<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Peter Dobias</style></author><author><style face="normal" font="default" size="100%">Kyle Christensen</style></author><author><style face="normal" font="default" size="100%">William Freid</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Gaming Intermediate Force Capabilities: Strategic Implications of Tactical Decisions</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">grey zone</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">kriegsspiel</style></keyword><keyword><style  face="normal" font="default" size="100%">matrix</style></keyword><keyword><style  face="normal" font="default" size="100%">non-kinetic</style></keyword><keyword><style  face="normal" font="default" size="100%">non-lethal</style></keyword><keyword><style  face="normal" font="default" size="100%">Wargaming</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">97-109</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article reviews the development and tests of two Intermediate Force Capability (IFC) concept development hybrid wargames. The first wargame plays out a maritime Task Force’s ability to counter hybrid threats in the grey zone. The second wargame examines the ability of a NATO Task Group, deployed to a third country to train local security forces, to counter a hostile militia trained and supported by a neighboring country. IFCs offer a class of response between doing nothing and using lethal force in a situation that would be politically unpalatable. As such, the aim of the wargame series is to evaluate whether IFCs can make a difference to mission success against hybrid threats in the grey zone. This wargame series was particularly important because it used traditional game mechanics in a unique and innovative way to evaluate and assess IFC’s effects on strategic mission success. Specifically, the hybrid wargame series has demonstrated that IFCs have a high probability of filling the gap between doing nothing and using lethal force. IFCs have the potential to improve operational effectiveness by allowing for more restrained use of force to escalate/de-escalate a situation and increasing decision time and space for tactical decision-makers. Both counter-personnel and counter-materiel capabilities (including miniaturization) are needed to act effectively in the current hybrid threat environment.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">97</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Veselin Monev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Enterprise IT security metrics: Classification, examples and characteristics (in Bulgarian)</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">characteristics</style></keyword><keyword><style  face="normal" font="default" size="100%">classification</style></keyword><keyword><style  face="normal" font="default" size="100%">company</style></keyword><keyword><style  face="normal" font="default" size="100%">expected annual lose</style></keyword><keyword><style  face="normal" font="default" size="100%">incident</style></keyword><keyword><style  face="normal" font="default" size="100%">IT security</style></keyword><keyword><style  face="normal" font="default" size="100%">management</style></keyword><keyword><style  face="normal" font="default" size="100%">matrix</style></keyword><keyword><style  face="normal" font="default" size="100%">measure</style></keyword><keyword><style  face="normal" font="default" size="100%">Metric</style></keyword><keyword><style  face="normal" font="default" size="100%">metrics</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">111</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The report addresses the key issues associated with measuring IT security for private companies. Several classifications of metrics are discussed focusing on the functions of different levels of security management. For the most part, this work examines the pros and cons of common metrics for measuring IT security and provides guidelines for creating own metrics. ‘Own metrics,’ adapted to the corporate environment, are those which security managers have to create and use for the purpose of effective management.</style></abstract></record></records></xml>