<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Image of a Bulgarian Politician “With Epaulettes”: Advantages and Disadvantages</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">46</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The transformation of a good soldier into a good politician is a process the success of which depends on the characteristics that make up the profiles of these two groups of subjects. The study of the effectiveness of this transformation is argued with the frequent cases of its realization in the practice of institutions such as the Presidency, the National Assembly and the Council of Ministers. The material presents the results of a study, the purpose of which is not to deny the possibility of realizing the good employee with epaulettes at the high levels of the country's political system. Rather, the goal is to examine the effectiveness of transforming the model of the good employee with epaulettes into the model of the good politician, thereby creating the conditions for achieving results for the benefit of society.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Localism in cybersecurity – mission impossible</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">148</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Broad concepts such as the concepts of localism and deterritorialization could be successfully used to study specific objects such as cyber security as a function of cybercrime. Using the methods for analysis and synthesis, the challenges that deterritorialization poses to the strategic management of cyber security are brought out in the study. Summarizing these challenges allows the construction of the triangle of contradictions, which explains the thesis for the modern characteristics of cyberspace, where localism becomes a mission impossible, and deterritorialization raises cybersecurity problems that still have no particular solution.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Rights, Goals, Security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">45</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Rights, goals and security are terms, that have entered widely into people&amp;#39;s daily lives, but the interrelationship between them is rarely studied. Placed in a certain context and addressed to specific subjects, the study of the existing connections between rights, goals and security reveals dependencies and tendencies invisible in the interpretation of the concepts in separation. This report presents the results of a study of the interrelationships between the concepts of rights, goals and security, placed in the context of the university and addressed to students. The research is based on generally accepted methods, with the help of which the deviation of the degree of the current achievement of the objectives is measured from their target values. At the end of the research, based on the results, it is concluded that the current state of the rights given by the university to the students and the ways of their use leads to the generation of uncertainty.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Локализмът в киберсигурността – мисия невъзможна</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">детериториализация</style></keyword><keyword><style  face="normal" font="default" size="100%">киберпрестъпност</style></keyword><keyword><style  face="normal" font="default" size="100%">Киберпространство</style></keyword><keyword><style  face="normal" font="default" size="100%">киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">локализъм</style></keyword><keyword><style  face="normal" font="default" size="100%">триъгълник на противоречията</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">148</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Широкоспектърни концепции каквито са концепциите за локализъм и детериториализация могат успешно да бъдат използвани за изследване на специфични обекти какъвто е киберсигурността, разглеждана като функция на киберпрестъпленията. С помощта на методите за анализ и синтез се извеждат предизвикателствата, които детериториализацията поставя пред стратегическото управление на киберсигурността. Обобщаването на тези предизвикателства дава възможност за построяване на триъгълника на противоречията, който обяснява тезата за това, че при съвременните характеристики на киберпространството, „локализма“ се превръща в мисия невъзможна, а „детериториализацията“ извежда проблеми, касаещи киберсигурността, за които към настоящия момент няма решение.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">„Пагонизиране“ на Образа на Българския Политик: Предимства и Недостатъци</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">анализ</style></keyword><keyword><style  face="normal" font="default" size="100%">недостатъци</style></keyword><keyword><style  face="normal" font="default" size="100%">политик</style></keyword><keyword><style  face="normal" font="default" size="100%">предимства</style></keyword><keyword><style  face="normal" font="default" size="100%">профил</style></keyword><keyword><style  face="normal" font="default" size="100%">служител с пагони</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">46</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Трансформирането на модела на добрия служител с пагони в модела на добрия политик е процес, успехът на който зависи от характеристиките, които изграждат профилите на тези две групи субекти. Изследването на ефективността на тази трансформация се аргументира със зачестилите случаи за нейната реализация в практиката на институции, каквито са Президентство, Народно събрание и Министерски съвет. В материала се представят резултатите от изследване, целта на което не е&amp;nbsp; отричане на възможността за реализиране на добрия служител с пагони на високите нива в политическата система на страната. Целта по-скоро е да се изследва ефективността при трансформирането на модела на добрия служител с пагони в модел на добрия политик, при което да се създадат условия за постигане на резултати в полза на обществото.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Права, Цел, Сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">метрики</style></keyword><keyword><style  face="normal" font="default" size="100%">права</style></keyword><keyword><style  face="normal" font="default" size="100%">сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">студенти</style></keyword><keyword><style  face="normal" font="default" size="100%">университет</style></keyword><keyword><style  face="normal" font="default" size="100%">цел</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">45</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Правата, целите и сигурността представляват понятия, които са навлезли широко в ежедневието на хората, но рядко се търси взаимната връзка между тях. Поставени в определен контекст и адресирани към конкретни субекти изследването на съществуващите връзки между правата, целите и сигурността разкриват зависимости и тенденции, невидими при разделното тълкуване на понятията. В материала се представят резултатите от изследване на взаимната връзка между понятията права, цели и сигурност, поставени в контекстна на университета и адресирани към студентите. Изследването се базира на общоприети методи, с помощта на които се измерва отклонението на степента на текущото постигане на целите от техните целеви стойности. В края на изследването, на базата на резултатите, се прави извод за това, че моментното състояние на правата, давани от университета на студентите и начините за тяхното използване води до генериране на несигурност.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The ‘Balance’ As a Panacea for Achieving (Cyber)Security</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">145</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Decision-making in a complex, complex, multi-layered and multifactorial environment, such as the security environment, requires a balance between threat factors and strategies to counter them. In this sense, the search for a single, simple solution, seen as a panacea, is an irrational management approach. The report presents the results of a study to develop a model for balancing cybersecurity solutions.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Catalog of Human Factor Roles in Cyberspace</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">147</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The idea of developing a catalog of human roles in cyberspace comes from the understanding that in terms of security in the human-computer pair, the weak link is the human, and also from what the cliché says, namely that amateurs attack computers and professionals attack people. The creation of the catalog of roles provides a tool for achieving security in cyberspace by studying and knowing the specific characteristics of destructive roles and the respective constructive human factor roles.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">146</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Measuring the maturity of cybersecurity capabilities is a key element of the overall concept of building and maintaining security in cyberspace. The report presents the results of the creation of a model for assessing the maturity of cybersecurity capabilities as a combination of the advantages of the balanced scorecard and benchmark model. The developed model has the strength of theoretical validity and practical applicability.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Productive and Counter-Productive Balance in Security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">44</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The research efforts in the field of security strengthens its relevance in conditions of crises, which are not lacking in modern times. Returning to fundamental questions such as why security is important and what makes it difficult to create an acceptable level of security allows, on the one hand, to reveal some erroneous theses, and on the other hand, to add perspectives in the search for rational answers. The material draws a parallel between two types of security balances, defined as productive and counter-productive. Based on the comparison, challenges to finding balanced solutions to security issues viewed as multifactorial functions are presented.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">„Балансът“ Като Панацея за Постигане на (Кибер)Сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">баланс</style></keyword><keyword><style  face="normal" font="default" size="100%">заплахи</style></keyword><keyword><style  face="normal" font="default" size="100%">киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">контроли за сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">панацея</style></keyword><keyword><style  face="normal" font="default" size="100%">рискове</style></keyword><keyword><style  face="normal" font="default" size="100%">способности</style></keyword><keyword><style  face="normal" font="default" size="100%">сценарии</style></keyword><keyword><style  face="normal" font="default" size="100%">уязвимости</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">145</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Взимането на решения в сложна, комплексна, многослойна и мултифакторна среда, каквато е средата за сигурност, изисква постигане на баланс между факторите на заплахата и стратегиите за противодействие срещу тях. В този смисъл търсенето на единствено, опростено решение, разглеждано като панацея представлява нерационален управленски подход. В доклада се представят резултатите от изследване за разработване на модел за балансиране на решенията в сферата на киберсигурността. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Атанас Кузманов</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Каталог от роли на човешкия фактор в киберпространството</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">деструктивни роли</style></keyword><keyword><style  face="normal" font="default" size="100%">Киберпространство</style></keyword><keyword><style  face="normal" font="default" size="100%">киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">конструктивни роли</style></keyword><keyword><style  face="normal" font="default" size="100%">хакери</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">147</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Идеята за разработване на каталог от роли на човешкия фактор в киберпространството идва от разбирането за това, че от гледна точка на сигурността в двойката човек-компютър по-слабото звено е човека, също така и от това, което клишето казва, а именно че аматьорите атакуват компютрите, а професионалистите атакуват хората. Създаването на каталога от роли предоставя инструмент за постигане на сигурност в киберпространството чрез изучаване и познаване на специфичните характеристики на деструктивните роли и адресираните към тях конструктивни роли на човешкия фактор. 
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Модел за Оценяване на Зрелостта на Способностите за Киберсигурност на Базата на Балансирана Карта от Показатели за Ефективност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">бенчмарк</style></keyword><keyword><style  face="normal" font="default" size="100%">ефективност</style></keyword><keyword><style  face="normal" font="default" size="100%">зрялост</style></keyword><keyword><style  face="normal" font="default" size="100%">киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">модел</style></keyword><keyword><style  face="normal" font="default" size="100%">способности</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">146</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Измерването на зрелостта на способностите за киберсигурност е ключов елемент от цялостната концепция за изграждане и поддържане на сигурност в киберпространството. В доклада се представят резултатите от създаването на модел за оценяване на зрелостта на способностите за киберсигурност като съчетание от предимствата на балансираната карта от показатели за ефективност и бенчмарк модел. Разработеният модел притежава силата на теоретичната обоснованост и практическата приложимост. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Продуктивен и Контра Продуктивен Баланс в Сигурността</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">баланс</style></keyword><keyword><style  face="normal" font="default" size="100%">заплахи</style></keyword><keyword><style  face="normal" font="default" size="100%">ресурси</style></keyword><keyword><style  face="normal" font="default" size="100%">риск</style></keyword><keyword><style  face="normal" font="default" size="100%">сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">способности</style></keyword><keyword><style  face="normal" font="default" size="100%">уязвимости</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">44</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Изследванията в областта на сигурността засилват своята актуалност в условия на кризи, които не липсват в съвремието. Връщането към основополагащите въпроси от типа защо е важна сигурността и какво затруднява създаването на приемливо ниво за сигурност позволява от една страна да бъдат разкрити някои погрешни тези, а от друга страна да бъдат добавени гледни точки при търсенето на рационални отговори. В материала се прави паралел между два типа баланси в сигурността, определени като продуктивен и контра продуктивен. На базата на сравнението се извеждат предизвикателства пред намиране на балансирани решения на въпроси за сигурността, разглеждани като многофакторни функции.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">138</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The examination of all issues of interest in the field of cybersecurity, cyber resilience and the fight against cybercrime can be focused on one term, and that is the term cybersecurity capabilities. Cybersecurity capabilities demonstrate the ability to implement policies, standards, guidelines, and operational procedures for the security of information systems, networks, applications, and information. In turn, cybersecurity capabilities are a dynamic object that is built, maintained, developed, modified and adapted to the changing security environment. The dynamics of security capabilities require measuring the degree of their maturity and comparing them with the target levels. This report provides a comparative analysis of existing models for assessing the maturity of cybersecurity capabilities, thus creating an opportunity for a reasonable choice of such a method for the needs of specific assessment.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Conceptual Model for Resilience in the field of Secuirty</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">141</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;It is already understood that security cannot be guaranteed. Numerous examples of security incidents prove that, and direct both researchers and practioners to explore the opportunities for development of security systems that are resilient. A common feature of the resilient systems is that they preserve the functionality of core processes and their supporting assets under perturbations. This report presents the results of a study aiming to deliver a conceptual model of the system for resilience in the field of security, that is supported by theoretical arguments and applicable in practice.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Main Issues and Risks Related to the Provision of Resources for Bulgaria’s Defence Capabilities Development Programme 2032</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">42</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The security, sovereignty and territorial integrity of the state are paramount benefits for society, which should be guaranteed by adequate instruments. The defence capabilities are main part of these instruments and therefore their condition attracts the interest not only of experts, but of the whole society. The development of the desired defence capabilities depends on the provision of resources for the proposed programmes and plans. Proving the rationality of the latter requires posing the right questions and identifying the associated risks.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">An Organizational Cybersecurity Program</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">139</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Information technologies have irreversibly entered the daily lives of consumers personally and professionally. This technology influx can be accepted as long as security is maintained at a sufficiently high level. The fulfillment of this condition is reflected in the attitude of organizations and users to the security of information systems, networks, applications and information. There are two possible options for ensuring cybersecurity in the organization: ad-hoc approach and systematic approach. This report expounds on the benefits of using a systematic approach in dealing with cybersecurity challenges based on the development, adoption, implementation and updating a dedicated organizational cybersecurity program.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Въпроси и рискове, свързани с ресурсното осигуряване на Програмата за развитие на отбранителните способности на Въоръжените сили на Република България 2032</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Въоръжени сили</style></keyword><keyword><style  face="normal" font="default" size="100%">отбранителни способности</style></keyword><keyword><style  face="normal" font="default" size="100%">програма за развитие</style></keyword><keyword><style  face="normal" font="default" size="100%">ресурси за отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">риск</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">42</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Сигурността, суверенитета и териториалната цялост на държавата са първостепенни блага за обществото, които следва да бъдат гарантирани с помощта на адекватни инструменти. Отбранителните способности са част от тези инструменти и като такива тяхното състояние предизвиква не само на експертен, но и по-широк обществен интерес. Изграждането на желаните отбранителни способности зависи от ресурсното осигуряване на разработваните програми и планове. Доказването на рационалността на такива планове и програми изисква отговори на правилните въпроси и идентифициране на свързаните рискове.&amp;nbsp;&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Концептуален Модел за Устойчивост в Сигурността</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">активи</style></keyword><keyword><style  face="normal" font="default" size="100%">риск</style></keyword><keyword><style  face="normal" font="default" size="100%">сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">технологии</style></keyword><keyword><style  face="normal" font="default" size="100%">устойчивост</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">141</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Възприемането на тезата за отсъствие на пълна сигурност, която се доказва от многобройните примери за инциденти със сигурността, насочва вниманието на изследователите и практиците към възможностите за изграждане на устойчиви системи в сигурността. Характерно за подобен тип системи е възможността за запазване на оперативната функционалност на ключови процеси и на поддържащите ги активи в условия на смутена среда. В доклада се представят резултатите от изследване, насочено към създаване на концептуален модел на система за устойчивост в сигурността, който е теоретично аргументиран и с висока степен на практическа приложимост.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Програма за киберсигурност на организацията</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">заплахи</style></keyword><keyword><style  face="normal" font="default" size="100%">защита в дълбочина</style></keyword><keyword><style  face="normal" font="default" size="100%">контроли за киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">програма за киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">противодействие на инциденти с киберсигурността</style></keyword><keyword><style  face="normal" font="default" size="100%">уязвимости</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">139</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Често срещаното в литературата твърдение, че информационните технологии необратимо са навлезли в ежедневието на потребителите в личен и професионален план може да се приеме за вярно при условие, че степента за сигурност на тези технологии е на достатъчно високо ниво. Изпълнението на това условие намира израз в отношението на организациите и потребителите към сигурността на информационните системи, мрежи, приложения и информация. Възможните подходи за осигуряване на киберсигурност в организацията са два: ad-hoc подход и системен подход. В материала се аргументират ползите от използване на системния подход при третиране на проблемите с киберсигурността на базата на разработване, приемане, прилагане и обновяване на програма за киберсигурност на организацията.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Сравнителен Анализ на Модели за Оценяване на Зрелостта на Способностите за Киберсигурност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">киберустойчивост</style></keyword><keyword><style  face="normal" font="default" size="100%">модели за измерване на зрелостта на способностите за киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">нива на зрялост</style></keyword><keyword><style  face="normal" font="default" size="100%">области за киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">способности</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">138</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Всичко онова, което се прави в областта на киберсигурността, киберустойчивостта и противодействието срещу киберпрестъпността може да бъде фокусирано върху един термин и това е терминът способности за киберсигурност. Способностите за киберсигурност демонстрират възможностите за изпълнение на политики, стандарти, указания и оперативни процедури за сигурност на информационни системи, мрежи, приложения и информация. От своя страна способностите за киберсигурност представляват динамичен обект, който се изгражда, поддържа, развива, модифицира и адаптира към променящата се среда за сигурност. Динамиката при способностите за сигурност налага измерване на степента на тяхната зрялост и съпоставяне с целевите нива. В доклада се прави сравнителен анализ на съществуващи модели за оценяване на зрелостта на способностите за киберсигурност като по този начин се създава възможност за аргументиран избор на подобен метод за нуждите на конкретно оценяване.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">On Conflicts, Interests, Goals, Power, and Security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">40</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&amp;nbsp;For people who are results-oriented, there are two basic rules. The first says that what is important is to achieve the goal, not the effort spent or the time wasted. Achieving the goal in practice means defending the interests in the course of a conflict with the help of adequate means, including power if necessary. The metric for achieving the goal is the security desired and sought by the subjects whose interests are defended with the tools of power. The second rule states that regardless of the result achieved, a benefit can be derived from the lessons learned.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Demography, Capabilies and Security</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">134</style></number><pages><style face="normal" font="default" size="100%">1-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Demographic processes and security are related and interdependent. The author argues for an appropriate integrating component that accounts for the demographic factors and their influence on the level of security. The concept of capabilities can perform this role. In this report, the link between demographic processes and policies and the state of security is examined through the lens of security capabilities and the human factor as their basic component. Equally appealing is the study of the link between security functions, security policies and the level of security in general, and the demographic security in particular.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating the Utility of Distance Learning Forms during the Covid-19 Pandemic</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">137</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The emergency situation introduced during the Covid-19 pandemic necessitated a shift to a distance learning regime for students in higher education. This has posed a challenge to universities, lecturers and students that they had not encountered before. Overall, the evaluations of the results of the distance learning forms used are positive. In order to identify lessons learned from the practice, it is necessary to compare the efforts of faculty members in using the forms of distance learning and the degree of satisfaction of students and their assessment of the usefulness of these forms. Based on this comparison, the material proposes a &amp;ldquo;gold standard,&amp;rdquo; including distance learning forms that have received the highest grade for usefulness from students.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">How People’s Behaviour Was Motivated during the Covid-19 Emergency Situation</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">39</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;People&amp;rsquo;s behaviour during emergency is a key factor for overcoming the crisis in the shortest possible time with the least consequences. A variety of tools, each with its specificity and a way of implementation, are used to model people&amp;rsquo;s behaviour. This article elaborates on the extent to which various motivators of human behaviour were successfully applied during the crisis caused by the spread of the corona virus.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Variety of University Cyber Security Programs - Is it Useful and Justified?</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">41</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Cybersecurity capabilities have long been not a luxury but a real necessity stemming from the development of technology and the associated threats, vulnerabilities and risks. A key component of these capabilities are the cybersecurity experts, who contribute their knowledge, skills and experience. In this regard, universities&amp;#39; efforts to launch cybersecurity programs seem justified and understandable. Is it possible that competition between universities and oversaturation with the university programs in the field of cybersecurity will lead to an unjustified expansion of the portfolio of taught knowledge and a shift in the focus from building the required capabilities? This report seeks answer to this and related questions on the academic contribution to cybersecurity.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Демография, Способности и Сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">демография</style></keyword><keyword><style  face="normal" font="default" size="100%">политики за сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">способности за сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">функции на сигурността</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">134</style></number><pages><style face="normal" font="default" size="100%">1-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Изследването на взаимната връзка и влияние на демографските процеси върху сигурността е свързано с избор на подходящ интегриращ компонент, който да се повлиява от демографските фактори и да пренася това влияние върху състоянието на сигурността. По съдържание и предназначение&amp;nbsp; способностите за сигурност могат да изиграят изискващата се роля. В статията се аргументира връзката между демограските процеси и политики и състоянието на сигурността, като се използват способностите за сигурност в сърцевината на които стои човешкият фактор. Не по-малко интересна е изследваната връзка между функциите на сигурността, политиките за сигурност и състоянието на сигурността по принцип и в частност по отношение на демографската сигурност.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">За конфликтите, интересите, целите, силата и сигурността</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">интереси</style></keyword><keyword><style  face="normal" font="default" size="100%">конфликт</style></keyword><keyword><style  face="normal" font="default" size="100%">протести</style></keyword><keyword><style  face="normal" font="default" size="100%">сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">сила</style></keyword><keyword><style  face="normal" font="default" size="100%">цел</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">40</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;За онези, които са ориентирани към резултатите важат две основни правила. Първото гласи, че е важно постигането на целта, а не вложените усилия и пропиляното време. Постигането на целта на практика означава отстояване на интересите в хода на възникнал конфликт с помощта на адекватни на средата средства на силата. Метриката за постигането на целта е сигурността, желана и търсена от субектите, чиито интереси се отстояват с инструментите на силата. Второто правило гласи, че независимо от постигнатия резултат, полза може да бъде извлечена чрез поуките от практиката.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Как бяха Използвани Мотиваторите на Човешкото Поведение в Условията на Извънредно Положение и Пандемия от Коронавирус</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">атрибутивна теория</style></keyword><keyword><style  face="normal" font="default" size="100%">баланс на последствията</style></keyword><keyword><style  face="normal" font="default" size="100%">коронавирус</style></keyword><keyword><style  face="normal" font="default" size="100%">криза</style></keyword><keyword><style  face="normal" font="default" size="100%">модели за поведение</style></keyword><keyword><style  face="normal" font="default" size="100%">организационна култура</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">39</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Поведението на хората в условия на криза е ключов фактор за излизане от кризата за възможно най-кратко време и с въможно най-малки последствия. Моделирането на поведението на хората използва инструменти, които притежават специфика като съдържание и като начин за прилагане. Дали и доколко успешно бяха прилжени различните мотиватори на поведението на хората по време на кризата с коронавируса &amp;ndash; това е въпросът, отговор на който се търси в настоящия материал&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Оценка на Полезността на Формите за Дистанционно Обучение по Време на Пандемия от Коронавирус</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">виртуална класна стая</style></keyword><keyword><style  face="normal" font="default" size="100%">дистанционно обучение</style></keyword><keyword><style  face="normal" font="default" size="100%">златен стандарт</style></keyword><keyword><style  face="normal" font="default" size="100%">пандемия</style></keyword><keyword><style  face="normal" font="default" size="100%">презентации</style></keyword><keyword><style  face="normal" font="default" size="100%">тестове</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">137</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Извънредното положение във връзка с пандемията от коронавирус наложи преминаване към режим на дистанционно обучение на студентите във висшите учебни заведения. Това изправи университетите, преподавателите и студентите пред предизвикателство, с което до момента те не бяха се срещали в такъв мащаб. Като цяло оценките за резултатите от използваните форми за дистанционно обучение са положителни. За да бъдат извлечени поуки от практиката се налага да бъдат сравнени усилията на преподавателите при използване на формите за дистанцино обучение и степента на удовлетвореност на студентите и тяхната оценка за полезността на тези форми. На базата на това сравнение в материала се прави предложение за &amp;bdquo;златен стандарт&amp;ldquo;, включващ формите за дистанцинно обучение, получили най-висока оценка за полезност от страна на студентите.&amp;nbsp;&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Разнообразието на Университетските Програми по Киберсигурност – Полезно и Обосновано ли e?</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">бакалавър</style></keyword><keyword><style  face="normal" font="default" size="100%">висше образование</style></keyword><keyword><style  face="normal" font="default" size="100%">киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">магистър</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">41</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Способностите за киберсигурност отдавна не са лукс, а реална необходимост, произтичаща от развитието на технологиите и на свързаните с това заплахи, уязвимости и рискове. Ключов компонент на тези способности са експертите по киберсигурност, допринасящи със знанията, уменията и опита си. В тази връзка усилията на университетите за стартиране на програми по киберсигурност изглеждат обосновани и разбираеми. Възможно ли е конкуренцията между университетите и пренасищането с университетски програми в областта на киберсигурността да доведе до необосновано разширяване на портфолиото от&amp;nbsp; преподавани знания и изместване на фокуса при изграждането на търсените способности. В търсене на отговор на този и още няколко въпроса е направен анализът в публикацията.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Profiling Human Roles in Cybercrime</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">145-160</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents results from a comparative analysis of the applicability of the main methods for developing cybercrime profiles. The criteria used to make the comparison take into account the specifics of the inductive and deductive profiling methods, as well as the particularities of the participants in a cybercrime and its investigation - a cybercriminal, the victim, and detection and investigation officer. The application of profiling for countering cybercrime is substantiated by appropriate profile samples selected in the review of previous studies in the same field.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">145</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Human Factor in Cybersecurity</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">Avangard</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing and managing security risk</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Avangard</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Embedding affordability assessments in military cost-benefit analysis: Defense Modernization in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">Military Cost–Benefit Analysis: Theory and practice </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">13</style></volume><isbn><style face="normal" font="default" size="100%">978-1-13-885042-2</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><reprint-edition><style face="normal" font="default" size="100%">Francois Melese, Anke Richter, and Binyam Solomon</style></reprint-edition></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Levels of Cybersecurity Training and Education</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">117</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The ambition of individuals and their organizations to achieve a desired level of cybersecurity may be subject to the application of different strategies. Known approaches to achieving cybersecurity involve the establishment of effective legal systems, innovative technical solutions, rational organizational structures, etc. The focus in discussions of cybersecurity remains on people and their training, which can lower the vulnerability to cyber attacks. Counting on such a strategy to build cybersecurity, it is important to properly understand that cybersecurity training can be constructed at several levels. Each of these levels has specific characteristics, such as the approach and methods used for training, and as a consequence is associated with different results in terms of the cybersecurity achieved.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Two-Level Model for Describing the Risk Profile in Formulating Policy and Developing Security Capabilities</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">129</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The risk assessment/management concept is widely used in security research due to its universality, but also because of the active nature and sense of precautionary management, implemented on its basis. The security risk profile can be described and studied at different levels of security, which poses the question how researchers should choose the appropriate model for identifying, evaluating and developing strategies to mitigate the risk. The article raises the question whether the use risk profiles for the purposes of policy formulation, at one level of security, and capacity building at another, can introduce errors in decision making. As a possible tool to eliminate such errors the author proposes the use of a two-stage model for the description and study of the risk profile, which includes a contextual and a specific level of the discourse.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Двустепенен Модел за Описание на Рисковия Профил при Формиране на Политика и Изграждане на Способности за Сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">контекст</style></keyword><keyword><style  face="normal" font="default" size="100%">оценяване и управление на риска</style></keyword><keyword><style  face="normal" font="default" size="100%">риск</style></keyword><keyword><style  face="normal" font="default" size="100%">рисков профил</style></keyword><keyword><style  face="normal" font="default" size="100%">сценарий</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">129</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Концепцията за оценяване и управление на риска намира широко приложение в изследванията в областта на сигурността поради притежаваната универсалност, а също така и поради активния характер и превантивния смисъл на управлението, което се реализира с нейна помощ. Рисковият профил за сигурността може да бъде описван и изследван на различни равнища на сигурността, което поставя пред изследователите проблема за избор на подходящ модел при идентифициране, оценяване и разработване на стратегии за противодействие срещу риска. В статията се поставя въпроса възможно ли е да бъде допусната съществена грешка при използване на резултатите от описанието на рисковия профил на едно ниво на сигурност за нуждите на формиране на политика и изграждане на способности за друго ниво на сигурност. Като възможен инструмент за изключване на подобна неточност се предлага използване на двустепенен модел за описание и изследване на рисковия профил, който включва контекстно и конкретно ниво.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Нива за Обучение на Персонала по Проблемите на Киберсигурността</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">апетит към риска</style></keyword><keyword><style  face="normal" font="default" size="100%">атрибутивна теория</style></keyword><keyword><style  face="normal" font="default" size="100%">баланс на последствията</style></keyword><keyword><style  face="normal" font="default" size="100%">киберсигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">обучение на база на информираност</style></keyword><keyword><style  face="normal" font="default" size="100%">организационна култура</style></keyword><keyword><style  face="normal" font="default" size="100%">риск</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Март 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">117</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Стремежът на хората и организациите към постигане на желано ниво на киберсигурност може да бъде подчинен на прилагането на различни стратегии. В практиката са познати варианти, при които постигането на киберсигурност се основава на създаване на ефективни законодателни системи, иновативни технически решения, рационални организационни структури и т.н. В центъра на вниманието когато се говори по проблемите на киберсигурността остават хората и възможностите за тяхното обучение, с което да бъде снижена уязвимостта от кибератаки. Залагайки на подобна стратегия за изграждане на киберсигурност, важно е правилно да се разбира, че обучението на персонала по проблемите на киберсигурността може да бъде конструирано в няколко нива. Всяко от тези нива притежава специфични характеристики като подход и като използвани методи за обучение, а като следствие от това се свързва с различни резултати по отношение на постигнатата киберсигурност.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Оценяване и управление на риска за сигурността</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">Авангард</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">34-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents main results of the analysis of cross impact between two of the ‘big themes’ in the FOCUS project: “EU as a global actor based on the wider Petersberg Tasks” and “Critical infrastructure &amp; supply chain protection.” The cross impact was evaluated by experts from both EU and non-EU countries. For each theme they were asked to estimate significance and interrelation of trends, thus allowing the research team to identify centres of gravity within each theme. Then they estimated the pairwise linkage of trends from the two themes. The study resulted in identification of key linkages among trends, to be further explored in the analysis of respective contexts, mission roles, and security research scenarios. This practical test of the presented model—having relatively limited number of domains and trends—contributes to the transparency and illustrative power of FOCUS methodology and can be expanded in future studies.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">34</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Strategy Maps and Balanced Scorecard - used for Assessing the Activities of the Entities in the BAS</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">107</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">„Strategy Maps and Balanced Scorecard - used for Assessing the Activities of the Entities in the BAS“ in the article, based on the classic and widely accepted approach to the management of the organization, a description of the possible mechanism for assessing the activity of structures of BAS is made. The main idea is related to the understanding that, in order to effectively run an organization it needs to create conditions for the evaluation of its activities, which in turn is associated with better understanding and description of the model of operation. In structuring the evaluation mechanism a strategic map, balanced scorecard, management matrix, quantitative and qualitative evaluations have been used. The content of the material presents the advantages in the theoretical and practical aspects, which would provide the proposed mechanism for measuring and evaluating the specific activity of the structures of BAS</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Планиране на способности за киберсигурност на базата на сценарии</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">Авангард</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">13-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Critical infrastructures are complex, interlinked socio-technical systems, with impact often crossing state borders. Their protection involves governments and business organisations, interacting in the application of a broad variety of measures to provide safety and security while investing a considerable amount of public and private resources. This paper examines the challenge of making respective policy and investment decisions transparent, and a sample of methods and tools used to facilitate decision making. It also calls for contributions to a knowledge portal on security and safety of critical infrastructures. </style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Infrastructure and Supply Chain Protection: EU possible development paths and strategies</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">97</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author><author><style face="normal" font="default" size="100%">Lozan Bizov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methodology for Planning Wartime Defence Capabilities</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management, IICT-BAS</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><isbn><style face="normal" font="default" size="100%">978-954-91700-4-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Taxonomy of Essential Services</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">191-196</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">58</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Taxonomy of Essential Services</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2012</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems 6(58)</style></publisher><pub-location><style face="normal" font="default" size="100%">Sevastopol, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">191-196</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Communities, countries and alliances cannot be efficient in preparing to meet diverse threats to their security within traditional organizational stovepipes. The boundaries between ‘internal’ and ‘external’ threats are getting fuzzier, and the vulnerabilities of governments, businesses and communities feed on each other, while the comprehensive approach is gaining traction in ever more security fields. The implementation of the comprehensive approach poses a number of methodological challenges. While it clearly requires coordination of various capabilities of a multitude of actors, it is less apparent which is the suitable organising concept. This paper takes as a starting point the concept of ‘essential services’ and suggests a taxonomy, that would allow to treat threats, vulnerabilities and risk in a common comprehensive framework. The taxonomy has been developed with a specific purpose in mind, and thus refers to European Essential Services (EES). We nevertheless reason that it can be replicated to support decision making at other levels, e.g. in national security policy making and planning. </style></abstract><issue><style face="normal" font="default" size="100%">58</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Balancing Ambitions and Resource Constraints in Shaping Collective Security and Defence Policies</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">95</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges of Multinational Acquisition of Capabilities in Black Sea Format</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">27</style></volume><pages><style face="normal" font="default" size="100%">174-182</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Countries in the Black Sea region already cooperate in the search of higher levels of security. The cooperation so far is at the level of coordinating some operational activities of Black Sea navies and regular training. In the search of efficiencies, the authors reason that this cooperation may be expanded to encompass cooperative procurement and maintenance of certain capabilities. Before embarking on such cooperative projects, participating countries need to overcome a number of policy, legal, managerial and technical challenges. The authors conclude that most promising would be cooperative initiatives at enhancing maritime surveillance, situational awareness, and consultations, command and control infrastructure, as well as the joint development, maintenance and use of training ranges and advanced simulation and training systems and joint acquisition and sharing of search and rescue capabilities. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Current issues in the acquisition of multirole fighters for the Bulgarian air force</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Current issues in the acquisition of multirole fighters for the Bulgarian air force</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Economic issues of the project for procurement of multirole fighters for Bulgaria's Air Force</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">4</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Economical aspects of the BGAF multirole aircraft acquisition project</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">89</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Microiconomics</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Avangard</style></publisher><pub-location><style face="normal" font="default" size="100%">Sifia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">National R&amp;T capacity in the interest of defence: Methodology for assessment and web platform for gathering and presenting information</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">75</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">NATO’s Role in Implementing the Smart Defence Concept</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">93</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&quot;NATO's role in implementing the concept of intelligent defense&quot; is a paper delivered at the international conference &quot;Smart Defence - the New Vision of Cooperation, Coordination and Coherence in SEE,&quot; held on 8 and 9 December 2011. The conference was organized by the Institute for European Initiatives with support from NATO's Public Diplomacy Division, the Association &quot;George Marshall&quot; - Bulgaria and the University of National and World Economy. The report presents an analysis of the environment made by its main features, messages and tools (instruments) to reveal the challenges, risks and possible solutions associated with implementing the concept of smart defense. At the end of the report makes suggestions for practical actions to facilitate implementation of the concept of smart defense in national and regional levels.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Smart defence and management: A managerial view to the 2010 report on the status of Bulgaria’s defence and armed forces</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">2</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Актуални въпроси за придобиването на многоцелеви изтребители за българските ВВС</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Ноември 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Икономически аспекти на проекта за придобиване на нов многоцелеви самолет за нуждите на ВВС на Република България</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Ноември 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">4</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Интелигентна отбрана и мениджмънт: Опит за мениджърски прочит на доклада за състоянието на отбраната и въоръжените сили на Република България за 2010</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Декември 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">2</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Национален капацитет за изследвания и технологии в интерес на отбраната: Методика за оценяване и уеб-платформа за събиране и представяне на информация</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">75</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ролята на НАТО при прилагане на концепцията за интелигентна отбрана</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">октомври 2011 г.</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">93</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Ролята на НАТО при прилагане на концепцията за интелигентна отбрана” представлява доклад, изнесе на международна конференция на тема „Smart Defence – the New Vision of Cooperation, Coordination and Coherence in SEE”, проведена на 8 и 9 декември 2011 г. Организатор на конференцията е Института за европейски инициативи с подкрепата на NATO’s Public Diplomacy Division, Асоциация „Джордж Маршал”- България и Университета за национално и световно стопанство. В доклада се представя анализ на средата, направен чрез нейните основни характеристики, послания и средства (инструменти), разкриват се предизвикателствата, рисковете и възможните решения, свързани с прилагане на концепцията за интелигентна отбрана. В края на доклада се правят предложения за практически действия, улесняващи прилагането на концепцията за интелигентна отбрана в национален и регионален мащаб.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Civilian oversight of the Armed Forces: Defence budget</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">51</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Embedding Affordability Assessment in the Analysis of Alternatives in Defense Modernization Projects</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">25</style></volume><pages><style face="normal" font="default" size="100%">99-112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The significant amount of financial resources, spent on modernizing the armed forces, the importance of acquired defense capabilities for implementation of defense missions and tasks, the limited amount of money for investments in defense are among the arguments supporting the implementation of effective and efficient methods for economic analysis in assessing acquisition projects. The application of new methods for economic analysis is a part of the process of innovation intended to give competitive advantages to strategic management in defense. The Economic Evaluation of Alternatives (EEoA) is a tool of defense resource management that focuses on the operational effectiveness and life cycle cost of alternatives within a set of scenarios representing budget limitations. The application of EEoA allows experts and decision-makers to create appropriate structures of any analysis of al­ternatives for acquisition projects in defense in a way that guarantees the achieve­ment of desired goals.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Modeling Defense Acquisition Strategy</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Fall 2010</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">53-68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Protecting European Critical Infrastructure: Training course for civil servants, owners and operators of critical infrastructures in the energy sector</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">53</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Защита на европейската критична инфраструктура: Курс за обучение на служители  от  МИЕТ  и  търговските  дружества – собственици /оператори  на  обекти  от  критичната  инфраструктура   в  сектор „Енергетика”</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">53</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Managing Risk in Force Development Programs</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">234-242</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Program-based Defence Resource Management and Defence Acquisition</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">43</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis of Alternatives: An Efficient Tool in Managing Force Modernization Projects</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">92-106</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Analysis of alternatives is a systematic method to deal with the problem of selecting a reliable variant and a common approach to the efficient allocation of limited resources among the competing candidate alternatives. In this method, the alternatives for meeting the existing needs are studied by assessment of the quantitative effects and costs for each of the considered alternatives. This becomes the objective that is approached by means of mathematical, economic, statistics, and other scientific methods. The analysis of alternatives is a process that includes definition of goals, main parameters, assumptions and constraints for the analysis; preparation of a list of considered alternatives; collection of data into a database and evaluation of the effects and cost for each alternative; performing sensitivity analysis; and reporting the final results from the analysis. The practical realization of the analysis of alternatives is related to the elaboration of a plan for the analysis, whose content is presented in this article.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Policies and Outlooks for the MOD activities on the field of Public-Private Partnerships </style></title><secondary-title><style face="normal" font="default" size="100%">Military Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><volume><style face="normal" font="default" size="100%">14</style></volume><pages><style face="normal" font="default" size="100%">120-130</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">2</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Implementing the Defence Programs of the Ministry of Defence for the 2006-2011 Period – Risk Assessment</style></title><secondary-title><style face="normal" font="default" size="100%">Military Journal </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>