurled plague-infected
cadavers into the besieged Caffa, thereby transmitting the disease to the inhabitants and
subsequently the survivors of the siege spread the plague from Caffa to the Mediterranean
Basin.
Such a measurement of the besiegers was deadly because in the 14th-Century medical
standards were extremely low and antibiotics against plague were successfully used
firstly in the 20th-Century.
74
Continental System of Napoleon
After Napoleon could not invade England with military methods he thought, that England
could be defeated by economic warfare. Great Britain was an important factor financing
alliance against Napoleon. In May 1806 Great Britain organized a naval blockade of
French and French-allied coasts. As a reaction Napoleon issued on 21 November 1806
the so-called Berlin decree which brought into effect an embargo against British trade [3].
The Berlin decree forbade every trade of European Countries allied with or dependent
upon France. The French measurement led to some damage of British economy between
1808 and 1811 by hiding the British exports which were falling between 25% and 55%
compared to pre-1806 level. The British economy was able to compensate the damages
otherwise encouraging British merchants to seek out new markets and to engage in
smuggling with continental Europe.
Within Europe on the one hand side some parts benefited from the embargo of British
economy, especially Belgium and Switzerland saw significantly increased profits due to
the lack of competition from British goods. But on the other hand side the embargo had
some negative effects on France itself. Shipbuilding and rope-making declined and with
few exports and a loss of profits, many industries were closed down.
It is only mentioned in passing that the famous Swedish economist Heckscher showed
how the economic policy of Napoleon against Great Britain failed.
Operation Bernhard
The result of the battle of Britain between summer and autumn 1940 taught the Third
Reich that it was not possible to conquer the British Isle with military means. Therefore
Germany organized an economic warfare against Great Britain using plans which were
prepared in 1939.
Britain was especially vulnerable because its effort was founded upon, and sustained by
an economy which was global. It consisted of its directly ruled colonial possessions; its
self-governing Commonwealth Dominions; and, the Empire’s commerce with neutral
powers around the globe. All of them were accepting (in exchange for goods and
services); and holding British Pounds Sterling, in their currency reserves for transaction
with; and within the Empire. Confidence in the integrity of the Pounds as a world wide
excepted currency, was essential to sustaining the vitality of the Empire, and the war
effort. It is evident flooding the British economy with a large amount of forged bank-
notes it is able to shake the foundations of the monetary system of Great Britain’s
economy and to restore the British economy into the age of barter economy.
The operation Bernhard [4] was named after the German SS Major Bernhard Krüger who
was responsible to organize the printing of the forged bank-notes. The operation consisted
of production of forged bank-notes and the infiltration of the 5, 10, 20 and 50 bank-notes
into the British Economy to destabilize the Economy. The initial plan was to drop the
bank-notes from aircraft on the assumption that while some honest people would hand
them in most people would keep the notes, in practice this plan was not put into effect
because the German Luftwaffe had not enough planes to deliver the forgeries, and
therefore the operation was placed into the hands of SS foreign intelligence.
The production of the forged bank-notes were organized in the concentration camp of
Sachsenhausen (35 km north of Berlin) employing more than 142 skilful prisoners for the
production of the appropriate rag-based paper with the correct watermark and the
engraving of the printing plates. In April 1945 the printing press had produced nearly 9
million bank-notes with the total value of 134,610,810 (today worth 3 billion Pounds).
The forged bank-notes are considered the most perfect counterfeits ever produced. The
75
Bank of England detected the existence of the notes in 1943, and declared them “the most
dangerous ever seen”.
After getting knowledge about the existence of forged bank-notes the Bank of England
initiated defence measurements which were able to contain the damage caused by forged
bank-notes.
The German operation has been dramatised in books, the BBC comedy-drama miniseries
Private Schulz and a 2007 Oscar-winning Austrian film, The Counterfeiters (Die
Fälscher).
The operation was not successful because it started too late. Therefore most of the notes
produced ended up at the bottom of Lake Toplitz of Austrian province Styria. It cannot
be completely excluded, that certain forged bank-notes could have directly went into the
pockets of former bigwig NAZI who were able to flee to safe countries, which have
decided not to pursue NAZIS, to finance a relatively trouble-free life after the end of the
World War Two.
4. How to fight an economic war successfully?
Just like conventional wars which were fought with military weapons, an economic
warfare had to be planned in detail and leaders of this type of war had to be best possible
trained and educated. While the core element of the planning process is the situation
assessment the most important parts of training and education are higher military
leadership training and studies of economics at a university.
4.1 Methods and weapons of Economic Warfare
As I mentioned above, economic warfare is as old as humankind. While in the early days
of economic warfare the methods and weapons were simple, they became more and more
sophisticated within the course of history. Due to its practical results, we can distinguish
between different groups of methods and weapons. For the purpose of the essay we will
distinguish between, fiscal, monetary, trading, espionage methods, head hunting and
biological warfare and the use of goal-oriented information as a weapon.
4.1.1 Fiscal methods and weapons
In the eyes of Europeans, the production, marketing and sale Airbus passenger liner is a
success story which is based on an economic warfare between the European aircraft
industry and the aircraft industry of the USA, especially Boeing the worldwide leading
commercial aircraft produces until the foundation of Airbus-Industries.
Thought it costs billions of US-Dollar to design and engineer a new airliner in detail -
money that aircraft producers must borrow up in front, and pay interest on every day
during the several years that pass from the start of design to the first sale of a complete
aircraft - Airbus-Industries is virtually exempt from such financial agonies, because it
was subsidised in the past with millions of Euro by the Airbus owning countries, i.e. the
development of the first model of Airbus which was launch in May 1969, the A300, was
subsidies with 800 million US-Dollar and the development of one of the modern plans,
the A330 and A340 family, was subsidised with 4.5 billion US-Dollar by the governments.
Due to best conditions for the granted loans, Airbus-Industries were able to calculate a
lower price than the most important competitor Boeing [5].
Boeing stayed not inactive and hit back during a public tender of the Ministry of Defence
of USA (Pentagon) for new tanker aircraft. In the first round of the tender, Airbus-
Industries offered with its strategic partner Northrop-Grumman, a large US-based defence
armament producer, a tanker plane granting good conditions to the Pentagon, but in the
final period of the tender Northrop-Grumman dissolved the strategic partnership and left
76
Airbus-Industries alone. In the final end and after the last best offer process in the tender
Boeing received order worth 52 billion US-Dollar.
As we showed above, fiscal policy is an important weapon to improve competiveness of
the own economy. With the purposeful use of taxes, contributions, customs duties states
can thereby strengthen their own economies competiveness.
4.1.2 Monetary methods and weapons
The current situation in Russia shows us how vulnerable a currency really is. Due to the
limited space for the essay, it is not possible to tell the true story about the dubious
monetary measurement fired by some think tanks against the Russian Rouble and which
happened parallel to the open asymmetric military conflict in Eastern Ukraine.
In principle, monetary measurement can be used both as defensive or offensive weapons.
Important is the devaluation of the own currency to reduce the price of own exports. Also
important is money laundry to legalize earnings. With the legalized money further
economic warfare can be financed.
Another weapon is stock exchange speculation. With this weapon share prices could be
devaluated and as a result enterprises could loose market shares.
4.1.3 Trade related methods and weapons
Trade is an important factor in economic activity. Trade makes every country better off.
Trade can be steered by using exchange rates as key elements of control the stream of
goods and services across borders. To stimulate exports or imports, a country can use
depreciation or a appreciation of a currency as a measurement.
Another successful weapon in trade is embargo. The word “Embargo” comes from
Spanish and it means “Distraint”. Embargo is the complete prohibition of commerce and
trade with a particular country or group of countries. In nearer past, embargoes were
imposed on Cuba by the USA, and, in the special case of arms trade, USA imposed
embargoes to Peoples Republic of China. The effects of embargoes could be widespread
and efficient for the own economy, but some scientist voiced concerns against embargoes
because of negative effects on the own economy.
4.1.4 Espionage methods and weapons
Espionage was and is an important factor in warfare. Political and military leaders need
all available information to judge the current situation. Therefore they normally use all
available human and non human resources to get all necessary information about the
enemy’s position, economy and so on. Espionage is in the chain of information collecting
the practice obtaining secrets from rivals or enemies for military, political, or economic
advantage. It is usually thought of as part of an organized effort.
During the cold war intensive espionage between the NATO and Warsaw Pact had taken
place, but recently, espionage agencies have targeted the illegal drug trade and those
considered terrorists. Besides these targets espionage daily happen the so-called industrial
espionage conducted for commercial purpose. Countries and most large corporations
spend considerable amount on espionage of opponent enterprises and on precautions to
protect against more cloak-and dagger varieties.
Modern warfare of the 21th Century is characterized by intensive use of electronic and
communication technology. Network centric warfare is one of the most modern words in
modern military discussions. The use of new technology allows a more efficient
reconnaissance, deception and security measurements. In the economic warfare receiving
and veiling of information has got a vigorous importance.
77
4.1.5 Head Hunting
Today among economists it is widely accepted, that investment in education and human
capital is one of the most important factors to achieve economic progress. For the further
development of a developed country it is vital to have excellent research and development
capacities at one’s disposal. Developed countries head-hunt the most qualified scientists
to make use of their research results and thereby strengthen their own economy.
In relation to head-hunting exist many examples in the past. Imagine the large emigrations
waves to the United States of America. During these waves many excellent European
scientist left Europe to make further research work in USA. As a result of all these
research works, the USA earned a lot of money. In a critical accounting estimate Europe
had the high costs for educating all these emigrating scientists and the USA earned a lot
off money.
4.1.6 Biological economic warfare
Biological economic warfare is a special case of biological warfare and a modern
biological economic war is different from ancient time biological economic war due to
the rapid changing standard of medical treatment of victims of biological warfare.
Biological economic warfare includes elements of uncertainty because it is not possible
to exclude all neutral or friendly people from the attack, i.e. during an attack against a
production facility with influenza-virus to bring a production to a standstill the virus can
also infect other people who are not employed in the attacked facility.
4.1.7 Information as a main weapon-system
An interview with the current director of ècole de guerre économique in Paris, Christian
Harbulot, published in the German newspaper “Der Spiegel” on April 20, 2006 makes
one sit up and takes notice: In the interview he clearly stated, that the European Unions
acts like a “headless chicken “, because in respect of economic warfare the European
Countries are total beginners and all the states have no ideas what concentrated effects in
information as a weapon lie and he explained from his own experience that within a
successful economic warfare the information-management plays a decisive role. The
economic warfare with the weapon “information” is warfare in real time, i.e. if a
competing company launched falsehood about a product of a competitor it is necessary
that the competitor had weapons for retaliation in his arsenal.
4.2 Types and organization of economic warfare
Modern military science identified different kinds of wars fought with military means. In
principle we can differentiate between nuclear, conventional, civil and asymmetric
warfare. The most interesting appearance of military warfare is the asymmetric warfare
which can be characterized as a conflict between two or more opponents of drastically
different levels of military capabilities or size. An economic warfare classified using
similar characteristic as military warfare. Categorically we can differentiate between a
conventional economic warfare and an asymmetric economic warfare. Conventional
economic warfare is an economic war between two or more countries. Such an economic
war is planned and fought by official authorities of the involved countries. An asymmetric
economic warfare is similar to military
Fought between opponents of different levels of capabilities, i.e. between an official
authority of a country and a private enterprise or between two or more private enterprises.
As a result of analyzing the situation of all the independent states in the world, we can
summarize, that only a few of the 194 independent states recently fought wars, but all of
them established a Ministry of Defence. None of them maintains a Ministry of Economic
Warfare. Merely the great powers have installed special governmental institutions to
collect information, which are useful for managing the economic warfare to impose the
78
nation’s economic interests on other nations. A planning process of economic warfare is
not the responsibility of a government alone it could also be made by enterprises.
Successful leaders in the economic warfare normally act in the same way as military
leaders do. Therefore in some parts the education of leadership and the training of leaders
could be the same.
4.3 Estimate of the situation, leadership and training system
After discussing economic warfare in general we had to answer questions like what are
the main responsibilities of planers or who are the leaders of the economic warfare and
what role should career officer play in this warfare?
Today, it is state of the art in military training of military leaders to teach the estimate
process. The estimate process had its origins in the Prussian Army’s attempt in the early
1800ies to develop a systematic and logical approach to the solution of military problems.
In economic warfare the estimate of the situation also plays an important role and
therefore had to be trained carefully similar to the training programs of military education
institutions. It is evident that on a careful estimate of the situation guarantees best possible
success in the following operation.
In the warfare with military means the success of military leaders depend on the use of a
balanced combination of talent and the successful use of military knowledge trained at
military universities. In the economic warfare the success also is the result from well-
based use of knowledge about the influence of the taken measures on the economic
process and the talent for analyzing economic interrelationships trained at universities.
The complex requirements for leaders of economic warfare more or less require an all-
in-one solution of education and training suitable for all purpose. The best possible
preparation to achieve well educated and trained leaders for economic warfare could be
taken place in military universities which are not only teaching the military core subjects
like assessment of situation, issue of orders, leadership and control but also economics as
a science discipline.
Looking around in the world we can find a shining example for an educational institution
for economic warfare. In 1997 General Jean Pichot Duclos founded the Ècole de Guerre
Èconomique (www.ege.fr) in Paris. The current director of école de guerre économique
is Christian Harbulot. Since its founding, the école de guerre économique has been
educating students to learn all the necessary knowledge to fight an operation in an
economic war successfully. It is worthwhile looking at the training curriculum presented
at the homepage mentioned above to gain an impression what will be thought at école de
guerre économique.
5. Prospects
For a long time power and influence of states has been based not only on military power
but also on economic strength. With their economic policy, states attempt to guarantee
the best possible standard of living for their population. These could only be achieved by
conquering desirable roles in the world economy and by further protection against attacks
from opponents. For this reason states have vital interests to strengthen their economies.
A strengthening of the economy could be achieved by organizing the national economy
in the best possible way and by organizing an economic warfare which is fought with the
purpose to hit the opponent economy but doesn’t destroy the opponent’s economy
completely.
Every country is been well advised to establish academic educational training centres
which are able to teach leadership and economics for an economic warfare.
79
References
The available literature is full of books and papers about this topic, which shows the
importance of Economic Warfare for Geo-Economics in a globalized world. The author
published his first result on this topic in “Österreichische Militärische Zeitschrift (ÖMZ)
4/2005 and after his habilitation at former Military University in Budapest in
Hadtudományi szemle 2009.
[1] see Carl Philipp Gottlieb von Clausewitz: Vom Kriege (Band 1.3), Ferdinand
Dümmler, Berlin 1832, Buch I, Kapitel 1, Abschnitt 2
[2] see Wheelie M.: Biological Warfare at the 1346 Siege of Caffa, in Historical
Review, Volume 8, Number 9, September 2002
(wwwnc.cdc.gov/eid/article/8/9/01-0536_article) (retrieved 5 March 2015)
[3] see www.historyhome.co.uk/c-eight/france/consys.htm (retrieved 5 March 2015)
[4] see www.jewishvirtuallibrary.org/jsource/Holocaust/operationbernhard.html
[5] see Boeing Wins Contract to Build Air Force Tankers, in The New York Times,
February 24, 2011
80
EFFECTIVENESS, EFFICIENCY AND PROMPTNESS OF CLAIMS
HANDLING PROCESS IN THE NIGERIAN INSURANCE
INDUSTRY
Tajudeen Olalekan YUSUF and Sunday Stephen AJEMUNIGBOHUN
Abstract: This study was designed with the aim of investigating the effectiveness, efficiency and
promptness of claims handling process within the Nigerian insurance industry. To this end, the
researchers have been able to assess the effectiveness and efficiency of claims handling process
and thus, examine its promptness in relation to the organizational productivity of insurance
companies in Nigeria. Claims handling procedures should be promptly managed to avoid
deficiency in organization’s operational objectives, and lastly, Government should ammonize
their resources and technical knowhow with the Nigerian insurance industry in ensuring that
insurance claims are well designed to curtail fraudulent claims experienced in the past.
Keywords: Claims handling process, effectiveness, efficiency, promptness,
insurance industry, Nigeria
1. Introduction
Oftentimes, loss situations awake the minds of the insuring public towards their insurer,
as many consumers pay little attention to their insurance coverage until they have a loss.
Claims, being the heartbeat of insurance, are the most critical contact the insuring public
has with the industry and thus, critical moment of truth that shapes a customer’s overall
perception of their insurer (Crawford, 2007). Singh (2007) noted that claims are the
defining moment in the customer relationship for insurance firms, with a firm’s success
often defined by one factor: the customer’s experience around claims.
A claim is a demand made by the insured person to the insurer for the payment of benefits
under a policy (Asokere & Nwankwo, 2010). However, to reduce the cost of claims and
deliver on a value-added brand promise to customers, non-life insurers are focusing on
enhancing efficiency and effectiveness in their claims function. Claims processing is the
gateway to the customer that will drive improvement in the insurers’ customer
acquisition, retention, enterprise business intelligence for product development insight
sand profitability for the next several years (Capgemini, 2011a). The speed, accuracy and
effectiveness of claims processing is also paramount for controlling costs, managing risks
and meeting portfolio underwriting expectations (IBM, 2011).
The task of handling claims process has been challenging. However, modernizing the
claims process for efficiency, effectiveness and flexibility has been being daunting task,
due to the fact that it is a mission-critical function that touches all parts of the
organization, affecting competitive positioning, customer service, fraud management,
risk exposure, cost control, and IT infrastructure (TIBCO, 2011). However, Singh (2012)
points at certain inefficiencies that are driving up claims costs and adversely affecting
customers’ claims experience. These inefficiencies include: aging technology, increasing
process complexity, and a rising number of fraudulent claims. Previous attempts to
improve the process have typically been limited to expedite a series of inefficient and
81
disconnected processes or of reducing manual steps. Efficiency is the ability to minimize
the use of resources in achieving organizational objectives (Khan et al., 2012).
Effectiveness, on the other hand, is said to be the extent to which stated objectives are
met- the policy achieves what it intended to achieve (Productive Commission, 2013).
Ilona and Evelina (2013) added that excellent organizational efficiency could improve
entities performance in terms of management, productivity, quality and profitability.
Zheng et al. (2010) are of the opinion that effectiveness determines the policy objectives
of the organization or the degree to which an organization realizes its own goals.
Claims handling service is being said to be the basis on which an insurance company is
ultimately judge by clients and the key issue affecting the reputation of the insurer.
However, the payment of legitimate claims represents the delivery of the promise at the
heart of the insurance contract; which, indeed, for many insurance companies, excellent
claims handling service is considered to be a differentiator that distinguished them from
the competition (AIRMIC, 2009). An earlier submission, according to Organization for
Economic Co-operation and Development (2014), opined that good practice for insurance
claim management involves: claims reporting; receipt of claims by the company; claims
files and procedures; fraud detection and prevention; claims assessment; claim
processing; timely claim processing, complaints and dispute settlement; and supervision
of claims-related services.
The way an insurer handles a claim often determines to a large extent the insured’s
opinion of and loyalty to the insurer. However, with claims being the largest single cost
item for insurers, controlling claims expenses through a streamlined process can have a
dramatically positive bottom-line impact while providing new and unique differentiating
flexibility in claims processing, which enables the company to innovate and react quickly
to unpredictable events and changes in the competitive landscape (TIBCO, 2011).
Different claims managers and administrators within the Nigerian insurance industry had
proven that claims procedural processes are being followed and timely responded to.
Previous studies such as Michael (2008); Rose (2013) Yusuf & Dansu (2014) adduced to
the fact that the way an insurance company manages the claims process is fundamental
to its profitability and long-term sustainability and thus, posited that good claim
management must be proactively conducted in recognizing and paying legitimate claims;
and assessing accurately the reserve associated with each claim.
The core objective of this study is to examine the effectiveness, efficiency and promptness
of claims handling process in the Nigerian Insurance Industry. Other objectives include:
ascertaining the claims handling activities; investigating the roles of claims management
team in designing strategies for fraud detection and prevention; and assessing claims
handling procedures in meeting the expectations of various customers.
2. Research questions and hypotheses
For the purpose of this study, the following relevant research questions were set:
i. Are effective and efficient claims handling activities significant in claims
management operations?
ii. Does promptness in claims handling process essential for fraud detection and
prevention?
iii. Of what significant importance are claims handling processes in meeting
customers’ expectations in the Nigerian Insurance Industry?
82
To provide answers to the questions highlighted above, the following testable
hypothetical statements were considered:
i. Ho: Managing claims effectively and efficiently will not significantly affect
operational process in claims management
ii. Ho: Promptness in claims handling processes does not essentially assist in fraud
detection and prevention
3. Conceptual and empirical framework A claim, according to DiNapoli (2013), is basically a demand presented for the payment
of money due for goods that have been delivered or services that have been provided.
Vaughan and Vaughan (2008) define a claim as a notification to an insurance company
that payment of an amount is due under the terms of a policy. An insurance claim,
therefore, is a demand by a person or an organization seeking to recover from an insurer
for a loss that an insurance policy might cover (Brooks et al., 2005). Michael (2008)
opines that insurance claims range from straightforward domestic building and contents
claims that are settled within days of notification to complex bodily injury claims that
remain open for many years.
However, a claim on the policy is thus demand on the insurer to fulfill its part of the
promise, committed to while writing the contract with the insured (Krishnan, 2010). A
claim is the defining moment in the relationship between an insurer and its customer
(Francis & Butler, 2010). Singh (2012) thus opines that retaining and growing market
share and improving customer acquisition and retention rates, insurers are focused on
enhancing customers’ claims experience. Similarly, insurers can transform the claims
processing by leveraging modern claims systems that are integrated with robust business
intelligence, document and content management systems which will enhance claims
processing efficiency and effectiveness.
According to Low (2000), efficiency measures relationship between inputs and outputs
or how successfully the inputs have been transformed into outputs. Efficiency is said to
focus on the input-output relationship, as opposed to output and outcomes; and that high
efficiency would be exemplified by the delivery of a large number for given inputs (Scott
et al., 2008). Pinprayong and Siengthai (2012) had noted a difference between business
efficiency and organizational efficiency; while business efficiency reveals the
performance of input and output ratio, organizational efficiency reflects the improvement
of internal processes of the organization such as organizational structure, culture and
community. Ilona and Evelina (2013) argued that effectiveness oriented companies are
concerned with output, sales, quality, creation of value added, innovation, cost reduction,
and thus, must measure the degree to which a business achieves its goals or the way
outputs interact with the economic and social environment. Capgemini (2011a) opined
that highly effective claims practices can be a key contributor to a differentiated customer
experience that strengthens customer loyalty and attract new customers, which is
especially valuable in a market with little or no growth.
Excellence in claims handling is being a competitive edge for an insurance company and
it is a service that clients greatly value. Similarly, key components that must be in place
in order to deliver excellence in insurance claims handling, according to AIRMIC (2009),
were noted as: culture and philosophy, communication, people, infrastructure, claims
procedures, data management, operations, and monitoring and review. Brooks et al.
(2005), more so, suggest some step-by-step claims handling activities to include:
acknowledging and assigning the claim, identifying the policy, contacting the insured or
the insured’s representative, investigating and documenting the claim, determining the
cause of loss and the loss amount, and concluding the claim. Meanwhile, claim efficiency
83
and effectiveness, according to Capgemini (2011b), had been noted to be core benefits
for claims transformation, which include: claim handling and administration; allocated
loss adjustment expense; indemnity exposure; and total cost of ownership.
The Productivity Commission (2002) as cited in Yusuf and Dansu (2014) suggest a good
claim management embraces: proactive in recognizing and paying legitimate claims;
assessing accurately the reserve associated with each claim; reporting regularly;
minimizing unnecessary costs; avoiding protracted legal disputation; dealing with
claimants courteously; and whatever possible, handling claims expeditiously. Michael
(2008) stated that the key elements of a modern claim management system that can
process all claim types should include a case management component along with the
ability to calculate and process complex reoccurring payments. Therefore, to significantly
improve claims management and swiftly adapt to changing situations, insurers must make
more profound infrastructure changes that align claims processing with corporate
objectives for customer service, operational cost and risk management (TIBCO, 2011).
Then, to reduce the cost of claims and deliver on a value-added brand promise to
customers, insurers must focus on enhancing efficiency and effectiveness in their claims
function (Singh, 2012).
Esri (2012) pointed at five steps for optimizing the insurance claims process to involve
data organization, analysis and planning, mobility, management, and customer
engagement. Singh (2012) postulated that for insurers to achieve higher levels of
operational efficiency and better process effectiveness, they must look towards
implementing modern claims system or enhancing their existing claims systems,
leveraging advanced fraud detection technologies and innovating around self-service
through processing. Rose (2013) affirms that the way an insurance company manages the
claims process is fundamental to its profit and long-term sustainability. In this regard, six
core aspects of predictive insurance claims processing were noted to include: fraud
management, recovery optimization, settlement optimization, claims benchmarking,
activity optimization, and litigation management.
3.1 Claims Fraud Detection and Prevention
The earlier study of Derrig and Krauss (1994) proposed that the word ‘fraud’ is reserved
for criminal acts, probable beyond a reasonable doubt, that violate statutes, making the
willful act of obtaining money or value for an insurer under false pretense or material
misrepresentation of a crime. Kuria and Morange (2014) recorded fraud as an omission
or act intended to make one gain advantage unlawfully or dishonestly in dealings that can
be achieved by intentionally concealing, suppressing, misrepresenting or non-disclosure
of material fact pertinent to transactions or financial decision; misappropriating assets;
and abusing fiduciary responsibility or position of trust. According to Derrig (2002),
insurance fraud is seen as criminal act involving obtaining financial gain from insurer or
insured using misrepresentation of facts or false pretenses.
The Crime and Fraud Prevention Bureau (2000) as cited in Nicola et al. (2006) noted four
main types of fraud in motor insurance and their associated levels of occurrence as:
completely false claims (12%), deliberately misrepresenting the circumstance of the
claim (32%), inflated loss value (39%), claiming from multiple insurers (3%), with 14%
being attributable to other types of fraudulent claims. Yusuf (2010) presented four classes
of insurance fraud: internal fraud, intermediary fraud, policyholder fraud, and insurer
fraud. Viaene and Dedene (2004) stated that fraud affects all classes of insurance. The
most common insurance fraud which falls within the general or non-life insurance market
can be categorized into opportunistic fraud (Yusuf & Babalola, 2009).
84
4. Research method
The study employed a survey research design. The engagement of survey design was
because of its ability to predict behavior and assist in gathering identical information
concerning all cases in a sample (Bordens & Abott, 2002; Aldridge & Levine, 2001).
Data were collected through the field survey among insurance companies specifically
claims department. The main instrument employed in gathering data was structured
questionnaire. The structured questionnaire was employed due to its appropriateness to
survey research (Babbie, 2005). The questionnaire consisted of two parts (part A and B).
While part A consisted of personal data of respondents, part B contained statement related
to variables understudied. The views of respondents with respect to issues under study
was assisted via the completion of the questionnaire which was drawn using a Likert-type
scaling measurement of ‘strongly agree’, ‘agree’, ‘undecided’, ‘disagree’ and ‘strongly
disagree’.
Among 49 insurance companies in Nigeria, which comprise 10 composite insurers, 7 life
specialist companies and 32 non-life risks underwriting companies (Asinobi & Ojo,
2014), 33 companies were chosen consisted of 25 general insurance companies and 8 life
insurance companies; giving a 67% of the industry capacity. The sample population thus
was drawn from Lagos metropolis. The choice of Lagos, as an empirical ground for
research interest, was because it houses the largest number of insurance companies in
Nigeria (Nigerian Insurers Association, 2011). A total of 132 copies of the questionnaire
were sent out. 4 copies of the questionnaire were provided for claims managers and other
staff within the claims department of each surveyed company accompanied by a covering
letter. This study employed a judgmental sampling technique because it assists in
selecting unit(s) to be observed on the basis of the researchers’ knowledge of judgment
of the population, its element and aim of the study (Babbie, 2005). To ensure the genuine
of responses, regular telephone calls, electronic mailing, short visits and assistance from
other persons were options to enable proper filling and returning of the questionnaire.
Thus, collection of questionnaire was done through self-effort and other research
assistants. Eventually, among 121 copies retrieved from the various insurance companies,
107 were correctly completed and these were analyzed for the research (that is, a 81%
effective response rate).
On the reliability and validity of the study, a pilot study was conducted. The Cronbach
alpha on questionnaire administration is 0.7981; which shows that the alpha level is above
the required standard 0.70. On the validity of the research, both construct and content
validity were adopted. The construct validity was designed via measures of the variables
understudied from well-grounded literatures on other previous studies. The content
validity was designed by giving a set of draft questionnaire to few selected top
management staff in the claims department and some members of the academia in the
field of insurance. These professionals went through the instrument and came up with
formidable suggestions which assisted the researchers in presenting the items within the
linguistic understanding of the respondents.
5. RESULTS AND DISCUSSION Table 1: Responses to the testing of hypothesis 1
Alternatives Responses Percentage (%)
Strongly Agree 08 07.48
Agree 21 19.63
Undecided 14 13.08
Disagree 38 35.51
Strongly Disagree 26 24.30
Total 107 100
Sources: Survey Report, 2015
85
Source: Survey Report, 2015
The result above shows that the calculated value of 20.53 is greater than the p-value of
0.000 at 5% level of significance (i.e. Dcal= 20.53 > p=0.000). Therefore, in consonance
with the decision rule, the null hypothesis (Ho) that Managing claims effectively and
efficiently will not significantly affect operational process in claims management is
rejected (see Table 1 for respondents’ views). The researchers then conclude that
managing claims effectively and efficiently will significantly affect operational process
in claims management. This, therefore, confirms the earlier studies of Ashturkar (2014),
DiNapoli (2013), Dhanushkoti and Coates (2006), and OECD (2004), who noted that
proactive process at claims handling will provide customers with better resolution and
reducing the overall cost of their claims, and thus giving service provider(s) stake in
claims handling, insurer can obtain more commitment and better performance from them.
Capgemini (2011b) concurs that improved claims handling and administration can
effectively streamline and accelerate the claims management lifecycle.
Table 4: Responses to the testing of hypothesis 2 Alternatives Responses Percentage (%)
Strongly Agree 05 04.67
Agree 17 15.89
Undecided 11 10.28
Disagree 43 40.19
Strongly Disagree 31 28.87
Total 107 100
Sources: Survey Report, 2015
Table 2: One-Sample Statistics
107 2.5047 1.26173 .12198
effective and efficient
claims management and
operational process
N Mean Std. Deviation
Std. Error
Mean
Table 3: One-Sample Test
20.534 106 .000 2.50467 2.2628 2.7465
effective and efficient
claims management and
operational process
t df Sig. (2-tailed)
Mean
Difference Lower Upper
95% Confidence
Interval of the
Difference
Test Value = 0
Table 5: One-Sample Statistics
107 2.2710 1.17818 .11390
Promptnes in claims
handling process
and fraud detection
and prevention
N Mean Std. Deviation
Std. Error
Mean
86
Source: Survey Report, 2015
From the table above, the calculated value of 19.93 is greater than the p-value of 0.000 at
5% level of significance (i.e. Dcal= 19.93 > p=0.000). Therefore, in compliance with the
decision rule, the null hypothesis (Ho) that promptness in claims handling process does
not essentially assist in fraud detection and prevention is rejected (see Table 4 for
respondents’ views). The therefore indicates that promptness in claims handling
processes does essentially assist in fraud detection and prevention. Again, this result
supports the view of Accenture (2013), who noted that a thorough assessment of fraud
detection capabilities and the feasibility of an enhanced fraud detection process will help
optimize and improve the enterprise’s return on investment in fighting fraud. Also in
affirmation of the result is the study of Nicola et al. (2006), who noted that knowledge
limitations are likely to preclude the detection of some classes of fraudulent claims such
as financial exaggerations.
6. Conclusion, Recommendations and Future Research
This study has been able to confirm the effectiveness, efficiency and promptness of claims
handling process with the Nigerian insurance industry as a research ground for its
empirical assessment. The findings of the study have proven that effective and efficient
management of claims can further enhance the operational process in insurance business.
Rose (2013) affirms that the way an insurance company manages the claims process is
fundamental to its profit and long-term sustainability. Capgemini (2011a) opined that
highly effective claims practices can be a key contributor to a differentiated customer
experience that strengthens customer loyalty and attract new customers, which is
especially valuable in a market with little or no growth.
On recommendation, claims manager should put forward strategic plans to ensuring that
insurance claims complaint files are properly kept, monitored and handled for needs that
may warrant its usefulness in the future. Secondly, state-of-the-art training mechanism
should be put in place to enhance and improve the working pattern of a claim officer
which invariably might affect the organizational efficiency of insurance companies.
Claims handling procedures should be promptly managed to avoid deficiency in
organization’s operational objectives. More so, regulators and other stakeholders within
the industry should at regular interval intensify effort to ascertaining the claims handling
procedural methods in use by insurance companies in Nigeria; and lastly, Government
should ammonize their resources and technical knowhow with the Nigerian insurance
industry in ensuring that insurance claims are well designed to curtail fraudulent claims
experienced in the past.
This study suggests that future studies should focus efforts at gathering information from
the insuring populace as related to customers’ experience of insurance claims in Nigeria.
Additionally, the various claims handling modes should be understudied to ascertain their
Table 6: One-Sample Test
19.939 106 .000 2.27103 2.0452 2.4968
Promptnes in claims
handling process
and fraud detection
and prevention
t df Sig. (2-tailed)
Mean
Difference Lower Upper
95% Confidence
Interval of the
Difference
Test Value = 0
87
acceptance level among the insurance companies and the use to which they are put.
Research efforts could be drawn at designing insurance claims model for addressing the
lingering perceived customer image related to insurance fraud in Nigeria. Lastly, future
research could also attend to detecting and preventing insurance fraud within the Nigerian
insurance industry.
References
[1] ASHTURKAR, P.B. (2014). Comparative study of effectiveness of claims
settlement operations in Indian life insurance companies. International Journal of
Advance Research in Computer Science and Management Studies, 2(11): 148-155.
[2] ASOKERE, A.S & NWANKWo, S.I. (2010). Essential of insurance: A modern
approach. 1st ed. Lagos: Fevas Publishing.
[3] Association of Insurance and Risk Managers in Industry and Commerce (2009).
Delivery excellence in insurance claims handling: Guide to best practice. London:
AIRMIC.
[4] BROOKS, P.J, POPOW, D.J., & HOOPES, D.L. (2005). Introduction to claims.
Pennsylvania: American Institute for Chartered Property Casualty Underwriters.
[5] Capgemini (2011a). Claims transformation: Enhancing brand value by delivery on
customer commitments, capturing efficiency gains, and optimizing indemnity
expenditures.
[6] CAPGEMINI (2011b). Capturing operational efficiency and sustainable value
through claims. Guidewire. Retrieved from: http://.www.capgemini.com/claims
[7] CRAWFORD (2007). Trends in claims handling: Insurance industry update.
Canada: Crawford & Company Inc.
[8] DERRIG, R.A. (2002). Insurance fraud. Journal of Risk and Insurance, 69(3): 271-
287.
[9] DERRIG, R.A., & Krauss, L. (1994). First steps to fight workers’ compensation
fraud. Journal of Insurance Regulation, 12: 390-415.
[10] DHANUSHKOTI, S. & Coates, P. (2006, April). Insurance claims management –
improving efficiency and effectiveness to reduce cost of claims. AIR Cover Story.
Retrieved from: http://.www.asiainsurancereview.com
[11] DINAPOLI, T.P. (2013). Improving the effectiveness of your claims auditing
process. Office of the New York State comptroller. Retrived from
http://.www.osc.state.ny.us.
[12] ESRI (2012). GIS for the insurance claims process: five steps for an effective
workflow. California: Esri White Paper, April.
[13] FRANCIS, P., & BUTLER, S. (2010). Cutting the cost of insurance claims: taking
control of the process. Booz & Company. Retrived from http://.www.booz.com.
[14] IBM (2011). Three ways to improve claims management with business analytics.
USA: IBM Corporation.
[15] ILONA, B., and EVELINA, S. (2013). Organizational assessment: effectiveness vs.
efficiency. Social Transformations in Contemporary Society, 1: 45-53.
[16] KHAN, M.T., KHAN, N.A., AHMED, S., & ALI, M. (2012). Connotation of
organizational effectiveness and factors affecting it. International Journal of
Business and Behavioural Sciences, 2 (9): 21-29.
[17] KRISHNAN, B. (2010). Claims management and claims settlements in life
insurance. The Journal of Insurance Institute of India, 36 (July-December): 49-57.
88
[18] KURIA, J.T., & MORONGE, M. (2014). Effect of fraud control mechanisms of the
growth of insurance companies in Kenya. International Journal of Innovative Social
& Science Education Research, 2(1): 26-39.
[19] LOW, J. (2000). The value of creation index. Journal of Intellectual Capital, 1(3):
252-262.
[20] MICHAEL, K. (2008). The increasing importance of claim management to
insurers. Claims Vendor Showcase, FINEOS Corporation.
[21] NICOLA, J.M, LINDEN, J.B., & THOMAS, C.O. (2006). How the detection of
insurance fraud succeeds and fails. Psychology, Crime & Law, 12(2): 163-180.
[22] Organization for Economic Co-operation and Development (2004). Guidelines for
good practice for insurance claims management. Retrieved from:
http://www.oecd.org/corporate/ca/corporategovernace principles
[23] PINPRAYONG, B., & SIENGTAI, S. (2012). Restructuring for organizational
efficiency in the banking sector in Thailand: a case study of Siam Commercial
Bank. Far East Journal of Psychology and Business, 8(2): 29-42.
[24] Productivity Commission (2002). Public liability claims management. Canberra:
Research Report.
[25] Productivity Commission (2013). On efficiency and effectiveness: some
definitions. Canberra: Staff Research Note.
[26] ROSE, S. (2013). Predictive claims processing: transforming the insurance claims
life cycle using analytics. SAS White Paper, 1-8.
[27] SCOTT, A., SIMON, B., NICK, H., & KARINA, W. (2008). Assessing multilateral
organization effectiveness: Evaluation Study 2008/3, from Danida’s Evaluation
Department-Development Cooperation, Ministry of Foreign Affairs.
[28] SINGH, V. (2012). Global trends in non-life insurance: claims. Capgemini.
[29] TIBCO (2011). Dynamic claims processing. USA: TIBCO Software Inc.
[30] VAUGHAN, E.J., & VAUGHAN, T.M. (2008). Fundamental of risk and insurance.
USA: John Wiley Sons, Inc.
[31] VIAENE, S., & Dedene, G. (2004). Insurance fraud issues and challenges. The
Geneva Papers on Risk and Insurance, 29(2): 313-333.
[32] YUSUF, T.O. (2010). Brokers and the control of postcontractual opportunism in
the Nigerian Insurance market. Journal of Financial Crime, 17(2): 223-239.
[33] YUSUF, T.O., & Babalola, A.R. (2009). Control of insurance fraud in Nigeria: an
exploratory study (case study). Journal of Financial Crime, 16 (4): 418-435.
[34] YUSUF, T.O., & Dansu, F.S. (2014). Effect of claims cost on insurers’ profitability
in Nigeria. International Journal of Business and Commerce, 3(10): 1-20.
[35] ZHENG, W., YANG, B., & MCLEAN, G. (2010). Linking organizational culture,
structure, strategy, and organizational effectiveness: mediating role of knowledge
management. Journal of Business Rsearch, 63(7): 763-771.
89
The Authors´ Bibliographies
Sunday Stephen AJEMUNIGBOHUN, Department of Insurance, Faculty of
Management Sciences, Lagos State University, Ojo, Lagos, Nigeria.
Email: [email protected], Phone: +234(0)7055342854.
Dorel BADEA, “NicolaeBălcescu” Land Forces Academy, Sibiu, Romania.
Email: [email protected].
Ghiţă BÂRSAN, Prof., Ph.D., “NicolaeBălcescu” Land Forces Academy, Sibiu,
Romania.
E-mail: [email protected].
Tomáš BINAR, Eng., Ph.D., Department of Logistics, Faculty of Military Leadership,
University of Defence, Brno. He deals with the Transport and Handling Technology.
Email: [email protected], Phone: +420 973 443 678.
Vasile CĂRUŢAŞU, “NicolaeBălcescu” Land Forces Academy, Sibiu, Romania.
Email: [email protected].
Harald GELL, Dr. scient. pth. MSc, MSD, MBA, Theresan Military Academy, Bachelor
Programme Military Leadership.
E-mail: [email protected], Phone: +43 664 622 2161.
Dumitru IANCU, “NicolaeBălcescu” Land Forces Academy, Sibiu, Romania
Email: [email protected].
Florin ILIE, “NicolaeBălcescu” Land Forces Academy, Sibiu, Romania.
Email: [email protected].
Vítězslav JAROŠ, Eng., Ph.D., Chief of Group, Department of Tactics, Faculty of
Military Leadership, University of Defence Brno. He deals with issues of the Tactics and
System of Command and Control of units, Military history and Theory of Military
Management.
Email: [email protected], Phone: +420 973 442 660.
Jaroslav KOMÁREK, Prof., Eng., CSc., Karel Englis College Brno. Author lectures
Management and Logistics and deals with System Dynamics and other simulation models
E-mail: [email protected], Phone: +420 737585694.
Csér ORSOLYA, Eng., Logistics Headquarters, Budapest, Hungary.
Email: [email protected].
Harald PÖCHER, Dr. habil., MoD Austria, Director of Audit Division B, Research
fields: Austrian School of Economics, Defence Economics, Armament Industry, Security
and Defence Policy of Japan, Military History of Japan.
Email: [email protected], Phone: +43 50201 10 20220.
90
Stanislav ROLC, Assoc. Prof., Eng., Ph.D., Military Research Institute. He has been
working as a Head of the Section of Material Engineering and he deals with applied
research, development and testing advanced materials and technologies intended for
armour protection of military vehicles.
Email: [email protected], Phone: +420 543 562 132.
Jiří SUKÁČ, Eng., Ph.D., Department of Logistics, Faculty of Military Leadership,
University of Defence, Brno. He deals with the Transport and Handling Technology.
Email: [email protected], Phone: +420 973 443 020.
Andrzej ŚWIDERSKI, dr. hab., Eng., Ph.D., Military University of Technology .in
Warsaw, Faculty of logistic, deputy dean of scientific. He deals with issues of modelling
processes and transport systems, exploitation of means of transport, logistics and quality
management.
Email: [email protected], Phone: +48 261 837 468.
Tajudeen Olalekan YUSUF, Ph.D., Department of Actuarial Science and Insurance,
Faculty of Business Administration, University of Lagos, Nigeria.
Email: [email protected], Phone: +234(0)7042454596.
91
The Reviewers´ Bibliographies
Aleš DVOŘÁK, Eng., Ph.D., Military Research Institute. He has been working as a Head
of Testing Department within the Section of Material Engineering and he deals with
applied research, development and testing advanced materials and technologies intended
for armour protection of military vehicles.
Email: [email protected], Phone: +420 543 562 133.
Petra HORVATHOVÁ, Assoc. Prof., Eng., Ph.D., Department of Management, Faculty
of Economics, VŠB – Technical University of Ostrava.
Email: [email protected], Phone: +420 597 322 442.
Jan KLACEK, Eng., Ph.D., He deals with issues of financial.
Email: [email protected].
Kazimierz KOWALSKI, Assoc. Prof., Eng., Ph.D., Military Academy of Land Forces,
Wroclaw, Poland. He deals with issues of maintainability of weapon systems, in its life
cycle in aspects of military logistical system management and total life cycle costs.
Email: [email protected], Phone: +48 691 662 116.
Robert KUTIL, Eng., Military Technical Institute Prague, branches Military technical
institute of Ground Forces in Vyškov, Special Measurements Test Room. He deals with
the conceptual questions of logistics aspects of the deployment, testing, operation and
storage of land-based military equipment and expenses in the framework of their life
cycle.
Email: [email protected], Phone: +420 774 373 836.
Jaromir MARES, PhD., Assoc. prof. Dipl Eng., Department of Logistics, Faculty of
Military Leadership, University of Defense in Brno. He has extensive experience in
military and civilian logistics. His specialties are operation of military vehicles and
evaluation of its effectiveness, focusing on technical, economic and environmental
aspects. Dealing with simulations of operation of military vehicles and drivers.
Email: [email protected], Phone: +420 973 443101.
Petr MUSIL, Eng., Ph.D., Department of Economy, Faculty of Military Leadership,
University of Defence. He deals with issues of planning, programming and budgeting
financial resources in public sector and application PPBFR in warfare.
Email: [email protected], Phone: +420 973 443 178.
Wojciech NYSZK, Assoc. Prof., Ph.D., Director Logistic, Institute Command and
Management Department, University of National Defence, Warsaw, Poland.
E-mail: [email protected], Phone: + 22 261 814154.
Svatopluk NEČAS, Ing., Ph.D., Department of Finance, Faculty of Economics and
Administration, Masaryk University, Brno. He deals with issues of insurance industry
and reinsurance.
Email: [email protected], Phone: +420 549 49 6214.
92
Jakub ODEHNAL, Eng., Ph.D., Department of Economy, Faculty of Military
Leadership, University of Defence. He deals with issues of military expenditures and
financial ensuring defense.
Email: [email protected], Phone: +420 973 442 197.
Veronika PASTOROVÁ, Eng., Department of Economy, Faculty of Military
Leadership, University of Defence. She deals with examination of military economic
relations and consequences of economic provision of defence, peace and security.
Email: [email protected], Phone: +420 973 288 749.
Ivo PIKNER, Eng., Ph.D., Military Art Department, Faculty of Military Leadership. He
deals with character and tendencies in military affairs and trends and development of
military art. He is also dealing with the problems of use of armed forces in current and
future operations and their impact on conceptual papers development.
Email: [email protected], Phone: +420 973 442 725.
Milan PODHOREC, Dipl. Eng., Ph.D., head of group, Department of Military
Management and Tactics, Faculty of Economics and Management, University of Defence
Brno. He publishes about problems of intelligence activities and reconnaissance offensive
and inoffensive operation, security situation and her influence on army, actual
interrogation development of tactics and military management.
Email: [email protected], Phone: +420 973 442384.
Árpád POHL, Assoc. Prof., PhD., Faculty of Military Science and Officer Training,
National University of Public Service, Budapest. He deals with issues of logistic support
of military operations.
Email: [email protected], Phone: 0036/1 432 9000.
Martin POP, Ing., University of Defence, Faculty of Military Leadership, Department
of Economy. He deals with the issues of World Economy, Economic Policy and
Economic Theory.
Email: [email protected]; Phone: +420 973 443 245.
Oldřich SOCHA, Eng., Doctrine Section, Training Command – Military Academy in
Vyskov.
Email: [email protected], Phone: +420 973 450 906.
Milan SOPÓCI, Prof., Eng., Ph.D., Department of Management, Armed Forces
Academy of General Milan Rastislav Stefanik, Liptovský Mikuláš, Slovakia. He deals
with issues of Management, Leadership and Crisis Management, margine of Air Defence.
Email: [email protected], Phone: +421 908 079 593.
Přemysl ŠTĚPÁNEK, Eng., 71rd mechanized battalion, Hranice. He deals with the
problems of the planning and decision-making process of commanders at the tactical
command and control level.
Email: [email protected], Phone: +420 973 425 202.
93
Eva ŠTĚPÁNKOVÁ, Eng., Ph.D., University of Defence in Brno, Faculty of Military
Leadership, Department of Management. She deals with strategic management, analytical
tools in management, managerial soft skills and environmental management.
Email: [email protected], Phone: +420 973 442 138.
Andrzej ŚWIDERSKI, dr. hab., Eng., Ph.D., Military University of Technology .in
Warsaw, Faculty of logistic, deputy dean of scientific. He deals with issues of modelling
processes and transport systems, exploitation of means of transport, logistics and quality
management.
Email: [email protected], Phone: +48 261 837 468.
Cezar VASILESCU, Dipl. Eng., Ph.D., Senior Lecturer, ROU AF Director, Defense
Resources Management (DRM) Postgraduate School of Studies Regional Department of
Defense Resources Management Studies, Brasov, Romania.
Email: [email protected], Phone: +4 0268 401800.
Economics and Management
Published by: University of Defence
Address: Kounicova Str. 65, 662 10 Brno
Czech Republic
+ 420 973 442 660
http://www.unob.cz/en/Eam/Pages/Eam_en.aspx
Number: 1/2015
Date of publication: 30th September 2015
Executive Editor: Eng. Vítězslav JAROŠ, Ph.D.
Printed by: University Press of University of Defence
Registration numbers: MK ČR E 17538
ISSN 1802-3975
© University of Defence
Univerzita obrany