<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">How People’s Behaviour Was Motivated during the Covid-19 Emergency Situation</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">attribution theory</style></keyword><keyword><style  face="normal" font="default" size="100%">balance of consequences</style></keyword><keyword><style  face="normal" font="default" size="100%">behavioural patterns</style></keyword><keyword><style  face="normal" font="default" size="100%">corona virus</style></keyword><keyword><style  face="normal" font="default" size="100%">Covid-19 pandemic</style></keyword><keyword><style  face="normal" font="default" size="100%">crisis</style></keyword><keyword><style  face="normal" font="default" size="100%">organisational culture</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><number><style face="normal" font="default" size="100%">39</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;People&amp;rsquo;s behaviour during emergency is a key factor for overcoming the crisis in the shortest possible time with the least consequences. A variety of tools, each with its specificity and a way of implementation, are used to model people&amp;rsquo;s behaviour. This article elaborates on the extent to which various motivators of human behaviour were successfully applied during the crisis caused by the spread of the corona virus.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Levels of Cybersecurity Training and Education</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">attribution theory</style></keyword><keyword><style  face="normal" font="default" size="100%">awareness based training</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational culture</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">risk appetite</style></keyword><keyword><style  face="normal" font="default" size="100%">„balance of consequences“</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">117</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The ambition of individuals and their organizations to achieve a desired level of cybersecurity may be subject to the application of different strategies. Known approaches to achieving cybersecurity involve the establishment of effective legal systems, innovative technical solutions, rational organizational structures, etc. The focus in discussions of cybersecurity remains on people and their training, which can lower the vulnerability to cyber attacks. Counting on such a strategy to build cybersecurity, it is important to properly understand that cybersecurity training can be constructed at several levels. Each of these levels has specific characteristics, such as the approach and methods used for training, and as a consequence is associated with different results in terms of the cybersecurity achieved.</style></abstract></record></records></xml>