<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iztok Prezelj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Comprehensive Security and Some Implemental Limits</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Asymmetric Threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Comprehensive security</style></keyword><keyword><style  face="normal" font="default" size="100%">Counter-terrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cross-sectoral approach</style></keyword><keyword><style  face="normal" font="default" size="100%">inter-organisational cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">multidimensional security</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk Assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">threat assessment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">13-34</style></pages><abstract><style face="normal" font="default" size="100%">The changing security environment has led to the development of com¬prehensive security approaches, strategies and policies. The ‘Holistic approach’ has become an academic and practical mantra. This paper argues, however, that comprehensive security approaches face serious obstacles to their practical implementation. The critical evaluation of several examples confirms that the implementation phase is a weakness of comprehensive approaches and that a truly comprehensive and holistic approach seems to be beyond the implemental capacities of our security systems. Multi-sectoral and multi-level comprehensive approaches become less comprehensive when implemented in practice or even cannot be implemented due to existing narrow perceptions of security or narrow and short-term interests. The trans-sectoral second-, third- and fourth-order effects of proposed security measures are hardly considered or not considered at all. There is no consensus on what exactly comprehensive means, while prioritisation of some areas in the national security policy leads to de-prioritisation of other areas and new vulnerabilities, inter-organisational and cross-sectoral cooperation faces serious limits, threat, risk and vulnerability assessments are not really comprehensive, etc. This paper finishes with recommendations on what to do about these serious limits on the implementation of comprehensive security.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>