<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">George Sharkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computationally intensive functions in designing and operating distributed cyber secure and resilient systems</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Computer Systems and Technologies, CompSysTech 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">agility</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">distributed systems</style></keyword><keyword><style  face="normal" font="default" size="100%">high-performance computing</style></keyword><keyword><style  face="normal" font="default" size="100%">operations</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">risk management</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%"> 21 June 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of RuseRuse</style></publisher><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><volume><style face="normal" font="default" size="100%">ACM International Conference Proceeding Series</style></volume><pages><style face="normal" font="default" size="100%"> 8-18</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Increasing incorporation of advanced information technologies makes business and public organisations more effective and efficient, while often introducing exploitable vulnerabilities. The efficient provision of security of interconnected, and interdependent, processes and sectors against cyberattacks requires deep understanding of vulnerabilities, exposure, potential negative impact, as well as the contribution existing and emerging organisational and technological solutions will potentially have on preventing attacks, reducing vulnerabilities, protecting digital infrastructures, response and recovery, and resilience. Such understanding will allow minimisation of risks against a spectrum of plausible cyber threats and reducing negative consequences of one or a series of cyberattacks.&lt;/p&gt;&lt;p&gt;Due to the complexity of the problem, the effective implementation of a number of functions and tasks in designing and operating distributed cyber secure and resilient systems require significant computational resources. This paper outlines six high-level, computationally demanding functions. The first three relate to the formulation and implementation of cybersecurity policy: understanding risk; planning and implementing cybersecurity measures; and continuous adaptation to the changing technological, threat and policy landscape. The other three functions are operational: situational awareness, including detection of cyberattacks and hybrid malicious activities; operational decision making, e.g. selecting a course of action under attack; and cyber forensics.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Dimitrina Polimirova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Main considerations in elaborating organizational information security policies</style></title><secondary-title><style face="normal" font="default" size="100%">20th International Conference on Computer Systems and Technologies, CompSysTech 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information security management</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">21 June 2019</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of RuseRuse</style></publisher><pub-location><style face="normal" font="default" size="100%">Bulgaria</style></pub-location><volume><style face="normal" font="default" size="100%">ACM International Conference Proceeding Series</style></volume><pages><style face="normal" font="default" size="100%">68-73</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;With the increasing reliance on information technologies, cloud services and internet as communications media, businesses, public and societal organizations face growing threats from cyberspace and, respectively, demands to protect sensitive data and information they collect, use, and disseminate. This paper elaborates on the key considerations organisations with more limited resources, such as schools, universities, research institutes and public organizations need to take into account in designing and implementing a respective information security policy. We start with a description of context and definition of the scope of information security policy, in particular delineating &amp;#39;information&amp;#39; and &amp;#39;cyber&amp;#39; security, and provide an overview of the most prominent frameworks and standards. On that basis we elaborate and structure the main areas of an information security policy, the main implementation challenges, and the need to review and amend the policy in a continuous cycle and comprehensive risk management framework. Depending of the specifics of their work, any school, university, institute and municipality may use this elaboration as a starting point in devising its own information security policy.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yantsislav Yanakiev</style></author><author><style face="normal" font="default" size="100%">Dimitrina Polimirova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">culture</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">expert assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;While technological solutions are being developed to enhance cyber security, there is increasing awareness that besides a technical approach the role of human performance, decision making and organizational culture are critical to increase the effectiveness of responses to evolving cyber threats. Hence, the focus of this paper is on the role of the human factors in cyber security. It presents an analysis of data from a Subject Matter Experts&amp;rsquo; study carried out in Bulgaria in the end of 2018 in the framework of the project &amp;ldquo;Cyber security and opportunities for application of innovative technologies in the state administration of the Republic of Bulgaria.&amp;rdquo; The data was collected via online survey from 92 experts from the state administration, academia and business organizations.&lt;/p&gt;&lt;p&gt;&amp;nbsp; The paper covers the following topics: 1) The most important issues in cyber security in Bulgaria and the role of the human factors among them; 2) Recruitment, Retention, Education &amp;amp; Training of IT personnel; 3) The human factors as a source of security breaches; and 4) Future research in the area of human factors in cyber security. Based on the analysis of the data, conclusions and recommendations are summarized regarding the ways to change the role of the human factor from the system&amp;rsquo;s &amp;ldquo;weakest link&amp;rdquo; to a powerful resource to detect and mitigate cyber threats.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Houssam Zenati</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Persistent Need to Reform Cyber Security Services: A Case Study on France</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">collaborations</style></keyword><keyword><style  face="normal" font="default" size="100%">communication</style></keyword><keyword><style  face="normal" font="default" size="100%">legislations</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">research</style></keyword><keyword><style  face="normal" font="default" size="100%">technology</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">37</style></volume><pages><style face="normal" font="default" size="100%">57-67</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">On February 21, 2014, following the terrorist attacks in France, the French prime minister declared that cyber security is a matter of major interest, and national interest of concern to all citizens, and it is important that the government is fully engaged. In the wake of the new challenges raised by terrorism in recent years and the cyber-attacks in Europe, the French Government presented in 2015 a national cybersecurity strategy emphasizing training and international cooperation. France's enhanced participation in the multilateral negotiations on cybersecurity within the UN and the OSCE is an indicator of the necessity of reforming and adapting cyber security services. However, the new French President has emphasized the need to reform further the cyber security services and the urge to master ever-evolving technologies in terms of data collection and cryptology. This article discusses the need to continue the reform of the French intelligence services, and to enhance the cooperation and the speed of innovation in the field cyber security - a general challenge for Western Europe.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Leendert van Bochoven</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Industry and Policy: Partnerships in Disruptive Times</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">co-creation</style></keyword><keyword><style  face="normal" font="default" size="100%">cognitive</style></keyword><keyword><style  face="normal" font="default" size="100%">ecosystem</style></keyword><keyword><style  face="normal" font="default" size="100%">industry</style></keyword><keyword><style  face="normal" font="default" size="100%">innovation</style></keyword><keyword><style  face="normal" font="default" size="100%">partnerships</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">public-private collaboration</style></keyword><keyword><style  face="normal" font="default" size="100%">technology</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">19-29</style></pages><abstract><style face="normal" font="default" size="100%">The rate of (technological) change in today´s dynamic environment calls for new policies and collaboration models between governments and industry. Two key elements will underpin successful policies for dealing with innovation and the impact of technology: an innovation ecosystem and an innovation platform. Just like companies are involving customers in private sector innovation, governments are seeking to involve citizens. There is a growing trend to engage citizens more and more in the co-creation of public services. The citizen co-creation approach also has merits for the defense and security industry, and there are several successful examples showcasing new ways of collaboration, overcoming the traditional obstacles. Three key recommendations will enable governments to overcome innovation challenges. These recommendations depend on two essential enablers to deal with disruptive innovation in government organizations: an innovation ecosystem and an innovation platform. Without both, innovation is for sure going to fail. Given the rate of unprecedented technological change, governments, militaries and businesses have to find creative ways to work and innovate together.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jasmin Čajić</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Relevance of Clausewitz’s Theory of War to Contemporary Conflict Resolution</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Clausewitz</style></keyword><keyword><style  face="normal" font="default" size="100%">conflict resolution</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">war</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">72-78</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article argues that Clausewitz’s writing on war nearly 200 years ago is still relevant for contemporary conflict resolution from at least three aspects: his idea that war is “the continuation of policy by other means”; secondly his analysis of the nature of war and the trinity theory; and finally his understanding of the nature of the strategy. The analysis in this article found that, if there is good policy from which to derive a strategy, and if we are able to apply it efficiently, with support of the people and international community, we have created solid preconditions to win the war. In addition, Clausewitz’s view of the issues associated with war, strategy and conflict resolution is important for understanding the major issues and decision making even while history and reality constrain his abstractions with today’s experience. His theories and concepts are as relevant today as they were two hundred years ago. Therefore, the twenty-first century strategists and leaders are recommended to take into consideration Clausewitz’s theories on war and strategy because they are still applicable today. In short, Clausewitz is a theorist for the twenty-first century.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vesna Poposka</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Urge for Comprehensive Cyber Security Strategies in the Western Balkan</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">law</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">Western Balkans</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">25-36</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The following policy brief aims to allocate the grassroots of cyber security awareness for Western Balkan states through analysis of the legal and policy frameworks in each of the states in the region. The topic is considered as one of the utmost priorities for the region due to (geo-) political, economic and security reasons. The legal and policy frameworks came out to be unclear, and a screening process had to be conducted for this analysis, due to the fact that comprehensive information is lacking, or at least are not publicly available. The first lesson to come out from this cluttered situation points to the need to prepare national cyber security strategies and organise the regional cooperation in that process.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yoana Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Policies for the Protection of Critical Infrastructure from Cyber Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyberattack</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">modeling</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">simulations</style></keyword><keyword><style  face="normal" font="default" size="100%">threat</style></keyword><keyword><style  face="normal" font="default" size="100%">US</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2014</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">116</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper is addressed in details the policy of the US regarding the issues of cyber security that are contained in Presidential Policy Directive (PPD-21). The tasks that should be solved for evaluation and planning of critical infrastructure protection are clearly defined. The following are specific examples of approaches and means to protect critical infrastructure from cyber attacks.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tibor Kozma</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Understanding Gender Mainstreaming in Modern Law Enforcement</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">action plan</style></keyword><keyword><style  face="normal" font="default" size="100%">code of conduct</style></keyword><keyword><style  face="normal" font="default" size="100%">gender inequality</style></keyword><keyword><style  face="normal" font="default" size="100%">gender-sensitive approach</style></keyword><keyword><style  face="normal" font="default" size="100%">indicator</style></keyword><keyword><style  face="normal" font="default" size="100%">mainstreaming</style></keyword><keyword><style  face="normal" font="default" size="100%">police reform</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">UNSC Resolution 1325</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2012</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">87-94</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>