Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 14 results:
RTF
EndNote XML
Filters:
Keyword
is
strategy
[Clear All Filters]
2023
Antonova, Gergana
,
Niya Prisadashka
,
Radoslav Dimitrov
,
Ioan Yonkov
,
Daniel Radev
,
Hristo Pavlov
,
Mario Mladenov
, and
Ilian Grigorov
.
Cybercrime Strategy (modeling example)
In
IT4Sec Reports
., 2023.
DOI
Google Scholar
RTF
EndNote XML
2022
Holota, Olena
, and
Oleksandr Tytkovskyi
.
"
Leadership in Developing a Strategy for Military Human Resource Management as Part of Capabilities-Based Defense Planning
."
Connections: The Quarterly Journal
21, no. 1 (2022): 45-59.
DOI
Google Scholar
RTF
EndNote XML
2021
Vilím, Lukáš
.
"
Evolution of Police Roles in Combatting Cybercrime in the Czech Republic, 2015-2020
."
Connections: The Quarterly Journal
20, no. 2 (2021): 15-20.
DOI
Google Scholar
RTF
EndNote XML
2020
Tabansky, Lior
.
"
Israel Defense Forces and National Cyber Defense
."
Connections: The Quarterly Journal
19, no. 1 (2020): 45-62.
DOI
Google Scholar
RTF
EndNote XML
2019
Smith, Paul Alan
.
"
Strategy Development and Implementation in a Complex Multi-National IT Organisation
."
Information & Security: An International Journal
42 (2019): 13-32.
DOI
Google Scholar
RTF
EndNote XML
2016
Fryc, Mariusz
.
"
From Wales to Warsaw and Beyond: NATO’s Strategic Adaptation to the Russian Resurgence on Europe’s Eastern Flank
."
Connections: The Quarterly Journal
15, no. 4 (2016): 45-65.
DOI
Google Scholar
RTF
EndNote XML
Wither, James K.
.
"
Making Sense of Hybrid Warfare
."
Connections: The Quarterly Journal
15, no. 2 (2016): 73-87.
DOI
Google Scholar
RTF
EndNote XML
Klaic, Aleksandar
.
"
A Method for the Development of Cyber Security Strategies
."
Information & Security: An International Journal
34, no. 1 (2016): 37-55.
DOI
Google Scholar
RTF
EndNote XML
Čajić, Jasmin
.
"
The Relevance of Clausewitz’s Theory of War to Contemporary Conflict Resolution
."
Connections: The Quarterly Journal
15, no. 1 (2016): 72-78.
DOI
Google Scholar
RTF
EndNote XML
Poposka, Vesna
.
"
The Urge for Comprehensive Cyber Security Strategies in the Western Balkan
."
Information & Security: An International Journal
34, no. 1 (2016): 25-36.
DOI
Google Scholar
RTF
EndNote XML
2015
Tasevski, Predrag
.
"
Macedonian Path Towards Cybersecurity
."
Information & Security: An International Journal
32, no. 2 (2015): 109-119.
DOI
Google Scholar
RTF
EndNote XML
2013
Nerlich, Uwe
.
"
Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider?
"
Information & Security: An International Journal
29, no. 1 (2013): 77-87.
DOI
Google Scholar
RTF
EndNote XML
2012
Kozma, Tibor
.
"
Understanding Gender Mainstreaming in Modern Law Enforcement
."
Connections: The Quarterly Journal
11, no. 2 (2012): 87-94.
DOI
Google Scholar
RTF
EndNote XML
2009
Murphy, Robert K.
, and
Richard G. Cathers
.
"
Transparency in Force Modernization Decisions
."
Information & Security: An International Journal
23, no. 2 (2009): 207-223.
DOI
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance