<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Nickolay Pavlov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Planning Measures and Capabilities for Protection of Critical Infrastructures</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capabilities-based planning</style></keyword><keyword><style  face="normal" font="default" size="100%">CIP</style></keyword><keyword><style  face="normal" font="default" size="100%">Comprehensive Approach.</style></keyword><keyword><style  face="normal" font="default" size="100%">Counterterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure Protection</style></keyword><keyword><style  face="normal" font="default" size="100%">Security Sector Transformation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2007</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">38-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents a framework methodology and process for planning and developing capabilities and measures for protection of critical infrastructure and presents major methodological and organizational challenges of effective and efficient protection. The authors emphasize the need for comprehensive approach, based on much better communication and greater coordination among governmental organizations, security services, owners and operators of critical infrastructure.</style></abstract></record></records></xml>