<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michel Rademaker</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing Cyber Security 2015</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber attacks</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">strategies</style></keyword><keyword><style  face="normal" font="default" size="100%">trends</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">93-104</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article is based on the HCSS Report Assessing Cyber Security. Following the introduction, it identifies fragmentation of reporting and presents threat assessment. Then it highlights the trends in cyber security, followed by a discussion on the importance of developing national cyber strategies. Last but not least, the authors provide general recommendations. The article is based on a review of 70 studies published by public authorities, companies, and research organizations from 15 countries over the last few years, and calls for international efforts to develop shared, commonly agreed definitions, metrics, and reporting standards to enhance threat assessments; to systematically anticipate trends and attempt to foresee potential new threats; to develop evidence-based cyber security policies that rely more on data and indicators, rather than subjective perceptions; and to consider setting up a mechanism to harmonize the collection and reporting of cyber statistics.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">93</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Erik Frinking</style></author><author><style face="normal" font="default" size="100%">Michel Rademaker</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing Cyber Security</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://hcss.nl/report/assessing-cyber-security</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Hague Centre for Strategic Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">The Hague, Netherlands</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maarten Gehem</style></author><author><style face="normal" font="default" size="100%">Artur Ursanov</style></author><author><style face="normal" font="default" size="100%">Erik Frinking</style></author><author><style face="normal" font="default" size="100%">Michel Rademaker</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing Cyber Security: A meta-analysis of threats, trends and responses to cyber attacks</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.jstor.org/stable/resrep12567</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Hague Centre for Strategic Studies</style></publisher><pub-location><style face="normal" font="default" size="100%">The Hague, Netherlands</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michel Rademaker</style></author><author><style face="normal" font="default" size="100%">Marc Gauw</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Trusted Networks Initiative: The Netherlands’ Response to DDoS Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cluster</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">DDoS attacks</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet exchanges</style></keyword><keyword><style  face="normal" font="default" size="100%">trusted routing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">65-70</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Cybercrime is on the rise and distributed denial of services attacks are among the most used by hacktivists, criminals, and even states. This article focuses on a Dutch solution to that problem, namely the Trusted Networks Initiative. The initiative aims at a global trust concept that provides website operators with a last resort option in case a large or long-lasting DDoS attack cannot be mitigated by other anti-DDoS means. The paper describes the foundational principles of the ini&amp;shy;tiative, and more specifically the intended solution via the trusted routing concept.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michel Rademaker</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Governance on Intelligence: Issues that Play a Role</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">democratic oversight</style></keyword><keyword><style  face="normal" font="default" size="100%">human rights</style></keyword><keyword><style  face="normal" font="default" size="100%">Intelligence assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">mandate</style></keyword><keyword><style  face="normal" font="default" size="100%">NSA files</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">29-33</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The intelligence landscape evolves with the spread of electronic communications and networks, surveillance technologies, abundance of open source data, and private actors undertaking intelligence activities. The activities of intelligence agencies and other actors needs to be mandated by law, with the necessary restrictions on the use of the data collected and conditions regarding governance and oversight by internal and external bodies, in compliance with human rights norms.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">29</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michel Rademaker</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">National Security Strategy of the Netherlands: An Innovative Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">National security</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk Assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">security strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">strategic plan­ning.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">51-61</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The defence and security community is faced with deep uncertainty. Strategic planning can no longer be performed in the traditional way. External and internal security are closely interlinked and this means that security planning should be organised in a more interlinked manner too. This article describes how a national security strategy is being developed in the Netherlands in a strongly interagency-oriented way. Not threat driven but values and capabilities oriented. This is a very innovative and challenging process that is underway at the moment. Attention in this article is paid to the process and methodology to realise the strategy.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michel Rademaker</style></author></authors><subsidiary-authors><author><style face="normal" font="default" size="100%">I&amp;S Monitor</style></author></subsidiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Operations Analysis in the Netherlands: A Brief Overview</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">269-271</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>