{\rtf1\ansi\deff0\deftab360

{\fonttbl
{\f0\fswiss\fcharset0 Arial}
{\f1\froman\fcharset0 Times New Roman}
{\f2\fswiss\fcharset0 Verdana}
{\f3\froman\fcharset2 Symbol}
}

{\colortbl;
\red0\green0\blue0;
}

{\info
{\author Biblio 7.x}{\operator }{\title Biblio RTF Export}}

\f1\fs24
\paperw11907\paperh16839
\pgncont\pgndec\pgnstarts1\pgnrestart
de Kok, Lisa C., Deborah Oosting, and Marcel Spruit. "The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour." \i Information & Security: An International Journal\i0  46, no. 3 (2020): 251-266.\par \par Zapara, Svitlana, Yaroslav Melnyk, Mariya Melnyk, Maryna Kuznetsova, and Natalia Bondar. "Labour Relations and the Information Security of the State during the Covid-19 Pandemics." \i Information & Security: An International Journal\i0  45 (2020): 77-88.\par \par Vardeva, Ivelina. "Generalized Net Model of an Automated System for Monitoring, Analysing and Managing Events Related to Information Security." \i Information & Security: An International Journal\i0  43, no. 2 (2019): 257-263.\par \par Dotsenko, Sergiy, Oleg Illiashenko, Sergii Kamenskyi, and Vyacheslav Kharchenko. "Integrated Model of Knowledge Management for Security of Information Technologies: Standards ISO/IEC 15408 and ISO/IEC 18045." \i Information & Security: An International Journal\i0  43, no. 3 (2019): 305-317.\par \par Tagarev, Todor, and Dimitrina Polimirova. \i Main considerations in elaborating organizational information security policies\i0  In \i 20th International Conference on Computer Systems and Technologies, CompSysTech 2019\i0 . Vol. ACM International Conference Proceeding Series. Bulgaria: University of RuseRuse, 2019.\par \par Rizov, Vasil. "Information Sharing for Cyber Threats." \i Information & Security: An International Journal\i0  39, no. 1 (2018): 43-50.\par \par Sadiku, Matthew N. O., Shumon Alam, and Sarhan M. Musa. "Information Assurance Benefits and Challenges: An Introduction." \i Information & Security: An International Journal\i0  36 (2017).\par \par Pot, ii, Oleksandr V., and Roman V. Oliynykov. "Ukrainian Educational System in the Field of Cybersecurity." \i Information & Security: An International Journal\i0  35, no. 1 (2016): 11-27.\par \par Bik, Volodymyr. "Protecting the National Interests in the Domain of Information Security as a Functional Task of the SBU." \i Information & Security: An International Journal\i0  31 (2014): 69-72.\par \par Ali, Hesham Arafat. "A New Technique for Enhancing the Properties of Transmitted Data." \i Information & Security: An International Journal\i0  26, no. 2 (2013): 58-78.\par \par Dimitrov, Michael. \i Why the Organization Needs Information Security Policy and Programme\i0  In \i IT4Sec Reports\i0 . Sofia: Institute of Information and Communication Technologies, 2013.\par \par Potij, Alexandr, Dmitrij Komin, and Inna Rebriy. "A Method of Evaluating Assurance Requirements." \i Information & Security: An International Journal\i0  28, no. 1 (2012): 108-120.\par \par Nickolov, Eugene. "Critical Information Infrastructure Protection." \i Information & Security: An International Journal\i0  17 (2005): 105-119.\par \par Arkhipov, Konstantin, and Vasiliy Ovodkov. "Information Security of Distance Learning." \i Information & Security: An International Journal\i0  14 (2004): 138-144.\par \par Tahir, Muhammad Nabeel. "A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment." \i Information & Security: An International Journal\i0  15 (2004): 211-215.\par \par Avramov, Stoyan. "Integrating COTS Technologies into a Scalable Mobile  Emergency Command Post." \i Information & Security: An International Journal\i0  10 (2003): 87-96.\par \par Ivanov, Tilcho. "Transparency of Defence Policy in Progress." \i Information & Security: An International Journal\i0  11 (2003): 55-72.\par \par Nickolov, Eugene. "Contemporary Trends in the Development of Information Security and Computer Virology." \i Information & Security: An International Journal \i0  4 (2000): 60-72.\par \par Tselkov, Veselin. "Cryptographic Software Solution for Information Protection in a Corporate Intranet." \i Information & Security: An International Journal\i0  4 (2000): 97-104.\par \par Nachev, Atanas. "Electromagnetic Radiation and the Computer Systems Data Security Problem." \i Information & Security: An International Journal\i0  4 (2000): 105-109.\par \par }