<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">From Post-industrial towards Neo-industrial Economy (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">economic crisis</style></keyword><keyword><style  face="normal" font="default" size="100%">globalization</style></keyword><keyword><style  face="normal" font="default" size="100%">neo-industrial economy</style></keyword><keyword><style  face="normal" font="default" size="100%">post-industrial economy</style></keyword><keyword><style  face="normal" font="default" size="100%">regionalization</style></keyword><keyword><style  face="normal" font="default" size="100%">reindustrialization</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">112</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">After the first global crisis of capitalism, the world faces the challenge of finding and implementing a new successful model of sustainable development. For the US, EU, Russia and other countries, this is a high (knowledge-based) reindustrialization and modernization of the economy, with the key role in its implementation being played by the state. In line with this trend, on the world stage, processes and policies of globalization are shifting from regionalization to globalization.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">От постиндустриална към неоиндустриална икономика</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">112</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">След първата глобална криза на капитализма светът е изправен пред предизвикателството да намери и реализира нов успешен модел на устойчиво развитие. За САЩ, ЕС, Русия и други страни това е високотехнологична (основана на знанието) реиндустриализация и модернизация на икономиката с решаваща роля на държавата за неговото реализиране. В унисон с тази тенденция, на световната сцена процесите и политиката на глобализиране се изместват от регионализиране на глобализацията. 
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity: A National Strategic Issue</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">108</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The modern information and communication age brought a complex of interdependencies among infrastructures that are essential for society and led to an exponential growth of vulnerabilities and risks. Hence, security of cyberspace turned into one of the most important challenges of Twenty first century, while cybersecurity is already seen as a cross-cutting, strategic national issue that impacts all societal levels. National cybersecurity strategies are expected to provide answers to the novel challenges and to guarantee security of cyberspace. This report provides analysis available national cyber strategies that allows identification of good practices and remaining gaps. For Member States of the European Union it is important to synchronize their national strategies with the EU strategy for cybersecurity.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Energy Security: A Paradigm Shift</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Fall 2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">75-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">75</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">New Trends in the Policies for Security of Critical Energy Infrastructures</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">critical energy infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">critical energy infrastructure protection</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">energy security</style></keyword><keyword><style  face="normal" font="default" size="100%">EU</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">public private partnership</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">January 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">106</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The current understanding for effective security policy of the critical energy infrastructure focuses on the ability to systematically assess vulnerabilities, predict threats and neutralize the risks of cyber attacks on the interdependent elements of the complex, intelligent energy infrastructures. There are three major new developments in the security policy concerning the functioning of the critical energy infrastructure – cyber security, public-private partnership and international cooperation in the development and implementation of the policy for security of critical energy infrastructures. Various countries and international organizations offer their own policy models, while their efficiency is yet to be proven.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Нови тенденции в политиката за сигурност на критичната енергийна инфраструктура</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">януари 2013 г.</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">106</style></number><publisher><style face="normal" font="default" size="100%">Институт по информационни и комуникационни технологии</style></publisher><pub-location><style face="normal" font="default" size="100%">София</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Съвременното разбиране за ефективна политика за сигурност на критичната енергийна инфраструктура поставя акцента върху способността да се систематизират уязвимостите, да се предвиждат заплахите и да се неутрализират рисковете от кибератаки върху елементи на сложно взаимообвързаните, интелигентни енергийни инфраструктури. Три са основните нови тенденции в политиката за сигурност на функционирането на критичната енергийна инфраструктура – киберсигурност, публично-частно партньорство и международно сътрудничество във формирането и реализирането на политиката за сигурност на критичната енергийна инфраструктура. Различни страни и международни организации предлагат свои модели на тези политики, чиято ефективност предстои да бъде доказвана.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Энергетическая безопасность: изменение парадигмы</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Осень 2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">87-112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">87</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security in a Communications Society: Opportunities and Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Arab Spring</style></keyword><keyword><style  face="normal" font="default" size="100%">civil society; policy</style></keyword><keyword><style  face="normal" font="default" size="100%">Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">democracy</style></keyword><keyword><style  face="normal" font="default" size="100%">Egypt</style></keyword><keyword><style  face="normal" font="default" size="100%">public diplomacy</style></keyword><keyword><style  face="normal" font="default" size="100%">revolution</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 2.0</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2012</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">53-66</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Shaping Energy Security Policy in Uncertainty</style></title><secondary-title><style face="normal" font="default" size="100%">International conference &quot;Energy Security - National, Regional and Euroatlantic Frameworks&quot;</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">21 June 2012</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Безопасность в коммуникационном обществе: возможности и вызовы</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Весна 2012</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">63-79</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">63</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Energy Security and Geopolitics</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Winter 2007</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">27-46</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Civil-Military Relations and the Construction of Consolidated Democracy: The Case of Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">89-99</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>