<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gergana Antonova</style></author><author><style face="normal" font="default" size="100%">Niya Prisadashka</style></author><author><style face="normal" font="default" size="100%">Radoslav Dimitrov</style></author><author><style face="normal" font="default" size="100%">Ioan Yonkov</style></author><author><style face="normal" font="default" size="100%">Daniel Radev</style></author><author><style face="normal" font="default" size="100%">Hristo Pavlov</style></author><author><style face="normal" font="default" size="100%">Mario Mladenov</style></author><author><style face="normal" font="default" size="100%">Ilian Grigorov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybercrime Strategy (modeling example)</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">PESTLE - analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">SWOT - analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">149</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The widespread penetration of technology and networks into people’s professional and personal lives brings cyber security challenges to the front line of our society. Cyberattacks and cybercrimes аre accompanying the daily lives of modern Internet users, and the damages caused by them are significant enough to be considered as a major component of modern cybersecurity. The diversity of criminal acts, perpetrators, and consequences requires a countering cybercrimes solution that has to be planned and implemented based on a strategic approach. Part of the countries are specifying their cyber security strategies with separate strategies for countering cybercrimes, and this turns out to be the right approach. The study defends the idea of the need and usefulness of developing and implementing a cybercrime strategy. Based on international good practices, authors’ ideas and research, a model for such a strategy, tailored to the Bulgarian environment is proposed. The aim is to provoke a discussion in the direction of assessing the need to create a national cybercrime strategy.</style></abstract></record></records></xml>