Political Science and Security Studies Journal http://psssj.eu/index.php/ojsdata <p>The <strong><em>“</em><em>Political Science and Security Studies Journal”</em> </strong>is a broad-based scientific journal aiming to be a pluralist platform for advancing academic knowledge and debate in the field of security and politics. The journal also publishes articles on further topics that fit the journal’s mission from scholars in related disciplines (sociology, philosophy, social psychology, economics and law).</p> <p> </p> en-US <p>The authors agree with the following conditions:</p> <p>1. Authors retain copyright and grant the journal right of first publication (<strong>Download agreement</strong>) with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</p> <p>2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.</p> <p>3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, <a href="https://www.ssrn.com/en/" target="_blank" rel="noopener">SSRN</a>, <a href="https://www.researchgate.net/" target="_blank" rel="noopener">ResearchGate</a>, <a href="https://mpra.ub.uni-muenchen.de/" target="_blank" rel="noopener">MPRA</a>, <a href="https://www.gesis.org/ssoar/home/" target="_blank" rel="noopener">SSOAR</a>, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4837983/" target="_blank" rel="noopener">The Effect of Open Access</a>).</p> psssjtim@gmail.com (Ivan) psssjtim@gmail.com (Ivan) Fri, 30 Jun 2023 00:00:00 +0300 OJS 3.2.1.1 http://blogs.law.harvard.edu/tech/rss 60 Employees’ attitudes towards diversity and diversity management http://psssj.eu/index.php/ojsdata/article/view/127 <p>The aim of the theoretical part of this article will be to describe diversity, its management, and different approaches to its implementation. I will also address the main areas related to diversity. This section will be based on the literature review and comparisons made among the authors.</p> <p>The practical part will deal with the application of diversity in four Information Technology (IT) companies. The aim of this section will be to find out the attitude of employees of chosen IT companies towards diversity. This objective will be achieved by means of a quantitative research investigation which will verify three established hypotheses. The first of these hypotheses sounds as follows: Employees identify themselves with their company’s approach to diversity. The second hypothesis is: The environment in smaller companies is more diverse than in large and medium-sized ones, and the third hypothesis reads: Graduates are perceived to be more contributing people than those who are 50+ years old.</p> Tomasz Czapran Copyright (c) 2023 Tomasz Czapran https://creativecommons.org/licenses/by/4.0/ http://psssj.eu/index.php/ojsdata/article/view/127 Sun, 02 Jul 2023 00:00:00 +0300 The The Shrinking Space of Democracy in Africa: Comparative Reflections from 2005-2020 Presidential Terms in Tanzania http://psssj.eu/index.php/ojsdata/article/view/115 <p>African countries mostly hatched from the claws of colonialism in the 1960s. During the independence ages, most of these countries were subjected to state-political parties where single-party supremacy controlled the state trajectories. The dominance of a single-party system aimed at the so-called strengthening of national unity among the citizens. However, the calling for global changes from the 1980s to 1990s influenced the political transformations of post-independence Africa which finally welcomed the democratization process. Tanzania danced the tune and from 1990 the country shifted to multiparty democracy. Since then, opposition political parties have bemoaned the country's political exercise because of its political partiality. Theoretically, multiparty politics is supposed to create neutral political grounds for all competing political groups when it comes to power contestations. Political reports from different stakeholders provide contrasting political space for competing political parties from 2005-2020 in Tanzania. This paper has, therefore, analyzed various political-related works of literature to assess the state of political activities within two presidential terms. Findings depicted that, the 2005-2015’s presidential term provided somehow neutral political ground compared to the 2015-2020’s presidential reign. Therefore, it is high time for Africa and Tanzania to accommodate all political actors for the well-being of the people, since shrinking of the political space under multiparty democracy has always been the sole key to causalities, immigration, economic downfall, hostilities, political hectic and other malpractices within the state.</p> Fadhili Mtani, Jumanne Ngohengo Copyright (c) 2023 Fadhili Mtani, Jumanne Ngohengo https://creativecommons.org/licenses/by/4.0/ http://psssj.eu/index.php/ojsdata/article/view/115 Sun, 02 Jul 2023 00:00:00 +0300 Debt management for sustainable infrastructure development: a systematic review http://psssj.eu/index.php/ojsdata/article/view/116 <p>Public debt managers coordinate public borrowing and ensure a consistent, sustainable, and methodical debt management practice. Nigeria has been borrowing from sources that include multilateral, bilateral, and commercial lenders in a bid to fill its infrastructural gap. As of 2022, Nigeria’s public debt stood at US$101.9 billion which comprised US$62.2 billion in domestic debt and US$39.6 billion in external debt. However, despite the loans contracted over the years, there is an observed gap between her accumulated debt and the level of infrastructural development. The study, therefore, investigated debt management in Nigeria and its imperative for sustainable infrastructural development. The study employed a mixed-methods design. SPSS-based inferential statistics and content analysis were employed in data analysis. The study found that public debt management has no significant effect on sustainable infrastructural development in Nigeria (β = 0.002, t (198) = 0.040, p &gt; 0.05. The study concluded that public debt management has no significant effect on sustainable infrastructural development in Nigeria. The National Assembly and the Federal Ministry of Finance should ensure that newly contracted external loans are tied to specific projects. The Federal Ministry of Finance in conjunction with the debt management office should create a special purpose vehicle for packaging domestic infrastructure bonds.</p> Gabriel Lola Oriloye, Dr Olayinka, Professor Oni Copyright (c) 2023 Gabriel Lola Oriloye, Dr Olayinka, Professor Oni https://creativecommons.org/licenses/by/4.0/ http://psssj.eu/index.php/ojsdata/article/view/116 Sun, 02 Jul 2023 00:00:00 +0300 Electronic government: theoretical foundations and directions of an action http://psssj.eu/index.php/ojsdata/article/view/120 <p>The presented article describes the theoretical foundations and modern role of e-government as an important factor in increasing the efficiency of public administration. Methods of evaluating the levels of electronic services are analyzed. Various models of state policy are shown in the formation of electronic government.</p> <p>The article also shows the emergence of e-government in the Republic of Azerbaijan, its main directions and principles of operation.</p> Nazim Ibadov, Nuran Mammadli Copyright (c) 2023 Nuran Mammadli, Ph.D in Philosophy, Associate professor https://creativecommons.org/licenses/by/4.0/ http://psssj.eu/index.php/ojsdata/article/view/120 Sun, 02 Jul 2023 00:00:00 +0300 Military and political decisions: essence, content, classification http://psssj.eu/index.php/ojsdata/article/view/126 <p>The study is based on the experience of the development and practical implementation of military-political decisions aimed at countering russian aggression by the state authorities of Ukraine. On this basis, the essence and content of military-political decisions are determined, the main approaches to their classification are proposed, taking into account the latest hybrid wars. The conclusions indicate the objective nature of the problem of military-political decisions in the state-building process. The research hypothesis was to prove the primacy of state military-political decisions in modern Ukraine over non-state ones. This hypothesis is generally proven. The main research methods were: historical, institutional, structural-functional, operational, comparative, regulatory and legal methods.</p> Mykola Sen Copyright (c) 2023 Mykola Sen https://creativecommons.org/licenses/by/4.0/ http://psssj.eu/index.php/ojsdata/article/view/126 Sun, 02 Jul 2023 00:00:00 +0300 Elements of cyber security in public territorial administration of Slovakia in regional self-governments http://psssj.eu/index.php/ojsdata/article/view/129 <p>The article is interested in describing the basic legislative procedures for the creation of effective protection of the level of public administration – a self-governing region against incidents of the current modern infrastructure in the field of information and cyber systems. Among the most important steps in the preparation and implementation of an appropriate security directive and the introduction of measures in information and cyber security are the role and position of the cyber security manager, the advisory body – the security committee of the self-governing region, as well as the significant importance of the audit of critical threats and rules in the field of information and cyber security. The creation of suitable security rules is increasingly coming to the fore even in relatively non-progressive public administration.</p> Jana Béreš Furmanová, Dominik Béreš Copyright (c) 2023 Jana Béreš Furmanová, Dominik Béreš https://creativecommons.org/licenses/by/4.0/ http://psssj.eu/index.php/ojsdata/article/view/129 Fri, 30 Jun 2023 00:00:00 +0300