Putnik, Nenad

Link to this page

Authority KeyName Variants
orcid::0000-0002-6374-7270
  • Putnik, Nenad (24)
  • Putnik, Nenad R. (1)
Projects

Author's Bibliography

The specific features of perpetration of the criminal offence of fraud using information-communication technologies

Milošević, Mladen; Putnik, Nenad

(Ministarstvo unutrašnjih poslova Republike Srbije, Beograd, 2019)

TY  - JOUR
AU  - Milošević, Mladen
AU  - Putnik, Nenad
PY  - 2019
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/423
AB  - Historically speaking, along with the development of ICT, the ways of their misuse developed as well. Whoever may have bad intentions will keep finding new methods to abuse these technologies. These methods are based on vulnerabilities of ICT systems, whether they are technical or related to human factor. This paper describes the phenomena of the so-called social engineering and phishing, as modes of performing the criminal offences of fraud and computer fraud, which are used for illegal collection and abuse of the data of ICT system users, in order to mislead them towards acting in a way that causes harm to their own or someone else's possession, with the intention of illegal gain for the perpetrator. Contemporary phishing attacks are very sophisticated, adapted to the potential victims and adjusted to their affinities. The collecting of information regarding a potential victim is most often done via social networks. Therefore, this paper describes the process of planning acts of fraud and explains two most common techniques for data collecting - via social networks and via the victim's illegal router hijacking. A special emphasis is put on the criminal law treatment of these phenomena in the legislation of the Republic of Serbia, as well as on solving the dilemmas about technical terms in fraudulent acts in Serbian and English languages. The authors present different forms of social engineering and phishing in ICT systems, i.e. cyberspace, and discuss if and in which cases their acts have legal characteristics of the aforementioned criminal offences. The authors also present and analyze Serbian criminal legislation,with the emphasis on the crime of fraud and similar crimes, which are, in their essence, special forms of fraud. The stress is put on the crime of computer fraud and its characteristic features in comparison with the crime of fraud. The authors consider the changes in legislation that would lead to reformulating the crime of computer fraud so as to encompass various acts carried out with the use of the information-communication technologies.
AB  - Posmatrano iz istorijske perspektive, paralelno sa razvojem informaciono-komunikacionih tehnologija (IKT) razvijaju se i načini njihove zloupotrebe. Zlonamerni akteri kontinuirano pronalaze nove metode za zloupotrebu ovih tehnologija koje su zasnovane na ranjivostima IKT sistema, bilo da je reč o tehničkim ili ranjivostima vezanim za ljudski faktor. U radu su opisani fenomeni tzv. socijalnog inženjeringa i fišinga, kao načina izvršenja krivičnih dela prevare i računarske prevare, kojima se nezakonito prikupljaju i koriste podaci korisnika IKT sistema kako bi se oni doveli u zabludu ili održali u njoj i usled toga postupili na štetu sopstvene ili tuđe imovine, uz nameru sticanja protivpravne imovinske koristi od strane učinioca. Savremeni fišing napadi su veoma sofisticirani, prilagođeni potencijalnoj žrtvi i usklađeni sa njenim afinitetima. Prikupljanje informacija o potencijalnoj žrtvi najčešće se sprovodi putem društvenih mreža. Stoga je u radu opisan proces planiranja prevarnih radnji i objašnjene su dve najzastupljenije tehnike prikupljanja podataka - putem društvenih mreža i putem nelegalnog preuzimanja kontrole nad ruterom žrtve. Poseban akcenat je stavljen na krivičnopravni tretman ovih fenomena u zakonodavstvu Republike Srbije kao i na pojmovno razjašnjenje terminoloških nedoumica u vezi sa prevarnim radnjama u srpskom i anglosaksonskom jeziku. Autori predstavljaju heterogene oblike ispoljavanja socijalnog inženjeringa i fišinga u IKT sistemima, tj. sajber prostoru, i razmatraju da li se i u kojim slučajevima njihovim vršenjem ispunjavaju zakonska obeležja pomenutih krivičnih dela.
PB  - Ministarstvo unutrašnjih poslova Republike Srbije, Beograd
T2  - Bezbednost, Beograd
T1  - The specific features of perpetration of the criminal offence of fraud using information-communication technologies
T1  - Specifičnosti izvršenja krivičnog dela prevare uz korišćenje informaciono-komunikacionih tehnologija
VL  - 61
IS  - 2
SP  - 68
EP  - 88
DO  - 10.5937/bezbednost1902068M
ER  - 
@article{
author = "Milošević, Mladen and Putnik, Nenad",
year = "2019",
abstract = "Historically speaking, along with the development of ICT, the ways of their misuse developed as well. Whoever may have bad intentions will keep finding new methods to abuse these technologies. These methods are based on vulnerabilities of ICT systems, whether they are technical or related to human factor. This paper describes the phenomena of the so-called social engineering and phishing, as modes of performing the criminal offences of fraud and computer fraud, which are used for illegal collection and abuse of the data of ICT system users, in order to mislead them towards acting in a way that causes harm to their own or someone else's possession, with the intention of illegal gain for the perpetrator. Contemporary phishing attacks are very sophisticated, adapted to the potential victims and adjusted to their affinities. The collecting of information regarding a potential victim is most often done via social networks. Therefore, this paper describes the process of planning acts of fraud and explains two most common techniques for data collecting - via social networks and via the victim's illegal router hijacking. A special emphasis is put on the criminal law treatment of these phenomena in the legislation of the Republic of Serbia, as well as on solving the dilemmas about technical terms in fraudulent acts in Serbian and English languages. The authors present different forms of social engineering and phishing in ICT systems, i.e. cyberspace, and discuss if and in which cases their acts have legal characteristics of the aforementioned criminal offences. The authors also present and analyze Serbian criminal legislation,with the emphasis on the crime of fraud and similar crimes, which are, in their essence, special forms of fraud. The stress is put on the crime of computer fraud and its characteristic features in comparison with the crime of fraud. The authors consider the changes in legislation that would lead to reformulating the crime of computer fraud so as to encompass various acts carried out with the use of the information-communication technologies., Posmatrano iz istorijske perspektive, paralelno sa razvojem informaciono-komunikacionih tehnologija (IKT) razvijaju se i načini njihove zloupotrebe. Zlonamerni akteri kontinuirano pronalaze nove metode za zloupotrebu ovih tehnologija koje su zasnovane na ranjivostima IKT sistema, bilo da je reč o tehničkim ili ranjivostima vezanim za ljudski faktor. U radu su opisani fenomeni tzv. socijalnog inženjeringa i fišinga, kao načina izvršenja krivičnih dela prevare i računarske prevare, kojima se nezakonito prikupljaju i koriste podaci korisnika IKT sistema kako bi se oni doveli u zabludu ili održali u njoj i usled toga postupili na štetu sopstvene ili tuđe imovine, uz nameru sticanja protivpravne imovinske koristi od strane učinioca. Savremeni fišing napadi su veoma sofisticirani, prilagođeni potencijalnoj žrtvi i usklađeni sa njenim afinitetima. Prikupljanje informacija o potencijalnoj žrtvi najčešće se sprovodi putem društvenih mreža. Stoga je u radu opisan proces planiranja prevarnih radnji i objašnjene su dve najzastupljenije tehnike prikupljanja podataka - putem društvenih mreža i putem nelegalnog preuzimanja kontrole nad ruterom žrtve. Poseban akcenat je stavljen na krivičnopravni tretman ovih fenomena u zakonodavstvu Republike Srbije kao i na pojmovno razjašnjenje terminoloških nedoumica u vezi sa prevarnim radnjama u srpskom i anglosaksonskom jeziku. Autori predstavljaju heterogene oblike ispoljavanja socijalnog inženjeringa i fišinga u IKT sistemima, tj. sajber prostoru, i razmatraju da li se i u kojim slučajevima njihovim vršenjem ispunjavaju zakonska obeležja pomenutih krivičnih dela.",
publisher = "Ministarstvo unutrašnjih poslova Republike Srbije, Beograd",
journal = "Bezbednost, Beograd",
title = "The specific features of perpetration of the criminal offence of fraud using information-communication technologies, Specifičnosti izvršenja krivičnog dela prevare uz korišćenje informaciono-komunikacionih tehnologija",
volume = "61",
number = "2",
pages = "68-88",
doi = "10.5937/bezbednost1902068M"
}
Milošević, M.,& Putnik, N.. (2019). The specific features of perpetration of the criminal offence of fraud using information-communication technologies. in Bezbednost, Beograd
Ministarstvo unutrašnjih poslova Republike Srbije, Beograd., 61(2), 68-88.
https://doi.org/10.5937/bezbednost1902068M
Milošević M, Putnik N. The specific features of perpetration of the criminal offence of fraud using information-communication technologies. in Bezbednost, Beograd. 2019;61(2):68-88.
doi:10.5937/bezbednost1902068M .
Milošević, Mladen, Putnik, Nenad, "The specific features of perpetration of the criminal offence of fraud using information-communication technologies" in Bezbednost, Beograd, 61, no. 2 (2019):68-88,
https://doi.org/10.5937/bezbednost1902068M . .
3

A Historical Overview of the Relation Between Technological Development and the Ability to Manage the Perception During War Conflicts

Putnik, Nenad

(Faculty of Security Studies, Human Research Center, Belgrade, 2018)

TY  - CONF
AU  - Putnik, Nenad
PY  - 2018
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/401
PB  - Faculty of Security Studies, Human Research Center, Belgrade
C3  - The Proceedings of human security and new technologies : 4th International Conference on Human Security
T1  - A Historical Overview of the Relation Between Technological Development and the Ability to Manage the Perception During War Conflicts
SP  - 17
EP  - 24
ER  - 
@conference{
author = "Putnik, Nenad",
year = "2018",
publisher = "Faculty of Security Studies, Human Research Center, Belgrade",
journal = "The Proceedings of human security and new technologies : 4th International Conference on Human Security",
title = "A Historical Overview of the Relation Between Technological Development and the Ability to Manage the Perception During War Conflicts",
pages = "17-24"
}
Putnik, N.. (2018). A Historical Overview of the Relation Between Technological Development and the Ability to Manage the Perception During War Conflicts. in The Proceedings of human security and new technologies : 4th International Conference on Human Security
Faculty of Security Studies, Human Research Center, Belgrade., 17-24.
Putnik N. A Historical Overview of the Relation Between Technological Development and the Ability to Manage the Perception During War Conflicts. in The Proceedings of human security and new technologies : 4th International Conference on Human Security. 2018;:17-24..
Putnik, Nenad, "A Historical Overview of the Relation Between Technological Development and the Ability to Manage the Perception During War Conflicts" in The Proceedings of human security and new technologies : 4th International Conference on Human Security (2018):17-24.

Trends in Peace Research - Can Cyber Détente Lead to Lasting Peace?

Putnik, Nenad; Milošević, Mladen

(IGI Global, Hershey, 2018)

TY  - CONF
AU  - Putnik, Nenad
AU  - Milošević, Mladen
PY  - 2018
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/400
PB  - IGI Global, Hershey
C3  - Handbook of Research on Examining Global Peacemaking in the Digital Age
T1  - Trends in Peace Research - Can Cyber Détente Lead to Lasting Peace?
SP  - 1
EP  - 19
ER  - 
@conference{
author = "Putnik, Nenad and Milošević, Mladen",
year = "2018",
publisher = "IGI Global, Hershey",
journal = "Handbook of Research on Examining Global Peacemaking in the Digital Age",
title = "Trends in Peace Research - Can Cyber Détente Lead to Lasting Peace?",
pages = "1-19"
}
Putnik, N.,& Milošević, M.. (2018). Trends in Peace Research - Can Cyber Détente Lead to Lasting Peace?. in Handbook of Research on Examining Global Peacemaking in the Digital Age
IGI Global, Hershey., 1-19.
Putnik N, Milošević M. Trends in Peace Research - Can Cyber Détente Lead to Lasting Peace?. in Handbook of Research on Examining Global Peacemaking in the Digital Age. 2018;:1-19..
Putnik, Nenad, Milošević, Mladen, "Trends in Peace Research - Can Cyber Détente Lead to Lasting Peace?" in Handbook of Research on Examining Global Peacemaking in the Digital Age (2018):1-19.

Monitoring društvenih mreža kao oblik nadzora u obrazovno-vaspitnim ustanovama

Dimitrijević, Ivan; Putnik, Nenad; Kučeković, Zoran

(Fakultet bezbednosti, Beograd, 2018)

TY  - CHAP
AU  - Dimitrijević, Ivan
AU  - Putnik, Nenad
AU  - Kučeković, Zoran
PY  - 2018
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/389
PB  - Fakultet bezbednosti, Beograd
T2  - Bezbednost u obrazovno-vaspitnim ustanovama i video-nadzor
T1  - Monitoring društvenih mreža kao oblik nadzora u obrazovno-vaspitnim ustanovama
SP  - 128
EP  - 144
ER  - 
@inbook{
author = "Dimitrijević, Ivan and Putnik, Nenad and Kučeković, Zoran",
year = "2018",
publisher = "Fakultet bezbednosti, Beograd",
journal = "Bezbednost u obrazovno-vaspitnim ustanovama i video-nadzor",
booktitle = "Monitoring društvenih mreža kao oblik nadzora u obrazovno-vaspitnim ustanovama",
pages = "128-144"
}
Dimitrijević, I., Putnik, N.,& Kučeković, Z.. (2018). Monitoring društvenih mreža kao oblik nadzora u obrazovno-vaspitnim ustanovama. in Bezbednost u obrazovno-vaspitnim ustanovama i video-nadzor
Fakultet bezbednosti, Beograd., 128-144.
Dimitrijević I, Putnik N, Kučeković Z. Monitoring društvenih mreža kao oblik nadzora u obrazovno-vaspitnim ustanovama. in Bezbednost u obrazovno-vaspitnim ustanovama i video-nadzor. 2018;:128-144..
Dimitrijević, Ivan, Putnik, Nenad, Kučeković, Zoran, "Monitoring društvenih mreža kao oblik nadzora u obrazovno-vaspitnim ustanovama" in Bezbednost u obrazovno-vaspitnim ustanovama i video-nadzor (2018):128-144.

Trends in peace research: Can cyber détente lead to lasting peace?

Putnik, Nenad; Milošević, Mladen

(IGI Global, 2018)

TY  - CHAP
AU  - Putnik, Nenad
AU  - Milošević, Mladen
PY  - 2018
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/386
AB  - In this chapter, the authors discuss the phenomenon of interstate conflicts in cyber space. In the last twenty years, this issue has become more explicit, and countries are making increasingly frequent mutual cyber warfare and cyber espionage accusations. The political and military elite of conflicting countries perceive the situation as very serious and are preparing not only for defending their segment of cyber space, but for developing offensive strategies for cyber warfare, as well. The authors endeavor to contribute to peace research by examining the possibilities for achieving cyber détente, the idea promoted by Henry Kissinger in 2011. In this chapter, the authors identify and analyze problems whose solution should be the focus of the States Parties to cyber détente: the question of denotation and potential desecuritization of technical terms, the question of identification and classification of cyber threats and the problem of the legal framework for their opposition. In addition, the authors give guidelines for their solution, based on securitization theory.
PB  - IGI Global
T2  - Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
T1  - Trends in peace research: Can cyber détente lead to lasting peace?
SP  - 1694
EP  - 1711
DO  - 10.4018/978-1-5225-5634-3.ch082
ER  - 
@inbook{
author = "Putnik, Nenad and Milošević, Mladen",
year = "2018",
abstract = "In this chapter, the authors discuss the phenomenon of interstate conflicts in cyber space. In the last twenty years, this issue has become more explicit, and countries are making increasingly frequent mutual cyber warfare and cyber espionage accusations. The political and military elite of conflicting countries perceive the situation as very serious and are preparing not only for defending their segment of cyber space, but for developing offensive strategies for cyber warfare, as well. The authors endeavor to contribute to peace research by examining the possibilities for achieving cyber détente, the idea promoted by Henry Kissinger in 2011. In this chapter, the authors identify and analyze problems whose solution should be the focus of the States Parties to cyber détente: the question of denotation and potential desecuritization of technical terms, the question of identification and classification of cyber threats and the problem of the legal framework for their opposition. In addition, the authors give guidelines for their solution, based on securitization theory.",
publisher = "IGI Global",
journal = "Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications",
booktitle = "Trends in peace research: Can cyber détente lead to lasting peace?",
pages = "1694-1711",
doi = "10.4018/978-1-5225-5634-3.ch082"
}
Putnik, N.,& Milošević, M.. (2018). Trends in peace research: Can cyber détente lead to lasting peace?. in Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
IGI Global., 1694-1711.
https://doi.org/10.4018/978-1-5225-5634-3.ch082
Putnik N, Milošević M. Trends in peace research: Can cyber détente lead to lasting peace?. in Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications. 2018;:1694-1711.
doi:10.4018/978-1-5225-5634-3.ch082 .
Putnik, Nenad, Milošević, Mladen, "Trends in peace research: Can cyber détente lead to lasting peace?" in Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (2018):1694-1711,
https://doi.org/10.4018/978-1-5225-5634-3.ch082 . .

Strategic planning of cyber defense: Towards more adequate legal framework and new concept of risk, challenge and threat assessment

Putnik, Nenad; Milošević, Mladen; Bošković, Milica

(Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd, 2017)

TY  - JOUR
AU  - Putnik, Nenad
AU  - Milošević, Mladen
AU  - Bošković, Milica
PY  - 2017
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/358
AB  - The assessment of security risks, challenges and threats is the first step in developing strategic documents in the field of security and defense. The Republic of Serbia does not still have a defined cyber defense strategy and the adequate legal framework for its planning and implementation. When developing strategic and normative documents, it is important to take into account the specifics of cyber space and cyber weapons. The principles and legality that are applied in the physical world are generally different from those in the cyber world. This second, virtual world, is characterized by insecurity and coincidence as the important features. This results in difficulties related to the inability to reach an adequate level of certainty necessary for making strategic decisions in terms of behavior predictability and functioning of the entities in cyberspace including cyber weapons. The paper describes eight principles of cyber warfare, which were established in 2001 by Parks and Duggan. In addition, taking into account the results of research conducted by relevant authors on the importance of the exponential law for the analysis, approximation and prediction of events in the virtual world, we felt it was justified to promote this law in a separate, ninth cyber warfare principle. The guidelines for the development of strategic documents are also important when defining the adequate legal framework, which should take into account the specifics of cyber world and cyber weapons in order to enable efficient and economical implementation of strategic objectives in this area. This paper presents a proposal for the redefinition of certain legal solutions and points to the ambiguity, incompleteness, inaccuracy and contradiction of certain provisions of positive legislation, indicating the possibilities of de lege ferenda.
AB  - Procena bezbednosnih rizika, izazova i pretnji je prvi korak u izradi strategijskih dokumenata na polju bezbednosti i odbrane. Republika Srbija još uvek nema definisanu strategiju sajber odbrane niti adekvatan pravni okvir za njeno planiranje i implementaciju. Prilikom izrade strateških i normativnih dokumenta važno je uzeti u obzir specifičnosti sajber prostora i sajber oružja. Principi i zakonitosti koji važe u fizičkom svetu se uglavnom razlikuju od onih koji važe u sajber svetu. Ovaj drugi, virtuelni svet, kao bitna obeležja karakterišu nesigurnost i slučajnost. Ovo za posledicu ima teškoće koje se odnose na nemogućnost dostizanja adekvatnog stepena izvesnosti neophodnog za donošenje strategijskih odluka, u smislu predvidljivosti ponašanja i delovanja entiteta u sajber prostoru, uključujući i sajber oružje. U radu smo opisali osam principa sajber ratovanja, koje su još 2001. utvrdili Parks i Dagen. Osim toga, uvažavajući rezultate istraživanja relevantnih autora o značaju eksponencijalnog zakona za analizu, aproksimaciju i predikciju događaja u virtuelnom svetu, smatrali smo opravdanom ideju da se ovaj zakon promoviše u zasebni, deveti, princip sajber ratovanja. Smernice za izradu strateških dokumenata važne su i prilikom definisanja adekvatnog pravnog okvira, koji bi trebalo da uvaži specifičnosti sajber sveta i sajber oružja kako bi omogućio efikasnu i ekonomičnu implementaciju strateških ciljeva u ovoj oblasti. Autori daju predloge za redefinisanje određenih zakonskih rešenja i ukazuju na nejasnost, nepotpunost, nepreciznost i protivrečnost pojedinih odredaba pozitivno pravnih propisa, ukazujući i na mogućnosti de lege ferenda. .
PB  - Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd
T2  - Vojno delo
T1  - Strategic planning of cyber defense: Towards more adequate legal framework and new concept of risk, challenge and threat assessment
T1  - Strateško planiranje sajber odbrane - ka adekvatnijem pravnom okviru i novoj koncepciji procene rizika, izazova i pretnji
VL  - 69
IS  - 7
SP  - 174
EP  - 185
DO  - 10.5937/vojdelo1707174P
ER  - 
@article{
author = "Putnik, Nenad and Milošević, Mladen and Bošković, Milica",
year = "2017",
abstract = "The assessment of security risks, challenges and threats is the first step in developing strategic documents in the field of security and defense. The Republic of Serbia does not still have a defined cyber defense strategy and the adequate legal framework for its planning and implementation. When developing strategic and normative documents, it is important to take into account the specifics of cyber space and cyber weapons. The principles and legality that are applied in the physical world are generally different from those in the cyber world. This second, virtual world, is characterized by insecurity and coincidence as the important features. This results in difficulties related to the inability to reach an adequate level of certainty necessary for making strategic decisions in terms of behavior predictability and functioning of the entities in cyberspace including cyber weapons. The paper describes eight principles of cyber warfare, which were established in 2001 by Parks and Duggan. In addition, taking into account the results of research conducted by relevant authors on the importance of the exponential law for the analysis, approximation and prediction of events in the virtual world, we felt it was justified to promote this law in a separate, ninth cyber warfare principle. The guidelines for the development of strategic documents are also important when defining the adequate legal framework, which should take into account the specifics of cyber world and cyber weapons in order to enable efficient and economical implementation of strategic objectives in this area. This paper presents a proposal for the redefinition of certain legal solutions and points to the ambiguity, incompleteness, inaccuracy and contradiction of certain provisions of positive legislation, indicating the possibilities of de lege ferenda., Procena bezbednosnih rizika, izazova i pretnji je prvi korak u izradi strategijskih dokumenata na polju bezbednosti i odbrane. Republika Srbija još uvek nema definisanu strategiju sajber odbrane niti adekvatan pravni okvir za njeno planiranje i implementaciju. Prilikom izrade strateških i normativnih dokumenta važno je uzeti u obzir specifičnosti sajber prostora i sajber oružja. Principi i zakonitosti koji važe u fizičkom svetu se uglavnom razlikuju od onih koji važe u sajber svetu. Ovaj drugi, virtuelni svet, kao bitna obeležja karakterišu nesigurnost i slučajnost. Ovo za posledicu ima teškoće koje se odnose na nemogućnost dostizanja adekvatnog stepena izvesnosti neophodnog za donošenje strategijskih odluka, u smislu predvidljivosti ponašanja i delovanja entiteta u sajber prostoru, uključujući i sajber oružje. U radu smo opisali osam principa sajber ratovanja, koje su još 2001. utvrdili Parks i Dagen. Osim toga, uvažavajući rezultate istraživanja relevantnih autora o značaju eksponencijalnog zakona za analizu, aproksimaciju i predikciju događaja u virtuelnom svetu, smatrali smo opravdanom ideju da se ovaj zakon promoviše u zasebni, deveti, princip sajber ratovanja. Smernice za izradu strateških dokumenata važne su i prilikom definisanja adekvatnog pravnog okvira, koji bi trebalo da uvaži specifičnosti sajber sveta i sajber oružja kako bi omogućio efikasnu i ekonomičnu implementaciju strateških ciljeva u ovoj oblasti. Autori daju predloge za redefinisanje određenih zakonskih rešenja i ukazuju na nejasnost, nepotpunost, nepreciznost i protivrečnost pojedinih odredaba pozitivno pravnih propisa, ukazujući i na mogućnosti de lege ferenda. .",
publisher = "Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd",
journal = "Vojno delo",
title = "Strategic planning of cyber defense: Towards more adequate legal framework and new concept of risk, challenge and threat assessment, Strateško planiranje sajber odbrane - ka adekvatnijem pravnom okviru i novoj koncepciji procene rizika, izazova i pretnji",
volume = "69",
number = "7",
pages = "174-185",
doi = "10.5937/vojdelo1707174P"
}
Putnik, N., Milošević, M.,& Bošković, M.. (2017). Strategic planning of cyber defense: Towards more adequate legal framework and new concept of risk, challenge and threat assessment. in Vojno delo
Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd., 69(7), 174-185.
https://doi.org/10.5937/vojdelo1707174P
Putnik N, Milošević M, Bošković M. Strategic planning of cyber defense: Towards more adequate legal framework and new concept of risk, challenge and threat assessment. in Vojno delo. 2017;69(7):174-185.
doi:10.5937/vojdelo1707174P .
Putnik, Nenad, Milošević, Mladen, Bošković, Milica, "Strategic planning of cyber defense: Towards more adequate legal framework and new concept of risk, challenge and threat assessment" in Vojno delo, 69, no. 7 (2017):174-185,
https://doi.org/10.5937/vojdelo1707174P . .
4

Zaštita podataka i socijalni inženjering - pravni, organizacioni i bezbednosni aspekti

Mandić, Goran; Putnik, Nenad; Milošević, Mladen

(Univerzitet u Beogradu, Fakultet bezbednosti, Beograd, 2017)

TY  - BOOK
AU  - Mandić, Goran
AU  - Putnik, Nenad
AU  - Milošević, Mladen
PY  - 2017
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/357
PB  - Univerzitet u Beogradu, Fakultet bezbednosti, Beograd
T1  - Zaštita podataka i socijalni inženjering - pravni, organizacioni i bezbednosni aspekti
ER  - 
@book{
author = "Mandić, Goran and Putnik, Nenad and Milošević, Mladen",
year = "2017",
publisher = "Univerzitet u Beogradu, Fakultet bezbednosti, Beograd",
title = "Zaštita podataka i socijalni inženjering - pravni, organizacioni i bezbednosni aspekti"
}
Mandić, G., Putnik, N.,& Milošević, M.. (2017). Zaštita podataka i socijalni inženjering - pravni, organizacioni i bezbednosni aspekti. 
Univerzitet u Beogradu, Fakultet bezbednosti, Beograd..
Mandić G, Putnik N, Milošević M. Zaštita podataka i socijalni inženjering - pravni, organizacioni i bezbednosni aspekti. 2017;..
Mandić, Goran, Putnik, Nenad, Milošević, Mladen, "Zaštita podataka i socijalni inženjering - pravni, organizacioni i bezbednosni aspekti" (2017).

Sajber bezbednost i zaštita od visokotehnološkog kriminala u Republici Srbiji - strateški i pravni okvir

Milošević, Mladen; Putnik, Nenad

(2017)

TY  - JOUR
AU  - Milošević, Mladen
AU  - Putnik, Nenad
PY  - 2017
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/355
T2  - Kultura polisa
T1  - Sajber bezbednost i zaštita od visokotehnološkog kriminala u Republici Srbiji - strateški i pravni okvir
VL  - 14
IS  - 33
SP  - 177
EP  - 191
ER  - 
@article{
author = "Milošević, Mladen and Putnik, Nenad",
year = "2017",
journal = "Kultura polisa",
title = "Sajber bezbednost i zaštita od visokotehnološkog kriminala u Republici Srbiji - strateški i pravni okvir",
volume = "14",
number = "33",
pages = "177-191"
}
Milošević, M.,& Putnik, N.. (2017). Sajber bezbednost i zaštita od visokotehnološkog kriminala u Republici Srbiji - strateški i pravni okvir. in Kultura polisa, 14(33), 177-191.
Milošević M, Putnik N. Sajber bezbednost i zaštita od visokotehnološkog kriminala u Republici Srbiji - strateški i pravni okvir. in Kultura polisa. 2017;14(33):177-191..
Milošević, Mladen, Putnik, Nenad, "Sajber bezbednost i zaštita od visokotehnološkog kriminala u Republici Srbiji - strateški i pravni okvir" in Kultura polisa, 14, no. 33 (2017):177-191.

Contemporary deception techniques: Social engineering – semantic, phenomenological and security aspects

Mandić, Goran; Putnik, Nenad; Milošević, Mladen

(Nova Science Publishers, Inc., 2017)

TY  - CHAP
AU  - Mandić, Goran
AU  - Putnik, Nenad
AU  - Milošević, Mladen
PY  - 2017
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/345
AB  - The purpose of this paper is to establish a terminological framework in order to explain social engineering and analyze it from phenomenological and security aspect. From phenomenological point of view, the paper explains the phenomenon of social engineering as a contemporary, specific and sophisticated manner of manipulating people. Social engineering is characterized by attacker’s innovative method of selecting and approaching the victim and, when needed, an unlimited number of attack cycles, depending on the goal set by the attacker. Attacks are based on the use of various tools and techniques. From the aspect of security, social engineering holds a very important place in planning and executing cyber-attacks. This paper analyzes perpetrators’ criminogenic and motivational factors from the criminological point of view. Motive and profile of perpetrators cannot always be established due to spatial and temporal limitations, as well as architectural and environmental characteristics of the information and communication system, which is the final target of the attacks. Regardless of the fact that it is present in each phase of a cyber-attack, social engineering is always the foundation of the first phase, in which the attacker learns in details the information which will facilitate access to the information and communication system he plans to attack. In this initial and crucial phase, preconditions for successful continuation and termination of the cyber-attack are realized. At the end of the paper, there is a detailed classification of threat subjects based on motives that moves them and the goal that is supposed to be achieved. In the scientific and professional thematization, this has not been done yet.
PB  - Nova Science Publishers, Inc.
T2  - Security Risks: Assessment, Management and Current Challenges
T1  - Contemporary deception techniques: Social engineering – semantic, phenomenological and security aspects
SP  - 111
EP  - 128
ER  - 
@inbook{
author = "Mandić, Goran and Putnik, Nenad and Milošević, Mladen",
year = "2017",
abstract = "The purpose of this paper is to establish a terminological framework in order to explain social engineering and analyze it from phenomenological and security aspect. From phenomenological point of view, the paper explains the phenomenon of social engineering as a contemporary, specific and sophisticated manner of manipulating people. Social engineering is characterized by attacker’s innovative method of selecting and approaching the victim and, when needed, an unlimited number of attack cycles, depending on the goal set by the attacker. Attacks are based on the use of various tools and techniques. From the aspect of security, social engineering holds a very important place in planning and executing cyber-attacks. This paper analyzes perpetrators’ criminogenic and motivational factors from the criminological point of view. Motive and profile of perpetrators cannot always be established due to spatial and temporal limitations, as well as architectural and environmental characteristics of the information and communication system, which is the final target of the attacks. Regardless of the fact that it is present in each phase of a cyber-attack, social engineering is always the foundation of the first phase, in which the attacker learns in details the information which will facilitate access to the information and communication system he plans to attack. In this initial and crucial phase, preconditions for successful continuation and termination of the cyber-attack are realized. At the end of the paper, there is a detailed classification of threat subjects based on motives that moves them and the goal that is supposed to be achieved. In the scientific and professional thematization, this has not been done yet.",
publisher = "Nova Science Publishers, Inc.",
journal = "Security Risks: Assessment, Management and Current Challenges",
booktitle = "Contemporary deception techniques: Social engineering – semantic, phenomenological and security aspects",
pages = "111-128"
}
Mandić, G., Putnik, N.,& Milošević, M.. (2017). Contemporary deception techniques: Social engineering – semantic, phenomenological and security aspects. in Security Risks: Assessment, Management and Current Challenges
Nova Science Publishers, Inc.., 111-128.
Mandić G, Putnik N, Milošević M. Contemporary deception techniques: Social engineering – semantic, phenomenological and security aspects. in Security Risks: Assessment, Management and Current Challenges. 2017;:111-128..
Mandić, Goran, Putnik, Nenad, Milošević, Mladen, "Contemporary deception techniques: Social engineering – semantic, phenomenological and security aspects" in Security Risks: Assessment, Management and Current Challenges (2017):111-128.

New challenges and revision of the human security concept

Bošković, Milica; Putnik, Nenad; Dragišić, Zoran

(Nova Science Publishers, Inc., 2017)

TY  - CHAP
AU  - Bošković, Milica
AU  - Putnik, Nenad
AU  - Dragišić, Zoran
PY  - 2017
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/342
AB  - After the fall of the Berlin Wall and ending the division of the world into two big military blocs, security doctrines slowly began to change. In the 1990s, a new concept gained momentum, and that was the concept of human security. This concept views national security through the state of economy, social and financial satisfaction of its citizens and overall level of political freedoms and culture. Military and police power do not have primacy any more when it comes to implementation of human security concept. As some authors highlight, human security can even be measured through number of future years spent outside a state of generalized poverty (King & Murray, 2001). A traditional perspective on security is focused on military and police power which ensure territorial integrity. Human security, on the other hand, pays attention to the environmental quality, for example, as an important factor of economic and social development of the society, as well as to susceptibility of a community to natural disasters, political instabilities and similar. Certain countries define human security as safety from violent and non-violent threats. However, during the past few years, as well as in 2015 and 2016, the world has been facing numerous instabilities and big challenges such as human migrations from war-torn or poverty-stricken countries – so-called third world countries. Millions of refugees reach European countries and the USA via several sea and land routes. Western countries and their citizens are faced with serious challenges that exceed the concept and measures of human security. A large influx of migrants, even when their need to look for a better life is taken into consideration, poses the danger of different traditional and cultural influences, social norms, as well as of criminogenic behavior. Experts predict that the number of migrants in the years to come will increase, and that fact leads to the following question: Can the concept of human security solve this challenge or is it necessary to establish new security strategies? Should concepts of military and police power as a pillar of the state return to the mainstream to a certain extent or completely?
PB  - Nova Science Publishers, Inc.
T2  - Security Risks: Assessment, Management and Current Challenges
T1  - New challenges and revision of the human security concept
SP  - 3
EP  - 14
ER  - 
@inbook{
author = "Bošković, Milica and Putnik, Nenad and Dragišić, Zoran",
year = "2017",
abstract = "After the fall of the Berlin Wall and ending the division of the world into two big military blocs, security doctrines slowly began to change. In the 1990s, a new concept gained momentum, and that was the concept of human security. This concept views national security through the state of economy, social and financial satisfaction of its citizens and overall level of political freedoms and culture. Military and police power do not have primacy any more when it comes to implementation of human security concept. As some authors highlight, human security can even be measured through number of future years spent outside a state of generalized poverty (King & Murray, 2001). A traditional perspective on security is focused on military and police power which ensure territorial integrity. Human security, on the other hand, pays attention to the environmental quality, for example, as an important factor of economic and social development of the society, as well as to susceptibility of a community to natural disasters, political instabilities and similar. Certain countries define human security as safety from violent and non-violent threats. However, during the past few years, as well as in 2015 and 2016, the world has been facing numerous instabilities and big challenges such as human migrations from war-torn or poverty-stricken countries – so-called third world countries. Millions of refugees reach European countries and the USA via several sea and land routes. Western countries and their citizens are faced with serious challenges that exceed the concept and measures of human security. A large influx of migrants, even when their need to look for a better life is taken into consideration, poses the danger of different traditional and cultural influences, social norms, as well as of criminogenic behavior. Experts predict that the number of migrants in the years to come will increase, and that fact leads to the following question: Can the concept of human security solve this challenge or is it necessary to establish new security strategies? Should concepts of military and police power as a pillar of the state return to the mainstream to a certain extent or completely?",
publisher = "Nova Science Publishers, Inc.",
journal = "Security Risks: Assessment, Management and Current Challenges",
booktitle = "New challenges and revision of the human security concept",
pages = "3-14"
}
Bošković, M., Putnik, N.,& Dragišić, Z.. (2017). New challenges and revision of the human security concept. in Security Risks: Assessment, Management and Current Challenges
Nova Science Publishers, Inc.., 3-14.
Bošković M, Putnik N, Dragišić Z. New challenges and revision of the human security concept. in Security Risks: Assessment, Management and Current Challenges. 2017;:3-14..
Bošković, Milica, Putnik, Nenad, Dragišić, Zoran, "New challenges and revision of the human security concept" in Security Risks: Assessment, Management and Current Challenges (2017):3-14.
1

Activities of modern intelligence services in cyberspace

Miljković, Milan; Putnik, Nenad

(Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd, 2016)

TY  - JOUR
AU  - Miljković, Milan
AU  - Putnik, Nenad
PY  - 2016
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/319
AB  - Espionage between countries dates back hundreds of years. Since the Internet was released for commercial use, developed countries started to exploit the advantages of computers and the Internet in espionage. Intelligence activity seeks to exploit all advantages and disadvantages of the mass use of information and communications technology (ICT) for purposes of intelligence activities. There is no serious intelligence service in the world which is not interested in this way of intelligence research, primarily because of the cost-effectiveness of such activity in comparison to other ways of collecting classified information. Nowadays, great powers are accusing each other of cyber espionage, the core issues being when one was spying on the other and who hired whom for that purpose. Cyberspace, by its nature, denies answers to these questions; in cyberspace it is very difficult to discover the identity of any malicious actor, as well as to prove the performance and ordering of such illegal operations. That is why the activities of the intelligence services in cyberspace will be ever more present, which will likely lead to changes in the way of intelligence gathering.
AB  - Špijunaža između država je stara stotinama godina. Od puštanja interneta u komercijalnu upotrebu razvijene zemlje počinju da koriste prednosti računara i interneta u toj aktivnosti. Obaveštajna delatnost teži da iskoristi sve prednosti i mane masovne upotrebe informaciono-komunikacione tehnologije (IKT) za obavljanje obaveštajnih aktivnosti. Nema ozbiljne obaveštajne službe u svetu koja nije zainteresovana za ovaj način obaveštajnog istraživanja, pogotovo zbog ekonomičnosti ovakve aktivnosti u odnosu na druge načine prikupljanja poverljivih podataka. U aktuelnoj navali međusobnog optuživanja velikih država za kiber špijunažu nema nevinih. Suštinska pitanja su kada je neko nekoga špijunirao, i ko je koga unajmio u te svrhe. Kiber prostor se, po svojoj prirodi, protivi pronalaženju odgovora na ova pitanja - u njemu je veoma teško otkriti identitet zlonamernog aktera, kao i dokazati sprovođenje i naručivanje takvih nelegalnih operacija. Zbog toga će i aktivnosti obaveštajnih službi u kiber prostoru biti sve izraženije, što će, po svoj prilici, voditi ka promenama u načinu prikupljanja obaveštajnih podataka.
PB  - Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd
T2  - Vojno delo
T1  - Activities of modern intelligence services in cyberspace
T1  - Aktivnosti savremenih obaveštajnih službi u kiber prostoru
VL  - 68
IS  - 7
SP  - 164
EP  - 180
ER  - 
@article{
author = "Miljković, Milan and Putnik, Nenad",
year = "2016",
abstract = "Espionage between countries dates back hundreds of years. Since the Internet was released for commercial use, developed countries started to exploit the advantages of computers and the Internet in espionage. Intelligence activity seeks to exploit all advantages and disadvantages of the mass use of information and communications technology (ICT) for purposes of intelligence activities. There is no serious intelligence service in the world which is not interested in this way of intelligence research, primarily because of the cost-effectiveness of such activity in comparison to other ways of collecting classified information. Nowadays, great powers are accusing each other of cyber espionage, the core issues being when one was spying on the other and who hired whom for that purpose. Cyberspace, by its nature, denies answers to these questions; in cyberspace it is very difficult to discover the identity of any malicious actor, as well as to prove the performance and ordering of such illegal operations. That is why the activities of the intelligence services in cyberspace will be ever more present, which will likely lead to changes in the way of intelligence gathering., Špijunaža između država je stara stotinama godina. Od puštanja interneta u komercijalnu upotrebu razvijene zemlje počinju da koriste prednosti računara i interneta u toj aktivnosti. Obaveštajna delatnost teži da iskoristi sve prednosti i mane masovne upotrebe informaciono-komunikacione tehnologije (IKT) za obavljanje obaveštajnih aktivnosti. Nema ozbiljne obaveštajne službe u svetu koja nije zainteresovana za ovaj način obaveštajnog istraživanja, pogotovo zbog ekonomičnosti ovakve aktivnosti u odnosu na druge načine prikupljanja poverljivih podataka. U aktuelnoj navali međusobnog optuživanja velikih država za kiber špijunažu nema nevinih. Suštinska pitanja su kada je neko nekoga špijunirao, i ko je koga unajmio u te svrhe. Kiber prostor se, po svojoj prirodi, protivi pronalaženju odgovora na ova pitanja - u njemu je veoma teško otkriti identitet zlonamernog aktera, kao i dokazati sprovođenje i naručivanje takvih nelegalnih operacija. Zbog toga će i aktivnosti obaveštajnih službi u kiber prostoru biti sve izraženije, što će, po svoj prilici, voditi ka promenama u načinu prikupljanja obaveštajnih podataka.",
publisher = "Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd",
journal = "Vojno delo",
title = "Activities of modern intelligence services in cyberspace, Aktivnosti savremenih obaveštajnih službi u kiber prostoru",
volume = "68",
number = "7",
pages = "164-180"
}
Miljković, M.,& Putnik, N.. (2016). Activities of modern intelligence services in cyberspace. in Vojno delo
Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd., 68(7), 164-180.
Miljković M, Putnik N. Activities of modern intelligence services in cyberspace. in Vojno delo. 2016;68(7):164-180..
Miljković, Milan, Putnik, Nenad, "Activities of modern intelligence services in cyberspace" in Vojno delo, 68, no. 7 (2016):164-180.

The Impact of Media on Students' Perception of the Security Risks Associated With Internet Social Networking - A Case Study

Putnik, Nenad; Bošković, Milica

(Fac Teacher Education, Zagreb, 2015)

TY  - JOUR
AU  - Putnik, Nenad
AU  - Bošković, Milica
PY  - 2015
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/302
AB  - From the viewpoint of cybercrime, young people represent a particularly vulnerable category of Internet users: children, adolescents and students. Young people are, undoubtedly, the most common and the most gullible users of social networks. Due to lack of education related to dangers they are exposed to on social networks, inexperienced users recklessly post information and multimedia contents on their profiles which can be misused by differently motivated Internet users. Apart from being exposed to the risk from the violation of personal privacy and misuse of personal data, young people are exposed to the risk from political or ideological manipulation. Various studies on social networks and secondary school students have been conducted in the Republic of Serbia. However, no study in this field which would look at university students has yet been conducted. The purpose of this study was to discover the extent to which students use social networking sites, but also the sources and ways students perceive online security risks associated with social networking. Study results show that the media has a dominant role in educating young people on the risks associated with social networking and that the impact of the media is greater than the impact of other educational factors such as family, school or university.
PB  - Fac Teacher Education, Zagreb
T2  - Croatian Journal of Education-Hrvatski casopis za odgoj i obrazovanje
T1  - The Impact of Media on Students' Perception of the Security Risks Associated With Internet Social Networking - A Case Study
VL  - 17
IS  - 2
SP  - 569
EP  - 595
DO  - 10.15516/cje.v17i2.555
ER  - 
@article{
author = "Putnik, Nenad and Bošković, Milica",
year = "2015",
abstract = "From the viewpoint of cybercrime, young people represent a particularly vulnerable category of Internet users: children, adolescents and students. Young people are, undoubtedly, the most common and the most gullible users of social networks. Due to lack of education related to dangers they are exposed to on social networks, inexperienced users recklessly post information and multimedia contents on their profiles which can be misused by differently motivated Internet users. Apart from being exposed to the risk from the violation of personal privacy and misuse of personal data, young people are exposed to the risk from political or ideological manipulation. Various studies on social networks and secondary school students have been conducted in the Republic of Serbia. However, no study in this field which would look at university students has yet been conducted. The purpose of this study was to discover the extent to which students use social networking sites, but also the sources and ways students perceive online security risks associated with social networking. Study results show that the media has a dominant role in educating young people on the risks associated with social networking and that the impact of the media is greater than the impact of other educational factors such as family, school or university.",
publisher = "Fac Teacher Education, Zagreb",
journal = "Croatian Journal of Education-Hrvatski casopis za odgoj i obrazovanje",
title = "The Impact of Media on Students' Perception of the Security Risks Associated With Internet Social Networking - A Case Study",
volume = "17",
number = "2",
pages = "569-595",
doi = "10.15516/cje.v17i2.555"
}
Putnik, N.,& Bošković, M.. (2015). The Impact of Media on Students' Perception of the Security Risks Associated With Internet Social Networking - A Case Study. in Croatian Journal of Education-Hrvatski casopis za odgoj i obrazovanje
Fac Teacher Education, Zagreb., 17(2), 569-595.
https://doi.org/10.15516/cje.v17i2.555
Putnik N, Bošković M. The Impact of Media on Students' Perception of the Security Risks Associated With Internet Social Networking - A Case Study. in Croatian Journal of Education-Hrvatski casopis za odgoj i obrazovanje. 2015;17(2):569-595.
doi:10.15516/cje.v17i2.555 .
Putnik, Nenad, Bošković, Milica, "The Impact of Media on Students' Perception of the Security Risks Associated With Internet Social Networking - A Case Study" in Croatian Journal of Education-Hrvatski casopis za odgoj i obrazovanje, 17, no. 2 (2015):569-595,
https://doi.org/10.15516/cje.v17i2.555 . .
1
1
1

The problem of legal (de)regulation of cyberspace conflicts

Milošević, Mladen; Putnik, Nenad

(Radio Beograd, Beograd, 2014)

TY  - JOUR
AU  - Milošević, Mladen
AU  - Putnik, Nenad
PY  - 2014
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/255
AB  - The article focuses on the analyses of the problem of legal regulation of cyberspace conflicts. The authors discuss about eventual legal qualifications of cyber warfare, underlining two main issues: first, the fact that cyber warfare cannot be considered as an act of the aggression according to the definition introduced by the UN Resolution; and, second, that it is widely considered that cyber warfare is more than an criminal act incriminated by national legislation. Having this in mind, the authors discuss about possibility of applying some of the established international treaty systems (International Law of War, International Space Law, Treaty on the Non-Proliferation of Nuclear Weapons, Antarctic Treaty System, United Nations Convention on the Law of the Sea, Mutual legal assistance treaties) as models for regulating cyberspace.
AB  - Članak je posvećen razmatranju problema pravne neregulisanosti konflikata u kiber prostoru. Autori raspravljaju o mogućim pravnim kvalifikacijama čina kiber ratovanja, ukazujući da se on ne može podvesti pod definiciju agresije usvojenu u rezoluciji Ujedinjenih nacija, ali da je ipak nedovoljno karakterisati ga kao krivično delo kažnjivo po odredbama nacionalnih zakonodavstava. U centralnom delu rada autori analiziraju nekoliko međunarodnih ugovornih režima: međunarodno ratno pravo, Sporazum o neširenju nuklearnog naoružanja, međunarodno kosmičko pravo, Sistem antarktičke povelje, Konvenciju Ujedinjenih nacija o pravu mora i ugovore o uzajamnoj pravnoj saradnji, kako bi utvrdili da li oni mogu služiti kao model za regulisanje međudržavnih konflikata u kiber prostoru.
PB  - Radio Beograd, Beograd
T2  - Treći program
T1  - The problem of legal (de)regulation of cyberspace conflicts
T1  - Problem pravne (ne)regulisanosti konflikata u kiber prostoru
IS  - 161-162
SP  - 266
EP  - 278
ER  - 
@article{
author = "Milošević, Mladen and Putnik, Nenad",
year = "2014",
abstract = "The article focuses on the analyses of the problem of legal regulation of cyberspace conflicts. The authors discuss about eventual legal qualifications of cyber warfare, underlining two main issues: first, the fact that cyber warfare cannot be considered as an act of the aggression according to the definition introduced by the UN Resolution; and, second, that it is widely considered that cyber warfare is more than an criminal act incriminated by national legislation. Having this in mind, the authors discuss about possibility of applying some of the established international treaty systems (International Law of War, International Space Law, Treaty on the Non-Proliferation of Nuclear Weapons, Antarctic Treaty System, United Nations Convention on the Law of the Sea, Mutual legal assistance treaties) as models for regulating cyberspace., Članak je posvećen razmatranju problema pravne neregulisanosti konflikata u kiber prostoru. Autori raspravljaju o mogućim pravnim kvalifikacijama čina kiber ratovanja, ukazujući da se on ne može podvesti pod definiciju agresije usvojenu u rezoluciji Ujedinjenih nacija, ali da je ipak nedovoljno karakterisati ga kao krivično delo kažnjivo po odredbama nacionalnih zakonodavstava. U centralnom delu rada autori analiziraju nekoliko međunarodnih ugovornih režima: međunarodno ratno pravo, Sporazum o neširenju nuklearnog naoružanja, međunarodno kosmičko pravo, Sistem antarktičke povelje, Konvenciju Ujedinjenih nacija o pravu mora i ugovore o uzajamnoj pravnoj saradnji, kako bi utvrdili da li oni mogu služiti kao model za regulisanje međudržavnih konflikata u kiber prostoru.",
publisher = "Radio Beograd, Beograd",
journal = "Treći program",
title = "The problem of legal (de)regulation of cyberspace conflicts, Problem pravne (ne)regulisanosti konflikata u kiber prostoru",
number = "161-162",
pages = "266-278"
}
Milošević, M.,& Putnik, N.. (2014). The problem of legal (de)regulation of cyberspace conflicts. in Treći program
Radio Beograd, Beograd.(161-162), 266-278.
Milošević M, Putnik N. The problem of legal (de)regulation of cyberspace conflicts. in Treći program. 2014;(161-162):266-278..
Milošević, Mladen, Putnik, Nenad, "The problem of legal (de)regulation of cyberspace conflicts" in Treći program, no. 161-162 (2014):266-278.

Cyber warfare

Kešetović, Želimir; Putnik, Nenad

(SAGE Publications,, 2013)

TY  - CHAP
AU  - Kešetović, Želimir
AU  - Putnik, Nenad
PY  - 2013
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/226
PB  - SAGE Publications,
T2  - Encyclopedia of Crisis Management
T1  - Cyber warfare
VL  - 1
SP  - 219
EP  - 221
ER  - 
@inbook{
author = "Kešetović, Želimir and Putnik, Nenad",
year = "2013",
publisher = "SAGE Publications,",
journal = "Encyclopedia of Crisis Management",
booktitle = "Cyber warfare",
volume = "1",
pages = "219-221"
}
Kešetović, Ž.,& Putnik, N.. (2013). Cyber warfare. in Encyclopedia of Crisis Management
SAGE Publications,., 1, 219-221.
Kešetović Ž, Putnik N. Cyber warfare. in Encyclopedia of Crisis Management. 2013;1:219-221..
Kešetović, Želimir, Putnik, Nenad, "Cyber warfare" in Encyclopedia of Crisis Management, 1 (2013):219-221.

Cyber security

Kešetović, Želimir; Putnik, Nenad

(SAGE Publications,, 2013)

TY  - CHAP
AU  - Kešetović, Želimir
AU  - Putnik, Nenad
PY  - 2013
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/222
PB  - SAGE Publications,
T2  - Encyclopedia of Crisis Management. Vol. 1
T1  - Cyber security
SP  - 217
EP  - 219
ER  - 
@inbook{
author = "Kešetović, Želimir and Putnik, Nenad",
year = "2013",
publisher = "SAGE Publications,",
journal = "Encyclopedia of Crisis Management. Vol. 1",
booktitle = "Cyber security",
pages = "217-219"
}
Kešetović, Ž.,& Putnik, N.. (2013). Cyber security. in Encyclopedia of Crisis Management. Vol. 1
SAGE Publications,., 217-219.
Kešetović Ž, Putnik N. Cyber security. in Encyclopedia of Crisis Management. Vol. 1. 2013;:217-219..
Kešetović, Želimir, Putnik, Nenad, "Cyber security" in Encyclopedia of Crisis Management. Vol. 1 (2013):217-219.

Cyber crime

Kešetović, Želimir; Putnik, Nenad

(SAGE Publications,, 2013)

TY  - CONF
AU  - Kešetović, Želimir
AU  - Putnik, Nenad
PY  - 2013
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/218
PB  - SAGE Publications,
C3  - Encyclopedia of Crisis Management. Vol. 1
T1  - Cyber crime
SP  - 215
EP  - 217
ER  - 
@conference{
author = "Kešetović, Želimir and Putnik, Nenad",
year = "2013",
publisher = "SAGE Publications,",
journal = "Encyclopedia of Crisis Management. Vol. 1",
title = "Cyber crime",
pages = "215-217"
}
Kešetović, Ž.,& Putnik, N.. (2013). Cyber crime. in Encyclopedia of Crisis Management. Vol. 1
SAGE Publications,., 215-217.
Kešetović Ž, Putnik N. Cyber crime. in Encyclopedia of Crisis Management. Vol. 1. 2013;:215-217..
Kešetović, Želimir, Putnik, Nenad, "Cyber crime" in Encyclopedia of Crisis Management. Vol. 1 (2013):215-217.

The protection of educational institutions from cyber crime and cyberbullying: Problems and dilemmas

Putnik, Nenad; Milošević, Mladen; Cvetković, Vladimir M.

(Sociološko društvo Srbije, Beograd, 2013)

TY  - JOUR
AU  - Putnik, Nenad
AU  - Milošević, Mladen
AU  - Cvetković, Vladimir M.
PY  - 2013
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/216
AB  - The article analyses the problems that appear in the process of protecting the educational institutions from the security risks in cyber space - cyber crime and cyberbullying. Due to main characteristics and nature of security risks in cyber space, children, adolescents and students are particularly vulnerable category of Internet users. Having this on mind, we can conclude that educational institutions are an important factor in the process of prevention and control of security risks that young people face in cyber space. The authors analyze the legal framework and the actual situation in this domain and propose concrete measures for the reduction of security risks in cyber space, and consider the capacities and importance of building and implementing the unique, functional and pragmatic multi-layer protection model. The first part of the article is dedicated to the analyses of the legal framework for countering cyber crime, with the consideration of the normative legal acts that regulate the protection of children and students from the violence, malestation and neglection in the school environment. The authors also focus on the legal definition of cyberbullying. In the second part of the article, the authors propose the principles and elements for building a model of multi-layer protection and analyze the possibility of its application in educational institutions in the Republic of Serbia, as an efficient tool for the prevention and reduction of security risks in the cyber space.
AB  - Članak je posvećen razmatranju problema zaštite obrazovno-vaspitnih ustanova od visokotehnološkog kriminala i elektronskog nasilja. Imajući u vidu prirodu visokotehnološkog kriminala, može se konstatovati da posebno ranljivu kategoriju korisnika Interneta predstavlja populacija mladih: dece, adolescenata i studenata. Obrazovno-vaspitne ustanove predstavljaju važan činilac u procesu prevencije i suzbijanja bezbednosnih rizika kojima su mladi izloženi u sajber prostoru. Autori analiziraju postojeće normativno i faktičko stanje u ovom domenu i predlažu konkretne mere za redukciju ovih bezbednosnih rizika, te ukazuju na mogućnost i značaj izgradnje i implementacije višeslojnog modela zaštite. U prvom delu rada analizirana je domaća pravna regulativa u oblasti visokotehnološkog kriminaliteta. Imajući u vidu specifičnost predmeta istraživanja, autori analiziraju i odredbe zakonskih i podzakonskih propisa u oblasti zaštite dece od nasilja, zlostavljanja i zanemarivanja u obrazovno-vaspitnim ustanovama, fokusirajući se na norme o tzv. elektronskom nasilju. U drugom delu rada autori predlažu principe i elemente za izgradnju modela višeslojne zaštite i analiziraju mogućnost njegove primene u obrazovnim ustanovama u Republici Srbiji, a u cilju prevencije rizika iz širokog spektra visokotehnološkog kriminaliteta.
PB  - Sociološko društvo Srbije, Beograd
T2  - Sociološki pregled
T1  - The protection of educational institutions from cyber crime and cyberbullying: Problems and dilemmas
T1  - Problem zaštite obrazovno-vaspitnih ustanova od visokotehnološkog kriminala i elektronskog nasilja
VL  - 47
IS  - 1
SP  - 75
EP  - 92
DO  - 10.5937/socpreg1301075P
ER  - 
@article{
author = "Putnik, Nenad and Milošević, Mladen and Cvetković, Vladimir M.",
year = "2013",
abstract = "The article analyses the problems that appear in the process of protecting the educational institutions from the security risks in cyber space - cyber crime and cyberbullying. Due to main characteristics and nature of security risks in cyber space, children, adolescents and students are particularly vulnerable category of Internet users. Having this on mind, we can conclude that educational institutions are an important factor in the process of prevention and control of security risks that young people face in cyber space. The authors analyze the legal framework and the actual situation in this domain and propose concrete measures for the reduction of security risks in cyber space, and consider the capacities and importance of building and implementing the unique, functional and pragmatic multi-layer protection model. The first part of the article is dedicated to the analyses of the legal framework for countering cyber crime, with the consideration of the normative legal acts that regulate the protection of children and students from the violence, malestation and neglection in the school environment. The authors also focus on the legal definition of cyberbullying. In the second part of the article, the authors propose the principles and elements for building a model of multi-layer protection and analyze the possibility of its application in educational institutions in the Republic of Serbia, as an efficient tool for the prevention and reduction of security risks in the cyber space., Članak je posvećen razmatranju problema zaštite obrazovno-vaspitnih ustanova od visokotehnološkog kriminala i elektronskog nasilja. Imajući u vidu prirodu visokotehnološkog kriminala, može se konstatovati da posebno ranljivu kategoriju korisnika Interneta predstavlja populacija mladih: dece, adolescenata i studenata. Obrazovno-vaspitne ustanove predstavljaju važan činilac u procesu prevencije i suzbijanja bezbednosnih rizika kojima su mladi izloženi u sajber prostoru. Autori analiziraju postojeće normativno i faktičko stanje u ovom domenu i predlažu konkretne mere za redukciju ovih bezbednosnih rizika, te ukazuju na mogućnost i značaj izgradnje i implementacije višeslojnog modela zaštite. U prvom delu rada analizirana je domaća pravna regulativa u oblasti visokotehnološkog kriminaliteta. Imajući u vidu specifičnost predmeta istraživanja, autori analiziraju i odredbe zakonskih i podzakonskih propisa u oblasti zaštite dece od nasilja, zlostavljanja i zanemarivanja u obrazovno-vaspitnim ustanovama, fokusirajući se na norme o tzv. elektronskom nasilju. U drugom delu rada autori predlažu principe i elemente za izgradnju modela višeslojne zaštite i analiziraju mogućnost njegove primene u obrazovnim ustanovama u Republici Srbiji, a u cilju prevencije rizika iz širokog spektra visokotehnološkog kriminaliteta.",
publisher = "Sociološko društvo Srbije, Beograd",
journal = "Sociološki pregled",
title = "The protection of educational institutions from cyber crime and cyberbullying: Problems and dilemmas, Problem zaštite obrazovno-vaspitnih ustanova od visokotehnološkog kriminala i elektronskog nasilja",
volume = "47",
number = "1",
pages = "75-92",
doi = "10.5937/socpreg1301075P"
}
Putnik, N., Milošević, M.,& Cvetković, V. M.. (2013). The protection of educational institutions from cyber crime and cyberbullying: Problems and dilemmas. in Sociološki pregled
Sociološko društvo Srbije, Beograd., 47(1), 75-92.
https://doi.org/10.5937/socpreg1301075P
Putnik N, Milošević M, Cvetković VM. The protection of educational institutions from cyber crime and cyberbullying: Problems and dilemmas. in Sociološki pregled. 2013;47(1):75-92.
doi:10.5937/socpreg1301075P .
Putnik, Nenad, Milošević, Mladen, Cvetković, Vladimir M., "The protection of educational institutions from cyber crime and cyberbullying: Problems and dilemmas" in Sociološki pregled, 47, no. 1 (2013):75-92,
https://doi.org/10.5937/socpreg1301075P . .

Contemporary security challenges: Hactivism as a new form of social conflict

Putnik, Nenad; Bošković, Milica

(Kultura - Polis Novi Sad i Institut za evropske studije, Beograd, 2013)

TY  - JOUR
AU  - Putnik, Nenad
AU  - Bošković, Milica
PY  - 2013
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/203
AB  - Nowadays, computer networks and information infrastructures security in general is not just a technical problem, but also an important strategic question. Due to the fact that global computer network is widespread and decentralized, together with the absence of legal framework which would regulate cyber warfare, activities of hacktivists - a sui generis cyber guerilla- has become an important problem of cyber security and additionally emphasized the importance of protection of information systems, conducting international investigations, extradition and punishment of perpetrators. The phenomenon of hacktivism has been present for about fifteen years, and it has affected various states on different continents, but even to this day no adequate and widely accepted solution for preventing this undesirable occurrence has been found. This paper attempts to describe the phenomenon of hactivism, discuss its implications for national security, as well as to offer a critical review of the current problems and strategies related to counteracting this occurrence.
AB  - Bezbednost računarskih mreža i, uopšte, informacionih infrastruktura danas nije više samo tehnički problem nego i važno strateško pitanje. Usled rasprostranjenosti i decentralizovanosti globalne računarske mreže kao i nepostojanja pravne regulative koja bi regulisala sajber ratovanje, aktivnost haktivista - svojevrsne sajber gerile - postala je jedan od važnih problema sajber bezbednosti i dodatno naglasila značaj zaštite informacionih sistema, sprovođenja međunarodnih istraga, ekstradicije i kažnjavanja izvršilaca. Fenomen haktivizma postoji oko petanest godina, pogađao je različite države na različitim kontinentima, ali do danas nije pronađeno adekvatno i opšteprihvaćeno rešenje za suzbijanje ove nepoželjne pojave. Ovaj rad nastoji da sa aspekta sajber bezbednosti opiše fenomen haktivizma, razmotri njegove implikacije po nacionalnu bezbednost država, kao i da pruži kritički osvrt na aktuelne probleme i strategije koji su vezani za suprotstavljanje ovoj pojavi.
PB  - Kultura - Polis Novi Sad i Institut za evropske studije, Beograd
T2  - Kultura polisa
T1  - Contemporary security challenges: Hactivism as a new form of social conflict
T1  - Savremeni bezbednosni izazovi - haktivizam kao novi oblik društvenog konflikta
VL  - 10
IS  - 21
SP  - 115
EP  - 132
ER  - 
@article{
author = "Putnik, Nenad and Bošković, Milica",
year = "2013",
abstract = "Nowadays, computer networks and information infrastructures security in general is not just a technical problem, but also an important strategic question. Due to the fact that global computer network is widespread and decentralized, together with the absence of legal framework which would regulate cyber warfare, activities of hacktivists - a sui generis cyber guerilla- has become an important problem of cyber security and additionally emphasized the importance of protection of information systems, conducting international investigations, extradition and punishment of perpetrators. The phenomenon of hacktivism has been present for about fifteen years, and it has affected various states on different continents, but even to this day no adequate and widely accepted solution for preventing this undesirable occurrence has been found. This paper attempts to describe the phenomenon of hactivism, discuss its implications for national security, as well as to offer a critical review of the current problems and strategies related to counteracting this occurrence., Bezbednost računarskih mreža i, uopšte, informacionih infrastruktura danas nije više samo tehnički problem nego i važno strateško pitanje. Usled rasprostranjenosti i decentralizovanosti globalne računarske mreže kao i nepostojanja pravne regulative koja bi regulisala sajber ratovanje, aktivnost haktivista - svojevrsne sajber gerile - postala je jedan od važnih problema sajber bezbednosti i dodatno naglasila značaj zaštite informacionih sistema, sprovođenja međunarodnih istraga, ekstradicije i kažnjavanja izvršilaca. Fenomen haktivizma postoji oko petanest godina, pogađao je različite države na različitim kontinentima, ali do danas nije pronađeno adekvatno i opšteprihvaćeno rešenje za suzbijanje ove nepoželjne pojave. Ovaj rad nastoji da sa aspekta sajber bezbednosti opiše fenomen haktivizma, razmotri njegove implikacije po nacionalnu bezbednost država, kao i da pruži kritički osvrt na aktuelne probleme i strategije koji su vezani za suprotstavljanje ovoj pojavi.",
publisher = "Kultura - Polis Novi Sad i Institut za evropske studije, Beograd",
journal = "Kultura polisa",
title = "Contemporary security challenges: Hactivism as a new form of social conflict, Savremeni bezbednosni izazovi - haktivizam kao novi oblik društvenog konflikta",
volume = "10",
number = "21",
pages = "115-132"
}
Putnik, N.,& Bošković, M.. (2013). Contemporary security challenges: Hactivism as a new form of social conflict. in Kultura polisa
Kultura - Polis Novi Sad i Institut za evropske studije, Beograd., 10(21), 115-132.
Putnik N, Bošković M. Contemporary security challenges: Hactivism as a new form of social conflict. in Kultura polisa. 2013;10(21):115-132..
Putnik, Nenad, Bošković, Milica, "Contemporary security challenges: Hactivism as a new form of social conflict" in Kultura polisa, 10, no. 21 (2013):115-132.

Politika zaštite obrazovno-vaspitnog sistema - analiza i predlozi za unapređenje

Keković, Zoran; Putnik, Nenad

(2013)

TY  - JOUR
AU  - Keković, Zoran
AU  - Putnik, Nenad
PY  - 2013
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/197
AB  - In previous research we were dealing with the national interest as an analytical concept, where we gave a detailed review of different relevant authors’ perspectives about the concept of national interest, and provided with suggestions for the analysis of the national interests of the Republic of Serbia, through analysis of the National Security Strategy, analysis of keynote addresses of Prime Minister nominees, and analysis of statements from official Government representatives. We also gave a review of two most common tools for analysis of national interests – matrices developed by Joseph Frankel and Donald E. Nuechterlein in 1970s, and we focused on Nuechterlein’s division of national interest by two criteria. The first one identifies basic interests of one state (defense, economy, world order, and ideology), and the second one identifies the intensity of the former (existential, vital, major, and peripheral). In this paper, we analyzed the national interest of the Republic of Serbia in a manner stated through keynote addresses (Government programmes) of Prime Minister Nominees from 2071 to 2017, which included eight Programmes overall. The main objective of this paper was to test the cognitive potential of the national interest, with the basic hypothesis that the national interest of small states is linked with the so-called “hard core of national interest” as implied by the Realists (Morgenthau), which is related to the issues of survival. First we gave a review of the thematization of small states in Realist literature, where we recognized the key period when small states became a focus of research for several theorists (Robert Rothstein, Annette B. Fox, Robert O. Keohane, Peter R. Baehr, Miriam F. Elman, and Kenneth Waltz). Then we gave a brief recapitulation of the importance of national interest as an analytical concept, with an end view of Frankel’s and Nuechterlein’s contribution to the development of its analytical potential. We have chosen the Nuechterlein’s matrix, so that our scope for analysis was the Adjusted Nuechterlein’s matrix – the world order interests for great powers were reduced to the level of regions for small states. In case of Serbia, it is the “Western Balkans” and Europe. The Adjusted Nuechterlein matrix was then applied to operationalized structure of these addresses (Programmes). We conducted the qualitative analysis of the Keynote addresses’ content, firstly through the list of priorities given, then through the analysis of how the author of the Programme labeled specific issue (“of high priority”, “of utmost importance”, etc.), and lastly, in what context the expression “national interest” have been used. In the analysis of the national interest of the Republic of Serbia through Government programmes, we considered the following conditions: the state strength through small states concept in International Relations theories, and the specificities of the Republic of Serbia in relation to immediate (“Western Balkans”) and wider (European) environment. Our findings showed us that there are two regularly mentioned priorities of the highest intensity (existential interests): Kosovo and Metohija, and the process of accession to the European Union, with a few more priorities only once mentioned as the highest ones – demographical issue and energy security. Combined existential and vital included the fight against organized crime and corruption, economic recovery, and the improvement of relations with neighboring countries. Our conclusion is that existential interests are primarily focused on values related to survival, which is in accordance with the Realist “hard core of international relations”.
T2  - Srpska politička misao
T1  - Politika zaštite obrazovno-vaspitnog sistema - analiza i predlozi za unapređenje
VL  - 39
IS  - 20
SP  - 215
EP  - 234
ER  - 
@article{
author = "Keković, Zoran and Putnik, Nenad",
year = "2013",
abstract = "In previous research we were dealing with the national interest as an analytical concept, where we gave a detailed review of different relevant authors’ perspectives about the concept of national interest, and provided with suggestions for the analysis of the national interests of the Republic of Serbia, through analysis of the National Security Strategy, analysis of keynote addresses of Prime Minister nominees, and analysis of statements from official Government representatives. We also gave a review of two most common tools for analysis of national interests – matrices developed by Joseph Frankel and Donald E. Nuechterlein in 1970s, and we focused on Nuechterlein’s division of national interest by two criteria. The first one identifies basic interests of one state (defense, economy, world order, and ideology), and the second one identifies the intensity of the former (existential, vital, major, and peripheral). In this paper, we analyzed the national interest of the Republic of Serbia in a manner stated through keynote addresses (Government programmes) of Prime Minister Nominees from 2071 to 2017, which included eight Programmes overall. The main objective of this paper was to test the cognitive potential of the national interest, with the basic hypothesis that the national interest of small states is linked with the so-called “hard core of national interest” as implied by the Realists (Morgenthau), which is related to the issues of survival. First we gave a review of the thematization of small states in Realist literature, where we recognized the key period when small states became a focus of research for several theorists (Robert Rothstein, Annette B. Fox, Robert O. Keohane, Peter R. Baehr, Miriam F. Elman, and Kenneth Waltz). Then we gave a brief recapitulation of the importance of national interest as an analytical concept, with an end view of Frankel’s and Nuechterlein’s contribution to the development of its analytical potential. We have chosen the Nuechterlein’s matrix, so that our scope for analysis was the Adjusted Nuechterlein’s matrix – the world order interests for great powers were reduced to the level of regions for small states. In case of Serbia, it is the “Western Balkans” and Europe. The Adjusted Nuechterlein matrix was then applied to operationalized structure of these addresses (Programmes). We conducted the qualitative analysis of the Keynote addresses’ content, firstly through the list of priorities given, then through the analysis of how the author of the Programme labeled specific issue (“of high priority”, “of utmost importance”, etc.), and lastly, in what context the expression “national interest” have been used. In the analysis of the national interest of the Republic of Serbia through Government programmes, we considered the following conditions: the state strength through small states concept in International Relations theories, and the specificities of the Republic of Serbia in relation to immediate (“Western Balkans”) and wider (European) environment. Our findings showed us that there are two regularly mentioned priorities of the highest intensity (existential interests): Kosovo and Metohija, and the process of accession to the European Union, with a few more priorities only once mentioned as the highest ones – demographical issue and energy security. Combined existential and vital included the fight against organized crime and corruption, economic recovery, and the improvement of relations with neighboring countries. Our conclusion is that existential interests are primarily focused on values related to survival, which is in accordance with the Realist “hard core of international relations”.",
journal = "Srpska politička misao",
title = "Politika zaštite obrazovno-vaspitnog sistema - analiza i predlozi za unapređenje",
volume = "39",
number = "20",
pages = "215-234"
}
Keković, Z.,& Putnik, N.. (2013). Politika zaštite obrazovno-vaspitnog sistema - analiza i predlozi za unapređenje. in Srpska politička misao, 39(20), 215-234.
Keković Z, Putnik N. Politika zaštite obrazovno-vaspitnog sistema - analiza i predlozi za unapređenje. in Srpska politička misao. 2013;39(20):215-234..
Keković, Zoran, Putnik, Nenad, "Politika zaštite obrazovno-vaspitnog sistema - analiza i predlozi za unapređenje" in Srpska politička misao, 39, no. 20 (2013):215-234.

Cyber warfare - a new form of contemporary socia conflicts

Putnik, Nenad R.

(Универзитет у Београду, Факултет безбедности, 2012)

TY  - THES
AU  - Putnik, Nenad R.
PY  - 2012
UR  - http://eteze.bg.ac.rs/application/showtheses?thesesId=565
UR  - https://fedorabg.bg.ac.rs/fedora/get/o:6723/bdef:Content/download
UR  - http://vbs.rs/scripts/cobiss?command=DISPLAY&base=70036&RID=512199093
UR  - http://nardus.mpn.gov.rs/123456789/2787
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/429
AB  - The creation of cyberspace represented a seminal turning point in the sphere of military activities, as well as in the understanding of corporate, national, regional and global security. The new “space” offered numerous possibilities for carrying out special propaganda operations and computer network based attacks on the enemy’s information systems. In English-speaking countries a term “cyber warfare” (kiber ratovanje) has been coined to describe this new form of confrontation in the virtual space. Attacks in a virtual space though they seem to be insignificant, can cause numerous casualties and material devastations in real, physical world. That is why cyber warfare has a central place in the field of interest of military, information, legal and security theorists and experts. At the end of the 21st century, the problem of conflicting in a virtual space has become one of the important topics of discussion in scientific and professional circles in all countries depending on information-communication technologies. Still, previous researches treated that phenomenon fragmentarily, and that resulted in the inability of creating a firm theoretical framework and clearly defined terminology. Bearing in mind that scientific literature has not sufficiently and coherently explored the phenomenon of cyber warfare, a scientific aim of this research has been a scientific explanation of cyber warfare phenomenon. The research of a phenomenon this complex necessarily imposes a multi-methodical approach and requires a complementary analysis of available and newly acquired data sources. We are talking about dominantly qualitative research approach, and insufficient theoretical basis brought about mostly exploratory nature of established research requirements. A scientific explanation of this current social phenomenon meant, thus, systematization of previous knowledge about cyber warfare, which assumed recognition, description and a thorough classification of different forms of conflicts in cyberspace. The results of the research show that cyber warfare is a comparatively new and unique form of social conflict which takes place in a specific environment, by using specific means, which has specific characteristics and principles. It can be a war without casualties, but it does not have to be like that. This form of conflict can be waged on its own, or can be a support to a conventional, kinetic conflict. The activity of cyber warfare does not have to be limited by a military discourse. Principles of cyber warfare are present IV in various different contexts, though a range of motivations and practices can vary to a great extent. Protagonists of cyber warfare use very well thought-out tactics and strategies in order to precisely determine targets of the attack and achieve their aims in a way that is similar to military methods. Destructive actions of various individuals and groups in cyberspace can have similar impulses, show similar understanding of strategic advantages which enable attack methods based on information technologies, and be revenge to those whose lives depend to a great extent on the use of complex information and communication systems. Cyber warfare not only questions certain conventional assumptions about the nature of social conflicts, but at the same time illustrates some of hidden possibilities and paradoxical potentials (social fusion and fission) of globally connected technologies. It, also, raises numerous questions related to the morality of offensive cyber warfare and adequacy of the existing multilateral regulations and conventions into which these new modalities should be adjusted. We believe that this, holistically based, analysis helps clarifying conceptual and terminological corpus of this specific field. Devoid of its military roots, the vocabulary and principles of cyber warfare can have a great analytic applicability. Different aspects of cyber conflicts, which have been analyzed in this paper, can be assigned to general theoretical principles and established characteristics of the phenomenon we have defined by the concept “cyber warfare.” On the practical level, the results of this research can contribute to a better understanding of this subject, which is of a great significance to developing strategies of prevention, suppression and controlling security risks in cyberspace, both on a corporate and national level. A fast entering of “information conflicts” into civil and corporate frameworks presents a serious problem to managers responsible for protection and security of information infrastructure. Managerial structures on a corporate-economy level have to be aware of how wide a spectrum of potential attacks is, including modern espionage, organized crime, perceptive battles, as well as hacker attacks, and attacks sponsored by states or business rivals. The concept of managing security risks in cyberspace from the aspect of national security, though, requires coordination of national legislation with the existing international standards. From the point of view of regional and global security, a particularly important problem is the lack of general accord on international agreements which would clarify a legal status of states and non-state actors in cyber conflicts. From the V said reasons, this paper has called attention to the need of equalization normative approaches with the aim of adopting acceptable legal definitions of basic concepts in the field of cyber warfare. Apart from that, propositions of possible directions of the development of international law of war have been proposed in order to develop more adequate mechanism of confronting and protection against cyber conflicts.
PB  - Универзитет у Београду, Факултет безбедности
T1  - Cyber warfare - a new form of contemporary socia conflicts
T1  - Кибер ратовање - нови облик савремених друштвених конфликата
UR  - https://hdl.handle.net/21.15107/rcub_nardus_2787
ER  - 
@phdthesis{
author = "Putnik, Nenad R.",
year = "2012",
abstract = "The creation of cyberspace represented a seminal turning point in the sphere of military activities, as well as in the understanding of corporate, national, regional and global security. The new “space” offered numerous possibilities for carrying out special propaganda operations and computer network based attacks on the enemy’s information systems. In English-speaking countries a term “cyber warfare” (kiber ratovanje) has been coined to describe this new form of confrontation in the virtual space. Attacks in a virtual space though they seem to be insignificant, can cause numerous casualties and material devastations in real, physical world. That is why cyber warfare has a central place in the field of interest of military, information, legal and security theorists and experts. At the end of the 21st century, the problem of conflicting in a virtual space has become one of the important topics of discussion in scientific and professional circles in all countries depending on information-communication technologies. Still, previous researches treated that phenomenon fragmentarily, and that resulted in the inability of creating a firm theoretical framework and clearly defined terminology. Bearing in mind that scientific literature has not sufficiently and coherently explored the phenomenon of cyber warfare, a scientific aim of this research has been a scientific explanation of cyber warfare phenomenon. The research of a phenomenon this complex necessarily imposes a multi-methodical approach and requires a complementary analysis of available and newly acquired data sources. We are talking about dominantly qualitative research approach, and insufficient theoretical basis brought about mostly exploratory nature of established research requirements. A scientific explanation of this current social phenomenon meant, thus, systematization of previous knowledge about cyber warfare, which assumed recognition, description and a thorough classification of different forms of conflicts in cyberspace. The results of the research show that cyber warfare is a comparatively new and unique form of social conflict which takes place in a specific environment, by using specific means, which has specific characteristics and principles. It can be a war without casualties, but it does not have to be like that. This form of conflict can be waged on its own, or can be a support to a conventional, kinetic conflict. The activity of cyber warfare does not have to be limited by a military discourse. Principles of cyber warfare are present IV in various different contexts, though a range of motivations and practices can vary to a great extent. Protagonists of cyber warfare use very well thought-out tactics and strategies in order to precisely determine targets of the attack and achieve their aims in a way that is similar to military methods. Destructive actions of various individuals and groups in cyberspace can have similar impulses, show similar understanding of strategic advantages which enable attack methods based on information technologies, and be revenge to those whose lives depend to a great extent on the use of complex information and communication systems. Cyber warfare not only questions certain conventional assumptions about the nature of social conflicts, but at the same time illustrates some of hidden possibilities and paradoxical potentials (social fusion and fission) of globally connected technologies. It, also, raises numerous questions related to the morality of offensive cyber warfare and adequacy of the existing multilateral regulations and conventions into which these new modalities should be adjusted. We believe that this, holistically based, analysis helps clarifying conceptual and terminological corpus of this specific field. Devoid of its military roots, the vocabulary and principles of cyber warfare can have a great analytic applicability. Different aspects of cyber conflicts, which have been analyzed in this paper, can be assigned to general theoretical principles and established characteristics of the phenomenon we have defined by the concept “cyber warfare.” On the practical level, the results of this research can contribute to a better understanding of this subject, which is of a great significance to developing strategies of prevention, suppression and controlling security risks in cyberspace, both on a corporate and national level. A fast entering of “information conflicts” into civil and corporate frameworks presents a serious problem to managers responsible for protection and security of information infrastructure. Managerial structures on a corporate-economy level have to be aware of how wide a spectrum of potential attacks is, including modern espionage, organized crime, perceptive battles, as well as hacker attacks, and attacks sponsored by states or business rivals. The concept of managing security risks in cyberspace from the aspect of national security, though, requires coordination of national legislation with the existing international standards. From the point of view of regional and global security, a particularly important problem is the lack of general accord on international agreements which would clarify a legal status of states and non-state actors in cyber conflicts. From the V said reasons, this paper has called attention to the need of equalization normative approaches with the aim of adopting acceptable legal definitions of basic concepts in the field of cyber warfare. Apart from that, propositions of possible directions of the development of international law of war have been proposed in order to develop more adequate mechanism of confronting and protection against cyber conflicts.",
publisher = "Универзитет у Београду, Факултет безбедности",
title = "Cyber warfare - a new form of contemporary socia conflicts, Кибер ратовање - нови облик савремених друштвених конфликата",
url = "https://hdl.handle.net/21.15107/rcub_nardus_2787"
}
Putnik, N. R.. (2012). Cyber warfare - a new form of contemporary socia conflicts. 
Универзитет у Београду, Факултет безбедности..
https://hdl.handle.net/21.15107/rcub_nardus_2787
Putnik NR. Cyber warfare - a new form of contemporary socia conflicts. 2012;.
https://hdl.handle.net/21.15107/rcub_nardus_2787 .
Putnik, Nenad R., "Cyber warfare - a new form of contemporary socia conflicts" (2012),
https://hdl.handle.net/21.15107/rcub_nardus_2787 .

Abuse of cyber space as means of mass communication

Putnik, Nenad; Miljković, Milan

(Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd, 2012)

TY  - JOUR
AU  - Putnik, Nenad
AU  - Miljković, Milan
PY  - 2012
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/178
AB  - Security threats to information systems may be grouped into certain types. The classification may be done according to the way of threat posing, namely techniques and instruments used for their implementation, as classification criteria. In the former research of the cyber security area, security threats in cyber space are most often identified with cyber attacks of technical type (attacks based on the use of malicious programs - malware, and attacks aimed to obstruct the services - distributed denial of service) and those attacks in cyber space which are based on the deception of other users of cyber space and the abuse of their trust (social engineering and phishing). Apart from different types of cyber attacks, which definitely represent one form of abuse of cyber space, specific abuse of this space as regards its function as a means of mass communication is also evident. In this sense, the category of cyber space security threats includes, besides the two above-mentioned aspects of cyber attacks, also 'the abuse of cyber space as a means of mass communication', as a special type of threats, in view of their destructive capability against individuals and the society as a whole. The paper presents detailed classification of security threats in cyber space, and the emphasis is put on the identification, classification and description of those phenomena that can be subsumed under a subcategory of 'the abuse of cyber space as a means of mass communication. In this sense, events of cyber space abuse for information warfare and support of terrorism are described and explained in detail.
AB  - Bezbednosne pretnje informacionim sistemima moguće je grupisati u određene vrste. Klasifikacija se može sprovesti u odnosu na način izazivanja pretnji, tj. tehnika i instrumenata koji se koriste radi njihovog ostvarivanja, kao kriterijuma klasifikacije. U dosadašnjim istraživanjima u području kiber bezbednosti, bezbednosne pretnje u kiber prostoru najčešće su poistovećivane sa kiber napadima tehničkog tipa (napadi zasnovani na upotrebi malicioznih programa − malware i napadi usmereni na opstrukciju usluga − distributed denial of service) i onim napadima u kiber prostoru koji se zasnivaju na obmanjivanju drugih korisnika kiber prostora i zloupotrebi njihovog poverenja (socijalni inženjering − social engineering i fišing − phishing). Osim različitih vrsta kiber napada koji, svakako, predstavljaju jedan vid zloupotrebe kiber prostora, evidentno je i specifično zloupotrebljavanje ovog prostora u odnosu na njegovu funkciju sredstva za masovnu komunikaciju. U tom smislu, kategoriji bezbednosnih pretnji u kiber prostoru, osim već pomenuta dva aspekta kiber napada, pripisujemo i 'zloupotrebe kiber prostora kao sredstva masovne komunikacije', kao posebnu vrstu pretnji, s obzirom na njihov destruktivni potencijal u odnosu na pojedince i društvo u celini. U radu je predstavljena detaljna klasifikacija bezbednosnih pretnji u kiber prostoru, a težište je na identifikaciji, klasifikaciji i deskripciji onih fenomena koji se mogu podvesti pod potkategoriju 'zloupotreba kiber prostora kao sredstva masovne komunikacije'. U tom smislu, detaljno su opisani i objašnjeni fenomeni zloupotrebe kiber prostora za informaciono ratovanje i za podršku terorizmu.
PB  - Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd
T2  - Vojno delo
T1  - Abuse of cyber space as means of mass communication
T1  - Zloupotreba kiber prostora kao sredstva masovne komunikacije
VL  - 64
IS  - 3
SP  - 157
EP  - 183
ER  - 
@article{
author = "Putnik, Nenad and Miljković, Milan",
year = "2012",
abstract = "Security threats to information systems may be grouped into certain types. The classification may be done according to the way of threat posing, namely techniques and instruments used for their implementation, as classification criteria. In the former research of the cyber security area, security threats in cyber space are most often identified with cyber attacks of technical type (attacks based on the use of malicious programs - malware, and attacks aimed to obstruct the services - distributed denial of service) and those attacks in cyber space which are based on the deception of other users of cyber space and the abuse of their trust (social engineering and phishing). Apart from different types of cyber attacks, which definitely represent one form of abuse of cyber space, specific abuse of this space as regards its function as a means of mass communication is also evident. In this sense, the category of cyber space security threats includes, besides the two above-mentioned aspects of cyber attacks, also 'the abuse of cyber space as a means of mass communication', as a special type of threats, in view of their destructive capability against individuals and the society as a whole. The paper presents detailed classification of security threats in cyber space, and the emphasis is put on the identification, classification and description of those phenomena that can be subsumed under a subcategory of 'the abuse of cyber space as a means of mass communication. In this sense, events of cyber space abuse for information warfare and support of terrorism are described and explained in detail., Bezbednosne pretnje informacionim sistemima moguće je grupisati u određene vrste. Klasifikacija se može sprovesti u odnosu na način izazivanja pretnji, tj. tehnika i instrumenata koji se koriste radi njihovog ostvarivanja, kao kriterijuma klasifikacije. U dosadašnjim istraživanjima u području kiber bezbednosti, bezbednosne pretnje u kiber prostoru najčešće su poistovećivane sa kiber napadima tehničkog tipa (napadi zasnovani na upotrebi malicioznih programa − malware i napadi usmereni na opstrukciju usluga − distributed denial of service) i onim napadima u kiber prostoru koji se zasnivaju na obmanjivanju drugih korisnika kiber prostora i zloupotrebi njihovog poverenja (socijalni inženjering − social engineering i fišing − phishing). Osim različitih vrsta kiber napada koji, svakako, predstavljaju jedan vid zloupotrebe kiber prostora, evidentno je i specifično zloupotrebljavanje ovog prostora u odnosu na njegovu funkciju sredstva za masovnu komunikaciju. U tom smislu, kategoriji bezbednosnih pretnji u kiber prostoru, osim već pomenuta dva aspekta kiber napada, pripisujemo i 'zloupotrebe kiber prostora kao sredstva masovne komunikacije', kao posebnu vrstu pretnji, s obzirom na njihov destruktivni potencijal u odnosu na pojedince i društvo u celini. U radu je predstavljena detaljna klasifikacija bezbednosnih pretnji u kiber prostoru, a težište je na identifikaciji, klasifikaciji i deskripciji onih fenomena koji se mogu podvesti pod potkategoriju 'zloupotreba kiber prostora kao sredstva masovne komunikacije'. U tom smislu, detaljno su opisani i objašnjeni fenomeni zloupotrebe kiber prostora za informaciono ratovanje i za podršku terorizmu.",
publisher = "Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd",
journal = "Vojno delo",
title = "Abuse of cyber space as means of mass communication, Zloupotreba kiber prostora kao sredstva masovne komunikacije",
volume = "64",
number = "3",
pages = "157-183"
}
Putnik, N.,& Miljković, M.. (2012). Abuse of cyber space as means of mass communication. in Vojno delo
Ministarstvo odbrane Srbije - Vojnoizdavački zavod, Beograd., 64(3), 157-183.
Putnik N, Miljković M. Abuse of cyber space as means of mass communication. in Vojno delo. 2012;64(3):157-183..
Putnik, Nenad, Miljković, Milan, "Abuse of cyber space as means of mass communication" in Vojno delo, 64, no. 3 (2012):157-183.

Teorije konflikata

Milašinović, Radomir; Milašinović, Srđan; Putnik, Nenad

(Univerzitet u Beogradu, Fakultet bezbednosti, Beograd, 2012)

TY  - BOOK
AU  - Milašinović, Radomir
AU  - Milašinović, Srđan
AU  - Putnik, Nenad
PY  - 2012
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/177
PB  - Univerzitet u Beogradu, Fakultet bezbednosti, Beograd
T1  - Teorije konflikata
ER  - 
@book{
author = "Milašinović, Radomir and Milašinović, Srđan and Putnik, Nenad",
year = "2012",
publisher = "Univerzitet u Beogradu, Fakultet bezbednosti, Beograd",
title = "Teorije konflikata"
}
Milašinović, R., Milašinović, S.,& Putnik, N.. (2012). Teorije konflikata. 
Univerzitet u Beogradu, Fakultet bezbednosti, Beograd..
Milašinović R, Milašinović S, Putnik N. Teorije konflikata. 2012;..
Milašinović, Radomir, Milašinović, Srđan, Putnik, Nenad, "Teorije konflikata" (2012).

The role of social networks for modern sociopolitical and security events

Bošković, Milica; Putnik, Nenad

(2011)

TY  - CONF
AU  - Bošković, Milica
AU  - Putnik, Nenad
PY  - 2011
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/125
AB  - From the technological, sociological, political and then security point of view, Internet has made a breakthrough for understanding the functioning of everyday living and working. As a modern and now the inevitable form of communication, social network entails a complex sociopolitical and security implications. In recent years, social networks are becoming an indispensable element in the gathering of political activists and starting the sociopolitical changes. In addition, the possibility for misuse of stored information and manipulation of social netowrks' members, make them a risk factor for national, corporate and individual security.
C3  - 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers
T1  - The role of social networks for modern sociopolitical and security events
T1  - Uloga društvenih mreža u savremenim socio-političkim i bezbednosnim pojavama
SP  - 110
EP  - 113
DO  - 10.1109/TELFOR.2011.6143505
ER  - 
@conference{
author = "Bošković, Milica and Putnik, Nenad",
year = "2011",
abstract = "From the technological, sociological, political and then security point of view, Internet has made a breakthrough for understanding the functioning of everyday living and working. As a modern and now the inevitable form of communication, social network entails a complex sociopolitical and security implications. In recent years, social networks are becoming an indispensable element in the gathering of political activists and starting the sociopolitical changes. In addition, the possibility for misuse of stored information and manipulation of social netowrks' members, make them a risk factor for national, corporate and individual security.",
journal = "2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers",
title = "The role of social networks for modern sociopolitical and security events, Uloga društvenih mreža u savremenim socio-političkim i bezbednosnim pojavama",
pages = "110-113",
doi = "10.1109/TELFOR.2011.6143505"
}
Bošković, M.,& Putnik, N.. (2011). The role of social networks for modern sociopolitical and security events. in 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers, 110-113.
https://doi.org/10.1109/TELFOR.2011.6143505
Bošković M, Putnik N. The role of social networks for modern sociopolitical and security events. in 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers. 2011;:110-113.
doi:10.1109/TELFOR.2011.6143505 .
Bošković, Milica, Putnik, Nenad, "The role of social networks for modern sociopolitical and security events" in 2011 19th Telecommunications Forum, TELFOR 2011 - Proceedings of Papers (2011):110-113,
https://doi.org/10.1109/TELFOR.2011.6143505 . .
1

Nacionalna bezbednost i bezbednost informacija

Putnik, Nenad

(JP Službeni glasnik i Univerzitet u Beogradu - Fakultet bezbednosti, Beograd, 2010)

TY  - CHAP
AU  - Putnik, Nenad
PY  - 2010
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/75
PB  - JP Službeni glasnik i Univerzitet u Beogradu - Fakultet bezbednosti, Beograd
T2  - Rizik, moć, zaštita : uvođenje u nauke bezbednosti
T1  - Nacionalna bezbednost i bezbednost informacija
SP  - 200
EP  - 224
ER  - 
@inbook{
author = "Putnik, Nenad",
year = "2010",
publisher = "JP Službeni glasnik i Univerzitet u Beogradu - Fakultet bezbednosti, Beograd",
journal = "Rizik, moć, zaštita : uvođenje u nauke bezbednosti",
booktitle = "Nacionalna bezbednost i bezbednost informacija",
pages = "200-224"
}
Putnik, N.. (2010). Nacionalna bezbednost i bezbednost informacija. in Rizik, moć, zaštita : uvođenje u nauke bezbednosti
JP Službeni glasnik i Univerzitet u Beogradu - Fakultet bezbednosti, Beograd., 200-224.
Putnik N. Nacionalna bezbednost i bezbednost informacija. in Rizik, moć, zaštita : uvođenje u nauke bezbednosti. 2010;:200-224..
Putnik, Nenad, "Nacionalna bezbednost i bezbednost informacija" in Rizik, moć, zaštita : uvođenje u nauke bezbednosti (2010):200-224.

Sajber prostor i bezbednosni izazovi

Putnik, Nenad

(Fakultet bezbednosti, Beograd, 2009)

TY  - BOOK
AU  - Putnik, Nenad
PY  - 2009
UR  - https://rhinosec.fb.bg.ac.rs/handle/123456789/32
PB  - Fakultet bezbednosti, Beograd
T1  - Sajber prostor i bezbednosni izazovi
ER  - 
@book{
author = "Putnik, Nenad",
year = "2009",
publisher = "Fakultet bezbednosti, Beograd",
title = "Sajber prostor i bezbednosni izazovi"
}
Putnik, N.. (2009). Sajber prostor i bezbednosni izazovi. 
Fakultet bezbednosti, Beograd..
Putnik N. Sajber prostor i bezbednosni izazovi. 2009;..
Putnik, Nenad, "Sajber prostor i bezbednosni izazovi" (2009).