<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">From Civil-Military Relations to Resilience: The Fifth Wave of Strengthening Democracy through Research and Education</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2025</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2025</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">24</style></volume><pages><style face="normal" font="default" size="100%">73-90</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The good governance of military and security forces is essential for the effective defense of a nation or alliance and for fostering their democratic evolution. This article explores NATO and partner countries’ initiatives over the past three decades to enhance good governance, distinguishing five waves of focus: civil-military relations and democratic control of armed forces, defense institution building, security sector reform, building integrity and reducing corruption, and strengthening democratic resilience. The authors review the research and educational activities of the Partnership for Peace Consortium and other organizations in support of these initiatives, concluding with a proposal to establish a working group on democratic resilience within the Consortium.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">73</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Twenty Years of Substantive Impacts on Security and Defense Discourse</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">5-6</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Over the past twenty years, Connections has been instrumental in informing and shaping security and defense policy debates within the Partnership for Peace community and beyond. This issue includes updated versions of some of the articles that have had the highest academic and policy-making impact.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Leadership in the Defense and Security Sector in the 21st Century</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">5-9</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the rationale for revisiting the subject of leadership in the defense and security sector, highlights
the challenges of analyzing the topic during the ongoing Russian war in Ukraine, and then presents the content of this special issue of Connections:
The Quarterly Journal. The contributors address diverse topics, such as the elicitation of desired leadership traits on the basis of the curricula of selected courses of the NATO School Oberammergau, the experience of China in introducing Western leadership concepts in the education and training of future military leaders, the experience of Ukraine in leading the enhancement of human resource management in the ministry of defense as part of the capabilities-based planning process, and the dangers for Ukraine in falling into the trap of authoritarian leadership during the current war with Russia. Three additional articles examine the interconnections between leadership in communication, respectively, in Hungary’s law enforcement organizations, the impact on organizational design, and the role of strategic narratives in Taiwan’s soft power and its positioning in the Indo-Pacific region.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Legal, Economic, and Regional Security Implications of the Russia-Ukraine War</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Fall 2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">5-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">At the threshold of its third year, Russia's large-scale and brutal war against Ukraine continues to kill thousands, terrorize millions of Ukrainians, and disrupt international supply chains, affecting global energy and food markets. This is the second journal issue dedicated to the ongoing war. It dwells on the issue of lustration - a problem Ukraine did not effectively address during its post-communist transition, which in turn led to the perpetuation of the Kremlin's ideology and, thus, its continuous influence on Ukrainian politics and society. Two articles explore the rationale for including Russia in the U.S. Department of State's list of state sponsors of terrorism. While some European countries and the European Parliament have already declared Russia a terrorist state, the debate in the United States is influenced by numerous additional considerations, and the decision is still pending. The link between military expenditures, defense industrial investments, and the general economic development and stability in wartime is also examined in detail. The final two articles analyze Moscow's interests and strategy towards the post-Soviet states and the strategically important Black Sea region. </style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Putin’s Last War: Narratives, Counternarratives, and Early Lessons Learned</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the early hours of February 24, 2022, the armed forces of the Russian Federation and armed formations of the so-called Donetsk and Lugansk people’s republics attacked Ukraine from the north, east, and south. In parallel, Russia conducted massive cyberattacks and propaganda campaigns. To the surprise of many analysts, Ukraine demonstrated exceptional cohesion, resilience, and will to fight. The raging war is already influencing the international security environment and the thinking on societal preparedness, military capabilities and operations, and will continue to do so in the coming decades. This editorial article presents the early lessons learned from the war, with a focus on Russia’s propaganda narratives and information warfare and ways to counter them, the role of professional military education, and combat medical support.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Academic ICT Research for Defence and Security</style></title><secondary-title><style face="normal" font="default" size="100%">Research in Computer Science in the Bulgarian Academy of Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><pages><style face="normal" font="default" size="100%">471-491</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">AI-driven Cybersecurity Solutions, Cyber Ranges for Education &amp; Training, and ICT Applications for Military Purposes</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the Third International Scientific Conference “Digital Transformation, Cyber Security and Resilience,” DIGILIENCE 2021, and summarises the results from four of its sessions: AI-driven Cybersecurity Solutions; Organisational and Ethical Considerations in Providing Cybersecurity; Cyber Ranges for Innovative Education &amp; Training; and Advanced ICT Solutions with Military Applications.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Countering Crime, Hate Speech, and Disinformation in Cyberspace</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Increased connectivity and open access to the Internet provide malicious actors with novel opportunities for intelligence gathering, attacks on vulnerable targets, and shaping mass perceptions and behavior. In the editorial article to this edition of Connections, the issue editors review recent and emerging security-related challenges and responses. The focus is on the increase in cybercrime, corruption, the spread of hate speech, propaganda, and disinformation. In addition, the contributors elaborate on prospective solutions such as strengthening the legal regimes, including international norms, instituting confidence-building measures, and enhancing cyber skills, as well as the challenges for defense posed by the advances in quantum computing.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Balancing Defense and Civil Support Tasks: The Impact of Covid-19 on the Bulgarian Military’s Roles</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">61-76</style></pages><abstract><style face="normal" font="default" size="100%">Military organizations are often called upon to contribute with specific capabilities or to enhance the civilian response capacity in an emergency at home, in particular, when urgent action in a high-risk environment is needed. The emergency related to the Covid-19 pandemic was not an exception. The Bulgarian armed forces have already made an important and highly visible contribution and are prepared to perform additional tasks assigned through the new emergency law. Both the society and the political elites appreciate this military involvement, and ideas for new civil security tasks have emerged. Based on the analysis of legal and doctrinal documents and the responses to an interview, this article provides an overview of the domestic tasks of the Bulgarian armed forces prior to the Covid-19 pandemic, new tasks assigned during the pandemic and the possibilities for and the caveats in the further expansion of the spectrum of domestic tasks. The opinions of 41 respondents in the interviews are almost equally split. A slight majority suggests further expansion of the domestic tasks, serving as a back-up, and building on high-tech capabilities the armed forces already possess or plan to develop. The remaining respondents call for exercising caution, assuring that the military contribution is effective and efficient, and reconsidering the newly assigned coercive tasks. The article also presents the decision-making context, shaped by long-delayed modernization, limited budget, and the severe shortage of personnel. This is the context in which policy-makers need to find an adequate balance between defense and civil support roles and capabilities.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">61</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges and Opportunities for Network Intrusion Detection in a Big Data Environment</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Advanced data storage and processing technologies allow to accumulate logs, network flows and system events from various sources in terabytes of heterogeneous data. This paper presents the state of the art in data pre-processing, feature selection, and the application of a variety of machine learning methods for intrusion detection. It outlines the main challenges in big data analytics and the opportunities provided by combining the outputs of several methods to increase the accuracy of detection and decrease the number of false alarms. The authors propose an architecture of an intrusion detection system combining offline machine learning and dynamic processing of data streams.&lt;/p&gt;&lt;p&gt;This paper is included in the program of the Second Scientific Conference &amp;quot;Digital Transformation, Cyber Security and Resilience &lt;a href=&quot;https://digilience.org/content/digilience-2020-program&quot;&gt;DIGILIENCE 2020&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Concept of Resilience: Security Implications and Implementation Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">5-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Aiming for a more effective and efficient response to diverse and multidimensional threats, an increasing number of defense and security organizations, the United Nations, NATO, and the EU embrace the concept of resilience in their security strategies and policies. This article provides a brief overview of the concept, a sample of definitions used in policy documents, and the types of problems they seek to resolve. Then we introduce the reader to the 15 articles published in the Summer and Fall 2020 issues of Connections that present the evolution of the concept of resilience and its implementation by and within political, defense, and law enforcement organizations, as well as its anticipated contribution to cybersecurity, disaster preparedness, peacebuilding, post-conflict restoration and countering hybrid threats.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This editorial article introduces the reader to the Second International Scientific Conference “Digital Transformation, Cyber Security and Resilience,” DIGILIENCE 2020, and summarises the results from five of its sessions: Protecting Critical Infrastructures from Cyberattacks; Security Implications and Solutions for IoT Systems; Big Data and Artificial Intelligence for Cybersecurity; Secure Communication and Information Protection; and Advanced ICT Security Solutions.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Digital Transformation, Cyber Security and Resilience of Modern Societies</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">DRIVER+ Taxonomy of Crisis Management Functions 2020</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">135</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In 2017, a research team in the DRIVER+ project led by the authors of this report developed a &quot;Taxonomy of crisis management functions for classification of solutions.&quot; The taxonomy included a comprehensive set of 54 crisis management (CM) functions, with sub-functions and tasks, grouped in ten main functional areas. This taxonomy was implemented in the online platform Portfolio of Solutions (POS) and used to classify project-defined crisis management gaps and solutions uploaded on the POS. With the accumulation of experience, the authors were tasked to review, update and amend the taxonomy of functions taking into account user’s feedback, the “Common Global Capability Gaps” identified by IFAFRI and the strategic gaps and challenges elaborated by the EU Disaster Risk Management Knowledge Centre. This report presents the amended taxonomy of functions, along with revised and amended taxonomy of hazards. In combination, the two taxonomies allow effective classification of any content and navigation of the POS platform.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Governance Model of a Cybersecurity Network: Best Practices in the Academic Literature</style></title><secondary-title><style face="normal" font="default" size="100%">ACM International Conference on Computer Systems and Technologies (CompSysTech'20)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">New York, NY, USA, ACM</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Governance of Collaborative Networked Organisations Requirements</style></title><secondary-title><style face="normal" font="default" size="100%">11th IEEE International Conference on Dependable Systems, Services and Technologies DESSERT 2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">14-18 May 2020</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Governance of Collaborative Networked Organisations: Stakeholder Requirements</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Logical Model for Multi-Sector Cyber Risk Management</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">13-26</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The increasing reliance on digital infrastructures makes whole sectors of the economy and public services vulnerable to attacks through cyberspace. Some progress has been made in understanding vulnerabilities and ways of reducing cyber risk at the sub-sectoral level. While the sectoral level remains a significant challenge, this study goes beyond, also addressing cyber risk resulting from the cross- and multi-sectoral interdependencies in a consistent logical model. The paper presents the scope of this logical model, outlines the problem of risk assessment, structured around the triplet &amp;ldquo;Threats &amp;ndash; Vulnerabilities &amp;ndash; Impact,&amp;rdquo; and the structuring of risk mitigation around types of risk reduction measures, the objective of decision-making on risk treatment, and the modalities of application. We provide examples of the implementation of the logical model, underlying the ECHO Multi-sector Assessment Framework, and conclude by emphasising the advantages the logical model and the framework provide.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">13</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Recommendations and Courses of Action: How to Secure the Post-Covid Future</style></title><secondary-title><style face="normal" font="default" size="100%">Transatlantic Security: Securing the Post Covid Future</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Federal Ministry of Defense</style></publisher><pub-location><style face="normal" font="default" size="100%">Vienna, Austria</style></pub-location><pages><style face="normal" font="default" size="100%">18-41</style></pages><isbn><style face="normal" font="default" size="100%">978-3-903121-93-5</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The recommendations contained in this report are the outcome of an online virtual transatlantic security brainstorming event designed to look at securing the future post COVID-19, flag issues and develop recommendations for policymakers. Leading think tanks and defense educational institutions hosted the discussions on six main topics, featuring 2,750 registered representatives from government, international organizations, academia, and the private sector. This number included over 160 VIP&amp;rsquo;s, many at the ministerial and ambassadorial level.&lt;/p&gt;&lt;p&gt;Key recommendations:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The transatlantic community should initiate an in-depth leadership discussion (using G7, NATO and US-EU formats) on leveraging and strengthening historically established strategic advantages.&lt;/li&gt;&lt;li&gt;Achieving &amp;ldquo;strategic complementarity&amp;rdquo; between NATO and the European Union is a strategically desirable goal. Both NATO and the EU should initiate comprehensive reviews of the US-Europe strategic dialogue on all topics from trade to security with the goal of reaffirming and enhancing transatlantic solidarity.&lt;/li&gt;&lt;li&gt;NATO and the EU should establish task forces to examine balancing allocation of resources devoted to traditional external threats with those devoted to emerging global threats.&lt;/li&gt;&lt;li&gt;NATO and the EU should establish and formalize mechanisms to examine and develop comprehensive response strategies to Chinese global efforts to expand influence. Beijing&amp;rsquo;s European policy during the pandemic provides strong evidence that the EU-China 2020 Strategic Agenda for Cooperation should be seriously overhauled. It is important scrutinize Chinese geo-economics through a security prism, with resulting guidance to the EU Members and aspirants on a unified strategy for their relations with China. A similar approach guiding relations with Russia is also warranted.&lt;/li&gt;&lt;li&gt;The timing of catastrophic events is often not predictable &amp;ndash; but effective responses to such events have much in common. NATO and the EU should formalize mechanisms to develop and robustly coordinate all hazards response capabilities to catastrophic events with the pandemic experience as a driving force. Important here is to ensure supply chain continuity. Resilient, dependable and diverse supply chains, involving trusted allies and partners, are essential for effective national and regional responses to pandemic-like threats.&lt;/li&gt;&lt;li&gt;The EU should create a Strategic Communications Task Force dedicated to countering hostile competitor campaigns designed to undermine EU public opinion; e.g. Chinese, Russian, Iranian, Islamist, and others.&lt;/li&gt;&lt;li&gt;Artificial Intelligence (AI) has much to offer in enhancing readiness and response to pandemic-type events, but often not without potentially far reaching implications for individual freedoms and civil liberty. Creating EU or NATO task forces or advisory/study groups charged with enhancing compatibility of legal and ethical frameworks with the use of AI in military applications is an option worth considering.&lt;/li&gt;&lt;/ul&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Taxonomy of Crisis Management Functions</style></title><secondary-title><style face="normal" font="default" size="100%">Sustainability</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">12</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">12</style></issue><section><style face="normal" font="default" size="100%">5147</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Towards the Design of a Collaborative Cybersecurity Networked Organisation: Identification and Prioritisation of Governance Needs and Objectives</style></title><secondary-title><style face="normal" font="default" size="100%">Future Internet</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">03/2020</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.mdpi.com/1999-5903/12/4/62</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">12</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The effective response to the proliferation and growing diversity and sophistication of cyber threats requires a broad spectrum of competencies, human, technological and financial resources that are in the powers of very few countries. The European Union is addressing this challenge through an initiative to establish one or more cybersecurity competence networks. A number of existing technologies can support collaboration in networked organisations; however, network governance remains a challenge. The study presented in this article aimed to identify and prioritise network governance issues. Towards that purpose, qualitative and quantitative methods were applied in the analysis of norms and regulations, statutory documents of existing networks, academic sources and interviews with representatives of funding organisations and potential major customers. The comprehensiveness and complementarity of these primary sources allowed to identify 33 categories of governance issues and group them in four tiers, indicative of the respective priority level. The results of the study are currently used to inform and orient the development of alternative models for governance of a cybersecurity network and a set of criteria for their evaluation. They will support informed decision-making on the most appropriate governance model of a future networked organisation, evolving from a project consortium.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Towards the Design of a Collaborative Cybersecurity Networked  Organisation: Identification and Prioritisation of Governance Needs and Objectives</style></title><secondary-title><style face="normal" font="default" size="100%">Future Internet</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">62</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Towards the Design of a Cybersecurity Competence Network: Findings from the Analysis of Existing Networks</style></title><secondary-title><style face="normal" font="default" size="100%">10th International Conference on Multimedia Communications, Services &amp; Security (MCSS 2020)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 2020</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Krakow, Poland</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Computationally intensive functions in designing and operating distributed cyber secure and resilient systems</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Computer Systems and Technologies, CompSysTech 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%"> 21 June 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of RuseRuse</style></publisher><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><volume><style face="normal" font="default" size="100%">ACM International Conference Proceeding Series</style></volume><pages><style face="normal" font="default" size="100%"> 8-18</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Increasing incorporation of advanced information technologies makes business and public organisations more effective and efficient, while often introducing exploitable vulnerabilities. The efficient provision of security of interconnected, and interdependent, processes and sectors against cyberattacks requires deep understanding of vulnerabilities, exposure, potential negative impact, as well as the contribution existing and emerging organisational and technological solutions will potentially have on preventing attacks, reducing vulnerabilities, protecting digital infrastructures, response and recovery, and resilience. Such understanding will allow minimisation of risks against a spectrum of plausible cyber threats and reducing negative consequences of one or a series of cyberattacks.&lt;/p&gt;&lt;p&gt;Due to the complexity of the problem, the effective implementation of a number of functions and tasks in designing and operating distributed cyber secure and resilient systems require significant computational resources. This paper outlines six high-level, computationally demanding functions. The first three relate to the formulation and implementation of cybersecurity policy: understanding risk; planning and implementing cybersecurity measures; and continuous adaptation to the changing technological, threat and policy landscape. The other three functions are operational: situational awareness, including detection of cyberattacks and hybrid malicious activities; operational decision making, e.g. selecting a course of action under attack; and cyber forensics.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">DIGILIENCE - A Platform for Digital Transformation,  Cyber Security and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The ongoing digital transformation requires significant investments and innovation to provide security of cyberspace and variety of critical infrastructures and essential services that increasingly depend on the digital infrastructure, as well as to enhance the resilience of organizations, communities, industries, nations, and alliances in the face of malicious use of cyberspace.&lt;/p&gt;&lt;p&gt;This volume presents 28 of the papers, accepted for presentation at the DIGILIENCE 2019 conference, dealing with cyber information sharing and situational awareness, the benefits and challenges of emerging technologies, such as artificial intelligence, the human factor, education and training for cyber security and resilience, the need to incorporate the cybersecurity efforts into the search for effective and efficient exploitation of information technologies, policies and solutions for security and resilience of Industry 4.0 and critical infrastructures, analysing and countering hybrid influence through social networks and more traditional media. The DIGILIENCE series of conferences will promote the sharing of knowledge and experience and facilitate the spread of good practice in IT governance, cyber security and resilience.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Digital Transformation, Cyber Security and Resilience, Information &amp; Security: An International Journal</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Integrative  Approach to Understand Vulnerabilities and Enhance the Security of  Cyber-Bio-Cognitive-Physical Systems</style></title><secondary-title><style face="normal" font="default" size="100%">18th European Conference on Cyber Warfare and Security, ECCWS 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">4 -5 July 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">European Conference on Information Warfare and Security, ECCWS</style></publisher><pub-location><style face="normal" font="default" size="100%">Coimbra, Portugal</style></pub-location><volume><style face="normal" font="default" size="100%">2019-July</style></volume><pages><style face="normal" font="default" size="100%">492-500</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Rapid technological advances provide numerous benefits to our ways of work and leisure, banking and transportation, delivery of products and health assistance. The increased interconnectedness among devices, people, networks, and systems, however, introduces a level of complexity surpassing the experience accumulated so far. While the security of communications, network and information systems can be considered a well-established discipline, the study of security of cyber-physical systems is fairly recent. Furthermore, the dependencies of live organisms, including humans, with integrated sensors and electronics, of perceptions and cognition, and variety of drones on influences from cyberspace have been subject of only few, mostly incidental studies. The interdependencies among cyber, physical, biological systems, and humans in situation assessment and decision-making roles create new potential vectors of attack by malicious actors. If exploited, they will lead to cross impact among domains that are usually studied separately. Authors from three Bulgarian institutions, combining research and policy-making experience, embarked on the task to elaborate a comprehensive cybersecurity research agenda. This paper presents their concept for an integrative approach to the exploration of &amp;lsquo;systems of systems.&amp;rsquo; The study is structured along five domains: communications and information systems and networks; cyber-physical system; bio-integrated systems; cognitive processes, i.e. the processes of shaping perceptions, assessing a certain situation and options and making decisions; and drones, remotely controlled or autonomous, the latter case being particularly reliant on advances in artificial intelligence. This paper outlines the problem of vulnerability of each of the five domains to influences from cyber space. Then it presents some advances in cross-domain understanding of vulnerabilities, supported by examples of cybersecurity studies, and provides the outlines of a corresponding, interdisciplinary research agenda, built around the concept of systems of systems. The authors conclude by predicting that the field of cybersecurity will be subject to considerable growth in coming years, requiring multi-and inter-disciplinary competencies and scientific support. &amp;copy; 2019, Curran Associates Inc. All rights reserved.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Main considerations in elaborating organizational information security policies</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Computer Systems and Technologies, CompSysTech 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">21 June 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of RuseRuse</style></publisher><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><volume><style face="normal" font="default" size="100%">ACM International Conference Proceeding Series</style></volume><pages><style face="normal" font="default" size="100%">68-73</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the increasing reliance on information technologies, cloud services and internet as communications media, businesses, public and societal organizations face growing threats from cyberspace and, respectively, demands to protect sensitive data and information they collect, use, and disseminate. This paper elaborates on the key considerations organisations with more limited resources, such as schools, universities, research institutes and public organizations need to take into account in designing and implementing a respective information security policy. We start with a description of context and definition of the scope of information security policy, in particular delineating &amp;#39;information&amp;#39; and &amp;#39;cyber&amp;#39; security, and provide an overview of the most prominent frameworks and standards. On that basis we elaborate and structure the main areas of an information security policy, the main implementation challenges, and the need to review and amend the policy in a continuous cycle and comprehensive risk management framework. Depending of the specifics of their work, any school, university, institute and municipality may use this elaboration as a starting point in devising its own information security policy.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Network-based Steering of Bulgaria’s Cybersecurity Research</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The increasing reliance of economies, public administrations, military and security services, and our everyday activities on advanced information and communication technologies brings benefits, as well as vulnerabilities. Providing security of ICT infrastructures and protection of essential services against cyberattacks is becoming increasingly important. Several countries already have dedicated cybersecurity research programs. Bulgaria is not among those countries, notwithstanding the grave problems it faces, as emphasized by the recent leakage from the National Revenue Service exposing the personal data of almost all tax-paying citizens. The authors therefore have developed and present a concept allowing to combine top-down programs and financing, which occasionally include cybersecurity-related themes, with bottom-up initiatives and use of variety of instruments to advance the national cybersecurity competences.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Scoping the Scenario Space for Multi-sector Cybersecurity Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper presents results from the ECHO project, supporting the identification and development of cyberattack scenarios. It explores the scenario space along four dimensions: (1) critical infrastructures and essential services, critically dependent on the ICT infrastructure; (2) types of malicious actors and their capabilities; (3) exploited vulnerabilities; and (4) short- vs longer term horizon. The exploration serves to span comprehensively the scenario space. The authors present the list of selected scenarios, storylines, and use cases, that are used in follow-up research to define key components of the capability requirements: technology roadmaps, cyber skills framework, information exchange and certification requirements.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Understanding Hybrid Influence: Emerging Analysis Frameworks</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Over centuries countries and alliances in conflict have used all available means at their disposal, in addition to military forces, to gain a competitive edge. &amp;lsquo;Hybrid threat&amp;rsquo; or &amp;lsquo;hybrid war&amp;rsquo; is a new term designating the coordinated use of military and non-military means, that got traction in the analysis of the 2006 Israel-Hezbollah War and became widely used beyond the professional communities after the 2014 annexation of Crimea by the Russian Federation. One specific aspect of such conflicts is the lack of a clear distinction between &amp;lsquo;war&amp;rsquo; and &amp;lsquo;peace&amp;rsquo;, when a skillful player would apply available means to subjugate the opponent&amp;rsquo;s will, and thus achieve its political objectives, without fighting. Economic leverage, energy dependencies, ideology, propaganda and disinformation, cyber attacks and corruption are just a few types of means for such diverse&amp;mdash;or &amp;lsquo;hybrid&amp;rsquo;&amp;mdash;influence. While using different channels, it is their combined impact that can bring desired effects.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Finding an appropriate response to such hybrid influence requires a good understanding of own vulnerabilities, exposure and actual or potential impact over the public institutions, the economy and the society. This paper looks into emerging frameworks allowing to estimate the impact of hybrid influence and the extent to which they may be used to reflect the actual interdependencies and complexity of modern societies. While combining in various ways empirical data and expert assessments, all these frameworks facilitate the application of risk-aware allocation of limited resources to counter hybrid influence.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security and Opportunities for Application of Innovative Technologies in the work of the State Administration in Bulgaria</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><publisher><style face="normal" font="default" size="100%">Bulgarian Academy of Sciences</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Evolving Models of Using Armed Forces in Domestic Disaster Response and Relief</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">40</style></volume><pages><style face="normal" font="default" size="100%">167-180</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Due to the high level of readiness and their comprehensive capabilities, armed forces are demanded or expected to contribute to the response to incident and disasters of natural, technogenic or manmade origin. Military units may provide surge capacity, unique capabilities, long-term support to relief and recovery or even be the first to respond to a disaster. This article reviews the European experience in the organisation for using armed forces in domestic disaster response and relief operations, models of military employment, examples of military formations specially tailored for disaster response, multinational disaster response and relief formations, and specific military capabilities used in domestic response and relief operations. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">167</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Hybrid Warfare Challenges and Responses: Lessons from Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This editorial article will be added soon.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Hybrid Warfare: Emerging Research Topics</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">289-300</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article elaborates on four emerging research topics, considered of key importance for the understanding of and finding effective countermeasures to hybrid threats: (1) exploring the interlinked dynamics of a conflict developing in parallel in the physical world and on social networks; (2) analysing the expanding involvement of private actors who serve as proxies for an assertive state; (3) exploring the vulnerabilities of national security systems to hybrid influence and finding effective countermeasures; and (4) designing an architecture that allows to study the problem of hybrid threats holistically by providing interoperability among domain-specific or cross-domain models, or ‘use cases,’ and the respective data. All these require multi- and interdisciplinary research and consistent accumulation, verification and sharing of data, case studies and models.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Key Issues in the Implementation of the EU Global Strategy and the Evolution of European Defence</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><number><style face="normal" font="default" size="100%">36</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In his opening remarks to the session on “CSDP and Implementation of the EU Global Strategy” of the Inter-Parliamentary Conference for the Common Foreign and Security Policy and the Common Security and Defence Policy, 15-17 February 2018, Sofia, the author outlines three key issues: The necessary cooperation, and on some matters – close coordination, between the European Union and NATO on defence matters; the need to maintain cohesion and the popular support for the European defence across EU, which requires proportionate and balanced contribution by and inclusion of all member states; and, given the proliferation of roles and missions of the armed forces, the need to remember what constitutes the core of the military profession and making sure that the ethos of the military is preserved.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Lessons from the Procedure of Acquiring a New Type of Combat Aircraft, 1999-2017</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 2018</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">131</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the report to the conference &quot;50 Years Unmanned Aviation in Bulgaria,&quot; organised by the Technical University of Sofia - branch Plovdiv, 11-12 April 2018, the author reviews discussions and actions in the past two decades, aiming--as minimum--at providing independent performance of peacetime air policing and interoperability with NATO allies. In similar situations, many countries that do not participate in the design and production of combat aircraft make a political choice. Bulgaria chose instead to select a new type of combat aircraft in a competitive procedure. In June 2016, the Bulgarian Parliament approved the respective &quot;Investment Expenditures Project,&quot; and in April 2017 the then Caretaker Government designated a supplier. However, the new Parliament created a commission of inquiry, and in September 2017, based on the commission's report, returned the project to the Ministry of Defence with recommendations for changes in the underlying documents.
  This report provides an analysis of the main problems of the competitive procedure, related to the definition of requirements, the adopted methodology for comparative evaluation of alternative proposals, and the adopted approach to the management of the project with focus on the lack of conceptual and procedural clarity and the hyper concentration of authority in a single body - the Project Management Board under the Commander of the Bulgarian Air Force.
  The report is based on publicly available information and is intended to support the successful implementation of the project for acquiring a new type of combat aircraft and the overall modernisation of the combat aviation.
  The full text of the report is in the Bulgarian language.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Main Avenues for Hybrid Influence over the National Security System</style></title><secondary-title><style face="normal" font="default" size="100%">Hybrid Threats: Myth or Reality? Consequences for the National and the European Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">16-17 October</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Sofia University “St. Kliment Ohridski</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Policy and Legal Frameworks of Using Armed Forces for Domestic Disaster Response and Relief</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">40</style></volume><pages><style face="normal" font="default" size="100%">137-166</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article reviews roles of military forces in Europe in support of civilian authorities in crises caused by natural or manmade incidents and disasters. These roles are shaped by five trends – some in effect since the end of the Cold war, others more recent. These are: transition from civil defence to civil protection; expanding non-combat roles of the armed forces; cooperation with an increasing number of actors; respective proliferation of modes of contribution; and searching ways to contribute to the resilience of both states and local communities. The authors elaborate and provide examples for these five trends and conclude by highlighting some enduring characteristics of the military contributions. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">137</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Поуки от процедурата за придобиване на нов тип боен самолет, 1999-2017</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">анализ на алтернативи</style></keyword><keyword><style  face="normal" font="default" size="100%">жизнен цикъл</style></keyword><keyword><style  face="normal" font="default" size="100%">многокритериален анализ</style></keyword><keyword><style  face="normal" font="default" size="100%">модернизация</style></keyword><keyword><style  face="normal" font="default" size="100%">отбранителна аквизиция</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">април 2018 г.</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">131</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Обсъждането и действията за придобиване на нов тип боен самолет за военновъздушните сили, осигуряващ като минимум самостоятелно изпълнение на задачата за въздушно патрулиране в мирно време и оперативна съвместимост със съюзниците в НАТО, продължават вече близо 20 години. В сходна ситуация много страни правят политически избор, докато България избра да проведе състезателна процедура. През 2016 г. Народното събрание одобри съответен &amp;bdquo;проект за инвестиционен разход&amp;ldquo;, който беше доведен до избор на изпълнител през април 2017 год., но няколко месеца по-късно, по предложение на създадена временна комисия, върна проекта в Министерството на отбраната с препоръки за промени.&lt;/p&gt;&lt;p&gt;Настоящата публикация анализира основни проблеми в процедурата, свързани с определянето на изискванията, възприетата методика за оценяване на алтернативни предложения и заложения подход към управлението на проекта, с фокус върху отсъствието на концептуална и процедурна яснота при свръхконцентрация на правомощия в един орган, ръководен от командира на ВВС. Тя е изготвена на основата на публично достъпна информация и е предназначена да подпомогне успешната реализация на проекта и цялостната модернизация на бойната ни авиация.&lt;/p&gt;&lt;p&gt;Докладът е представен на Научна конференция &amp;quot;50 години безпилотна авиация в България&amp;quot;, организирана от филиал Пловдив на Техническия университет - София, 11-12 април 2018 г.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer International Publishing</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham, Switzerlad</style></pub-location><volume><style face="normal" font="default" size="100%">582</style></volume><pages><style face="normal" font="default" size="100%">350-357</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security and Resilience of Modern Societies: A Research Management Architecture</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">38</style></volume><pages><style face="normal" font="default" size="100%">93-108</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Advanced information and communications technologies (ICT) facilitate the increase of effectiveness and efficiency of defence and security organizations, governmental services, the economy, and quality of life, while at the same time providing opportunities for malicious actors to cause significant damage without exercising physical coercion. Policies for security and resilience of modern societies to threats and risks from the cyberspace account for foreseen cyber threats, their immediate impact on ICT infrastructure, consequent effects on critical services, as well as cascading effects across systems and infrastructures. This paper presents the architecture used to plan and, consequently, manage cybersecurity research in Bulgaria. It covers five application areas (information management systems; industrial control systems; unmanned and remotely piloted vehicles; bio-integrated systems; and cognitive processes and decision-making), the study of systems of systems, and support to the formulation and implementation of cybersecurity policy.</style></abstract><section><style face="normal" font="default" size="100%">93</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defence-Industrial Cooperation with Foreign Countries: Best Practices of Ethics</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><number><style face="normal" font="default" size="100%">35</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In a presentation to the conference on “Security Sector Governance: Defence Production, Sales and Acquisitions” in Kyiv, Ukraine, the author aims to raise the awareness among Ukrainian stakeholders on existing policies, standards, and good practices in corporate ethics of defence companies. The paper outlines key considerations in establishing defence-industrial cooperation across borders and the principles of business ethics. Then it provides examples from the most recent “Company Index” of Transparency International and concludes by emphasising ethical behaviour as a key pre-condition for solid defence industrial cooperation.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">NATO Governance and Delivery of Commonly Funded Capabilities: Improving Support to NATO Commanders</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%"> April 2017</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;At the NATO Warsaw Summit, Heads of State and Government tasked the NATO Deputies Committee to provide recommendations on how to improve the governance aspects of the common funded capability delivery process. Towards that purpose, the NATO Secretary General appointed an independent Group of Senior Experts (GSE) drawn from the Alliance Members. The GSE reviewed the processes and decision-making apparatus across the dimensions of requirement setting, resource allocation, risk management, programme control and capability delivery. A guiding principle for this work was the need to protect the effective application of consensus-based governance. The GSE concluded at an early stage in its work that any recommendations would need to ensure that the controls exercised through the life of a project applied a consensus test at the right time and in the right place. Appropriate oversight and individual (National) and collective (Alliance) agreement were essential but so was the effective delegation of project management and accountability to get the job done.&lt;/p&gt;&lt;p&gt;The GSE undertook a wide-ranging review of the current governance and project control processes used by NATO to deliver capability programmes, recent IBAN reports, potentially useful benchmarks in the academic literature and in the practical delivery of projects in analogous organisations. Combining this analysis with the experience inside the GSE provided clarity of the problem, capacity to explore a range of areas, test potential solutions, and offer practical recommendations.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Отбранително-индустриално сътрудничество с чуждестранни компании: Добри етични практики</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">доставки за отбраната</style></keyword><keyword><style  face="normal" font="default" size="100%">етичен кодекс</style></keyword><keyword><style  face="normal" font="default" size="100%">отбранителна индустрия</style></keyword><keyword><style  face="normal" font="default" size="100%">политика за интегритет</style></keyword><keyword><style  face="normal" font="default" size="100%">Украйна</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><number><style face="normal" font="default" size="100%">35</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Резюме: В доклада си на конференцията „Добро управление на сектора за сигурност: производство, търговия и придобиване на отбранителни продукти“ в Киев, Украйна, авторът запознава заинтересованите украински представители съществуващи политики, стандарти и добри практики за корпоративна етика на фирми от отбранителната индустрия. Докладът представя основни съображения в установяването на трансгранично отбранително-индустриално сътрудничество и принципите на бизнес етиката, дава примери от последния „Фирмен индекс“ на „Прозрачност без граници“. В заключението се подчертава, че етичното поведение е основно предварително условие за стабилно отбранително-индустриално сътрудничество.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence and Security Sectors</style></title><secondary-title><style face="normal" font="default" size="100%">Addressing Security Risks at the Ukrainian Border Through Best Practices on Good Governance</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">IOS Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Amsterdam</style></pub-location><pages><style face="normal" font="default" size="100%">67-73</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO Study</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Dependability Engineering of Complex Systems, Proceedings of the Twelfth International Conference on Dependability Problems and Complex Systems DepCoS-RELCOMEX</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">July 2-6, 2016</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Brunow, Poland</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">National and international security, our financial, industrial as well as economic prosperity, healthcare system and national well-being as a whole are dependent on critical infrastructures, which could be described as highly interdependent. Many examples are available such as the national electrical grid, oil and natural gas systems, telecommunication and information networks, transportation networks, water systems, and banking and financial systems. Keeping them in reliable and secure state and study their dependencies is paramount for every government or organization. There is an urgent need of their classification. Creation and development of model and methodology which could describe their behaviors is going to make this world safer. The presented here model and based on it study and initial results are steps toward reliable and secure critical information infrastructure.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity: A Generic Reference Curriculum</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">National Defence</style></publisher><pub-location><style face="normal" font="default" size="100%">Kingston, ON</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;The reference curriculum on cybersecurity may be used by educators as a generic guide for implementing a cybersecurity program. It is organized alnf four maun themes: &lt;/span&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;Cyberspace and the Fundamentals of Cybersecurity &lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;Risk Vectors Theme&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;International Cybersecurity Organizations, Policies and Standards&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;Cybersecurity Management in the National Context &lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;The full text of the Cybersecurity Curriculum is available for free download on the NATO website &lt;a href=&quot;http://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2016_10/20161025_1610-cybersecurity-curriculum.pdf&quot; target=&quot;_blank&quot; title=&quot;Cybersecurity: A Generic Reference Curriculum &quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Resources Management System in Visegrad Group</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">National Centre for Strategic Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">Warsaw</style></pub-location><pages><style face="normal" font="default" size="100%">83</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Experience of the Kyrgyz Republic in Crisis Management: Lessons for the Future</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">DCAF</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva – Bishkek</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Generic Reference Curriculum on Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">181-184</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A volunteer group of academics and practitioners embarked on a two-year project to develop a generic reference curriculum on cybersecurity on behalf of NATO and the Partnership for Peace Consortium. This paper provides a brief overview of the result of this work - a curriculum that is recommended as a starting point for any university or training organization considering a program in the field of cybersecurity. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">181</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Impact of Corruption on National Security and Counter-corruption Strategies</style></title><secondary-title><style face="normal" font="default" size="100%">Foreword to Karin Meghesan and Valentin Stoian, Corruption and National Security: Evaluation and Response</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">National Intelligence Academy “Michai Viteazul”</style></publisher><pub-location><style face="normal" font="default" size="100%">Bucharest</style></pub-location><pages><style face="normal" font="default" size="100%">7-21</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-stakeholder Approach to Cybersecurity and Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">59-68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Identifying and involving all relevant stakeholders in national cybersecurity strategy (NCSS) development is key for defining the scope, setting the goals and approaches, and the roadmap to achieve targeted maturity levels. It is more than involving the three groups (government, private sector, academia) and requires a holistic approach towards security and resilience of all interconnected segments of national and international cyberspace. The paper presents the approach to making the Bulgarian NCSS (BG-NCSS). Different aspects of stakeholders' involvement and engagements are considered: for identifying the scope and developing the strategy, defining the responsibilities and engaging with the development of a national collaboration operational network, strategy implementation and the roadmap to a resilient society, and collaboration to achieve operational cyber resiliency. As a collaboration mechanism, applications of public-private partnerships at different levels are envisaged.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">59</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Reflecting Developments in Hybrid Warfare into Defence Policy</style></title><secondary-title><style face="normal" font="default" size="100%">Countering Hybrid Threats: Lessons Learned from Ukraine</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">IOS Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Amsterdam</style></pub-location><pages><style face="normal" font="default" size="100%">27-33</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Understanding the impact of good governance and corruption on defence institution building: A reference curriculum for educators</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http:/www.nato.int/nato_static_fl2014/assets/pdf/pdf_2016_12/20161209_1612-DIB-Reference_Curriculum.pdf</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">NATO</style></publisher><pub-location><style face="normal" font="default" size="100%">Brussels</style></pub-location><pages><style face="normal" font="default" size="100%">95</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ключови въпроси в прилагането на Глобалната стратегия на ЕС и развитието на Европейската отбрана</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">военна професия</style></keyword><keyword><style  face="normal" font="default" size="100%">Глобална стратегия на Европейския съюз</style></keyword><keyword><style  face="normal" font="default" size="100%">Европейска отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">кибер сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">ОПСО</style></keyword><keyword><style  face="normal" font="default" size="100%">хибриден конфликт</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><number><style face="normal" font="default" size="100%">36</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Във встъпителното си изложение в сесията „ОПСО и прилагането на Глобалната стратегия на ЕС“ на интерпарламентарната конференция за общата политика за външна политика и политиката за сигурност и общата политика за сигурност и отбрана, проведена на 15-17 февруари 2018 г. в гр. София, авторът очертава три основни проблема: необходимостта от сътрудничество, а по някои въпроси – тясна координация между Европейския съюз  и НАТО в областта на отбраната; необходимостта да се поддържа кохезията и обществената поддръжка за Европейската отбрана в страните от Европейския съюз, което изисква пропорционален и балансиран принос и включване на всички държави членки; и, предвид разширяването на ролите и задачите на въоръжените сили, да не се забравя каква същността на военната професия и съхраняване на нейния характер.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Albania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">120</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Albania has a total area of 28,748 km2. It shares a border with Montenegro to the northwest, with Kosovo to the northeast, with Macedonia to the north and east, and with Greece to the south and southeast. It has a coastline around 476 km long. Albania is divided into 12 regions (qarks), 36 districts, 375 municipalities and communes, which are the basic units of local self-government.

The four main hazards affecting Albania are forest fires, floods, earthquakes and snowstorms. Among other hazards available assessments make reference to landslides, drought, epidemics, avalanches, tsunami, technological hazards, dam burst and storms.

The national crisis management framework consists of three levels – national, regional and local. At national level, the Council of Ministers leads and governs the national system of civil emergency management in Albania, with the main role played by the General Directorate of Civil Emergencies in the Ministry of Interior.

Prefects in the qarks (regions) are responsible for planning and coping with civil emergencies at qark (regional) level. A Commission of Planning and Responding to Civil Emergencies is established in each qark with the task to coordinate activities of the qark authorities and volunteer organisations for planning and coping with emergency. Accordingly, the mayor or the head of commune is responsible for planning and responding to civil emergencies in the respective municipality or commune (local) level. Under the chairmanship of the mayor or the head of commune, a Commission of Planning and Responding with Civil Emergencies is established, and its main task is to coordinate all activities of the local government unit and volunteer organisations, responsible for planning and responding to emergencies.

The principal operational forces or active structures in Albania are comprised of the Armed Forces; Directorate of Fire Protection and Rescue (PMNZZH); the Ambulance Service; the State Police and other Police units; Directorate of State Reserves; Units specialised in mines and technical response; Monitoring and operational supportive structures.

Earlier data show that in normal times the human resources dedicated to crisis management include the following: app. 450 personnel, including the employed in civil protection at qark level (app. 50) and personnel employed in civil protection at commune or district level. Involvement of private companies and volunteers is limited to app. 500 of active personnel.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analysing Organisational, Legal, and Political Framework Conditions to Support the Implementation of New Crisis Management Solutions</style></title><secondary-title><style face="normal" font="default" size="100%">10th Security Research Conference Future Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">15-17 Sept 2015</style></date></pub-dates></dates><pages><style face="normal" font="default" size="100%">145-152</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgaria: Information on Capabilities, Organisations, Policies, and Legislation in Crisis Management and Disaster Response</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">128</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Natural disasters in Bulgaria are on the increase. For just four months—from June to October 2014—heavy floods affected half of Bulgaria’s regions and took 18 casualties on five different occasions. By the end of October, the total number of disasters since the start of the year exceeded 600, including train crashes and explosions in ammunition factories, the most recent one killing 15 people. 
The types of challenges faced come in sharp contrast with the traditional concerns and the approach to protection of the population prior to WWII and during the Cold war. After several waves of reorganisation of the former militarised system for civil defence, the civil protection units and their management bodies are now part of General Directorate “Fire Safety and Civil Protection” (FSCP) within the Ministry of the Interior.
The main legal act regulating their activities is the Disaster Protection Law. A separate concept does not exist at current. The Disaster Protection Law reflects currently prevailing conceptual views on crisis management and disaster response.  A number of strategies and executive regulations complement the law in regard to disaster prevention, the functioning of volunteers and volunteer organisations, consultative bodies, mid-term programmes, annual implementation plans, etc. Crisis preparedness and response need to adhere to a number of other laws, e.g. on the Ministry of the Interior, on the environmental protection, on the waters, on the regulation of territories, etc. 
The central executive power continues to play the key role, primarily via the MOI General Directorate “Fire Safety and Civil Protection.” The regional and municipal authorities have their own disaster protection plans, and each region has a local FSCP directorate. Along with other ministries and central executive agencies, critical infrastructure operators, other trade companies, volunteers, health services, and the armed forces, they perform their crisis management duties in a Unified Rescue Service. 
FSCP provides points of contact for international co-operation, including humanitarian aid, engagement for disaster response and relief, protection of European critical infrastructures, etc. 
FSCP has about 8,000 personnel and is sustained through the budget of the Ministry of the Interior. Elements of the monitoring and early warning system are maintained through the budget of respective ministries, agencies, and institutes. Some equipment, infrastructure and training programmes are financed as part of international projects, including EU structural funds. In addition, the Joint Commission for Restoration and Relief (JCRR) to the Council of Ministers has an annual budget of 70-90 mln. BGN, or approximately 0.1 percent of the GDP, to finance “the prevention, containment, and overcoming the consequence of disasters.” 
Bulgaria has some crisis management capabilities of potential interest to the EU and other MSs, such as medium search and rescue units for urban environments, medium CBRN units, and land units for fighting forest fires, as well as the FSCP training range in the town of Montana. Mobile medical teams of the Military Medical Academy are regularly deployed abroad in disaster response operations. At the time of writing of this report, a Centre for Crisis Management and Disaster Response in Sofia, pending the accreditation from the North-Atlantic Council, will be declared NATO Centre of Excellence.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">On Bulgaria’s Defence Policy 2015-2020</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">32</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">On September 30th, 2015 the Council of Ministers approved a “Programme for the development of the defence capabilities of the armed forces of Republic of Bulgaria till 2020.” This is the main document, defining Bulgaria’s defence policy. It will be discussed by the National Assembly, with the expectation to be adopted. This will however lead to a significant divergence from the obligations undertaken at the NATO Wales Summit, the “National Programme 2020” of the 2014 Caretaker Government, and the consensus reached at the Consultative Council on National Security (chaired by the President) in April 2015. Furthermore, this analysis shows that the Programme will not serve to determine and guide future decisions and actions in the defence sphere. The stagnation of the armed forces will continue, even against the recognition of increasing direct threats to the security of the country. Finally, the anticipated parliamentary approval of the Programme will make even fuzzier the responsibility for the status of the armed forces and their readiness to protect the sovereignty and the territorial integrity of Bulgaria.
The full text of  CSDM Views 32 is in Bulgarian.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Case Study on South-Eastern Europe</style></title><secondary-title><style face="normal" font="default" size="100%">Deliverable 8.2</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">31 July 2015</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">EvoCS Consortium</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Infrastructure Protection: The Challenge of Establishing Interagency Cooperation</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This report presents the context for and decision support requirements in the field of critical infrastructure protection. The author then examines alternatives in structuring ‘Levels of Cooperation’ and concludes that we need to distinguish at least between operational coordination and coordination in the development of measures and capabilities for critical infrastructure protection. Next the report presents a critical account of the experience of Bulgaria both in operational and development coordination. In the concluding section the author recommends to focus not only on centralized, top-down decision making, but to explore the benefits of bottom-up approaches and accelerate the implementation of tools like exchange of experience, testing interoperability, conducting joint, multi-agency, multi-stakeholder training and exercises, benchmarking, and to provide for free flows of information and knowledge, as well as continuous learning. This will serve to identify and prove certain promising concepts and contribute to the development of a culture of cooperation. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Infrastructure Protection: the Challenges of Establishing Interagency Cooperation (in Ukrainian)</style></title><secondary-title><style face="normal" font="default" size="100%">Zelena knyha z pytan zakhystu kritychoy infrastructuru</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">NISS</style></publisher><pub-location><style face="normal" font="default" size="100%">Kyiv</style></pub-location><pages><style face="normal" font="default" size="100%">158-161</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Evolving Security Concepts: The Premium on Governance in the Case of Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">83-107</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The EvoCS project analysed security perceptions and discourses in 12 countries, including Bulgaria. The authors of the Bulgarian case study introduce the particular &amp;lsquo;transitional&amp;rsquo; context of the security discourse, briefly describe the project methodology and present the research results for Bulgaria, along with explanation of the historical and social influences on security perceptions. The Bulgarian security discourse emerged as unique among all twelve examined in EvoCS. It is dominated by the &amp;ldquo;political stability and security&amp;rdquo; core value and the overarching theme is governance &amp;ndash; in the political, social, and economic spheres, as well as in facing the pervasive threat of corruption. The case study epitomises a double disconnect &amp;ndash; between the official Bulgarian security discourse and societal perceptions of security challenges, on one hand, and between challenges identified in EU security strategies and challenges faced by Bulgaria, on the other. This is reflected in the final section of the paper, presenting policy recommendations on making the security discourse in Bulgaria more relevant to the challenges the country faces and the societal interests.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Good Practices and Challenges in Organizing for Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">5-8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Hungary: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">127</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">• Hungary is a landlocked country in Central Europe with a territory of slightly over 93 thousand square kilometres. It has boundaries, shared with Austria to the west, Serbia, Croatia and Slovenia to the south and southwest, Romania to the southeast, Ukraine to the northeast, and Slovakia to the north. The country is crossed by rivers Danube and Tisza, which are navigable 418 and 444 kilometres, respectively. 
• The crisis management system in Hungary has been under significant pressure in the last years, which revealed weakness and vulnerabilities to be addressed through policies and actions. Numerous disasters – from the notorious red sludge spill, via floods, to storms and droughts – made it evident that a profound reform of the Hungarian crisis management and disaster response architecture was needed.
• A new disaster management law was adopted in 2011 (in force since 1 January 2012), laying the foundations of a system in which professional disaster management service cooperates closely with obliged and volunteer civil protection structures. As put by the law, disaster management has been named a national cause.
• The National Directorate General for Disaster Management (NDGDM) within the Ministry of Interior is the national authority for disaster management. As of 1 January 2012 a new organisational structure of the NDGDM was introduced, which has been built on three pillars: civil protection, fire protection and industrial safety, with the National Inspectorate General of Fire Services, the National Inspectorate General of Civil Protection and the National Inspectorate General of Industrial Safety constructing the backbone of the NDGDM.
• The Disaster Management Governmental Coordination Committee (DMGCC) is an inter-agency coordination body ensuring consistency between sectors. At county and local level, protection committees are in place to concert disaster management.
• From an operational perspective, the central structures for disaster management at the county and local level include 20 county directorates for disaster management, their subordinated offices for disaster management, the professional dire departments and the municipal fire departments.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Key Prerequisites for Integrity in Defence - Role of Parliament</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">29</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In a report to the session “Defence Management Reform and Integrity Building” of the 88th Rose-Roth seminar of the NATO Parliamentary Assembly, Belgrade, 31 March - 2 April 2015, the author outlines three key prerequisites for integrity in defence: having a balanced, adequate, acceptable, and affordable defence policy; assessment of plans, budget proposals, and reports with a view on planned or actual results; and effective cooperation and coordination among key security stakeholders. The report further suggests roles of parliaments and parliamentarian committees on security and defence.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Lithuania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">126</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">As in the other Baltic Region States the organisational structure is centralised, i.e. coordinated and mostly organised by the central national civil protection authority, as is the case with Estonia, Latvia, Lithuania. Additionally, the use of private rescue services is low in the Baltic Countries. 
 
The National Security Strategy establishes the basic goals and means of the national security policy. The aim of the Lithuanian National Security Strategy is to provide a vision of the state’s development, its national interests and the necessary actions for their implementation. 

The civil security system and the civil protection system of Lithuania is comprised by the Government, the state and municipal institutions, economic entities, public organisations, civil protection forces such as fire and rescue, police, state border guard, medical services, public security service, state food and agriculture service, other emergency services, forces of economic entities, volunteers, the emergency commissions and emergency operation centres. 

The management of civil protection in Lithuania is organised in three levels - national, regional (county) and local (municipal). At national level, the Government, the Government Emergency Commission, the Emergency Management Centre, the Ministry of National Defence, the Civil Protection Department, the State Fire Prevention and Rescue Service, Ministries, and other public authorities are the main stakeholders entitled to make strategic decisions on the implementation of civil protection measures.

At county level, administrations of county governors, county civil protection departments, and county emergency management centres are responsible for organising and ensuring preparedness for emergencies as well as for assisting when necessary in their relief. 

At municipal level, mayors of municipalities, civil protection departments, civil protection personnel, municipal emergency management centres, fire protection, search and rescue services, warning and information, evacuation, civil protection services and economic entities are responsible for organising preparedness for emergency situations and when required mitigate their effect.

International cooperation in Lithuania in the field of crisis management is coordinated by the Fire and Rescue Department, which is subordinated to the Ministry of Interior. Individual ministries and other state civil security institutions also participate in international civil protection activities.

Crisis management institutions part of the civil protection and rescue system, Training Centre, other educational institutions of civil protection as well as the forces of the civil protection and rescue system are financed by the state budget, while the economic entities are financed from their own resources. 

The systems for training in the field of civil protection are quite different in the Baltic region, however they share some basic features. Education in civil protection and rescue has a legal foundation in all of the Baltic Region countries. Basic and advanced education at the national level is standardised through the use of certificates, as well as the development of educational and training curricula. All of the Baltic region states have specialised schools and colleges which carry out education in civil protection and rescue area.  
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Poland: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">119</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">• Poland is a country in the eastern part of Central Europe with an area of almost 312 000 sq. km. Poland is an almost unbroken plain reaching from the Baltic Sea in the north, to the Carpathian Mountains in the south.
• The Polish crisis management system is a complex architecture which is still under construction. The heavy floods of 1997, 2001 and 2010 exposed significant shortcomings and prompted a series of legal and institutional reforms.
• In Poland, there is no single authority dealing with disaster management. The structure of the Polish emergency management has five levels: state, ministry (central government body), province (voivodeship), county (poviat) and district (commune, gmina).
• The national firefighting and rescue efforts are the pivotal part of the crisis management system of the country. The Chief Commandant of the State Fire Service, under the supervision of the Minister of the Interior, is the central body of the state administration responsible for the organisation and management of those activities.
• Several services and structures also support or make part of the wider Polish crisis management system, including (but not limited to): the Police; the Border Guard; the State Inspection for Environment Protection; the Institute for Meteorology and Water Management; the National Atomic Energy Agency; the mining rescue stations; the maritime search and rescue service; the naval rescue service; NGOs, e.g. Mountain Volunteer Rescue Service; Tatra Mountains Volunteer Rescue Service; Water Volunteer Rescue Service; Mazurian Rescue Service and others.
• The role of the private sector in the civil security system is limited, while NGOs are important and cooperate closely with the state institutions. The Volunteer Fire Service is the biggest part of the volunteer sector in Poland.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Romania: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">121</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Romania is highly vulnerable to catastrophic natural disasters. Firstly, it is situated in a seismically active region and has a history of devastating and deadly earthquakes – the most affecting happened in Vrancea in 1977. Furthermore, the Bucharest area has experienced a number of tremors of varying intensities, and the probability that a severe and damaging earthquake will occur is high. However, Romania is also at risk by other natural and technological hazards. More specifically, the floods in 2010 revealing weaknesses of the civil protection system triggered some process of improving. Of the former group, floods, drought and heat/cold waves have been experienced frequently, while the most affecting example of a man-made disaster has been the accident at the Baia Mare gold processing plant, where, in 2000, 100 000 cubic meters of toxic waste water spilled out and flooded into the Danube River, affecting Romania, Hungary, Ukraine, Serbia and Bulgaria. 

The Romanian crisis management concept views civil protection as a public policy issue, and as a civil operation during which the military could provide support with both assets and people. Crisis management does not rely on a centralised structure, but is a result of the interaction of parallel architectures. The latter involve bodies and agencies dealing with particular risks, while the crisis management system-of-systems employs an all-hazard approach. The most significant developments within the crisis management domain took place in 2004, as well as after the 2007 accession to the European Union. 

The National Emergency Management System (NEMS) is a nationally owned mechanism of multiple stakeholders, which provides coordination and response in case of emergencies, and serves as an advocate for prevention and disaster risk reduction at different levels. It is organised at four levels (national/governmental, ministerial, county and local), with a particular coordination and communication role for the national-level authorities. The system is led by the Prime Minister, supported by the National Committee for Emergency Situations and having the Minister of Administration and Interior as a chief executive. The main executive administrative body is the General Inspectorate for Emergency Situations (GIES), which coordinates plans and operational activities in cases of natural and man-made emergency situations. Specific plans are prepared at all administrative levels. Funding is provided through the state and local budgets, though they are used mostly for post-disaster rehabilitation and less for preventive measures.

The role of the private sector in the civil security system is limited, while NGOs cooperate closely with the state institutions, mostly in the fields of education and training. The number of organised volunteers is about 130 000. Regulations require that everyone be prepared to take care of himself in the immediate aftermath of major disasters. Every family and company should develop its own emergency plan, stock its own emergency survival kit, and ensure that each family member or company employee is familiarised with emergency procedures and can take precautions to protect their personal safety. However, in general, the society is not well organised at a community level and expectations that disaster management is a state responsibility are widely spread.

After Romania’s EU accession in 2007, the country improved its cooperation with international actors and increased its efforts to make the crisis management system coherent with international (particularly the EU) context. Romania has increased its engagement in the work of committees and working groups dealing with the EU’s civil protection. Romania has activated the EU’s Monitoring and Information Centre (MIC)  several times and contributed to several MIC-coordinated interventions providing support to Greece, Georgia, Hungary, Moldova and Turkey. Bilateral agreements or protocols are signed with some of the Romania’s neighbours (Bulgaria, Hungary, and Moldova), as well with other European (Czech, Denmark, France, the Netherlands, and Turkey) and non-European countries (Azerbaijan and the USA –with FEMA and USTDA).

The Romanian capacity for emergency response includes several niche capabilities: pyrotechnical capabilities for drainage, controlled breaches, and detonation, for water purification and transportation and for marine de-pollution. Military cargo aircraft are also available in cases of emergencies at home and abroad (C-27J Spartan – 6, C-130 Hercules – 3, and An-26 Curl – 4).</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Scenario and ambitions for managing a trans-border political-military crisis: Implications for Bulgaria’s Defence Policy</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">30</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">At the end of 2007 and early 2008, we conducted a study on the request of the Ministry of Defence of Republic of Bulgaria, aimed to support the review of the country&amp;rsquo;s defence policy and the long-term vision for its armed forces. The report was published in the Spring of 2008 without any substantive editorial intervention. In view of the current crisis in neighbouring Macedonia, we decided to inform our readers on the relevant portions of that work, as it was published more than seven years ago. Depending on the evolution of the security situation close to the Bulgarian borders, we stand ready to review prospective scenarios and recommend feasible courses of action.
The full text of the report is in Bulgarian.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Georgi Cvetkov</style></author><author><style face="normal" font="default" size="100%">Filip Spasov</style></author><author><style face="normal" font="default" size="100%">Veselin Petkov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Албания: Способности, Организация, Политики и Законодателство за Управление на Кризи и Отговор при Бедствия</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">120</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът предлага оценка на основните рискове за Албания, например горски пожари, наводнения, заметресения и снежни бури. Описана е структурата на националната система за управление при кризи, функционираща на три нива, като се изследва водещата роля на Главна дирекция „Извънредни ситуации&quot; в Министерството на вътрешните работи. Докладът разглежда начина на структуриране и работата на системата от ниво qark (регион) до ниво община. В заключение се предлага описание на основните оперативни звена и на ресурсите, които се отделят за управление при кризи.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author><author><style face="normal" font="default" size="100%">Nataly Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">България: Способности, организация, политики и законодателство за управление на кризи и реагиране при бедствия</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">България</style></keyword><keyword><style  face="normal" font="default" size="100%">Закон за защита при бедствия</style></keyword><keyword><style  face="normal" font="default" size="100%">защита на населението</style></keyword><keyword><style  face="normal" font="default" size="100%">наводнения</style></keyword><keyword><style  face="normal" font="default" size="100%">пожари земетресения</style></keyword><keyword><style  face="normal" font="default" size="100%">природни бедствия</style></keyword><keyword><style  face="normal" font="default" size="100%">специализация</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">128</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът представя основните рискове за населението, свързани с природни бедствия и промишлени аварии и преобладаващите към момента концептуални възгледи за кризисното управление, отразени в Закона за защита при бедствия. Централната изпълнителна власт играе основна роля в организационно отношение чрез Главна дирекция &quot;Пожарна безопасност и защита на населението&quot; на МВР. Единната спасителна система е основа на кризисното управление в страната, като осигурява готовност и реагиране на областни и общински власти, други министерства и агенции, оператори на критична инфраструктура, други търговски дружества, здравни заведения, доброволци и въоръжените сили. Докладът представя информация за равнището на финансиране и способностите на страната за кризисно управление, вкл. способности от потенциален интерес за ЕС и страни-членки.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">За отбранителна политика на Република България 2015-2020</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">бюджет за отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">модернизация</style></keyword><keyword><style  face="normal" font="default" size="100%">Отбранителна политика</style></keyword><keyword><style  face="normal" font="default" size="100%">развитие на въоръжените сили</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Октомври 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">32</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">На 30 септември 2015 г. Министерският съвет одобри &quot;Програма за развитие на отбранителните способности на въоръжените сили на Република България 2020&quot;. Това е основният документ, дефиниращ отбранителната политика на страната. Предстои неговото обсъждане и приемане от Народното събрание. Това обаче ще означава значително отстъпление от ангажиментите, поети на срещата на върха на НАТО в Уелс, националната програма 2020, приета от служебното правителство през октомври 2014 г. и становище на Консултативния съвет за национална сигурност от април 2015 г. Нещо повече, документът няма да изпълни предназначението си да предопределя и насочва бъдещи решения и действия в областта на отбраната. Вегетирането на въоръжените сили ще продължи, при това в сложна обстановка на нарастващи заплахи, а приемането на Програмата от Народното събрание само ще размие отговорността за състоянието на Въоръжените сили и готовността им да гарантират суверенитета и териториалната цялост на Република България.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ключови предпоставки за интегритет в отбраната: Роля на парламента</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">бюджет за отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">интегритет</style></keyword><keyword><style  face="normal" font="default" size="100%">координация</style></keyword><keyword><style  face="normal" font="default" size="100%">НАТО</style></keyword><keyword><style  face="normal" font="default" size="100%">Отбранителна политика</style></keyword><keyword><style  face="normal" font="default" size="100%">парламентарен контрол</style></keyword><keyword><style  face="normal" font="default" size="100%">прозрачност</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Април 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">29</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">В доклада си пред сесията „Реформа на отбранителния мениджмънт и утвърждаване на интегритета“ пред 88-я Роуз-Рок семинар на Парламентарната асамблея на НАТО в Белград, 31 март – 2 април 2015 г. авторът очертава три ключови предпоставки за интегритет в отбраната: наличие на балансирана, адекватна, приемлива и реалистична отбранителна политика; оценяване на планове, бюджетни предложения и доклади за изпълнението от гледна точка на планирани и реални резултати; и ефективно сътрудничество и координация между организациите в сектора за сигурност. Докладът предлага още съответни роли на парламента и парламентарни комисии по сигурност и отбрана.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Filip Spasov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Литва: Способности, организация, политики и законодателство за управление на кризи и отговор при бедствия</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">гражданска защита</style></keyword><keyword><style  face="normal" font="default" size="100%">Литва</style></keyword><keyword><style  face="normal" font="default" size="100%">отговор при бедствия</style></keyword><keyword><style  face="normal" font="default" size="100%">подготовка</style></keyword><keyword><style  face="normal" font="default" size="100%">структури за управление при кризи</style></keyword><keyword><style  face="normal" font="default" size="100%">централизирана структура</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">126</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът изхожда от факта, че системата за управление при кризи в Литва е централизирана, което е характерно за всички държави от балтийския регион. От гледна точка на законодателство, докладът оценява Националната стратегия за сигурност, която задава основните цели и средстава за реализиране на националната политика за сигурност. Авторите описват нивата и елементите на литовската система за управление при кризи, в т.ч. правителство, държавни и общински структури, предприятия, обществени организации, сили и средства за гражданска защита.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vesselin Petkov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Полша: Способности, Организация, Политики и Законодателство за Управление на Кризи и Отговор при Бедствия</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Национална система за противопожарна защита и спасяване</style></keyword><keyword><style  face="normal" font="default" size="100%">отговор при бедствия</style></keyword><keyword><style  face="normal" font="default" size="100%">подготовка</style></keyword><keyword><style  face="normal" font="default" size="100%">Полша</style></keyword><keyword><style  face="normal" font="default" size="100%">стандартни оперативни процедури</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">119</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Обект на настоящето изследване е сложната архитектура на полската система за управление при кризи. Докладът се фокусира върху централния елемент на системата – националните структури за противопожарна защита и спасяване; нивата, на които действат; и функционирането им. Изследването обхваща също и други структури и служби, съставляващи или подпомагащи полската система за управление при кризи в широк смисъл.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Рунъния: Способности, Организация, Политики и Законодателство за Управление на Кризи и Отговор при Бедствия</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Информационна система за управление при извънредни ситуации</style></keyword><keyword><style  face="normal" font="default" size="100%">Национална система за управление при извънредни ситуации</style></keyword><keyword><style  face="normal" font="default" size="100%">отговор при бедствия</style></keyword><keyword><style  face="normal" font="default" size="100%">подготовка</style></keyword><keyword><style  face="normal" font="default" size="100%">Румъния</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">121</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Обект на настоящия доклад е Румъния – държава, силно уязвима от природни бедствия; разположена в сеизмично активен регион с история, белязана от разрушителни земетресения, и подложена на въздействието на множество рискове, например наводнения, суша и горещини. Докладът изследва концептуалната основа на управлението при кризи в Румъния и структурата на системата, в която основна координираща роля по отношение на планове и оперативни дейности играе Главният инспекторат за извънредни ситуации. Авторът отделя специално внимание на ролята на частния сектор и НПО, активни основно в сферата на образованието и обучението. Способностите на Румъния за реакция при кризи и извънредни ситуации се разглежда в контекста на международното сътрудничество в областта.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Сценарий и амбиции за управление на трансгранична военнополитическа криза: Изводи за отбранителната политика на България</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">етнически конфликт</style></keyword><keyword><style  face="normal" font="default" size="100%">Отбранителна политика</style></keyword><keyword><style  face="normal" font="default" size="100%">сценарии за планиране</style></keyword><keyword><style  face="normal" font="default" size="100%">трансгранично въздействие</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">30</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">В края на 2007 и началото на 2008 г. проведохме изследване по заявка на министерството на отбраната на Република България, осигурявайки аналитична поддръжка на провеждания тогава преглед на отбранителната политика на страната и дългосрочните планове за развитие на въоръжените сили. Отчетът от изследването бе публикуван от издателството на МО през пролетта на 2008 г. без съществени редакционни промени. Предвид текущата криза в съседна Македония, решихме да информираме нашите читатели за съответната част от изследването във вида, публикувано преди повече от седем години. В зависимост от развитието на ситуацията в сферата на сигурността в близост до нашите граници, имаме готовност да преразгледаме потенциалните сценарии и да препоръчаме адекватен курс на действие.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Veselin Petkov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Унгария: Способности, организация, политики и законодателство за управление на кризи и отговор при бедствия</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Колонтар</style></keyword><keyword><style  face="normal" font="default" size="100%">отговор при бедствия</style></keyword><keyword><style  face="normal" font="default" size="100%">подготовка</style></keyword><keyword><style  face="normal" font="default" size="100%">структурна реформа</style></keyword><keyword><style  face="normal" font="default" size="100%">тристълбова система за управление при бедствия</style></keyword><keyword><style  face="normal" font="default" size="100%">Унгария</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">127</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът предлага детайлен преглед на системата за управление при кризи в Унгария, която бе подложена на сериозно напрежение в последните години от редица случаи, изобличаващи нейни слабости и уязвимости и предизвикали цялостни реформи. Последните са разгледани от авторите от различни ъгли. По отношение на законодателството докладът разглежда новия закон за управление при кризи от 2011г., който поставя основите на система, в която професионалната служба за управление при кризи взаимодейства с професионални и доброволчески структури за гражданска защита. От оперативна гледна точка авторите описват структурата и функциите на Националната генерална дирекция за управление при кризи под шапката на Министерството на вътрешните работи, която изпълнява ролята на национален орган за управление при кризи. От гледна точка на управление докладът описва различните нива на системата и актьорите, ангажирани в процеса. Авторите извличат практически примери от начина на действие на унгарската система за управление при кризи преди и след реформите.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Economic Aspects of the Development of a Vision for Bulgaria’s Defense till 2035</style></title><secondary-title><style face="normal" font="default" size="100%">Conference on the Reforms in Bulgaria’s Security Sector</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2014</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">New Bulgarian University</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Intelligence, Crime and Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2014</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">31</style></volume><pages><style face="normal" font="default" size="100%">05-06</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">05</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">NATO Initiatives in Support of Defence Management Reform and Integrity Building</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">26</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In a presentation to the 86th Rose-Roth seminar, organized by the NATO Parliamentary Assembly, 16-18 June 2014 in Baku, Azerbaijan, Dr. Tagarev elaborates on the need to merge efforts to strengthen defence institution, and in particular to introduce advanced approaches to defence management, and initiatives to build integrity and reduce corruption in defence.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Scenarios for Resource Allocation to Bulgaria’s Defense in the Horizon of 2035</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Defense Management</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2014</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://omicsgroup.org/journals/scenarios-for-resource-allocation-to-bulgarias-defense-in-the-horizon-of-2035-2167-0374.1000119.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">119</style></pages><isbn><style face="normal" font="default" size="100%">2167–0374</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Scenarios for Resource Allocation to Bulgaria’s Defense in the Horizon of 2035</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Defense Management</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2014</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">As part of the formulation of a vision for Bulgaria’s force development in the horizon of 2035, the authors were tasked to study the evolution of the economic environment and provide a view on the potential resource allocation to defense. Our study resulted in three scenarios—“Bulgaria in the gray zone of the European economic space,” “Peripheral economy,” and “Catching up economy”—each one plausible under a set of driving factors and conditions. The paper presents the process of scenario design, the scenarios, the respective defense budget levels and the&lt;br&gt;impact on Bulgaria’s defense and armed forces.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">119</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">What needs to be done to avoid a repetition of ‘Karbala 2003’? (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">25</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Ten years after the lethal attack on the Bulgarian contingent’s base in Karbala, Iraq, and on the occasion of the declassification of the defence ministry commission’s report on the case, the authors formulate key problems that need to be resolved in order to avoid similar tragedies in the future, i.e. to focus training of the armed forces, and their overall development, on modern operations, to introduce effectively the norms and practices of mission command, to adhere to the modern standards for protecting forces on mission, and to create an effective unit for analysis and formulation of lessons learned.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">За да не се повтаря никога ‘Кербала 2003’</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">командване в мисии</style></keyword><keyword><style  face="normal" font="default" size="100%">подготовка на войските</style></keyword><keyword><style  face="normal" font="default" size="100%">поуки от практиката</style></keyword><keyword><style  face="normal" font="default" size="100%">стандарти за защита</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Януари 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">25</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">По повод на десетата годишнина от смъртоносната атака срещу база ‘Индия’ на българския контингент в Кербала и разсекретяването на доклада на ведомствената комисия, авторите формулират ключовите проблеми, които трябва да бъдат решени, за да се избегнат аналогични случаи в бъдеще -- поставяне на съвременните операции във фокуса на цялостната подготовка на войските, решително възприемане на модерните норми и практики за командване в мисии, внедряване на съвременни стандарти за защита на контингентите в мисии, и създаване на ефективно звено за анализ, формулиране и внедряване на поуките от практиката.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Инициативи на НАТО в подкрепа на реформа в Мениджмънта на отбраната и за утвърждаване на интегритета</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">интегритет</style></keyword><keyword><style  face="normal" font="default" size="100%">отчетност</style></keyword><keyword><style  face="normal" font="default" size="100%">прозрачност</style></keyword><keyword><style  face="normal" font="default" size="100%">укрепване на отбранителни институции</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Юни 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">26</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">В доклада си пред 86-я Роуз-Рот семинар, организиран от Парламентарната асамблея на НАТО, 16-18 юни 2014 г. в гр. Баку, Азербайджан, д-р Тагарев обосновава необходимостта да се обединят усилията да укрепване на отбранителните институции, и в частност въвеждането на съвременни подходи към мениджмънта на отбраната, и инициативи за утвърждаване на интегритета и противодействие на корупцията в отбраната.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Отбранителните способности на НАТО и ЕС. Приносът на България за тяхното изграждане и развитие</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">интелигентна отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">НАТО</style></keyword><keyword><style  face="normal" font="default" size="100%">Обща политика за сигурност и отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">отбранително планиране</style></keyword><keyword><style  face="normal" font="default" size="100%">специализация</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">януари 2014 г.</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">110</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">В доклада пред националната научна конференция в гр. София, 8-9 април 2013 г., се прави преглед на изискванията, постиженията и предизвикателствата пред определянето и развитието на отбранителни способности в съюзен контекст.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analytical support to foresighting EU roles as a Global Security Actor</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">21-33</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Making decisions on major investments, including investments in security research, requires good grasp of the future, which by definition is uncertain. This paper presents the analytical process, methods, and tools, including the DSTO Scenario Analysis Tool Suite, used in the elaboration and selection of a set of context scenarios and possible new roles for EU as a global actor based on the wider Petersberg tasks. Results of this exploratory process within the FP7 FOCUS project are intended to derive suggestions for the EU’s security research planning. The conclusion emphasises the critical importance of providing rigorous analytical support, in particular when security foresight involves subject matter experts that are not part of a dedicated research team.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">21</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgaria’s contribution in the Development of NATO and EU’s Defence Capabilities (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">110</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This report to the national conference in Sofia, 8-9 April 2013, provides a review of requirements, achievements, and challenges in determining and developing defence capabilities in NATO and EU context.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defence and Security Sector Reform and Parliamentary Oversight</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">17</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the notes for a speech to the 84th Rose-Roth seminar of the NATO Parliamentary Assembly on “Afghanistan, Regional Security and the Future of International Cooperation,” conducted in Bishkek, Kyrgyzstan, 13-15 November 2013, the author outlines two reasons for failings of security sector reform efforts – inability to properly contextualize security sector reform initiatives and invalid assumptions regarding the power and shadow influence of some security organizations. He then identifies three features of successful reform designs, valid for every context: provide for political legitimacy of security and defence organizations and reform initiatives; emphasise integrity at least as much as effectiveness; involve civil society organizations.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">EU’s Common Foreign and Security Policy: It is Time for Change (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">17 Decem 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">19</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating the Cross-impact of EU Functions as a Global Actor and Protector of Critical Infrastructures and Supply Chains</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">34-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents main results of the analysis of cross impact between two of the ‘big themes’ in the FOCUS project: “EU as a global actor based on the wider Petersberg Tasks” and “Critical infrastructure &amp; supply chain protection.” The cross impact was evaluated by experts from both EU and non-EU countries. For each theme they were asked to estimate significance and interrelation of trends, thus allowing the research team to identify centres of gravity within each theme. Then they estimated the pairwise linkage of trends from the two themes. The study resulted in identification of key linkages among trends, to be further explored in the analysis of respective contexts, mission roles, and security research scenarios. This practical test of the presented model—having relatively limited number of domains and trends—contributes to the transparency and illustrative power of FOCUS methodology and can be expanded in future studies.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">34</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Future Defence Policy Challenges (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">21</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In a lecture to the Atlantic Club of Bulgaria on April 4th, 2013, defence minister analyzes the context in which the Caretaker Government contributes to the formulation and the implementation of Bulgaria’s defence policy, outlines future challenges with major impact on its formulation and the plans of his ministerial team.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Good Governance of Intelligence from a Management Perspective</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">34-40</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">34</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Guidance on Developing Bulgaria’s Defence Policy (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">22</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The Minister and deputy ministers of defence in Bulgaria’s caretaker Government, 13 March – 28 May 2013 outline the key required short- and mid-term activities in the area of defence. This document was presented at the attention of the Cabinet and the succeeding team of minister Angel Naydenov, and was published on the MOD website on May 28, 2013.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Management Priorities of the Minister of Defence of the Republic of Bulgaria  in the 2013 Caretaker Government</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">20</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Defence governance principles, priorities, and tasks of minister Tagarev as member of Bulgaria’s Caretaker Government, appointed by President Rossen Plevneliev, and his team, aim to provide stability of the defence sector and military operations, open dialogue with the organizations active on defence policy issues, and enhanced cooperation and interaction with our Allies and national security sector organizations. These priorities were publicly announced on 20 March 2013.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">On the modalities of Ukraine’s cooperation with Euro-Atlantic partners in addressing future security threats and challenges</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">15</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Speaking on the first panel on “Ukraine and International Organizations: Responding to Common Challenges and Threats” at the international conference on “The Role of International Organizations in the National Security of Ukraine” Dr. Tagarev emphasises the possibilities and potential benefits for Ukraine from being more proactive in its defence cooperation with NATO and the European Union.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Principles of Defence Management</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Speaking to members of the Georgian Parliament, staffers, and experts from the defence ministry, Dr. Tagarev outlined the features of management vis-à-vis other governance functions in defence, in particular command and control, and elaborated on the principles of effective management, using the structure provided by standards in the ISO 9000 series.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Report for the activity of the Ministry of Defence in the period of Bulgaria’s Caretaker Government, 13 March – 28 May 2013 (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">23</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The minister, deputy ministers and Chief of Cabinet of the MOD in Bulgaria’s Caretaker Government, 13 March – 28 May 2013, account for the results and implementation of the main priorities and tasks, including the provision of stability of the defence sector and military operations, open dialogue with the organizations active on defence policy issues, and enhanced cooperation and interaction with our Allies and national security sector organizations. This document was presented publicly and published on the MOD website on May 28, 2013.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Security Sector Reform: Policy and Management Aspects</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In a roundtable discussion on &quot;‘The Role and Responsibilities of Parliamentary Committees in Security Sector Oversight and Security Sector Governance’&quot; with parliamentarians, staffers, defence and security officials Dr. Tagarev presents the process of devising security policies and outlines the respective roles of parliament. He then outlines principles of effective management, emphasizing the need to measure not only inputs, but also the output and the outcomes of the activities of security sector organizations.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Бъдещите предизвикателства пред отбранителната политика</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">думи: неопределеност</style></keyword><keyword><style  face="normal" font="default" size="100%">интелигентна отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">мащаб</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Декември 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">21</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">В лекцията си пред Атлантическия клуб в България на 4 април 2013 г. министърът на отбраната представя контекста, в който служебното правителство допринася за формирането и реализирането на отбранителната политика, очертава бъдещите предизвикателства с най-съществено влияние върху нейното формиране и планираните действия на своя екип.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Assya Davidova</style></author><author><style face="normal" font="default" size="100%">Anton Lazarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Насоки за развитие на отбранителната политика на Република България</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">НАТО</style></keyword><keyword><style  face="normal" font="default" size="100%">Обща политика за сигурност и отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">Отбранителна политика</style></keyword><keyword><style  face="normal" font="default" size="100%">отбранителни способности</style></keyword><keyword><style  face="normal" font="default" size="100%">ресурсна рамка</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Декември 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">22</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Министърът и заместник-министрите на отбраната в Служебното правителство, 13 март – 28 май 2103 г., очертават основните необходими действия в областта на отбраната в кратко- и средно-срочен хоризонт. Документът е предоставен на вниманието на Служебния кабинет на Република България и екипът на министър Ангел Найденов, и е публикуван на сайта на Министерството на отбраната на 28 май 2013 г. 
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Общата политика за сигурност и отбрана на ЕС: време е за промяна</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Декември 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">19</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Относно модалностите на сътрудничеството на Украйна с Евроатлантическите партньори за посрещането на бъдещи заплахи и предизвикателства за сигурността </style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Септември 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">15</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">В изложението си на международната конференция “Ролята на международните организации за националната сигурност на Украйна”, панел 1: “Украйна и международните организации в отговора на общи предизвикателства и заплахи”, авторът подчертава възможностите и потенциалните ползи за Украйна от едно про-активно отбранително сътрудничество с НАТО и Европейския съюз. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Assya Davidova</style></author><author><style face="normal" font="default" size="100%">Anton Lazarov</style></author><author><style face="normal" font="default" size="100%">Rossen Ivanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Отчет на дейността на Министерството на отбраната за периода на управление на Служебното правителство, 13 март – 28 май 2013 г.</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">интегритет</style></keyword><keyword><style  face="normal" font="default" size="100%">НАТО</style></keyword><keyword><style  face="normal" font="default" size="100%">Обща политика за сигурност и отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">операции</style></keyword><keyword><style  face="normal" font="default" size="100%">Отбранителна политика</style></keyword><keyword><style  face="normal" font="default" size="100%">отбранителни способности</style></keyword><keyword><style  face="normal" font="default" size="100%">отчетност</style></keyword><keyword><style  face="normal" font="default" size="100%">прозрачност</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Декември 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">23</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Министърът и заместник-министрите и началникът на кабинета в Министерството на отбраната в Служебното правителство, 13 март – 28 май 2103 г., отчитат постигнатите резултати и изпълнението на управленските приоритети и задачи, в това число осигуряването на стабилност и устойчивост в управлението на отбранителния сектор, диалога с организациите, активни по въпроси на отбранителната политика, взаимодействието със съюзници и организации от националния сектор за сигурност. Документът е представен публично и е публикуван на сайта на Министерството на отбраната на 28 май 2013 г.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Реформиране на сектора за отбрана и сигурност и парламентарен контрол</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">военна реформа</style></keyword><keyword><style  face="normal" font="default" size="100%">гражданско общество</style></keyword><keyword><style  face="normal" font="default" size="100%">интегритет</style></keyword><keyword><style  face="normal" font="default" size="100%">парламентарен надзор</style></keyword><keyword><style  face="normal" font="default" size="100%">реформиране на сектора за сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">Централна Азия</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Ноември 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">17</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">В доклада си пред 84-я Роуз-Рот семинар на Парламентарната асамблея на НАТО на тема „Афганистан, регионалната сигурност и бъдещето на международното сътрудничество”, проведен в Бишкек, Киргизстан, 13-15 ноември 2013 г., авторът представя две причини за неуспешни опити за реформиране на сектора за сигурност – неспособността усилията да се поставят в необходимия контекст и невалидност на основни хипотези относно мощта и сенчестото влияние на някои организации от системата за сигурност. Докладът представя три характеристики на успешни подходи към реформата, валидни във всеки контекст: политическа легитимност на организациите от системата за сигурност и инициативите за тяхното реформиране; подчертаване на интегритета поне в степента, в която се цели ефективност; и активно включване на организациите на гражданското общество. 
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Управленски приоритети на министъра на отбраната на Република България в Служебното правителство 2013 </style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">взаимодействие</style></keyword><keyword><style  face="normal" font="default" size="100%">интегритет</style></keyword><keyword><style  face="normal" font="default" size="100%">координация</style></keyword><keyword><style  face="normal" font="default" size="100%">отчетност</style></keyword><keyword><style  face="normal" font="default" size="100%">прозрачност</style></keyword><keyword><style  face="normal" font="default" size="100%">устойчивост</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Декември 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">20</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Представени са управленските принципи, приоритети и задачи на министър Тагарев като член на Служебното правителство, назначено от Президента Росен Плевнелиев, и неговият екип, насочени към осигуряване на стабилност и устойчивост в управлението на отбранителния сектор, открит диалог с организациите, активни по въпроси на отбранителната политика, задълбочено сътрудничество и взаимодействие със съюзниците и организациите от националния сектор за сигурност. Приоритетите за обявени публично на 20 март 2013 г.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Academic Research on Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">It4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">104</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Activities of the IT4Sec Department in 2011</style></title><secondary-title><style face="normal" font="default" size="100%">It4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">February 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">99</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">13-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Critical infrastructures are complex, interlinked socio-technical systems, with impact often crossing state borders. Their protection involves governments and business organisations, interacting in the application of a broad variety of measures to provide safety and security while investing a considerable amount of public and private resources. This paper examines the challenge of making respective policy and investment decisions transparent, and a sample of methods and tools used to facilitate decision making. It also calls for contributions to a knowledge portal on security and safety of critical infrastructures. </style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges of Implementation of National Security Strategies in Transition Democracies from a Governance Perspective</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">103</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Notes for the report to the conference on “Transforming National Security Concepts as a Response to New Global and Security Challenges and Threats: Experiences from Ukraine and NATO,” Kyiv, 19 September 2012, session “National Security Concepts of NATO and EU countries: Lessons Learned.”</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Civilian Control in Defence (in Russian)</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Key issues in civilian control on defence, with focus on the role of a civilian minister of defence and the distribution of functions and responsibilities between the minister and the senior military officer (chief of the General Staff or Defence Staff). Presented to members of the Defence Committee of the Kyrgyz Parliament in Riga in December 2012.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Context Scenarios and Alternative Future EU Roles as a Global Security Actor</style></title><secondary-title><style face="normal" font="default" size="100%">It4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">100</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">On the draft law on the management and the functioning of the system for protecting national security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">10</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents the key positions in the statement made to the meeting of the Council for foreign policy, defence and security to the President of Republic of Bulgaria on 21 September 2012</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Europe and the Balkans during the Strategic Transformation of the European Union: Implications for Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">efficiency</style></keyword><keyword><style  face="normal" font="default" size="100%">EU integration</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">multinational cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword><keyword><style  face="normal" font="default" size="100%">Ukraine</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">12.2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><publisher><style face="normal" font="default" size="100%">Academy of Sciences and Head of the Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper includes speaking notes for the session on “Central-Eastern Europe’s Positioning and Perspectives of the European Union’s Transformation” of the conference “The EU, Central and Eastern Europe and Ukraine: Transformation, Prognosis and Perspectives,” conducted on 16 November 2012 in Kyiv, Ukraine. It addresses selected issues of the current status of the EU in the persisting financial and economic crisis, respective developments in Bulgaria and other countries in South Eastern Europe, and possible implications for Ukraine, with focus on security policies and governance.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Europe and the Balkans during the Strategic Transformation of the European Union: Implications for Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper includes speaking notes for the session on “Central-Eastern Europe’s Positioning and Perspectives of the European Union’s Transformation” of the conference “The EU, Central and Eastern Europe and Ukraine: Transformation, Prognosis and Perspectives,” conducted on 16 November 2012 in Kyiv, Ukraine. It addresses selected issues of the current status of the EU in the persisting financial and economic crisis, respective developments in Bulgaria and other countries in South Eastern Europe, and possible implications for Ukraine, with focus on security policies and governance.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Good Governance in the Security Sector as a Prerequisite for Bulgaria’s Defence Integration</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">14</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This report to the conference “Good Governance and Macroeconomic Approaches to Sustainable Economic Development,” 6 December 2012, Sofia, outlines the drivers for increasing integration within the Euroatlantic defence and the key requirements for effective integration, with focus on maintaining the trust among allies, integrity, and adequate positioning of the country within NATO and the European Union</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methodology for Planning Wartime Defence Capabilities</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management, Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">80</style></pages><isbn><style face="normal" font="default" size="100%">978-954-91700-4-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author><author><style face="normal" font="default" size="100%">Lozan Bizov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methodology for Planning Wartime Defence Capabilities</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management, IICT-BAS</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><isbn><style face="normal" font="default" size="100%">978-954-91700-4-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Modelling Extreme Events for the Purposes of Security Foresight</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2012</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%"> Radioelectronic and Computer Systems 7(59)</style></publisher><pub-location><style face="normal" font="default" size="100%">Sevastopol, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">253-259</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The risk management approach is used increasingly in modern security planning. In this approach, planners attempt to assess the likelihood of an event and the potential loss if the event occurs, and then to select certain measures that minimise an integral criteria of risk over some set of events. However, certain events of low probability but high potential impact, referred to as ‘extreme’ or ‘catastrophic’ events, need to be treated dif-ferently than those with a low potential loss and a high likelihood of occurring. This paper presents a brief overview of six ‘methods’ that have been used in addressing security-related risk management tasks—extreme value theory, catastrophe loss models, black swan theory, dynamic modelling, agent models, and complexity studies—and provides examples. It presents a summary on areas of implementation and underlines the limita-tions of established risk management approaches.</style></abstract><issue><style face="normal" font="default" size="100%">59</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Shaping Energy Security Policy in Uncertainty</style></title><secondary-title><style face="normal" font="default" size="100%">International conference &quot;Energy Security - National, Regional and Euroatlantic Frameworks&quot;</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">21 June 2012</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Taxonomy of Essential Services</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">191-196</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">58</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Taxonomy of Essential Services</style></title><secondary-title><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2012</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Radioelectronic and Computer Systems 6(58)</style></publisher><pub-location><style face="normal" font="default" size="100%">Sevastopol, Ukraine</style></pub-location><pages><style face="normal" font="default" size="100%">191-196</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Communities, countries and alliances cannot be efficient in preparing to meet diverse threats to their security within traditional organizational stovepipes. The boundaries between ‘internal’ and ‘external’ threats are getting fuzzier, and the vulnerabilities of governments, businesses and communities feed on each other, while the comprehensive approach is gaining traction in ever more security fields. The implementation of the comprehensive approach poses a number of methodological challenges. While it clearly requires coordination of various capabilities of a multitude of actors, it is less apparent which is the suitable organising concept. This paper takes as a starting point the concept of ‘essential services’ and suggests a taxonomy, that would allow to treat threats, vulnerabilities and risk in a common comprehensive framework. The taxonomy has been developed with a specific purpose in mind, and thus refers to European Essential Services (EES). We nevertheless reason that it can be replicated to support decision making at other levels, e.g. in national security policy making and planning. </style></abstract><issue><style face="normal" font="default" size="100%">58</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Доброто управление в сектора за сигурност като необходимо условие за интегриране в Евроатлантическата отбранителна система</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">доверие</style></keyword><keyword><style  face="normal" font="default" size="100%">ефективност</style></keyword><keyword><style  face="normal" font="default" size="100%">ефикасност</style></keyword><keyword><style  face="normal" font="default" size="100%">интегритет</style></keyword><keyword><style  face="normal" font="default" size="100%">интелигентна отбрана</style></keyword><keyword><style  face="normal" font="default" size="100%">мащаб</style></keyword><keyword><style  face="normal" font="default" size="100%">позициониране</style></keyword><keyword><style  face="normal" font="default" size="100%">Спектър на заплахи</style></keyword><keyword><style  face="normal" font="default" size="100%">специализация</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Декември 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">14</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът пред конференцията „Доброто управление и макроикономически подходи за устойчиво икономическо развитие”, организирана от сдружението на завършилите колежа „Дж. Маршал” на 6 декември 2012 г. в гр. София, посочва основните причини да се търси по-тясна интеграция в Евроатлантическата отбранителна система и ключовите условия за ефективна интеграция, с фокус върху доверието между съюзниците, интегритета на министерството на отбраната и на държавното управление и подходящото позициониране на страната в НАТО и Европейския съюз. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Европа и Балканите в стратегическата трансформация на Европейския съюз: Значение за Украйна </style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">добро управление</style></keyword><keyword><style  face="normal" font="default" size="100%">Европейска интеграция</style></keyword><keyword><style  face="normal" font="default" size="100%">ефикасност</style></keyword><keyword><style  face="normal" font="default" size="100%">корупция</style></keyword><keyword><style  face="normal" font="default" size="100%">многонационално сътрудничество</style></keyword><keyword><style  face="normal" font="default" size="100%">политика за сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">Украйна</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Ноември 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Доклад в сесията „Позициониране и перспективи пред Централна и Източна Европа в трансформацията на Европейския съюз” на конференцията „ЕС, Централна и Източна Европа и Украйна: Трансформация, прогнози и перспективи”, проведена на 16 ноември 2012 г. в гр. Киев. Разглеждат се избрани въпроси на състоянието на ЕС в продължаващата финансова и икономическа криза, съответните развития в България и други страни от Югоизточна Европа, и възможното им значение за Украйна. Фокусът е върху политики за сигурност и доброто управление. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Georgiev, Venelin</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Колективна отбрана  и сигурност – амбиции и  възможности</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">януари 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">95</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">В доклада се прави анализ на влиянието на основните фактори, които следва да бъдат отчитани при търсене на баланс между политическите амбиции и ресурсните ограничения (възможности), идващи от снижените отбранителни бюджети на голяма част от страните в Европа. Представени са три възможни перспективи.
На първо място се разглеждат възможностите, които предоставя всеобхватния подход, разбиран в по-широк смисъл като взаимна подкрепа на интересите, стратегиите и способностите на международните играчи, взаимодействието между военни и цивилни институции, ефективно партньорство между публични организации, неправителствени организации и частни компании, както и портфолио от способности, в което по един рационален начин са балансирани възможностите за превенция с инвестициите за защита, ранно предупреждeние, бърза реакция и управление на последствията. На второ място, в доклада разбирането по отношение на отбранителните способности е разширено и допуска балансиране на инвестициите в оперативни способности и защитни мерки, насочени към снижаване на уязвимостта, „меки” средства за формиране на регионалната среда за сигурност (дипломация в областта на отбраната и сигурността, подкрепа на нарастване на ниво на управление в отделни страни, подкрепа при изграждане на демократични институции и т.н.), готовност и възможности за ранно предупреждение за промените в средата за сигурност, организационна гъвкавост (подвижност). На трето място се обръща внимание на търсенето на по-висока ефективност при изграждането и поддържането на отбранителни способности чреp съвместно придобиване на отбранително продукти както между страните-членки, така и между организации от националния сектор за сигурност.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ratchev, Valeri</style></author><author><style face="normal" font="default" size="100%">Uwe Nerlich</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Контекстни сценарии и алтернативни бъдещи роли на ЕС като глобален играч в сферата на сигурността</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><number><style face="normal" font="default" size="100%">100</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Относно проекта на закон за управление и функциониране на системата за защита на националната сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">демократичен контрол</style></keyword><keyword><style  face="normal" font="default" size="100%">ефективност</style></keyword><keyword><style  face="normal" font="default" size="100%">ефикасност</style></keyword><keyword><style  face="normal" font="default" size="100%">мениджмънт</style></keyword><keyword><style  face="normal" font="default" size="100%">сектор за сигурност</style></keyword><keyword><style  face="normal" font="default" size="100%">управление</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Септември 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">10</style></number><publisher><style face="normal" font="default" size="100%">Център за мениджмънт на сигурността и отбраната</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Представени са основните тези от изказването в рамките на заседанието на Съвета за външна политика, отбрана и сигурност към Президента на Република България, състояло се на 21 септември 2012 г.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Stayka Angelova</style></author><author><style face="normal" font="default" size="100%">Liliya Georgieva</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Отчет за дейността на секция &quot;Информационни технологии в сигурността&quot; за 2011 г.</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><number><style face="normal" font="default" size="100%">99</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Предизвикателства пред прилагането на стратегии за национална сигурност на страни в преход от гледна точка на добротоуправление</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">19 септември 201</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">103</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">2010 Annual Report of the IT4Sec department</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">72</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Architectural requirements in the integration of the Electronic Communications Network and the National Network of the State Administration</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">87</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Balancing Ambitions and Resource Constraints in Shaping Collective Security and Defence Policies</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">95</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges of Multinational Acquisition of Capabilities in Black Sea Format</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">27</style></volume><pages><style face="normal" font="default" size="100%">174-182</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Countries in the Black Sea region already cooperate in the search of higher levels of security. The cooperation so far is at the level of coordinating some operational activities of Black Sea navies and regular training. In the search of efficiencies, the authors reason that this cooperation may be expanded to encompass cooperative procurement and maintenance of certain capabilities. Before embarking on such cooperative projects, participating countries need to overcome a number of policy, legal, managerial and technical challenges. The authors conclude that most promising would be cooperative initiatives at enhancing maritime surveillance, situational awareness, and consultations, command and control infrastructure, as well as the joint development, maintenance and use of training ranges and advanced simulation and training systems and joint acquisition and sharing of search and rescue capabilities. </style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Civil-Military Interaction at the Core of the EU Comprehensive Approach</style></title><secondary-title><style face="normal" font="default" size="100%">NDU Scientific Quarterly</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">civil-military cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">Comprehensive approach</style></keyword><keyword><style  face="normal" font="default" size="100%">coordination</style></keyword><keyword><style  face="normal" font="default" size="100%">CSDP</style></keyword><keyword><style  face="normal" font="default" size="100%">EU</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Winter 2011</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">85</style></volume><pages><style face="normal" font="default" size="100%">57-81</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The European Union is a unique and complex power, with a potential to act in the field of security that has been largely underutilized. The particular choices on future EU security roles will be shaped by the structural conditions for EU decision-making, as well as trends and factors that do and will drive the respective decisions. Towards that purpose, the first part of this article presents a study on dimensions, structural conditions, and drivers. It summarises the advances in the implementation of the comprehensive approach and outlines constraints impacting the definition of EU roles in this respect. The second part of the paper focuses on the evolution of civil-military interaction – the key ingredient in the evolution of the comprehensive approach. It looks into the origins of contemporary civil-military interaction in operations and presents the two main concepts of civil-military cooperation, or CIMIC, and civil-military coordination. It then presents current EU policies with major impact on the development and use of civilian and military assets in EU operations, including the interfaces between EU and NATO. The final section examines the civil-military dimension of future EU roles in the implementation of the comprehensive approach. It looks at potential developments in civil-military interaction in ‘external’ and ‘internal’ roles and identifies plausible EU roles in developing ‘mixed’ civil-military capabilities.</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CIVIL-MILITARY INTERACTION AT THE CORE OF THE EU COMPREHENSIVE APPROACH</style></title><secondary-title><style face="normal" font="default" size="100%">Zeszyty Naukowe AON </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><num-vols><style face="normal" font="default" size="100%">(85)</style></num-vols><section><style face="normal" font="default" size="100%">57-81.</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Civil-military interaction in the EU’s comprehensive approach</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">94</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">IT4Sec Reports 94 summarises the CSDM input to Focus working package 3.2. It examines the origins of contemporary civil-military interaction, the modalities of civil-military interaction in current EU policies and an approach to exploring the civil-military dimension of future EU roles in the implementation of the comprehensive approach. The report concludes that future security roles of the European Union will require ever closer interaction between civilian and military instruments to guarantee the coordination and cooperation of those involved in operations at national and international levels. With time, the interaction between civilians and military moved forward from coordination on an adhoc basis to a structured EU-wide process of development of military and civilian capabilities. This trend is likely to continue towards encompassing the early phases of defining future operational requirements and technology development, that would not only guarantee effective implementation of advanced concepts of operations and interoperability among military and main civilian actors, but may also lead to the creation of common civil-military assets owned in some form by the European Union.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Comparative Defence Data Analysis</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">90</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">„Comparative Defence Data Analysis” outlines what is considered good practice in formulating defence policy, in particular in emphasising particular missions of the armed forces, in managing defence personnel, in understanding what a certain level of defence allocations would mean for the capacity of the armed forces to perform assigned missions, and in managing main categories of defence assets. Towards this purposes the study compares the practices of 18 mid- to small-size countries – all more or less transparent in their defence affairs, based entirely on publicly available data</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Countering Corruption in the Defence Sector: Main Risks and Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">83</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Defence is not immune to corruption. Several factors make the defence sector even more susceptible to corruption than other sectors, which sometimes manifests in unexpected forms. Hence, the corruption challenge has to be analysed comprehensively, while integrity initiatives are focused and build on success. Transparency and accountability are the most powerful tools to enhance integrity and reduce corruption in a democratic society. Their implementation in the defence sector along with other, more problem-specific measures, has to be provided in a single good governance framework. This presentation presents examples from the experience of Bulgaria, that could of use to the ongoing anti corruption endeavours of the Ukrainian defence sector.  </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Countering Corruption in the Defence Sector: Main Risks and Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference “Strengthening Integrity and Combating Corruption in Ukraine’s Defence Sector&quot;</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">16 May 2011</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Kyiv, Ukraine</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Countering Corruption in the Defense Sector: Key Challenges to Bulgaria and Southeast Europe and Good Practice</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">77</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Foresight-related terminology in defence</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">82</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Framework for Analysis of Potential EU Roles in the Comprehensive Approach</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">88</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">IT4Sec Reports 88 presents the CSDM input to Focus working package 3.1. It identifies principal dimensions for describing EU roles in the comprehensive approach: (1) Actors; (2) Instruments; (3) Goals and Objectives in supporting non-EU member states; (4) Strategies; and (5) Mission Roles. Secondly, it provides an overview of recent advances in the EU understanding and development of the comprehensive approach. Third, it presents analysis of the structural conditions for EU decision-making and respective strategies. The final section of the report outlines the main drivers for the further development and implementation of the comprehensive approach. Abstracts of recent specialised publications are included in an Annex to this report. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Information support requirements of the Ministry of Justice</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">91</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Intelligent Organisation in the Defence Sector</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">81</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">„The Intelligent Organisation in the Defence Sector” summarises the report made to the national conference on “Smart Defence: National Defence Policy and Defence Investments in the Second Decade of the Twenty first Century,” Plenary session I on “Defence Policy, Capabilities, and Resources.” The conference was organised by the Association of the Officers in the Reserve ‘Atlantic’, &lt;www.atlantic-bg.org/en/&gt;, 29 March 2011, Central Military Club, Sofia. The report examines the fundamental challenges to the management of force development in a complex environment. It then examines the concepts of ‘smart defence’ and the ‘intelligent organisation’ and analyses the challenges of their implementation in the Bulgarian defence establishment. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Managing change in complex organizations in deep uncertainty</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">73</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">National R&amp;T capacity in the interest of defence: Methodology for assessment and web platform for gathering and presenting information</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">75</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">NATO and NATO Partnerships in Enhancing Security through Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">78</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Phases and Challenges of Security Sector Reform in the Experience of Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">85</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">IT4Sec Reports 85 includes the main theses of a presentation at the “Oversight and Accountability of the Defense Sector” panel of the Annual Conference of the Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, Garmisch-Partenkirchen, 22-23 June 2011. The report describes the Bulgarian experience along the three main phases of reform in the post-communist transition of the country: (1) Establishing key mechanisms for civilian control over the armed forces and protection of human rights in the early 1990s; (2) Building democratic defense institutions, starting in the late 1990s and continuing to be in the focus throughout the first decade of the new century; and (3) Transformation of the security sector as a whole – the current focus of reform efforts.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Towards the exploration of future EU roles as a global security actor</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">92</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">IT4Sec Reports 92 is an internal deliverable within the FOCUS project summarising the input by CSDM and CESS (Centre for European Security Strategies) to working package 6.1. It suggests a way to describe future EU roles as a global security actor. It then provides a comprehensive analysis of the principal trends in global security and identifies essential drivers of change, examining also specific challenges and strategic shocks that may steer global developments to one or another alternative future. Finally, it presents a framework for exploring EU global security roles, incorporating a concept of the global EU power and examination of the external-internal nexus in the EU Common Foreign and Security Policy.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Годишен отчет за 2010 на секция Информационни технологии в сигурността</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">72</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Гражданско-военно взаимодействие във всеобхватния подход на ЕС</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">94</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът представя изследователските резултати на ЦМСО по работен пакет 3.2 на проект FOCUS. В доклада се описва произхода на съвременното гражданско-военно взаимодействие, съответните модалности в съвременните политики на Европейския съюз и подход към изследването на гражданско-военното измерение на бъдещите роли на ЕС в прилагането на всеобхватния подход. В заключението се подчертава, че бъдещите роли на ЕС в сферата на сигурността ще изискват все по-тясно взаимодействие между цивилни и военни инструменти за да се гарантира координация между всички участници в операции на национално и международно ниво. С времето сътрудничеството между цивилни и военни ще се измества от ад-хок координация към структуриран процес на развитие на военни и цивилни способности. Вероятно тази тенденция ще обхване ранните фази на определяне на бъдещи оперативни изисквания и технологично развитие, като по този начин не само гарантира ефективно прилагане на съвременни оперативни концепции и оперативна съвместимост между военни и цивилни, но може да доведе и до създаване на общи „цивилно-военни” способности притежавани под някаква форма от Европейския съюз. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Ilian Alipiev</style></author><author><style face="normal" font="default" size="100%">Nataly Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Изисквания към информационното осигуряване и системи на Министерство на правосъдието</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><number><style face="normal" font="default" size="100%">91</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Изисквания на архитектурния подход при интегриране на Електронна съобщителна мрежа и Националната мрежа на държавната администрация</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">септември 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">87</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Интелигентната организация  в отбранителния сектор</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">март 2011 г.</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">81</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът представя тезиси на доклад пред национална конференция на тема „Интелигентната отбрана: националната отбранителна политика и инвестициите в отбраната през второто десетилетие на 21 век”, панел I: „Отбранителна политика, способности, ресурси”, организирана от Съюза на офицерите от резерва “Атлантик” и проведена на 29 март 2011 г. в Централен военен клуб, гр. София. В доклада са анализирани фундаменталните предизвикателства в управлението на развитието и използването на отбранителни способности в сложна среда. Пред-ставени са концепцията за „интелигентната отбрана” според официални документи на НАТО и изказвания на Генералния секретар на НАТО Андерс Фо Расмусен, както и основните характеристики на интелигентната организация. На тази основа са анализирани основните проблеми по прилагане на концепцията от министерството на отбраната на Република България.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Uwe Nerlich</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Към изследването на бъдещи роли на ЕС като глобален играч в сферата на сигурността</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">декември 2012 г.</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">92</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът представя основни изследователски резултати на ЦМСО и Центърът за европейски стратегии за сигурност (CESS) по работен пакет 6.1 на проект FOCUS. Предложен е начин за описание на бъдещи роли на ЕС в сферата на глобалната сигурност. Представен е задълбочен анализ на основни тенденции в глобалната сигурност. Идентифицирани са основни драйвери на промяната, както и специфични предизвикателства и възможни стратегически шокове, които биха могли да насочат развитието към едно или друго алтернативно бъдеще. Представен е рамков подход за изследване на глобалната мощ на ЕС и връзката между външни и вътрешни развития в Общата външна политика и политика за сигурност на съюза.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">НАТО и партньорствата на НАТО в укрепване на сигурността чрез резилианс</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">78</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Национален капацитет за изследвания и технологии в интерес на отбраната: Методика за оценяване и уеб-платформа за събиране и представяне на информация</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">75</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Потенциални роли на ЕС във всеобхватния подход: Рамка за анализ</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">септември 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">88</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът представя изследователските резултати на ЦМСО по работен пакет 3.1 на проект FOCUS. В доклада са идентифицирани основни измерения за описание на ролите на Европейския съюз в прилагането на всеобхватния подход: (1) Действащи лица; (2) Инструменти; (3) Цели в подпомагането на страни извън ЕС; (4) Стратегии; и (5) Роли в мисии, систематизирани са развитията на разбирането за всеобхватния подход в ЕС, анализирани са структурните условия за взимане на съответни решения и са представени основните драйвери на бъдещото развитие и прилагане на всеобхватния подход от ЕС. В анекс са включени резюмета на последни специализирани публикации по темата. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Противодействие на корупцията в отбраната: основни предизвикателства пред България и Югоизточна Европа и добри практики</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">77</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Противодействие на корупцията в отбранителния сектор: Основни рискове и предизвикателства</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">май 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">83</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът представя основните тези на доклад пред конференция на тема “Укрепване на интегритета и противодействие на корупцията в отбранителния сектор на Украйна”, проведена на 16 май 2011 г. в гр. Киев. Признава се, че отбранителният сектор не е имунизиран срещу корупцията. Няколко фактора правят този сектор дори по-податлив на корупция, понякога проявяваща се в неочаквани форми. Към предизвикателствата на корупцията следва да се подхожда всеобхватно, но инициативите за укрепване на интегритета трябва да са фокусирани и да надграждат постигнати успехи. Прозрачността и отчетността са най-мощните инструменти за укрепване на интегритета и намаляване на корупцията в демократични общества. Прилагането им в отбраната, наред с други специфични мерки, се осъществява в рамките на концепцията за добро управление. Докладът включва примери от опита на България, които могат да се използват в текущите антикорупционни усилия в отбранителния сектор на Украйна.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Georgi Tsvetkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Сравнителен анализ на данни за отбраната</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">ноември 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">90</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът разглежда добрите практики във формулирането на отбранителна политика, в частност при дефинирането на мисии на въоръжените сили, управлението на личния състав в отбраната, разбирането как разпределението на средствата за отбрана се отразява на изпълняваните мисии и управлението на основните категории отбранителни активи. За тази цел изследването, основано на информация от открити източници, сравнява практиките на 18 малки и средни по размер страни – всички отличаващи се със своята относително прозрачна политика и дейност в сферата на отбраната.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Терминология на планирането с използване на сценарии в отбраната</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><number><style face="normal" font="default" size="100%">82</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Управление на промяната в сложни организации при висока степен на неопределеност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">73</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Фази и предизвикателства на реформата на сектора за сигурност: Анализ на българския опит</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">юни 2011</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">85</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Докладът представя основните тези на доклад в сесията “Надзор и отчетност на отбранителния сектор” на ежегодната конференция на Консорциума на военните академии и институти за изследване на сигурността, Гармиш-Партенкирхен, 22-23 юни 2011 г. Докладът анализира българския опит през трите основни фази на реформа на сектора за сигурност в посткомунистическия преход: (1) Установяване на основните механизми на цивилен контрол над въоръжените сили и защита на човешките права в началото на 90-те години; (2) Изграждане на демократични отбранителни институции, от края на 90-те години и първото десетилетие на 21 век; и (3) Трансформиране на сектора за сигурност като цяло – основен фокус на текущите реформи.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Philipp Fluri</style></author><author><style face="normal" font="default" size="100%">Adrian Kendry</style></author><author><style face="normal" font="default" size="100%">Mark Pyman</style></author><author><style face="normal" font="default" size="100%">Simon Lunn</style></author><author><style face="normal" font="default" size="100%">Ashley Thornton</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></title></titles><keywords><keyword><style  face="normal" font="default" size="100%">accountability</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">Defence governance</style></keyword><keyword><style  face="normal" font="default" size="100%">defence management</style></keyword><keyword><style  face="normal" font="default" size="100%">integrity</style></keyword><keyword><style  face="normal" font="default" size="100%">Transparency</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0 </style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Transparency and corruption challenges in the defence sphere often affect not only transition states but also established democracies. This compendium, the product of cooperation between Transparency International UK, the NATO PfP team and DCAF, focuses on concepts and tools which can ensure good practices in defence management and policy through enhancing transparency, increasing accountability and building integrity. Designed primarily as an introduction and reference tool for defence personnel, civilians in the defence sphere, democratic institutions, and civil society will also find materials on integrity building and anti-corruption measures which are relevant to their own security governance activities</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alxandre Kukhianidze</style></author><author><style face="normal" font="default" size="100%">Tamuna Karosanidze</style></author><author><style face="normal" font="default" size="100%">Nina Khatiskatsi</style></author><author><style face="normal" font="default" size="100%">Alexander Scrivener</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Combating Defence-related Corruption in Countries with Unresolved Territorial Disputesor or Frozen Conflicts</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">163-167</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 13 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">13</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Concept for Strategic Defence Managenment</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">February 2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">46</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><volume><style face="normal" font="default" size="100%">46</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">IT4Sec Reports 46 presents a concept for strategic defence management, i.e. for maintaining the alignment among defence objectives, strategies and tools in a changing force development environment, created for Bulgaria’s Ministry of Defence. It provides an overview of main principles, governance functions and management process in defence, as well as the main steps for the implementation of the concept. A relevant organisational structure of the Ministry of Defence and a structure of the defence programmes are presented in annexes to the report.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Corruption Curse</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">2-13</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 1 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">2</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Costing in Capability-Based Planning</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">64</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nickolay Slatinski</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Cultural Awareness in Implementing Integrity Building Programmes</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">331-342</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 24 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its author with the exception of Box 24.1, contributed by Todor Tagarev and Box 24.2, contributed by Velizar Shalamanov.</style></abstract><section><style face="normal" font="default" size="100%">24</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Budgeting and Financial Management</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">63-79</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 6 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">6</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alice Eldridge</style></author><author><style face="normal" font="default" size="100%">Dominique Lamoureux</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Defence Industry as an Ally in Reducing Corruption</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">266-276</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 20 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its
authors with the exception of Boxes 20.1,20.2,contributed by Todor Tagarev</style></abstract><section><style face="normal" font="default" size="100%">20</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Procurement</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">80-95</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 7 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its
author with the exception of Box 7.2, contributed by Maciej Wnuk and Box 7.6, contributed by Elisabeth Wrigth.</style></abstract><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Democratic Legitimacy of Security Sector Governance in Crisis Situations</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">45</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Developing Guidelines and RTD Strategies for Crisis Management in Natural Disasters</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">68</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Driving forces of security services’ reform  in the countries of Eastern Europe</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">49</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Effective Resource Management in a Good Governance Context</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">50</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Enabling Factors and Effects of Corruption in the Defense Sector</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2010</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">77-88</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">An Exercise in Defining Capability Requirements</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">63</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">For effective and efficient security sector</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">69</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">James Greene</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Human in the Loop</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">208-220</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 16 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its
author with the exception of Box  16.2, contributed by Leonid Polyakov</style></abstract><section><style face="normal" font="default" size="100%">16</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anne-Christine Wegener</style></author><author><style face="normal" font="default" size="100%">Mark Pyman</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Importance of Integrity Building</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">178-185</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 14 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">14</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Lucas</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrity Issues Related to Military Operations</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">149-162</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 12 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its
author with the exception of Boxes 12.1, 12.2, 12.3, 12.4,  contributed by Todor Tagarev</style></abstract><section><style face="normal" font="default" size="100%">12</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Introduction to the Planning for Defence Capabilities</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">48</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aditya Batara</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Involvement of Defence Personnel and Assets in Economic Activities</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">138-148</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 11 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">11</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Making Change Happen</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">315-330</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 23 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its
author with the exception of Box 23.6, contributed by Sami Faltas.</style></abstract><section><style face="normal" font="default" size="100%">23</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Modern System of International Relations: Elaboration of Strategies for Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">66</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">National Approaches in Support of Building Integrity and Reducing Corruption in Defence</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">34-45</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 4 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">4</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Adrian Kendry</style></author><author><style face="normal" font="default" size="100%">Susan Pond</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">NATO and the Evolution of the Building Integrity Initiative</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">24-33</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 3 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">3</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark Pyman</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Offset Arrangements</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">96-108</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 8 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its
author with the exception of Box 8.2, contributed by Todor Tagarev.</style></abstract><section><style face="normal" font="default" size="100%">8</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Francois Melese</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Opportunities and Risks with Out-sourcing, Privatization and Public-Private Partnerships in Defence</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">109-123</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 9 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its
author with the exception of Boxes 9.4,9.5,9.9, contributed by Todor Tagarev</style></abstract><section><style face="normal" font="default" size="100%">9</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">James Greene</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Personnel policies</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">47-62</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 5 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Planning of Security Sector Capabilities for Protection of Maritime Sovereignty</style></title><secondary-title><style face="normal" font="default" size="100%">Scientific Support for the Decision Making in the Security Sector</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Policy for security and development of the unified Electronic Communications Network and the National Network of the State Administration</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">62</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Prioritising Capabilities in View of Risks</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">65</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Programme for management of the Institute of Information and Communication Technologies of the Bulgarian Academy of Sciences</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">55</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">„Programme for Managing and Development of the Institute of Information and Communication Technologies of the Bulgarian Academy of Sciences”.  This management programme was prepared for the procedure for appointment of director of the Institute of Information and Communication Technologies (IICT) of the Bulgarian Academy of Sciences, established through merger of three academic institutes. It is based on a SWOT analysis. The report presents the fundament of a balanced scorecard for assessing the results and the performance of a modern research and technology organisation.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Protecting European Critical Infrastructure: Training course for civil servants, owners and operators of critical infrastructures in the energy sector</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">53</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Regulatory Frameworks</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">186-207</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 15 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">15</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Requirements and constraints in the design and selection of critical infrastructure protection scenarios</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">59</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ian Davis</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of Civil Society and the Media</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">277-297</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 21 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">21</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Leonid Polyakov</style></author><author><style face="normal" font="default" size="100%">James Greene</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of Government</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">221-237</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 17 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its authors with the exception of Box 17.1, contributed by Todor Tagarev and Boxes 17.4, 17.6 contributed by Maciej Wnuk</style></abstract><section><style face="normal" font="default" size="100%">17</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">James Greene</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of International Organisations</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">298-313</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 22 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">22</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of Ombudsperson Institutions</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">250-265</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 19 of the NATO-DCAF Building Integrity Compendium.  The boxes in the chapter were contributed by its
author with the exception of Box 19.5, contributed by Todor Tagarev</style></abstract><section><style face="normal" font="default" size="100%">19</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wim F. van Eekelen</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of Parliaments and Audit Offices</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">238-249</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 18 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">18</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Francois Melese</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">A Strategic Approach to Building Integrity and Reducing Corruption in Defence</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">14-23</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 2 of the NATO-DCAF Building Integrity Compendium. The boxes in the chapter were contributed by its
author with the exception of Box 2.4 , contributed by Todor Tagarev</style></abstract><section><style face="normal" font="default" size="100%">3</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Strategic Defence Management: From Core Processes to Organizational Structures</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">71</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Strategic Defence Review: Purpose, Principles, Players</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">47</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Strategic Risk Assessment</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">56</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Transformation Strategies</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">57</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Utilisation of Surplus Equipment and Infrastructure</style></title><secondary-title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">124-136</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Chapter 10 of the NATO-DCAF Building Integrity Compendium.</style></abstract><section><style face="normal" font="default" size="100%">10</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Въведение в планирането за отбранителни способности</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">48</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Движещи сили на реформата на службите за сигурност в страните от Източна Европа</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">49</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Демократична легитимност на управлението на сектора за сигурност в кризисни ситуации</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">45</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ефективен ресурсен мениджмънт в контекста на доброто управление</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">50</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Защита на европейската критична инфраструктура: Курс за обучение на служители  от  МИЕТ  и  търговските  дружества – собственици /оператори  на  обекти  от  критичната  инфраструктура   в  сектор „Енергетика”</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">53</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Изисквания и ограничения в проектирането и избора на сценарии за защита на критична инфраструктура</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">59</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Концепция за стратегически отбранителен мениджмънт</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">46</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Модерната система на международни отношения: Разработване на стратегии за Украйна</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">66</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Насоки и изследователски стратегии в поддръжка на кризисното управление при природни бедствия</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">68</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Остойностяване в планирането за способности</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">64</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Политики за сигурност и развитие на обединената Електронна съобщителна мрежа и Националната мрежа на държавната администрация</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">62</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Предпоставки за ефективен и ефикасен сектор за сигурност в новата стратегия за сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">69</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Приоритизиране на способностите от гледна точка на риска</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">65</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Програма за управление и развитие на Института по информационни и комуникационни технологии – БАН</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">55</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Управленската програма, изготвена за участие в конкурса за директор на Института по информационни и комуникационни технологии на БАН, се базира на SWOT анализ и представя основите на балансирана система от показатели за оценяване на резултатите и ефективността на функциониране на една модерна научноизследователска организация.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Стратегии за трансформация</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">57</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Стратегически отбранителен мениджмънт: от основни процеси към организационни структури</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">71</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Стратегически преглед на отбраната: Назначение, принципи, участници</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">47</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Стратегическо оценяване на риска</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">56</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Учение по определяне на изискванията към отбранителните способности</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">63</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><tertiary-authors><author><style face="normal" font="default" size="100%">Hari Bucur-Marcu</style></author><author><style face="normal" font="default" size="100%">Philipp Fluri</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">About the Authors</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">203</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Acquisition Management</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Security and Defence Management Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">155-184</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This chapter explores some of the issues involved in acquisition management. It sets acquisition management into its wider context by describing some of the processes that lead to the decision to launch a particular acquisition project, looks at the use of acquisition strategies as a means to choose how best to acquire equipment and/or services and to demonstrate these choices to stakeholders, and at acquisition cycles as a means for managing the project once launched.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot; lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://it4sec.org/compendum/defence-management-introduction&quot; title=&quot;Back to the book content&quot;&gt;Back to the book content&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">6</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Basics of Effective Resource Management in the Security Sector</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">44</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgaria’s Defence Policy and Force Size from a Comparative Macro Perspective</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">115-128</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents a novel, theoretically sound approach to the analysis of defence policy and force models and first results of its implementation. The ap­proach is based on comparison of defence policies and cost data under the hypothe­sis that a particular defence policy relates to a specific set of defence capabilities with the respective impact on cost. We identified six factors, or dimensions, of de­fence policy with major impact on the cost of the respective capabilities, and used publicly available data to construct a model of capability cost, expressed in defence budget per active duty military personnel in constant purchasing power parity dol­lars, as a function of the six factors. Then the model was used to define what might be the reasonable force size of the Bulgarian Armed Forces in 2015 under three plausible alternative defence policies. The final section of the paper outlines strengths and limitations of the approach, as well as outputs and potential outcomes from its implementation. 
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Capabilities-based Planning for Security Sector Transformation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">24</style></volume><pages><style face="normal" font="default" size="100%">27-35</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Advanced approaches towards defense management, and the process of the ongoing force transformation in particular, rely to a great extent on Capabilities-Based Planning (CBP) to provide for robust response to a broad spectrum of threats and challenges. Our assumption is that CBP has considerable potential to enhance initiatives for security sector transformation. This paper outlines a planning frame­work, based on centralized planning and agency-based development of security sector capabilities. It links objectives, security ambitions, planning scenarios, tasks, required and affordable capabilities, and planning risks. The distribution of capa­bilities among security sector organizations accounts for their traditions, experi­ence, and current roles, but focuses on cost effectiveness. The development of ca­pabilities is subject to regular monitoring, assessment of gaps and risks, and coor­dinated decision making on corrective measures. Then, the paper presents possible levels of integration of the security sector. The conclusion is that coordinated capa­bility development, with capabilities-based planning as its central feature, should be seen as the core process in security sector transformation.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CLASSIC, MODERN, AND POST-MODERN APPROACHES TO MAKING SECURITY STRATEGY</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">09/2009</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Classic, Modern, and Post-Modern Approaches to Making Security Strategy</style></title><secondary-title><style face="normal" font="default" size="100%">First International Seminar with Discussion on Security Policy (Security-2009)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">18 Sept. 2009</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Classic, Modern, and Post-Modern Approaches to Making Security Strategy</style></title><secondary-title><style face="normal" font="default" size="100%">First International Seminar with Discussion on Security Policy</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2009</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Varna, Bulgaria</style></pub-location><pages><style face="normal" font="default" size="100%">7-17</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Classic, Modern, and Post-modern Approaches to Making Security Strategy</style></title><secondary-title><style face="normal" font="default" size="100%">First International Seminar with Discussion on Security Policy </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">18 September</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Bulgaria</style></publisher><volume><style face="normal" font="default" size="100%">7</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><num-vols><style face="normal" font="default" size="100%">7-17 </style></num-vols></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Competencies of the EU-12 defence-related supplier base, EDA study</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">32</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Crisis Management in a multilateral context</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">40</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Decision-making and Corruption Risks</style></title><secondary-title><style face="normal" font="default" size="100%">Integrity in Defence: Effective, Transparent and Accountable Management</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">EuroAtlantic Education Initiative</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">189–214</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Planning – A Core Process in Defence Management</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Security and Defence Management Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">45-73</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This chapter looks at the notion of defence policy and the importance of the transparency of long-term planning and force development plans for the democratic governance of defence. It then examines various planning horizons and the interactions among the respective processes, thus explaining why and how defence planning constitutes a core defence management process. Thirdly, the chapter briefly introduces the reader to the possible alternative approaches to defence planning. The fourth part presents a framework model of linking policy objectives to force structure and explains the role of planning risks. The concluding part briefly touches on contexts for the national defence planning process and once again emphasises the importance of transparency of decision-making for the democratic accountability, effectiveness, and efficiency of a defence establishment. The issues addressed in this chapter are not unique to NATO aspirants and partner countries. Our belief is that civilian and military experts from any country on the thorny path to democratic governance of defence would benefit from a better understanding of the linkages between security challenges and policy objectives to defence planning, on one hand, and defence planning to resource management mechanisms, on the other. Because, for example, it does not matter whether a Ministry of Defence implements a ‘perfect’ accounting system and transparent financial procedures if they support the development of a force structure that is not adequate to the security environment, the policy objectives and the strategy of the country.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot; lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;/compendum/defence-management-introduction&quot; title=&quot;Back to the book content&quot;&gt;Back to the book content&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">2</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Democratic Defence Management and the Role of Parliament</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">42</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Developing Capabilities for Education and Research in Defence Management: The Bulgarian Experience</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">35</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Formalizing the Optimization Problem in Long-Term Capability Planning</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">2009</style></number><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">99-114</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%"> In defining future force capabilities, decision makers need to balance objectives, strategy, force capabilities, and risk within a forecasted force develop­ment environment and resource levels. This is commonly a task in long-term de­fense and force planning. This paper presents a mathematical formalization of the planning problem that involves static and dynamic optimization. Several static and dynamic discrete optimization models illustrate the approach. The concluding sec­tion presents a short deliberation on applicability.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Gaming Approach to Enhancing Defense Resource Allocation</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">7-16</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Good Governance and Quality Management Principles</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">33</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Governance, Management, Command, Leadership: Setting the Context for Studies of Defence Management</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Security and Defence Management Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">15-43</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This chapter provides an explanation of what is defence governance, how it differentiates from management and command and what is the role of strategic leadership. On that basis, we identify the areas of defence institutions that could be strongly enhanced through adoption of modern business practices. As a result, the value of defence management is explained vis-à-vis traditional military bureaucratic or command approaches. The chapter does not preach a particular model of defence management. Instead, it sets the context for detailed examination of the key defence management issues in following chapters. The themes and issues presented here are based on data and observations in countries creating, reforming, or transforming their defence institutions and, without detailed elaboration, illustrate main points to be considered by those involved in arguing, planning, designing and implementing defence institution-building activities. Thus, it provides orientation to policy makers who want to learn how a defence institution could be developed as an effective and democratic pillar of national and international security, producing adequate defence at a socially acceptable cost.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot; lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;/compendum/defence-management-introduction&quot; title=&quot;Back to the book content&quot;&gt;Back to the book content&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">1</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Improving Governance in the Management of Resources in the Security and Defence Sector</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">41</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">IT4Sec Reports 41 includes the main theses of a presentation at the NATO-RACVIAC conference on “Better Management of Defence Resources, including Integrity Building in the Armed Forces,” Rakitje, Croatia, 14-16 September 2009. It sees resource management in security and defence as traditionally judged in view of effectiveness and efficiency. However, when the decisions are made by a few insiders and under the veil of secrecy, there is no guarantee that the interests of society will be protected. Further, there are no guarantees that the use of public resources will deliver anticipated effects in an efficient manner. In approaching this general problem, the paper outlines general principles of democratic governance of the security sector. It then focuses on the institutional perspective on democratic governance, underlining ways in which a defence minister can greatly contribute to improving governance in managing resources for security and defence. Finally, the paper lays out ideas on how the cooperation among countries in South Eastern Europe could contribute to strengthening the governance of security and defence sectors, and resource management in particular.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Interactive Simulations in Support of Decision Making on Defence Resource Allocation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">129-140</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%"> This article describes the approach and the experience of the Defence and Force Management Department at the “G.S. Rakovski” Defence and Staff Col­lege in conducting interactive simulations that support decision making on force structure, force development programs, and the respective allocation of resources. The primary purpose of the simulation is to educate students, mostly senior military and civilian MOD personnel, in the intricacies of defence planning in a changing environment, and to provide ‘hands on’ experience in defence programming and budgeting. In addition, it allows exploring the space of potential policy alternatives, force structuring and programming decisions, thus serving as a powerful decision support </style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Introduction</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">3-13</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In historical terms, defence management emerged as a topic of interest for the defence sector not too long ago. It is no more than five decades since some Western nations introduced the concept of managing defence in addressing such issues as allocating financial or human resources, solving strategic or operational problems in a comprehensive approach, or using business-like tools governing the defence sector. Such an enterprise requires excellence at all levels and in every department of the defence establishment. One proven way of achieving this is to apply the managerial functions of planning, organising, leading and controlling to those segments and activities of the defence organisation that may contribute to maximising the operational performance of armed forces. The problems in need of managerial solutions are similar throughout the entire Euro-Atlantic space, regardless of the status of each individual nation, be it a North Atlantic Treaty Organization (NATO) member or a partner. Some of these problems are decades old but became urgent in the last fifteen years or so. Among these problems, the cuts in personnel and spendings as a result of the ‘peace dividends’ after the end of the Cold war, as well as the increased demands for more deployable forces that operate far away from their home bases and have to be sustained for longer periods. ...&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot; lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;/compendum/defence-management-introduction&quot; title=&quot;Back to the book content&quot;&gt;Back to the book content&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Introduction to Programme-based Force Development</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Security and Defence Management Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">75-92</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This chapter examines key issues in the use of defence programmes and the programming process. For general programme management issues—performance architecture, alignment with higher level vision, goals and objectives, management of time and cost, leadership and accountability, etc.—the reader may refer to a number of published works and online resources. This chapter is focused on one specific aspect of programme-based force development, namely the programme structure – the key for providing capability orientation of the force development process. The chapter examines principles and practices of programme-based force development which, as shown bellow, is equivalent to programme-based defence resource management. It outlines the reasons behind the use of programmes and programming, shows what a good programme decision is and how it depends on the design of a programme structure, and singles out key activities in a programme management process and the links among them. In the concluding part, the main challenges in the successful design and implementation of programme-based force development in transition countries is briefly examined.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot; lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://it4sec.org/compendum/defence-management-introduction&quot; title=&quot;Back to the book content&quot;&gt;Back to the book content&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">3</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Life Cycle Management: Key Issues and Challenges in Transition Countries</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">36</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Managing Defence Resources on a Programme Basis</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">29</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Managing Finances</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Security and Defence Management Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">93-123</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In this chapter, the reader will find several lists and specifications intended to make the content easily understood. They may further serve as a sort of ‘checklist.’ The chapter is based on the author’s own research and experience in both European and American countries in the public sector, particularly in defence, as well as in the private sector. Solutions and recommendations offered here reflect this rich personal experience. The focus is on defence and the management of financial resources as a particular type of defence resources.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot; lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://it4sec.org/compendum/defence-management-introduction&quot; title=&quot;Back to the book content&quot;&gt;Back to the book content&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">4</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Manpower Management</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Security and Defence Management Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">125-154</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This chapter explores that complexity. It begins with an overview section that assumes that the ultimate aim of any military manpower management process is to have in place a force structure that is appropriate to a nation’s security needs. From that it follows that the management process has to be a kind of quasi-market mechanism, one that attempts to match the supply of military manpower to the demand for it. On the demand side, the challenge is to know just what manpower numbers and mix of skills are required. These have to be determined within some form of force planning process that considers manpower requirements simultaneously with decisions regarding equipment, doctrine and organisation. But ultimately, the demand for military manpower will be driven by four critical considerations: the state of the international security environment; the perceived utility of military force in that environment; the technology of warfighting; and, as always, by issues of affordability. These factors and their implications for manpower requirements are discussed in the third and fourth sections of this chapter. On the supply side, the challenge is to manage a lifecycle process of recruiting, training, promoting, deploying and finally releasing the right numbers of individuals such that there is a dynamic synchronisation of the distribution of available numbers and skills with the distribution of numbers and skills actually required to support the force structure. The fifth section of this chapter examines this process in detail. In particular, it addresses the issues that manpower managers face as they attempt to manage what is generally quite an inflexible process in the face of shifting demographics and changing labour markets. The sixth section explores some ideas for dealing with these issues through changing manpower supply processes to make them more flexible and hence more responsive to military requirements. A concluding section summarises the need for manpower management change and reflects on the factors that will determine how far and how fast that change might go.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot; lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://it4sec.org/compendum/defence-management-introduction&quot; title=&quot;Back to the book content&quot;&gt;Back to the book content&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Methodology for Assessing Vulnerabilities and Planning Measures for Protection of Critical Infrastructures, ICT Fair for Trust &amp; Security Research</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">31</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Modalities of the EU-12 defence-related supplier base</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">37</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">National Crisis Management Systems</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">39</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Preface</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">1-2</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Principles of crisis management</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">38</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Programme-based Management for Effective Oversight of the Security Sector</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">30</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Programmes and Programming as Tools for Effective Resource Management</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">34</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Strategic Defence Review: Goals, Reasons, Methodology, Organisation</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">28</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Strategic Defence Review in the context of Euroatlantic Integration: Lessons learned from Bulgaria’s experience</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">26</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Transparency in Defence Management</style></title><secondary-title><style face="normal" font="default" size="100%">Defence Management: An Introduction</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Security and Defence Management Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pub-location><style face="normal" font="default" size="100%">Geneva</style></pub-location><pages><style face="normal" font="default" size="100%">185-201</style></pages><isbn><style face="normal" font="default" size="100%">978-92-9222-089-1</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Transparency in conjunction with accountability is the essence of democracy. Its application, however, varies greatly, especially in the field of defence and security. Defence is different from other areas of government through the monopoly on the use of force and the existence of a trained military establishment, which has its own views on the best way of safeguarding national interests. The primacy of politics over the military has been widely recognised, but harmonious relations require a balance of trust, in which politicians refrain from attempts at micro-management after they have agreed strategic documents and mandates and the military accept to be accountable for the way they implement them. This is particularly important for the conduct of peace support operations, where modern communications tempt the leadership at home to follow every decision of the field commander. But it is also important for the less visible issues of defence management. Defence is also different from other government departments because of its emphasis on the long haul. Planning should be based on a rolling forward plan for 10 years or more but with sufficient flexibility to take account of unforeseen developments and for delays in the realisation of specific items. Other spending departments do not have the same ratio between investment and running costs as defence, which in many ways resembles a commercial company in its activities. The most difficult area in civil-military relations is the allocation of resources, which usually are deemed inadequate by the military for the execution of their tasks, but have to be evaluated by the political bodies in the competition for money with other departments. In the end, politics will prevail, but in a way in which the final responsibility for adequate forces will lie with the politicians in Cabinet and Parliament.&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;font-family: tahoma,arial,helvetica,sans-serif; font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot; lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;https://it4sec.org/compendum/defence-management-introduction&quot; title=&quot;Back to the book content&quot;&gt;Back to the book content&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Using Architectural Models to Identify Opportunities for Improvement of Acquisition Management</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">188-203</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article presents a model of the processes of one of the Bulgarian force-management subsystems – the acquisition system. The modeling approach adopted is architecture-oriented, which means that the processes are represented ac­cording to their sub-processes or phases and activities and the connections in terms of information exchanged between them. The modeling framework selected for this purpose is the widely accepted in NATO and partner countries DODAF (Depart­ment of Defense Modeling Framework). The authors provide a brief discussion of the model and some recommendations for improvement of the process of acquisi­tion management.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Въведение в ефективния ресурсен мениджмънт в сектора за сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">44</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Демократичност в отбранителния мениджмънт и ролята на парламента</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">42</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Добро управление и принципи за ефективен мениджмънт</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">33</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Компетенции на отбранителните доставчици от новите 12 страни членки на ЕС</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">32</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Мениджмънт на жизнения цикъл: Основни въпроси и предизвикателства за страните в преход</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">36</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Методология за оценяване на уязвимости и планиране на мерки за защита на критична инфраструктура</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">31</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Модалности на функционирането на отбранителните доставчици от новите 12 страни членки на ЕС</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">37</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Национална система за управление при кризи</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">39</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Принципи на кризисния мениджмънт</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">38</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Програмен мениджмънт за ефективен контрол на сектора за сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">30</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Програмите и програмирането като инструменти за ефективен ресурсен мениджмънт</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">34</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Развитие на способности за образование и изследвания в областта на мениджмънта на отбраната</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">35</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Стратегически преглед на отбраната: цели, необходимост, методология, организация</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">28</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Стратегическият преглед на отбраната в контекста на Евроатлантическата интеграция: Поуки от българския опит</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">26</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Управление на отбранителните ресурси на програмна основа</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">29</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Управление при кризи в многонационален контекст</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">40</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Усъвършенстване на ресурсния мениджмънт в сектора за сигурност и отбрана</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">41</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgarian Defence Policy and Force Development 2018</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><isbn><style face="normal" font="default" size="100%">978-954-509-394-4</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgarian Defense Policy and Force Development 2018 </style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Sofia, Military Publishing House</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Civilians in Defense Ministries</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2008</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">110-117</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Programmes as a Language for Effective Communication</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2008</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">22</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defense policy and development of the Armed Forces of the Republic of Bulgaria 2018</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Democratic governance of the security sector: Defence Policy</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2008</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">23</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Expanded Capability Portfolios to Steer Force Development under Strategic Uncertainty</style></title><secondary-title><style face="normal" font="default" size="100%">Specialist Meeting on Capability-Based Long Term Planning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">18-19 Nov 2008</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Oslo</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper reflects a methodology for long-term defence planning, developed by one of the authors at the request of the Bulgarian Ministry of Defence in the period July-November 2007. The methodology builds on good practices in long-term defence planning and capabilities-based planning in an attempt to make the force development process more sensitive and adaptive to significant changes in the environment (security, political, socio-economic, technological, etc.) while preserving the transparency of resource allocation decisions. The underlying approach combines two recent developments. The first one calls for the use of two levels of scenarios—‘mission scenarios,’ or ‘planning situations’ in NATO parlance, and ‘context scenarios,’ known also as ‘alternative futures’—as a means to represent strategic uncertainty in the force development environment. The second one is based on an expanded definition of ‘capability.’ We distinguish three types of capabilities:
A.	Capabilities to perform operational and management tasks, the operational capabilities being in the focus of long-term planning so far;
B.	Capabilities to shape the security environment, e.g. regional security cooperation, assistance to other countries, etc., and 
C.	Capabilities for strategic adaptiveness, including analysis of trends and forecasting changes in the force development environment, technology monitoring, R&amp;D, concept development and experimentation, maintenance of mobilization capacity, etc. 
Since the decisions in the long-term planning process are made under constraints (although constraints may be more or less loose), all types of capabilities are thus placed on equal footing in the competition for resources, while the use of context scenarios allows to rationalize the balancing between type A capabilities and the investment in shaping and strategic adaptiveness.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">In conclusion: Follow-up Steps</style></title><secondary-title><style face="normal" font="default" size="100%">Bulgaria's Defence Policy and Force Development 2018</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The concluding section of the study on Bulgaria's Defence Policy and Force Development 2018 elaborates measures and steps needed to institutionalise the model of the integrated ministry of defence.
The full text below is in Bulgarian.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Institutionalizing Operations Analysis for Security and Defense in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2008</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">45–53</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Introductory part</style></title><secondary-title><style face="normal" font="default" size="100%">Bulgaria's Defence Policy and Force Development 2018</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This section includes the preface, the table of contents, and the introduction of the monographic study on Bulgaria's Defence Policy and Force Development 2018. 
The full text below is in Bulgarian.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Legal Basis of the National Security and Defence Policy</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2008</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">25</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Part 1: Rationalizing the Transformation of Defence</style></title><secondary-title><style face="normal" font="default" size="100%">Bulgaria's Defence Policy and Force Development 2018</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This section presents the main conclusions of the context scenarios, or &quot;alternative futures&quot; for the design of the national defence policy, the vision for the long-term development of the defence institution, as well as the respective levels of ambition. 
The full text below is in Bulgarian.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Part 2: Force Structure 2018</style></title><secondary-title><style face="normal" font="default" size="100%">Bulgaria's Defence Policy and Force Development 2018</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This section presents a capability partition and library of force building blocks, developed with account of Bulgaria's defence needs and traditions, levels of ambition for each of the envisioned missions and respective scenarios, key considerations and results in force structuring, considerations on the structuring and location of the armed forces on the territory of the country, and recommendations for adapting the force structure to changing fiscal constraints.
The full text below is in Bulgarian.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Part 3: The Integrated Defence Institution at Strategic Level</style></title><secondary-title><style face="normal" font="default" size="100%">Bulgaria's Defence Policy and Force Development 2018</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This section presents a vision for the strategic transformation of Bulgaria's defence institution, a model for structuring and functions of the integrated ministry of defence and strategic level (joint) commands, as well as possible alternative arrangements. 
The full text below is in Bulgarian.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Klaus Niemeyer</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">SfP 981149 Operations Research Support to Force and Operations Planning in the New Security Environment </style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Sofia: Artgraf, 2008</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stefan Hadjitodorov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Nikolay Pavlov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Shaping Bulgaria's Security and Defence R&amp;T Policy</style></title><secondary-title><style face="normal" font="default" size="100%">Policy and Models for R&amp;D Management in Support of Defence Industrial Transformation</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2008</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Avangard Prima</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">105-111</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Демократично управление в сектора за сигурност: Отбранителна политика</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2008</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">23</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Законова основа на политиките за национална сигурност и отбрана</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2008</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">25</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Отбранителна политика и развитие на въоръжените сили на Република България 2018</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Военно издателство „Св. Георги Победоносец”</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Отбранителните програми като език за ефективна комуникация</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2008</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">22</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Can We Measure Effectiveness and Efficiency of Defence Diplomacy, Public Discussion on “Defence Diplomacy”</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">18</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Capabilities Based Planning: The Effectiveness of PPBES in Ensuring a Superior Output</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">19</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Capability Taxonomy</style></title><secondary-title><style face="normal" font="default" size="100%">Methodology and scenarios for defense planning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Ministry of Defence, Directorate &quot;Defence Policy&quot;, Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Civilians in Defence Ministries: Competencies and Decision-making Roles, Public Discussion on “Role of Civilians in Department of Defence”</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">17</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Policy: Scope, Main Components, and Relationships</style></title><secondary-title><style face="normal" font="default" size="100%">International Relations /Mejdunarodni otnoshenia/</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><pages><style face="normal" font="default" size="100%">141-156</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1-2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Force Planning Curriculum</style></title><secondary-title><style face="normal" font="default" size="100%">Methodology and scenarios for defense planning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Ministry of Defence, Directorate &quot;Defence Policy&quot;, Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Framework Methodology to Support the Selection of a Multipurpose Fighter</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">82-91</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The procurement of multipurpose fighter planes is one of the major procurement, or modernization projects, announced by Bulgaria’s Ministry of Defense in 2002, but a procurement case has not been initiated so far. This article calls for a transparent decision-making process within a rational framework, based on both qualitative and quantitative analysis, that would allow to select “the best” multipurpose fighter for the Bulgarian Air Force. After outlining the main assumptions, the authors examine the issue of identifying and structuring the criteria for selection of a multipurpose fighter, describe the main steps of a rational, quantitatively-based, transparent decision-making process and analyze the major decision support requirements, as well as methods and tools that may be used in providing analytical support to both the selection process and the follow-on contract and project management.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Lessons Learned from Multi-national Defence Cooperation in South East Europe</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">21</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Main principles in setting defence R&amp;T policy</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">15</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Methodology for Defence and Force Planning</style></title><secondary-title><style face="normal" font="default" size="100%">Methodology and scenarios for defense planning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Ministry of Defence, Directorate &quot;Defence Policy&quot;, Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Methodology for Defence Planning in the Context of Security Strategy Planning</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">16</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><isbn><style face="normal" font="default" size="100%">1311-1493</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Planning Measures and Capabilities for Protection of Critical Infrastructures</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">38-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents a framework methodology and process for planning and developing capabilities and measures for protection of critical infrastructure and presents major methodological and organizational challenges of effective and efficient protection. The authors emphasize the need for comprehensive approach, based on much better communication and greater coordination among governmental organizations, security services, owners and operators of critical infrastructure.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Selecting a set of force planning scenarios</style></title><secondary-title><style face="normal" font="default" size="100%">Methodology and scenarios for defense planning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Ministry of Defence, Directorate &quot;Defence Policy&quot;, Military Publishing House</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Измерване на ефективност и ефикасност на отбранителната дипломация</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">18</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Методология за планиране на отбраната в контекста на планирането на стратегията за сигурност</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">16</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Методология и ситуационни сценарии за планиране на отбраната и въоръжените сили</style></title><secondary-title><style face="normal" font="default" size="100%">Методология и сценарии за отбранително планиране</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Министерство на отбраната, Дирекция &quot;Отбранителна политика&quot;, Военно издателство</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Основни принципи на формирането на отбранителна научноизследователска и технологична политика</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><number><style face="normal" font="default" size="100%">15</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Планиране за способности: Ефективност на ППБЕС при осигуряване на по-добри резултати</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">19</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Поуки от практиката на многонационално отбранително сътрудничество в Югоизточна Европа</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">21</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Цивилните в министерствата на отбраната: Компетенции и роли при взимане на решения</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">17</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms)</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">15-34</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Abstract</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Nickolay Pavlov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Critical Infrastructure Analysis and Protection – Key Issues and Relationships</style></title><secondary-title><style face="normal" font="default" size="100%">Military Journal </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Introduction to Program-based Defense Resource Management</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">55-69</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The Partnership Action Plan on Defense Institution Building (PAP-DIB) supports Partner countries in developing and implementing transparent procedures for the effective allocation of defense resources. These are procedures that can allow decision-makers to relate decisions on security policy, defense requirements, and resource allocation. A considerable number of NATO member countries use program-based defense resource management--some in combination with capability-based planning--as one of the main tools supporting the effective implementation of their security and defense policy. Other member countries do not use the explicit term &quot;program-based&quot; but nevertheless implement the same principles of transparency and accountability in their approach to defense resource management.
This essay examines the principles and practices of program-based defense resource management, which, as will be shown below, equates to program-based force development. It starts with outlining the reasons behind the use of programming, and then looks at several key topics structured around two main themes: what is a good program decision, and how does it depend on the design of a program's structure? and what are the key activities in the defense-resource management process, and what are the connections between them? It then briefly examines some of the major implementation challenges usually encountered by new NATO members and Partner countries, and concludes with an outline of the links between program-based defense resource management and defense institution building.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Introduction to Program-based Defense Resource Management</style></title><secondary-title><style face="normal" font="default" size="100%">Connection: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">16</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">55</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multiagent Modelling of Critical Infrastructures</style></title><secondary-title><style face="normal" font="default" size="100%">Military Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><volume><style face="normal" font="default" size="100%">113</style></volume><pages><style face="normal" font="default" size="100%">97-115</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">1</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">A. Angelov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Officers in the Reserve: A Natural Bridge between the Armed Forces and the Civil Society</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">Sofia: Union of the Officers in the Reserve ‘Atlantic’</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Planning and Development of Defense Institutions in a Time of Transformation</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">1-3</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Program-based Resource Management: Guidance and Implementation</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">12</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Relating Budget Decisions to Policy Objectives through Defence Programs</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">14</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Role of the offsets for the development of the national defence industrial base</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Security sector budgeting: main issues and good practices</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">10</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Бюджтиране в сектора за сигурност: основни въпроси и добри практики</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><number><style face="normal" font="default" size="100%">10</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Обвързване на бюджетните решения с целите на отбранителната политика чрез отбранителни програми</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><number><style face="normal" font="default" size="100%">14</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ресурсно управление на основата на програми: Насоки и приложение</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><number><style face="normal" font="default" size="100%">12</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ролята на офсетните споразумения за развитие на отбранително – индустриалната база на страната</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><number><style face="normal" font="default" size="100%">13</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Civil Security: Architectural Approach in Emergency Management Transformation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">75-101</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article presents the major findings of a comprehensive study (White Paper on Civil Protection) accomplished by the Center for National Security and Defense Research (CNSDR) in the Bulgarian Academy of Sciences (BAS). The research is presently further developed within the framework of a NATO Science for Peace Project SFP-981149 for building new capabilities in Decision Making Support for the Bulgarian Security Sector. The main goal of this article is to assess the status and prospects ahead of the system for protection of population and critical infrastructure. The fundamental principles of the Concept for Civil Security of the Republic of Bulgaria have been formulated within the context of the establishment of an integrated security sector. An institutionalized civil security system is considered “the third pillar” of the security sector in Bulgaria. Three main alternatives for development of civil security system are put forward. The first alternative is a result of a narrow interpretation and application of the newly adopted Crisis Management Act. The second alternative offers a broader interpretation and application of the Crisis Management Act. This alternative envisages maximum interdepartmental coordination – “a quasi ministry, whereas a ministry is not actually established.” The third alternative envisages the establishment of a new Ministry of Civil Security. The development of a Center of Excellence in Security Sector Transformation in Bulgaria is proposed to provide scientific support to the effective transformation of the civil security system and the implementation of the Crisis Management Law.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Civil Society Security Expertise. Role of ThinkTanks and Activist NGOs, Civil - Militay  Relations   and  Democratic Control  of the Security Sector</style></title><secondary-title><style face="normal" font="default" size="100%">A Handbook for Military Officers, Servicemen and Servicewomen of the Security and Intelligence Agencies, and for Civilian Politicians and Security Experts</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">57-59</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Civil Society Security Expertise. Role of ThinkTanks and Activist NGOs</style></title><secondary-title><style face="normal" font="default" size="100%">C I V I L - M I L I T A R Y   R E L A T I O N S   A N D  D E M O C R A T I C   C O N T R O L   O F   T H E  S E C U R I T Y   S E C T O R</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><volume><style face="normal" font="default" size="100%">A Handbook for Military Officers, Servicemen and Servicewomen of the Security and Intelligence Agencies, and for Civilian Politi</style></volume><pages><style face="normal" font="default" size="100%">57-59</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Civil-Military Relations and Democratic Control of the Security Sector</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">Procon</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A Handbook for Military Officers, Servicemen and Servicewomen of the Security and Intelligence Agencies, and for Civilian Politicians and Security Experts. The Handbook has been translated in Bahasa, French, Russian, Spanish, and Ukrainian.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Defence Planning: Strategic and Financial Aspects</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">05</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Developing an Architecture for Naval Sovereignty Operations Center</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">29-37</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article summarizes the results of a comprehensive study in support of the acquisition of an advanced C4ISR system for the Navy of the Republic of Bulgaria. A small interdisciplinary team in six months has designed the essential operational views of the architecture of a complex system that provides for maritime sovereignty operations and control of sea traffic. Main challenges, such as lack of development standards, adequate procedures, and doctrinal documents, are briefly described. The approach may be used by NATO and partner countries that envision joint development and acquisition of C2 and surveillance systems.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Defence Planning: From National Security Policy to Force Planning</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">04</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Интегрирано отбранително планиране: От политика за национална сигурност към планиране на силите</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">04</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Планиране на отбраната: Стратегически и финансови аспекти</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">05</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Analysis and evaluation of the system for civil protection and reaction in crisis situations: White Paper on the Civil Protection of the Republic of Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">03</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgaria: Integrated Defence Resource Management</style></title><secondary-title><style face="normal" font="default" size="100%">Security-Sector Reform and Transparency Building. Needs and Options for Ukraine and Moldova</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Centre for European Security Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">Groningen, The Netherlands</style></pub-location><pages><style face="normal" font="default" size="100%">39-47</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Fernando Duarte Carvalho</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">From Downsizing to Modernising Defence in C&amp;E Europe: Opportunities for SME’s</style></title><secondary-title><style face="normal" font="default" size="100%">Defense Related SME's: Analysis and Description of Current Conditions</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">NATO Science Series</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">ISO Press, 2004</style></publisher><pub-location><style face="normal" font="default" size="100%">Amsterdam</style></pub-location><volume><style face="normal" font="default" size="100%">43</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Transforming the Security Sector in the Context of the Euroatlantic Integration. Developing Capabilities for Effective Contribution to NATO</style></title><secondary-title><style face="normal" font="default" size="100%">Bulgaria’s Roadmap to NATO beyond Prague</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Institute for Euroatlantic Security</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">68-85</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Shalamanov, Velizar</style></author><author><style face="normal" font="default" size="100%">Stoyan Balabanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Изследване за анализ и оценка на системата за защита на населението и реагиране при извънредни ситуации. “Бяла книга по Гражданска защита на Р. България</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><number><style face="normal" font="default" size="100%">03</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Architectural Approach to the Design of the Naval Sovereignty Operations Center and the Coastal System for Control of Navigation and Shipping</style></title><secondary-title><style face="normal" font="default" size="100%">The Naval Sovereignty Operations Center - When and How, AFCEA</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">27 February 2003</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Varna</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bulgarian Armed Forces and National Security Policy:  Shaping the Security Environment in South East Europe</style></title><secondary-title><style face="normal" font="default" size="100%">Almost NATO: Partners and Players in Central and Eastern European Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">Charles Krupnick (Lanham, Md.: Rowman &amp; Littlefield, 2003)</style></publisher><pages><style face="normal" font="default" size="100%">119-155</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Dobromir Totev</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Jan A. Trapans</style></author><author><style face="normal" font="default" size="100%">Philipp H. Fluri</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Civilians and the Military in Defense Planning</style></title><secondary-title><style face="normal" font="default" size="100%">Defense and Security Sector Governance and Reform in South East Europe: Insights and Perspectives</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva: Geneva Centre for the Democratic Control of Armed Forces</style></publisher><pages><style face="normal" font="default" size="100%">217–230</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Control, Cooperation, Expertise: Civilians and the Military in Bulgarian Defence Planning Experience</style></title><secondary-title><style face="normal" font="default" size="100%">ISIS Research Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><number><style face="normal" font="default" size="100%">14</style></number><publisher><style face="normal" font="default" size="100%">Sofia: Institute for Se¬curity and International Studies</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Developing Defence Capabilities in the Process of NATO Integration – Allied, National Planning and Specialisation</style></title><secondary-title><style face="normal" font="default" size="100%">International Workshop “Strategic Defence Review – Economic Dimensions&quot;</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">29-30 May 2003</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Ribaritza, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Developing South East European Cooperative Crisis Management Capacity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">10</style></volume><pages><style face="normal" font="default" size="100%">73-83</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we propose and reason for launching SEE Cooperative Crisis Management Initiative aimed at developing sustainable regional Cooperative Crisis Management Capacity, seen as a set of Cooperative Crisis Management Capabilities to deal with the most probable crises in SEE. The proposal is based on critical assessment of the achievements of related security cooperation in South East Europe. The paper elaborates the purpose, the advantages and the mechanics of implementation of the proposal. Key to its advance is to define the scope so that the initiative adds to, coordinates and streamlines ongoing efforts without considerable duplication. Essential is the establishment of a Regional Crisis Management Centre, i.e., on the premises of the SEEBRIG HQ in Plovdiv, Bulgaria, after the HQ transfers to Romania in 2003.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Tilcho Ivanov</style></author><author><style face="normal" font="default" size="100%">Dobromir Totev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Konstantin Dimitrov</style></author><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Managing Resources for Defence and Security</style></title><secondary-title><style face="normal" font="default" size="100%">Programme of Integration of the Republic of Bulgaria into NATO</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">Sofia: Institute for Euroatlantic Security</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Means of Comparing Military Budgeting Processes in South East Europe</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">95-135</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents a methodology for comparative assessment of military budgeting systems and practices. It is intended for implementation within the Budget Transparency Initiative (BTI) of the Stability Pact for South Eastern Europe (SEE). The methodology shall allow BTI participants and other beneficiaries to identify promising areas for dissemination of  good local practice among SEE countries, as well as areas where all SEE countries lack necessary expertise or experience and the region as a whole would need outside support to improve the military budgeting practices. In a hierarchy of criteria, the methodology covers military budgets, budgeting process, budget execution, and assessment of budget execution. Special attention is paid to the issues of transparency and assurance of integrity of military budgeting. The paper includes a description of an idealised military budgeting process to serve as a benchmark, a comprehensive questionnaire to compare existing systems and practices to the benchmark, sets of possible answers to the questions, and guidance on how to process respective answers to the questionnaire. 
Potentially, the proposed methodology may be useful in other studies aiming to improve democratic governance, transparency and accountability in the public sector, in particular in the defence and the security sector.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Charles Krupnick</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Shaping the Security Environment in South-Eastern Europe: Bulgarian Armed Forces and National Security Policy</style></title><secondary-title><style face="normal" font="default" size="100%">Almost NATO: Partners and Players in Central and Eastern Europe</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">Lanham, Md.: Rowman &amp; Littlefield</style></publisher><pages><style face="normal" font="default" size="100%">119-155</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Военни способности – национално, съюзно планиране и специализация</style></title><secondary-title><style face="normal" font="default" size="100%">Военен журнал</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">110</style></volume><pages><style face="normal" font="default" size="100%">35-45</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Daniel Nelson</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Beyond Defense Planning</style></title><secondary-title><style face="normal" font="default" size="100%">Transparency in Defence Policy, Military Budgeting and Procurement</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">Sofia: Geneva Centre for the Democratic Control of Armed Forces and George C. Marshall - Bulgaria</style></publisher><pages><style face="normal" font="default" size="100%">17-26</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Overview of Defence Transparency Issues in Southeast Europe</style></title><secondary-title><style face="normal" font="default" size="100%">Transparency in Defence Policy, Military Budgeting and Procurement</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces and George C. Marshall—Bulgaria</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">8-14</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Reshaping Bulgarian Armed Forces for the 21st Century</style></title><secondary-title><style face="normal" font="default" size="100%">Bulgaria for NATO 2002</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">Institute for Regional and International Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">David Greenwood</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Transparency in Defence Budgets and Budgeting</style></title><secondary-title><style face="normal" font="default" size="100%">Transparency in Defence Policy, Military Budgeting and Procurement</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces and George C. Marshall </style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">27-38</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><secondary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Transparency in Defence Policy, Military Budgeting and Procurement</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><publisher><style face="normal" font="default" size="100%">Sofia: Geneva Centre for the Democratic Control of Armed Forces and George C. Marshall – Bulgaria</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Plamen Pantev</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Plamen Pantev</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Civil-Military Relations in Bulgaria: Aspects, Factors, Problems</style></title><secondary-title><style face="normal" font="default" size="100%"> Civil-Military Relations in South-East Europe: National Perspectives and PfP Standards</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><publisher><style face="normal" font="default" size="100%">Institut fuer Internationale Friedenssicherung</style></publisher><pub-location><style face="normal" font="default" size="100%">Vienna</style></pub-location><pages><style face="normal" font="default" size="100%">31-62</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Economic aspects of defense modernization</style></title><secondary-title><style face="normal" font="default" size="100%">Economic Benefits for Bulgaria from Joining NATO</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><publisher><style face="normal" font="default" size="100%"> Centre for Liberal Strategies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><pages><style face="normal" font="default" size="100%">25-42</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Organizatcia na nauchnite izsledvania v interes na otbranata</style></title><secondary-title><style face="normal" font="default" size="100%">Military problerms</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2001</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Organization of Scientific Research and Development in the Interest of Defence</style></title><secondary-title><style face="normal" font="default" size="100%">Military Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2001</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">108</style></volume><pages><style face="normal" font="default" size="100%">35-45</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Organization of Scientific Research and Development in the Interest of Defense</style></title><secondary-title><style face="normal" font="default" size="100%"> Military Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><volume><style face="normal" font="default" size="100%">108</style></volume><pages><style face="normal" font="default" size="100%">35-45</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Prerequisites and Approaches to Force Modernization in a Transition Period</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2001</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">30-52</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The new security challenges, in particular the challenges stemming from the wave of terrorist attacks and massive use of biological threats in September 2001, require novel ways of organizing and modernizing military forces. In the beginning of the Twenty First century militaries have to perform a broader spectrum of missions and tasks in cooperation with other agencies and other countries. For a country in transition, the search for effective modernization is complicated by resource constraints, lack of experience in market environment and relevant organizational culture. 
This article describes the application of common principles in modernizing Bulgarian military. It describes defense reform requirements with emphasis on the necessity to introduce rigorous defense resource management. The major challenge is to implement organizational and procedural changes, essential for the creation of a transparent, flexible acquisition process, compatible with acquisition systems and practices of NATO and EU member countries. The article provides details on the main elements of the new acquisition planning, listing current priorities and presenting an ongoing force modernization study. It covers also the role of research and development in modernization, as well as potential national and international cooperation activities.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Transparent Defence Planning for Effective Democratic Control</style></title><secondary-title><style face="normal" font="default" size="100%">PFP Planning Symposium</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.isn.ethz.ch/pfpdc/e_index.htm</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Oberammergau, Germany</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Организация на научните изследвания в интерес на отбраната</style></title><secondary-title><style face="normal" font="default" size="100%">Военни проблеми</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Indicator Space Configuration for Early Warning of Violent Political Conflicts by Genetic Algorithms</style></title><secondary-title><style face="normal" font="default" size="100%">Annals of Operations Research</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><volume><style face="normal" font="default" size="100%">97</style></volume><pages><style face="normal" font="default" size="100%">287-311</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stefan Hadjitodorov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Scientific Research and Development in NATO</style></title><secondary-title><style face="normal" font="default" size="100%">Military Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">107</style></volume><pages><style face="normal" font="default" size="100%">81-90</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Computational Intelligence in Multi-Source Data and Information Fusion</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1999</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">33-49</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">A model of MultiSource Information Fusion (MSIF) is proposed. It expands the application of proven MSDF techniques to diverse problem areas. This model allows for a unified framework clearly distinguishing processing functions from methods dealing with partial, uncertain, and imprecise information. The concept of computational intelligence provides for a holistic approach to design and integration of methods and algorithms for information fusion. We describe the application of computational intelligence to the fusion of data and information in two studies of early warning. The emphasis is on the power of soft-computing methods in designing early warning architectures pertinent to forecasting events in complex dynamical systems. </style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The New Military Doctrine of The Republic of Bulgaria: Contribution of Communications and Information Technologies to Achieve National Security Objectives</style></title><secondary-title><style face="normal" font="default" size="100%">C4/NCMC International Conference </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><pages><style face="normal" font="default" size="100%">7-17</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Comparative Analysis of Russian and US Views on Information Warfare in the Works of Timothy Thomas</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">105-115</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolution of the Notion of ‘Information War'</style></title><secondary-title><style face="normal" font="default" size="100%">Military Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">105</style></volume><pages><style face="normal" font="default" size="100%">80-86</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Information and Security at Dawn of the Twenty-First Century  (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">8-9</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue><work-type><style face="normal" font="default" size="100%">Editorial</style></work-type></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Information and Security at Dawn of the Twenty-First Century  (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">7-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Library Update</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">109-113</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">J. Rojicek</style></author><author><style face="normal" font="default" size="100%">M. Valeckova</style></author><author><style face="normal" font="default" size="100%">K. Warwick</style></author><author><style face="normal" font="default" size="100%">M. Karny</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Non-linear predictive models as compressors for time-series: A case of classifying qualitative dynamics</style></title><secondary-title><style face="normal" font="default" size="100%">3rd European IEEE Workshop on Computer-Intensive Methods in Control and Data Processing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September/1998</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Prague</style></pub-location><pages><style face="normal" font="default" size="100%">29-34.</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Object Oriented Model to Support Early Warning and Rapid Reaction Planning in International Context</style></title><secondary-title><style face="normal" font="default" size="100%">Supplemental Ways for Improving International Stability SWIIS'98</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 14-16, 1998</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">IFAC</style></publisher><pub-location><style face="normal" font="default" size="100%">Bucharest</style></pub-location><pages><style face="normal" font="default" size="100%">47-52</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Object Oriented Model to Support Early Warning and Rapid Reaction Planning in International Context</style></title><secondary-title><style face="normal" font="default" size="100%"> IFAC Conference on Supplemental Ways for Improving International Stability (SWIIS'98)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year><pub-dates><date><style  face="normal" font="default" size="100%">14-16 May 1998</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sinaia, Romania</style></pub-location><pages><style face="normal" font="default" size="100%">45-51</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The current security environment allows for greater integration of efforts to prevent war and conflict. This paper is focused on the technological aspects of a concept of an international Network of Situation Centers to support early warning and rapid reaction of the international community. It presents the Multilayer architecture of the system and object-oriented description of its components. Simulation experience and potential deterring effects of the concept arc briefly described.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Reengineering Defense Planning in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">Research Report</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 1998</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.isis-bg.org/Publications/Shalamanov&amp;Tagarev_%20Reengineering_1998-12.htm</style></url></web-urls></urls><number><style face="normal" font="default" size="100%">9</style></number><publisher><style face="normal" font="default" size="100%">Institute for International and Security Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Reengineering the Defense Planning in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">Research Report</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 1998</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">9</style></number><publisher><style face="normal" font="default" size="100%">Institute for Security and International Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Reengineering the Defense Planning in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">ISIS Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><number><style face="normal" font="default" size="100%">9</style></number><publisher><style face="normal" font="default" size="100%">Institute for Security and International Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Timothy Thomas on the Key Elements of the Russian Approach to IW</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1998</style></year></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">75-92</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of Military Education in Harmonizing Civil-Military Relations</style></title></titles><dates><year><style  face="normal" font="default" size="100%">1997</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">www.nato.int/acad/fellow/95-97/ tagarev.pdf</style></url></web-urls></urls><number><style face="normal" font="default" size="100%">Final Report</style></number><publisher><style face="normal" font="default" size="100%">NATO Democratic Institutions Fellowship Program</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author><author><style face="normal" font="default" size="100%">Andrew Hunter</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Selection of Indicators for Early Warning of Violent Political Conflicts by Genetic Algorithms</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Transition to Advanced Market Institutions and Economies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1997</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June/ 1997</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Warsaw, Poland</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Veselin Tselkov</style></author><author><style face="normal" font="default" size="100%">Dragomir Pargov</style></author><author><style face="normal" font="default" size="100%">Rusin Petrov</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Criteria of Computer System Security Assessment and Evaluation</style></title><secondary-title><style face="normal" font="default" size="100%">nformation Aspects of Security and Development of Modern Societies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><publisher><style face="normal" font="default" size="100%">Sofia: AFCEA-Sofia</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Aspects of Security </style></title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><publisher><style face="normal" font="default" size="100%">Procon</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia:</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dragomir Pargov</style></author><author><style face="normal" font="default" size="100%">Veselin Tselkov</style></author><author><style face="normal" font="default" size="100%">Rusin Petrov</style></author><author><style face="normal" font="default" size="100%">Iliya Kraytchev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Security in Computer Systems</style></title><secondary-title><style face="normal" font="default" size="100%"> AFSEA-Sofia Information Aspects of Security and Development of Modern Societies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><pub-location><style face="normal" font="default" size="100%">Sofia:</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dragomir Pargov</style></author><author><style face="normal" font="default" size="100%">Veselin Tselkov</style></author><author><style face="normal" font="default" size="100%">Rusin Petrov</style></author><author><style face="normal" font="default" size="100%">Iliya Kraytchev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Security in Computer Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information Aspects of Security and Development of Modern Societies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year><pub-dates><date><style  face="normal" font="default" size="100%"> September</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">AFSEA-Sofia</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><pages><style face="normal" font="default" size="100%">93-98</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author><author><style face="normal" font="default" size="100%">Alfredo Moscardini</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Soft - Computing Methods for Early Warning of Violent Conflicts</style></title><secondary-title><style face="normal" font="default" size="100%">1996 AFCEA-Europe Sofia Seminar</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1996</style></year></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><pages><style face="normal" font="default" size="100%">44-51</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">David J. Nicholls</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Nonlinearity in Data Related to War</style></title><secondary-title><style face="normal" font="default" size="100%">Supplementary Ways for Increasing International Stability</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1995</style></year></dates><pub-location><style face="normal" font="default" size="100%">Vienna, Austria 29 September - 1 October, 1995</style></pub-location><pages><style face="normal" font="default" size="100%">165-169.</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of Education and Training in the Field of C4I</style></title><secondary-title><style face="normal" font="default" size="100%">AFCEA-Europe Budapest Seminar</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1994</style></year></dates><pub-location><style face="normal" font="default" size="100%">Budapest</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>