<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bohdan M. Holovkin</style></author><author><style face="normal" font="default" size="100%">Oleksii V. Tavolzhanskyi</style></author><author><style face="normal" font="default" size="100%">Oleksandr V. Lysodyed</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Corruption as a Cybersecurity Threat in the New World Order</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">Covid-19 pandemic</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity threats</style></keyword><keyword><style  face="normal" font="default" size="100%">fight against corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">post-pandemic conditions</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">75-87</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The important topic of cybersecurity relative to the fight against corruption in the context of global challenges in the pandemic and post-pandemic world requires further research. The purpose of this article is to identify and analyze current and prospective cybersecurity issues in this context by applying general-scientific and special-legal methods of cognition. Using the dialectical method, theoretical background, and contemporary views on ensuring cybersecurity served to investigate the key current challenges. Formal-legal and comparative methods allowed to recommend measures to enhance cybersecurity in view of the massive digitalization and social transformations. The authors emphasize the need to establish a national cybersecurity policy based on society’s information literacy and culture, combining respect to traditional and historical values with a modern understanding of multicultural communication and well-being.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">75</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nadja Milanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Institutional Resilience and Building Integrity in the Defence and Security Sector</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">accountability</style></keyword><keyword><style  face="normal" font="default" size="100%">BI</style></keyword><keyword><style  face="normal" font="default" size="100%">Building Integrity</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">defense and security sector</style></keyword><keyword><style  face="normal" font="default" size="100%">Good governance</style></keyword><keyword><style  face="normal" font="default" size="100%">institutional resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">Transparency</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">67-75</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The concept of resilience in defense and security is evolving towards the inclusion of a wide-ranging and multi-dimensional set of vulnerabilities and associated mitigation strategies across the spectrum of military and non-military mechanisms of response. This article argues that while corruption and poor governance are now recognized as a security threat, as articulated in the NATO Warsaw Summit Declaration, the strengthening of defense and related security institutions in both Allied and partner countries remains to be further embedded as an integral part of the concept of resilience. Institutional resilience based on integrity, transparency and accountability is critical for ensuring the fulfilment of NATO’s resilience commitment and its baseline requirements, which include inter alia continuity of government with the ability to make decisions and provide services to the population. Corruption and poor governance undermine public trust and perpetuate instability and fragility. NATO’s Building Integrity policy contributes to the fulfilment of the Alliance’s three core tasks – collective defense, crisis management and cooperative security. NATO’s work on Projecting Stability vis-à-vis partners has recognized the role of good governance as a component of improving partners’ resilience. This needs to be further institutionalized through consistent efforts at strengthening defense institutions. The contribution of institutional resilience to NATO’s defense and deterrence task needs to be further conceptualized. The article argues for a more consistent approach to operationalizing Building Integrity as an integral part of the concept of resilience and the need for robust institutional capabilities to mitigate vulnerabilities stemming from the risk of corruption as a security threat.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">67</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nika Chitadze</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Global Dimensions of Organized Crime and Ways of Preventing Threats at International Level</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">illegal formations</style></keyword><keyword><style  face="normal" font="default" size="100%">international conventions</style></keyword><keyword><style  face="normal" font="default" size="100%">law enforcement agencies</style></keyword><keyword><style  face="normal" font="default" size="100%">mafia</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">smuggling</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">17-32</style></pages><abstract><style face="normal" font="default" size="100%">The present paper predominantly focuses on the different approaches related to the definition of organized crime, the primary conditions that create a convenient foundation upon which organized crime can develop, the main activities of organized criminal groups, and leading organized criminal formations across the different regions of the world, in particular, the Italian Mafia, the Japanese bōryokudan (Yakuza), Chinese triads, Colombian drug cartels, and Russian criminal organizations (“Russian Mafia”), and so on.
The second part of the paper is dedicated to the review of the international experience of fighting against transnational organized crime, particularly with regard to different international conventions and agreements within the nineteenth century and first half of the twentieth century. It also explores this phenomena on a UN-level and with reference to a range of European institutions (the EU, Council of Europe). The concluding section sees an examination of the role of law enforcement agencies in the fight against organized crime.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">17</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aleksejs Loskutovs</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Transnational Organized Crime – Latvian Challenges and Responses</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">border crossing</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">human trafficking</style></keyword><keyword><style  face="normal" font="default" size="100%">illegal trafficking</style></keyword><keyword><style  face="normal" font="default" size="100%">Money Laundering</style></keyword><keyword><style  face="normal" font="default" size="100%">narcotic substances</style></keyword><keyword><style  face="normal" font="default" size="100%">Organized crime</style></keyword><keyword><style  face="normal" font="default" size="100%">vehicle theft</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">33-39</style></pages><abstract><style face="normal" font="default" size="100%">This article provides recent evidence from Latvia on activities of organized crime groups, covering illegal border crossing, drug trafficking, economic crime, money laundering, theft of vehicles, human trafficking, and the corruption related to all these types of crime. The concluding section presents regional and European initiatives to counter organized crime, in which Latvian law enforcement agencies participate, as well as the national project to build a fence on the border with the Russian Federation.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Ratchev</style></author><author><style face="normal" font="default" size="100%">Vesselin Petkov</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolving Security Concepts: The Premium on Governance in the Case of Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Bulgaria</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">Political stability</style></keyword><keyword><style  face="normal" font="default" size="100%">security discourse</style></keyword><keyword><style  face="normal" font="default" size="100%">social security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">83-107</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The EvoCS project analysed security perceptions and discourses in 12 countries, including Bulgaria. The authors of the Bulgarian case study introduce the particular &amp;lsquo;transitional&amp;rsquo; context of the security discourse, briefly describe the project methodology and present the research results for Bulgaria, along with explanation of the historical and social influences on security perceptions. The Bulgarian security discourse emerged as unique among all twelve examined in EvoCS. It is dominated by the &amp;ldquo;political stability and security&amp;rdquo; core value and the overarching theme is governance &amp;ndash; in the political, social, and economic spheres, as well as in facing the pervasive threat of corruption. The case study epitomises a double disconnect &amp;ndash; between the official Bulgarian security discourse and societal perceptions of security challenges, on one hand, and between challenges identified in EU security strategies and challenges faced by Bulgaria, on the other. This is reflected in the final section of the paper, presenting policy recommendations on making the security discourse in Bulgaria more relevant to the challenges the country faces and the societal interests.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lidia Velkova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Facilitating Factors and Effects of Corruption Networks</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">anti-corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption effects</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption factors</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption networks</style></keyword><keyword><style  face="normal" font="default" size="100%">market corruption</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Juli 2015</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">130</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">At the start of the Twenty first century, corruption turned into a global challenge, with major negative impact on the democratic development and the effective functioning of the market economy, especially for countries in transition, such as Bulgaria. Delineating the forms of corruption according to the degree of public access to corrupt services, provided by public officials, allows classify corrupt practices qualitatively in two groups of a different nature: market corruption and corrupt networks. The latter form of “networked” corruption has its roots in the social relations and, unlike the market form, is based on existing personal relations between public servants and citizens. Hence, it has deeper social roots and heavier destructive consequences for the society and the state.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Leonid Polyakov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">On Integrity of Intelligence in Countries of Eastern Europe</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">Intelligence governance</style></keyword><keyword><style  face="normal" font="default" size="100%">parliamentary oversight</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">55-63</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article examines the evolution of intelligence and counterintelli¬gence services in selected Eastern European countries, formerly part of the Soviet Union, in the two decades of independence. It emphasises transitional influences, the high level of secrecy and the lack of effective parliamentary oversight. In this environment, a common feature of the transition process is the general lack of integrity. Not surprisingly, instead of serving as a guardian against corrupt practices in government, they turn into a major conduit of political and economic corruption.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">55</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges of Implementation of National Security Strategies in Transition Democracies from a Governance Perspective</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">accountability</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">effectiveness</style></keyword><keyword><style  face="normal" font="default" size="100%">efficiency</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">security strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">smart security</style></keyword><keyword><style  face="normal" font="default" size="100%">terrorist attack at Burgas airport</style></keyword><keyword><style  face="normal" font="default" size="100%">Transparency</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">103</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Notes for the report to the conference on “Transforming National Security Concepts as a Response to New Global and Security Challenges and Threats: Experiences from Ukraine and NATO,” Kyiv, 19 September 2012, session “National Security Concepts of NATO and EU countries: Lessons Learned.”</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Europe and the Balkans during the Strategic Transformation of the European Union: Implications for Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">efficiency</style></keyword><keyword><style  face="normal" font="default" size="100%">EU integration</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">multinational cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword><keyword><style  face="normal" font="default" size="100%">Ukraine</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">12.2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><publisher><style face="normal" font="default" size="100%">Academy of Sciences and Head of the Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper includes speaking notes for the session on “Central-Eastern Europe’s Positioning and Perspectives of the European Union’s Transformation” of the conference “The EU, Central and Eastern Europe and Ukraine: Transformation, Prognosis and Perspectives,” conducted on 16 November 2012 in Kyiv, Ukraine. It addresses selected issues of the current status of the EU in the persisting financial and economic crisis, respective developments in Bulgaria and other countries in South Eastern Europe, and possible implications for Ukraine, with focus on security policies and governance.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Europe and the Balkans during the Strategic Transformation of the European Union: Implications for Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">CSDM Views</style></keyword><keyword><style  face="normal" font="default" size="100%">efficiency</style></keyword><keyword><style  face="normal" font="default" size="100%">EU integration</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">multinational cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword><keyword><style  face="normal" font="default" size="100%">Ukraine</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><publisher><style face="normal" font="default" size="100%">Centre for Security and Defence Management</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper includes speaking notes for the session on “Central-Eastern Europe’s Positioning and Perspectives of the European Union’s Transformation” of the conference “The EU, Central and Eastern Europe and Ukraine: Transformation, Prognosis and Perspectives,” conducted on 16 November 2012 in Kyiv, Ukraine. It addresses selected issues of the current status of the EU in the persisting financial and economic crisis, respective developments in Bulgaria and other countries in South Eastern Europe, and possible implications for Ukraine, with focus on security policies and governance.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Philipp Fluri</style></author><author><style face="normal" font="default" size="100%">Adrian Kendry</style></author><author><style face="normal" font="default" size="100%">Mark Pyman</style></author><author><style face="normal" font="default" size="100%">Simon Lunn</style></author><author><style face="normal" font="default" size="100%">Ashley Thornton</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Building Integrity and Reducing Corruption in Defence: A Compendium of Best Practices</style></title></titles><keywords><keyword><style  face="normal" font="default" size="100%">accountability</style></keyword><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">Defence governance</style></keyword><keyword><style  face="normal" font="default" size="100%">defence management</style></keyword><keyword><style  face="normal" font="default" size="100%">integrity</style></keyword><keyword><style  face="normal" font="default" size="100%">Transparency</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">Geneva Centre for the Democratic Control of Armed Forces</style></publisher><isbn><style face="normal" font="default" size="100%">978-92-9222-114-0 </style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Transparency and corruption challenges in the defence sphere often affect not only transition states but also established democracies. This compendium, the product of cooperation between Transparency International UK, the NATO PfP team and DCAF, focuses on concepts and tools which can ensure good practices in defence management and policy through enhancing transparency, increasing accountability and building integrity. Designed primarily as an introduction and reference tool for defence personnel, civilians in the defence sphere, democratic institutions, and civil society will also find materials on integrity building and anti-corruption measures which are relevant to their own security governance activities</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elena Kovalova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Expanding Security Agenda: Challenges for Transition States</style></title></titles><keywords><keyword><style  face="normal" font="default" size="100%">corruption</style></keyword><keyword><style  face="normal" font="default" size="100%">security sector reform</style></keyword><keyword><style  face="normal" font="default" size="100%">South Eastern Europe</style></keyword><keyword><style  face="normal" font="default" size="100%">trafficking in persons</style></keyword><keyword><style  face="normal" font="default" size="100%">transition</style></keyword><keyword><style  face="normal" font="default" size="100%">transnational crime</style></keyword><keyword><style  face="normal" font="default" size="100%">Western New Independent States</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2008</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">7</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Since the end of the Cold War, transnational organized crime and corruption have persistently plagued the post-communist states in Central and Eastern Europe. Facilitation of travel and trade regimes in Europe has provided criminal organizations with a broader scope to expand their businesses and to invest and profit through such practices. The fall of living standards and growth of unemployment in the post-communist economiesalong with the promotion of free movement of goods, services, and people in the enlarging European Union (EU)—produced new forms of organized crime in the region, particularly a modern-day equivalent of slavery that is known as trafficking in persons (TIP). The novelty of the crime, combined with the corruption of unreformed law enforcement agencies in transition states and the transnational nature of TIP have increased the need for international cooperation to fight it effectively. Based on an analysis of TIP in South Eastern European (SEE) and Eastern European states, this article attempts to assess the patterns of human trafficking in the region, determine links between corruption and trafficking, and identify possible networks for counter-trafficking activities in the region</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>