Roland Kelemen

58283156900

Publications - 8

The Connections Between Social Media Platforms and Hybridity

Publication Name: Palgrave Studies in Digital Inequalities

Publication Date: 2025-01-01

Volume: Part F742

Issue: Unknown

Page Range: 105-123

Description:

The method of hybrid threats and the underlying conceptual framework have been widely investigated again since the second half of the 2000s, following Hezbollah’s tangible military success in Lebanon against the Israel Defense Forces in 2006. This was exacerbated by the activities of the Islamic State, which conducted a sophisticated and rather aggressive marketing campaign, and developed psychological warfare in cyberspace to a high level. Various operations in the context of the Ukrainian crisis and the Russian annexation of Crimea have once again brought hybrid warfare into the spotlight. The hybrid equipments are not new in history, but their success has been obviously enhanced by the development of technology, especially cyberspace and the wide range of opportunities cyberspace offers. Following the Russian–Ukrainian crisis, it has also become clear that hybrid instruments can not only appear as parts of a complex interstate conflict but that some of their elements can be used on their own. Clear examples of this include various disinformation campaigns. In this paper, the authors highlight, through a characterisation of hybrid conflicts, the extent to which the use of soft assets is an immanent part of contemporary military operations. The filtering practices and mechanisms, economic and market perceptions of social media platforms can be used to conduct disinformation campaigns.

Open Access: Yes

DOI: 10.1007/978-3-031-83479-0_6

Legal Framework and Data Storage Background of Online Collected Data for Predictive Maintenance and Repair Purposes in the Automotive Sector in the European Union

Publication Name: IEEE Access

Publication Date: 2025-01-01

Volume: 13

Issue: Unknown

Page Range: 157986-158000

Description:

This research begins with a simple but essential question: In predictive vehicle maintenance, where should raw data from a car be stored? Some argue that it makes sense to keep it within the vehicle, managed directly by its control units. Others prefer sending it to a backend system for evaluation by larger models. We found that this decision cannot be made based solely on technical reasoning. The legal conditions surrounding personal data, cybersecurity, product responsibility, and AI-based systems in the European Union carry equal weight in shaping feasibility. These regulations not only impose constraints but also actively influence the design and application of such technologies in real-world scenarios. The findings suggest that legal barriers frequently limit implementation more than current technical capabilities. Addressing these constraints early in the design process is crucial, as they define not only what types of data processing are permitted but also how predictive maintenance services can be delivered to users. To support responsible development, this study proposes a legal-technical framework tailored to the European regulatory landscape. It aligns predictive maintenance systems with key European Union regulations, including the GDPR, Cybersecurity Act, Cyber Resilience Act, and AI Act.

Open Access: Yes

DOI: 10.1109/ACCESS.2025.3594772

The Most Significant Case of Military Supplier Fraud in Hungary During the First World War: The Criminal Judgement of the Cloth-Fraud Case Based on the Judgements of the Military Courts of the Time

Publication Name: Journal on European History of Law

Publication Date: 2025-01-01

Volume: 16

Issue: 1

Page Range: 154-161

Description:

In the first year of the First World War, several cases of war transport abuse came to light in Hungary, which were of great social interest and caused extremely significant material and moral damage. One of the largest of these was the so-called baized fraud case. The special feature of these cases is that some of the defendants are military personnel, while others have civilian status. In Hungary, the practice has developed that both categories of persons are tried by military courts. This study aims to provide a comprehensive overview of the historical facts of the case, the legal context of the case and the decisions of the courts at first and second instance.

Open Access: Yes

DOI: DOI not available

Cyberfare State1 Concept The Impact of the Transformation of Individuals and Their Relationships on the Functioning and Security of the State

Publication Name: Journal of Information Ethics

Publication Date: 2024-09-01

Volume: 33

Issue: 2

Page Range: 37-48

Description:

The study builds on the basic idea of the cyberfare state model to show the impact of cyberspace on individuals and their interconnections; i.e., the social networks. In doing so, it shows that the basic characteristics of these segments of the social totality have undergone significant qualitative and quantitative changes in recent decades, shaping their dynamics, malleability and overall impact on state security. Accordingly, the state had to respond to this phenomenon, to which they gave different answers based on their relationship to the rule of law. The states of the smart total control cyberfare state have moved toward Orwellian rule, also using the achievements of cyberspace, while in the case of democratic states the only way forward is to strengthen the capabilities of individuals (users) and increase their knowledge. In the second half of the paper, the author reviews the steps taken to this end.

Open Access: Yes

DOI: 10.2307/JIE.33.2.37

The Impact of Digital Inequality on IT Identity in the Light of Inequalities in Internet Access

Publication Name: Elte Law Journal

Publication Date: 2024-01-01

Volume: 2024

Issue: 2

Page Range: 173-186

Description:

This article investigates the relationship between the United Nations Sustainable Development Goals (SDG) and Internet access, focusing on how digital connectivity influences the achievement of these global objectives. This research examines digital inequalities in access, usage, skills and outcomes through a mixed-methods approach, including statistical analysis and case studies. The findings indicate a strong correlation between Internet access and progression towards the European sustainability goals related to education quality, gender equality and industry innovation. In particular, it can be shown that where Internet access indicators are lower, digital literacy and IT identity scores are also lower for society as a whole, impacting both the quality of education and social mobility, while simultaneously reducing the economic competitiveness of the respective state. We can also see that these societies have a more patriarchal approach, negatively impacting the social status of women (although the COVID-19 epidemic negatively impacted social resilience, too) while further harming progress towards the Sustainable Development Goal associated with education. Significant disparities are also identified, particularly affecting rural areas, women, children and marginalised communities. The article futher explores IT identity, revealing that a strong IT identity enhances digital inclusion and empowerment. Article results highlight the necessity of addressing digital inequalities to ensure the equitable distribution of digital benefits and advocating for Internet access as a fundamental right essential to achieving global sustainability and Internet equality.

Open Access: Yes

DOI: 10.54148/ELTELJ.2024.2.173

Cybersecurity and cybercrime: Current trends and threats

Publication Name: Journal of International Studies

Publication Date: 2024-01-01

Volume: 17

Issue: 2

Page Range: 220-239

Description:

The rapid development of digital technologies and their active implementation in all spheres of the economy, on the one hand, contribute to increased control over the activities of economic entities, and on the other hand, create new challenges associated with the dynamic development of cybercrime. The purpose of the article is to analyze the global trends in cybercrime in 2016-2023 (by calculating national levels of cybercrime) and to model the mechanisms of combating it in order to form a global, open and safe cyberspace, protect the population from cyber threats and cyber fraud, increase the effectiveness of financial monitoring procedures and control over transactions in cyberspace. The article presents the dominant directions, evolutionary, temporal and spatial patterns of the development of crime in cyberspace, clustering of the countries,and identification of leaders and outsiders in the field of cybercrime (through visualization density maps based on the construction of self-organized Kohonen maps). The results of the calculations confirm a significant increase in the level of cybercrime in the world since 2016 (in particular, due to the COVID-19 pandemic and active digital transformation). A comparative analysis of the indicator across countries made it possible to distinguish those with the highest rates of cybercrime (Slovenia, Iceland, Moldova, Georgia) and those with a significantly higher level of cyber security (Greece, Belgium, France, Germany).

Open Access: Yes

DOI: 10.14254/2071-8330.2024/17-2/12

To the Margin of the Theory of a New Type of Warfare Examining Certain Aspects of Cyber Warfare

Publication Name: Hungarian Yearbook of International Law and European Law

Publication Date: 2019-01-01

Volume: 7

Issue: 1

Page Range: 203-226

Description:

In the second half of the 20th century, humanity went through an unprecedented technical and technological development. As a result, technological innovations emerged in the course of the last third of the century which have now become indispensable parts of everyday life, the whole society and even the state. Among them, we must mention the IT sector, which has effectively enabled global contacts and communication between people and organizations across different parts of the world through various tools, programs and networks. Moreover, it also facilitates and simplifies everyday tasks both in the private and the public sector. Cyberspace is a unique and complex phenomenon, since it can be described with physical and geographical concepts, but in addition, its virtual features also have extraordinary relevance. As a result of its remarkable expansion, fundamental areas such as sociology, geopolitics, security policy or warfare must also be reconsidered. This paper provides an overview of the new types of security challenges for the 21st century, most notably security risks related to the cyberspace. In addition, some aspects of cyber warfare, such as cyber intelligence, cyber attack and cyber defense are examined. Particular attention is given to the question whether a cyber attack in itself can reach the level of an armed attack, and if so, what means can be used by the State under attack in defense.

Open Access: Yes

DOI: 10.5553/HYIEL/266627012019007001012

From Voice to Action: Upholding Children’s Right to Participation in Shaping Policies and Laws for Digital Safety and Well-Being

Publication Name: Societies

Publication Date: 2025-09-01

Volume: 15

Issue: 9

Page Range: Unknown

Description:

While the digital environment offers new opportunities to realise children’s rights, their right to participation remains insufficiently reflected in digital policy frameworks. This study analyses the right of the child to be heard in the academic literature and in the existing international legal and EU regulatory frameworks. It explores how children’s participation right is incorporated into EU and national digital policies and examines how genuine engagement can strengthen children’s digital resilience and support their well-being. By applying the 7C model of coping skills and analysing its interaction with the right to participation, the study highlights how these elements mutually reinforce the achievement of the Sustainable Development Goals (SDGs). Through a qualitative analysis of key strategic documents and the relevant policy literature, the research identifies the tension between the formal acknowledgment of children’s right to participate and its practical implementation at law- and policy-making levels within the digital context. Although the European Union’s examined strategies emphasise children’s participation, their practical implementation often remains abstract and fragmented at the state level. While the new BIK+ strategy shows a stronger formal emphasis on child participation, this positive development in policy language has not yet translated into a substantive change in children’s influence at the state level. This nuance highlights that despite a positive trend in policy rhetoric, the essential dimension of genuine influence remains underdeveloped.

Open Access: Yes

DOI: 10.3390/soc15090243