<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mitko Bogdanoski</style></author><author><style face="normal" font="default" size="100%">Metodi Hadji-Janev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Leadership Playbook for the Digital Age: Preparing the Western Balkan Leadership for the Digital Transformation</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The ongoing digital transformation caused by emerging technologies poses novel challenges but also opportunities. Western Balkan (WB) leaders are lagging behind the ongoing processes of this transformation. The article argues that WB leaders need to comprehend digital transformation and use this process to improve governance, boost the economy and address existing social challenges.&lt;/p&gt;&lt;p&gt;This paper is included in the program of the Second Scientific Conference &amp;quot;Digital Transformation, Cyber Security and Resilience &lt;a href=&quot;https://digilience.org/content/digilience-2020-program&quot;&gt;DIGILIENCE 2020&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Metodi Hadji-Janev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Protecting Critical Information Infrastructure from Terrorist Attacks in South East Europe: How Real is the Threat</style></title><secondary-title><style face="normal" font="default" size="100%">Comprehensive Approach as &quot;Sine Qua Non&quot; for Critical Infrastructure Protection</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">IOS Press</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Metodi Hadji-Janev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Toward Effective National Cyber Security Strategy: The Path That Macedonia Must Consider</style></title><secondary-title><style face="normal" font="default" size="100%">Cyber Security and Resiliency Policy Framework</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">IOS Press</style></publisher><pages><style face="normal" font="default" size="100%">57-64</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Metodi Hadji-Janev</style></author><author><style face="normal" font="default" size="100%">Stevan Aleksoski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Use of Force in Self-Defense Against Cyber-Attacks and the Shockwaves in the Legal Community: One more Reason for Holistic Legal Approach to Cyberspace</style></title><secondary-title><style face="normal" font="default" size="100%">Mediterranean Journal of Social Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">14</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Metodi Hadji-Janev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Threats to the Critical Infrastructure in South-East Europe posed by Al Qaeda and its Associated Movements: the case of Macedonia</style></title><secondary-title><style face="normal" font="default" size="100%">Counterterrorism challenges regarding the Critical Infrastructure protection</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><publisher><style face="normal" font="default" size="100%">Center for Civil - Military Relation</style></publisher><pub-location><style face="normal" font="default" size="100%">Monterey, USA, Ljubljana, Slovenia</style></pub-location><pages><style face="normal" font="default" size="100%">187-201</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>