Political Science and Security Studies Journal http://psssj.eu/index.php/ojsdata <p>The <strong><em>“</em><em>Political Science and Security Studies Journal”</em> </strong>is a broad-based scientific journal aiming to be a pluralist platform for advancing academic knowledge and debate in the field of security and politics. The journal also publishes articles on further topics that fit the journal’s mission from scholars in related disciplines (sociology, philosophy, social psychology, economics and law).</p> <p> </p> High school of the social and economic en-US Political Science and Security Studies Journal 2719-6410 <p>The authors agree with the following conditions:</p> <p>1. Authors retain copyright and grant the journal right of first publication (<strong>Download agreement</strong>) with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</p> <p>2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.</p> <p>3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, <a href="https://www.ssrn.com/en/" target="_blank" rel="noopener">SSRN</a>, <a href="https://www.researchgate.net/" target="_blank" rel="noopener">ResearchGate</a>, <a href="https://mpra.ub.uni-muenchen.de/" target="_blank" rel="noopener">MPRA</a>, <a href="https://www.gesis.org/ssoar/home/" target="_blank" rel="noopener">SSOAR</a>, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4837983/" target="_blank" rel="noopener">The Effect of Open Access</a>).</p> The Rohingya refugees' prolonged presence in Bangladesh: non-traditional security threats to the region http://psssj.eu/index.php/ojsdata/article/view/98 <p>The presence of refugees for an extended period of time may cause a slew of security issues in the host country. This study looked at the worrying sectors of non-traditional security and management issues produced by the Rohingya refugee crisis in Bangladesh. Environmental deterioration, economic risks, political, and social unrest are all linked to non-traditional security threats. Bangladesh is deeply concerned about the internal strife within the Rohingya refugee and extremist groups. The prolonged stay of a large number of refugees in Bangladesh has become a concern, complicating issues of socioeconomic, environmental, and personal security. Because of the current inflow of Rohingya immigrants into Bangladesh, this qualitative research has mostly focused on non-traditional security issues. The study looked into whether the presence of Rohingya refugees caused any security concerns. Although the thorough literature study has improved awareness of the idea and concerns of non-traditional security, the research questions have highlighted the research difficulties through qualitative interviews. Thematic analysis of the transcript was employed in this study. The study's findings have provided an opportunity to investigate the non-traditional security threat brought on by the presence of Rohingya refugees in Bangladesh from a different angle.</p> Shamim Hosen Copyright (c) 2023 Shamim Hosen https://creativecommons.org/licenses/by/4.0/ 2022-12-31 2022-12-31 3 4 3 14 10.5281/zenodo.7526439 Police brutality and its impact on human rights: a comparative analysis of Nigeria and the United States of America (2015-2020) http://psssj.eu/index.php/ojsdata/article/view/99 <p>Human rights are often violated by individuals acting on behalf of the state. Police brutality reflects the struggle within the law enforcement circle to operate within the ambit of the legally allowed threshold needed to diffuse an incidence like civil disturbance or self-preservation by the law enforcement officers. Previous studies have been limited to the causes, consequences, and impact of police brutality and the generational economic effects on the minority groups. But few of these studies have investigated the historical, cultural, and political backgrounds to police brutality in the selected countries. This study, therefore, examined police brutality in Nigeria and the United States of America. The paper adopted a phenomenology research design. This enabled the researcher to gain deeper understanding of the study phenomena by exploring the views of those who directly experienced policy brutality in the selected countries. The study found that police brutality is deeply rooted in the colonial past of the two countries. The countries were both colonized by the British and they both inherited their system of social justice from the same colonial heritage. The study found areas of similarities and differences between the Nigerian policing system and the United States of America’s policing culture. The study revealed that the failure of the police force in the two countries to rein in corrupt elements in their rank is one of the motivating factors encouraging police brutality in Nigeria and the United States of America. The study also highlighted the negative effects of corruption in the Nigeria Police and the role it plays in police brutality in Nigeria. The study, therefore, recommended comprehensive reform in Nigeria police force and that Police officers should be retrained on racial and minority sensitivity in the United States of America to reduce the incidence of police brutality.</p> Gabriel Lola Oriloye Olayinka Babatune Adebogun Copyright (c) 2023 Gabriel Lola Oriloye, Olayinka Babatune Adebogun https://creativecommons.org/licenses/by/4.0/ 2022-12-31 2022-12-31 3 4 15 26 10.5281/zenodo.7535098 Application of economic analysis in audit efficiency of investments in the modernization of weapons http://psssj.eu/index.php/ojsdata/article/view/110 <p>The article examines one of the typical problems for the practice of internal auditors of the Defense Ministry of Ukraine, which is related to the need to increase the reliability and provability of audit conclusions of the financial and material resources management system, using the example of checking the expediency of realization investment projects.</p> <p>To solve the mentioned problem, a methodology is proposed based on the involvement of military-economic analysis approaches to audit procedures by conducting a comparative juxtaposition of the ratio of costs for the modernization of a sample of weapons and benefits from its implementation and probability indicators of the effectiveness of the use of a sample of weapons before and after its modernization.</p> <p>For the practical use of the proposed methodology, an example is given for a specific sample of weapons with a detailed review of the procedures of the methodology and substantiation of the selected chosen conditions and the obtained results.</p> <p>In order to analyze the results of the audit and make a final decision in the relevant authority, it is proposed to compile the calculations into a summary table, convenient for users of the audit report.</p> <p>It is noted that the proposed method of evaluating the effectiveness of investments in the modernization of weapons can be extended to a wide range of military equipment with the appropriate correction of conditions and technical and economic indicators.</p> Julia Lutsik Pavlo Parkhomenko Lyudmila Panasenko Stanislav Slobodianyk Oleg Onofriychuk Yurii Punda Copyright (c) 2022 Julia Lutsik, Pavlo Parkhomenko, Lyudmila Panasenko, Stanislav Slobodianyk, Oleg Onofriychuk, Yurii Punda https://creativecommons.org/licenses/by/4.0/ 2022-12-31 2022-12-31 3 4 27 34 10.5281/zenodo.7581821 Formulation of the problem of creating advanced remote-controlled demining systems http://psssj.eu/index.php/ojsdata/article/view/114 <p>The experience of combat operations in modern military conflicts has shown that one of their dangerous consequences is the contamination of territories with explosive objects that pose a threat to both the military and civilians. At the same time, one of the main problematic issues is the significant excess of the rate of development of mine weapons compared to the rate of development of mine action equipment. Ukraine is no exception, which, due to the full-scale aggression of the russian federation, has become the most explosive contaminated country in the world.</p> <p>The analysis of the use of explosive devices in the war of the russian federation against Ukraine shows that the enemy uses the entire range of mine weapons available to it, including those prohibited by international conventions. An analysis of the available demining equipment in the engineering units of the Armed Forces of Ukraine shows their obsolescence and low efficiency, as well as the lack of remote-controlled demining systems. At the same time, the main method of performing demining tasks both in the conditions of hostilities and in the absence of them is manual, which poses a great danger to sappers. Therefore, the creation of remote-controlled demining systems is an urgent task.</p> <p>The solution to this problem is proposed through the development of new principles of operation of advanced remote-controlled demining complexes, substantiation of possible options for the use of standard portable means of searching for explosive objects on remotely controlled mobile platforms according to the concept of “Forward Edge Sapper”, substantiation of requirements for the structure and parameters of these complexes and implementation of the idea of creating a database of technical images of known explosive objects based on the obtained experimental data.</p> <p>This article presents a model of functioning of a remote-controlled demining system based on the formalization of the scientific problem using the theoretical-set approach, considering the experience of the enemy’s use of explosive objects during the war of the russian federation against Ukraine and the characteristics of means of their search and destruction.</p> Volodymyr Kotsiuruba Volodymyr Krivtsun Copyright (c) 2022 Volodymyr Kotsiuruba, Volodymyr Krivtsun https://creativecommons.org/licenses/by/4.0/ 2022-12-31 2022-12-31 3 4 35 41 10.5281/zenodo.7750447