This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.
Background: This is an ecological study that analyzes suicides committed in Montenegro during the 2000-2018 period, taking into account gender, age and methods of suicide. Methods: Suicide rates and trends up until 2009 were obtained from the official registers of Bureau of Statistics of Montenegro (MONSTAT) while the later data were obtained from the Department of Interior’s. MONSTAT also provided data on unemployment and average salary. As per statistical methods, descriptive and correlations were calculated. Results: The average crude suicide rate was 21.06, for males 29.93 and for females 12.42. Crude suicide rates were not associated with unemployment rate or average salary. However, the unemployment rate was significantly correlated with lethal methods of suicide, namely suicide by firearm and by hanging. Average net salary was negatively correlated with suicide by firearm. Conclusions: The ratio of males and females who committed suicide was 2.41. In the last three years, this ratio continues to rise in favor of males (reaching 4.29 in 2018). This could be explained by specific cultural features where males are expected to be the main financial contributors to the households. The labor market of Montenegro does not offer adequate opportunities to set and maintain a stable economic situation which puts additional pressure and stress on males.
With a different violent forms and sorts, extremism continued progress in the 21'st century. Regardless sources that encourage it, violent extremism goes beyond national and regional borders and gets global tendencies. Waves of current violent religious extremism, have gained more importance with the spread of terrorism, especially because of the prominent impact on global security. Understanding of modern terrorism is not separated from the violent extremism and radicalization, which are considered as incentives for terrorism. The consistency of these security challenges is confirmed through their presence at all levels, from national and regional, to global security. The fact is that terrorism, violent extremism and radicalization are present in national security policies, as major challenges for security which need to be more efficient opposed. Reflection of the global challenges of spreading violent extremism and radicalization as an incitements for terrorism is quite present in the Western Balkans region. All Western Balkans countries have experienced these challenges, especially during the most dangerous phase of conflicts in Syria and Iraq 2012-2017, due to the participation of Balkan fighters in their battlefields.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.