<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pavel Varbanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Perspectives in the Design of a Modern  Cybersecurity Training Programme: The ECHO Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competencies</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity skills</style></keyword><keyword><style  face="normal" font="default" size="100%">design</style></keyword><keyword><style  face="normal" font="default" size="100%">framework</style></keyword><keyword><style  face="normal" font="default" size="100%">training program</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">177-190</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper leverages the training and education-related research outputs developed under the ECHO project. They are compared to the progress of the workgroups in ENISA (European Union Agency for Cybersecurity) and ECSO (European Cybersecurity Organization) that classify, structure and define the competencies, skills, and knowledge and risk factors. The approach digested by the ECHO project explores the methods for achieving a more vital balance between the market demands and talent supply. The scope of the research activities covers four main and interconnected components – i) Contextualization; ii) Competences; iii) Generic Curriculum; iv) Assessment methodology. The proposed approach explores and gradually builds upon the generic definitions of the skills and knowledge toward specific requirements on what an ICT or cybersecurity professional must know and be able to do in order to implement initial and further cyber-incident response actions. The paper considers mainly the design methods for building cybersecurity training programs for professionals. Still, it could be applied in academic settings as well, enriching the academic programs with practical learning experiences. Several examples are provided to demonstrate the relevance and applicability of the proposed methods.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">177</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Philipp H. Fluri</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Stabilization Missions – Lessons to Be Learned from Resilience-Based Peacebuilding</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Afghanistan</style></keyword><keyword><style  face="normal" font="default" size="100%">framework</style></keyword><keyword><style  face="normal" font="default" size="100%">Guatemala</style></keyword><keyword><style  face="normal" font="default" size="100%">liberal peacebuilding</style></keyword><keyword><style  face="normal" font="default" size="100%">Liberia</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience for peace</style></keyword><keyword><style  face="normal" font="default" size="100%">SIGAR</style></keyword><keyword><style  face="normal" font="default" size="100%">stabilization</style></keyword><keyword><style  face="normal" font="default" size="100%">stabilization missions</style></keyword><keyword><style  face="normal" font="default" size="100%">Timor-Leste</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Fall 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">59-68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">International stabilization missions are often unsuccessful, as demonstrated by the fact that a large number of countries that have hosted such missions have also relapsed into conflict within 20 years. The author suggests looking to experiences of resilience-based peacebuilding for more successful examples. These remain largely unknown or ignored and still do not enjoy the attention they deserve, whether because the ‘wrong’ NGO crowd dominates peacebuilding programming, the ‘wrong’ departments and ministries are considered the main peacebuilding partners or the resilience-based projects simply are not costly enough to attract attention. A framework for resilience and examples from Guatemala, Liberia, Timor-Leste, and Afghanistan are discussed and lessons to be learned identified.</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">59</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Means of Comparing Military Budgeting Processes in South East Europe</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">accountability</style></keyword><keyword><style  face="normal" font="default" size="100%">Budget Transparency Initiative</style></keyword><keyword><style  face="normal" font="default" size="100%">defence</style></keyword><keyword><style  face="normal" font="default" size="100%">framework</style></keyword><keyword><style  face="normal" font="default" size="100%">Good governance</style></keyword><keyword><style  face="normal" font="default" size="100%">methodology</style></keyword><keyword><style  face="normal" font="default" size="100%">military budgeting</style></keyword><keyword><style  face="normal" font="default" size="100%">questionnaire</style></keyword><keyword><style  face="normal" font="default" size="100%">Stability Pact for South Eastern Europe</style></keyword><keyword><style  face="normal" font="default" size="100%">Transparency</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">95-135</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents a methodology for comparative assessment of military budgeting systems and practices. It is intended for implementation within the Budget Transparency Initiative (BTI) of the Stability Pact for South Eastern Europe (SEE). The methodology shall allow BTI participants and other beneficiaries to identify promising areas for dissemination of  good local practice among SEE countries, as well as areas where all SEE countries lack necessary expertise or experience and the region as a whole would need outside support to improve the military budgeting practices. In a hierarchy of criteria, the methodology covers military budgets, budgeting process, budget execution, and assessment of budget execution. Special attention is paid to the issues of transparency and assurance of integrity of military budgeting. The paper includes a description of an idealised military budgeting process to serve as a benchmark, a comprehensive questionnaire to compare existing systems and practices to the benchmark, sets of possible answers to the questions, and guidance on how to process respective answers to the questionnaire. 
Potentially, the proposed methodology may be useful in other studies aiming to improve democratic governance, transparency and accountability in the public sector, in particular in the defence and the security sector.</style></abstract></record></records></xml>