{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
Georgiev, Venelin. \i Productive and Counter-Productive Balance in Security\i0  In \i CSDM Views\i0 ., 2022.\par \par Easton, Marleen, and Vanessa Laureys. "Behind Blue Lights: Exploring Police Officers? Resilience after the Terrorist Attack at Brussels Airport on March 22, 2016." \i Connections: The Quarterly Journal\i0  19, no. 3 (2020): 77-97.\par \par Nowakowska-Krystman, Aneta. "Maritime Piracy as a Form of Organized Crime: A Strategic Management Approach." \i Connections: The Quarterly Journal\i0  15, no. 3 (2016): 41-53.\par \par Ratchev, Valeri. \i Slovenia: Capabilities, Organisations, Policies, and Legislation in crisis management and disaster response\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2015.\par \par Dimitrov, Michael. \i Why the Organization Needs Information Security Policy and Programme\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2013.\par \par }