<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author><author><style face="normal" font="default" size="100%">Nina Otorepec Vogrinčič</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Criminal and networked state capture in the Western Balkans: the case of the Zemun clan</style></title><secondary-title><style face="normal" font="default" size="100%">Southeast European and Black Sea Studies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">547-570 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author><author><style face="normal" font="default" size="100%">Joe Airey</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Interagency Cooperation in Counter-Terrorism</style></title><secondary-title><style face="normal" font="default" size="100%">Combating Transnational Terrorism</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">Procon</style></publisher><pub-location><style face="normal" font="default" size="100%">s</style></pub-location><pages><style face="normal" font="default" size="100%">235-252</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The need for more effective interagency cooperation in counter-terrorism (CT) was highlighted in the aftermath of 9/11, when it became clear that the reluctance to coordinate and share information between security agencies could no longer be tolerated if terrorist attacks were to be prevented in the future. The 9/11 Commission made it clear that the threat of modern global terrorism required a “quick, imaginative, and agile response,” and that it would be necessary to coordinate a wide array of resources in order to achieve an effective “unity of effort.”  It has been argued that, without such cooperation, “institutional gaps, duplication of effort, and overlapping responsibilities are inevitable,” and that such weaknesses can be “exploited by terrorists.” 
After 2001, many governments worldwide have undertaken comprehensive reforms of their national security systems. In particular, they have taken steps to improve and expand horizontal interagency cooperation in the fight against terrorism. New CT strategies have thus tried to incorporate the lessons from 9/11 and have created a variety of new structures aimed at achieving this, such as intelligence fusion cells, national CT centers, governmental working groups, joint task forces, etc. It is widely believed that these actions have contributed to improvements in the efficiency of national and international CT efforts. Indeed, it is self-evident that to effectively detect, deter, and defeat contemporary terrorism a coordinated approach by all national security agencies is required. It is also clear that no single agency can deal with this problem alone because terrorism cuts across multiple jurisdictions. Uncoordinated actions by one agency can produce only limited results in the fight against such a complex threat. In recognition of this, government organizations engage in a variety of different forms of interagency cooperation to include: sharing information, the exchange of staff (liaison officers), participation in joint threat assessments, cooperative or mutually reinforcing planning, and participation in joint training, exercises and operations.
However, research shows that interagency cooperation in CT is a much more complex endeavor than some might think. In practice, many problems have emerged, including bureaucratic competition among agencies, a failure to share intelligence, and the duplication of effort.  In one study, a SWOT   assessment was used to analyze interagency cooperation using a sample of one hundred European CT experts. The findings revealed that, although much had been achieved in relation to the exchange of information and the creation of trust among agencies, further improvement was needed. Agencies seemed to be aware of the importance of trust, and yet still found it difficult to put their faith in one another. Although there had been a shift from the “need to know” to the “need to share,” mutual wariness between partners still limited the exchange of information.  According to Strom and Eyerman, interagency cooperation in CT is a challenge at all levels.  Effective interagency cooperation requires breaking down what are often formidable barriers based on law, institutional culture, organizational structure, jurisdictional responsibilities, and trust, to name but a few factors. An example of the impact of a failure to communicate and coordinate across agencies is illustrated by the Anders Breivik case in Norway in 2011.
Based on the authors’ combined academic and practical experience, this chapter identifies several capacities that need to be coordinated as part of a comprehensive approach to CT and describes two examples of good practice – Joint Terrorism Task Forces (JTTFs) and intelligence fusion centers. The chapter concludes with some general recommendations for practitioners on how to improve interagency cooperation in the field of CT in their countries.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author><author><style face="normal" font="default" size="100%">Erik Kopač</style></author><author><style face="normal" font="default" size="100%">Aleš Žiberna</style></author><author><style face="normal" font="default" size="100%">Anja Kolak</style></author><author><style face="normal" font="default" size="100%">Anton Grizold</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Quantitative monitoring of military transformation in the period 1992–2010: Do the protagonists of transformation really change more than other countries?</style></title><secondary-title><style face="normal" font="default" size="100%"> Defence Studies Volume</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">20-46</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Comprehensive Security and Some Implemental Limits</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Asymmetric Threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Comprehensive security</style></keyword><keyword><style  face="normal" font="default" size="100%">Counter-terrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cross-sectoral approach</style></keyword><keyword><style  face="normal" font="default" size="100%">inter-organisational cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">multidimensional security</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk Assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">threat assessment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">13-34</style></pages><abstract><style face="normal" font="default" size="100%">The changing security environment has led to the development of com¬prehensive security approaches, strategies and policies. The ‘Holistic approach’ has become an academic and practical mantra. This paper argues, however, that comprehensive security approaches face serious obstacles to their practical implementation. The critical evaluation of several examples confirms that the implementation phase is a weakness of comprehensive approaches and that a truly comprehensive and holistic approach seems to be beyond the implemental capacities of our security systems. Multi-sectoral and multi-level comprehensive approaches become less comprehensive when implemented in practice or even cannot be implemented due to existing narrow perceptions of security or narrow and short-term interests. The trans-sectoral second-, third- and fourth-order effects of proposed security measures are hardly considered or not considered at all. There is no consensus on what exactly comprehensive means, while prioritisation of some areas in the national security policy leads to de-prioritisation of other areas and new vulnerabilities, inter-organisational and cross-sectoral cooperation faces serious limits, threat, risk and vulnerability assessments are not really comprehensive, etc. This paper finishes with recommendations on what to do about these serious limits on the implementation of comprehensive security.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author><author><style face="normal" font="default" size="100%">Erik Kopač</style></author><author><style face="normal" font="default" size="100%">Aleš Žiberna</style></author><author><style face="normal" font="default" size="100%">Anja Kolak</style></author><author><style face="normal" font="default" size="100%">Anton Grizold</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolutionary Reality of the Policy of Revolution in Military Affairs: Results of a Comparative Study</style></title><secondary-title><style face="normal" font="default" size="100%">unpublished paper, Research Project Transforming Defence Policies in Contemporary Security Environment</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><publisher><style face="normal" font="default" size="100%">University of Ljubljana</style></publisher><pub-location><style face="normal" font="default" size="100%">Ljubljana</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Improving Interorganisational Cooperation in Counterterrorism Based on a Quantitative SWOT Assessment</style></title><secondary-title><style face="normal" font="default" size="100%">Public Management Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">209-35</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1-2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Improving Inter-organizational Cooperation in Counterterrorism Based on a Quantitative SWOT Assessment</style></title><secondary-title><style face="normal" font="default" size="100%">Public Management Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">209–35</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1-2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author><author><style face="normal" font="default" size="100%">Erik Kopač</style></author><author><style face="normal" font="default" size="100%">Janja Vuga</style></author><author><style face="normal" font="default" size="100%">Aleš Žiberna</style></author><author><style face="normal" font="default" size="100%">Anja Kolak</style></author><author><style face="normal" font="default" size="100%">Anton Grizold</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Military Transformation as Perceived by Experts</style></title><secondary-title><style face="normal" font="default" size="100%">The Journal of Slavic Military Studies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">28</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author><author><style face="normal" font="default" size="100%">Daniel Harangozo</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Effectiveness of the Vienna Document CSBM Regime: Assessment of Experts’ Perceptions</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">University of Ljubljana, Faculty of Social Sciences, Defence Research Centre</style></publisher><pub-location><style face="normal" font="default" size="100%">Ljubljana</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Inter-Organizational Cooperation and Coordination in the Fight against Terrorism: From Undisputable Necessity to Paradoxical Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">Comparative Strategy</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">329</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author><author><style face="normal" font="default" size="100%">Erik Kopač</style></author><author><style face="normal" font="default" size="100%">Uroš Svete</style></author><author><style face="normal" font="default" size="100%">Aleš Žiberna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cross-sectoral Scanning of Critical Infrastructures: From Functional Differences to Policy-relevant Similarities</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Homeland Security and Emergency Management</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">9</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges in Conceptualizing and Providing Human Security</style></title><secondary-title><style face="normal" font="default" size="100%">HUMSEC Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.humsec.eu/cms/fileadmin/user_upload/humsec/Journal/Prezelj.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">1</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Fight Against Terrorism and Crisis Management in the Western Batkans</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">IOS Press</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Role of the European Union in the Fight against International Terrorism</style></title><secondary-title><style face="normal" font="default" size="100%">The Fight Against Terrorism and Crisis Management in the Western Balkans</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">IOS Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Amsterdam</style></pub-location><pages><style face="normal" font="default" size="100%">16-34</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Matematično-statistični integralni model za ocenjevanje ogroženosti nacionalne varnosti in računalniški program INTEGRO</style></title><secondary-title><style face="normal" font="default" size="100%">Model celovitega ocenjevanja ogrožanja nacionalne varnosti Republike Slovenije</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Ministrstvo za obrambo</style></publisher><pub-location><style face="normal" font="default" size="100%">Ljubljana</style></pub-location><pages><style face="normal" font="default" size="100%">209-28</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author><author><style face="normal" font="default" size="100%">Marija Gaber</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Smuggling as a Threat to National and International Security: Slovenia and the Balkan Route</style></title><secondary-title><style face="normal" font="default" size="100%">Athena Papers</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Balkans</style></keyword><keyword><style  face="normal" font="default" size="100%">drug trafficking</style></keyword><keyword><style  face="normal" font="default" size="100%">illegal migration</style></keyword><keyword><style  face="normal" font="default" size="100%">security threats</style></keyword><keyword><style  face="normal" font="default" size="100%">smuggling</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">Partnership for Peace Consortium of Defense Academies and Security Studies Institutes</style></publisher><pub-location><style face="normal" font="default" size="100%">Garmisch-Partenkirchen</style></pub-location><volume><style face="normal" font="default" size="100%">5</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The general aim of this book is to analyze the threat of smuggling in general and in the particular context of the Republic of Slovenia, as well as the countermeasures that Slovenia is taking. Its primary focus is on the three most prevalent and dangerous types of smuggling: the smuggling of people, drugs, and weapons. Specifically, it provides analysis of the international and Slovenian understanding of the term smuggling; the Balkan smuggling route; national statistics on smuggling people, drugs and weapons to or through Slovenia; the organization of groups responsible for smuggling people, drugs, and weapons to or through Slovenia (the organization of smugglers, division of labor, methods of concealment, ways of crossing the border, means of communication, indices and indicators of smuggling, frequency of smuggling for particular groups, prices and methods of payment, motivation and profile of smugglers, etc.); and the Slovenian response to the threat of smuggling, with a focus on key police and customs measures.
</style></abstract></record></records></xml>