<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maryna Starodubska</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Excessive Brotherly Love? - 'Fraternity' of Russians and Ukrainians as a Russian Propaganda Narrative</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cross-cultural comparison</style></keyword><keyword><style  face="normal" font="default" size="100%">fraternal people</style></keyword><keyword><style  face="normal" font="default" size="100%">institutions</style></keyword><keyword><style  face="normal" font="default" size="100%">Russia</style></keyword><keyword><style  face="normal" font="default" size="100%">Ukraine</style></keyword><keyword><style  face="normal" font="default" size="100%">values</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">47-66</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article aims to show, using evidence from cross-cultural studies, that the peoples of Ukraine and Russia differ significantly on the individualism-collectivism dimension that lies at the heart of national identity. It argues that the idea of Russian and Ukrainian fraternity is, in fact, a myth, based perhaps on some limited cultural accidentals or overly-broad categorizations of temperament and not on fundamental ideologies that undergird the society. Illusions of the fraternity are a product of propaganda based on a range of narratives about the countries (including Ukraine) Russia considers its “area of influence” and has been unsuccessfully trying to return under its control. Understanding the motivations of Russia, a state with a legacy of authoritarianism and consistently strong ideological opposition to democratic values, is key to making sense of such narratives and the logic behind them. Cross-cultural studies provide insights for a broader understanding of inherent differences between Russian and Ukrainian peoples. Approximately 50 percent of the variation in national cultural orientations is unique to the country and is rooted in the lasting differences in historic developmental trajectories. Of particular interest is the relationship between individualism and collectivism in Russian and Ukrainian cultures and its respective impact on the institutions, as these dimensions are among the most distinctive for cultural variation. The author argues that one can discern clear distinctions in cultures by observing the distinct evolution and varying importance of institutions.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">47</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Philipp Fluri</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Concept of Resilience: Security Implications and Implementation Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">concept</style></keyword><keyword><style  face="normal" font="default" size="100%">crisis management</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">disaster risk</style></keyword><keyword><style  face="normal" font="default" size="100%">European Union</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">institutions</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">peacebuilding</style></keyword><keyword><style  face="normal" font="default" size="100%">police force</style></keyword><keyword><style  face="normal" font="default" size="100%">postconflict reconstruction</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Sendai Framework</style></keyword><keyword><style  face="normal" font="default" size="100%">stabilization</style></keyword><keyword><style  face="normal" font="default" size="100%">theory</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">5-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Aiming for a more effective and efficient response to diverse and multidimensional threats, an increasing number of defense and security organizations, the United Nations, NATO, and the EU embrace the concept of resilience in their security strategies and policies. This article provides a brief overview of the concept, a sample of definitions used in policy documents, and the types of problems they seek to resolve. Then we introduce the reader to the 15 articles published in the Summer and Fall 2020 issues of Connections that present the evolution of the concept of resilience and its implementation by and within political, defense, and law enforcement organizations, as well as its anticipated contribution to cybersecurity, disaster preparedness, peacebuilding, post-conflict restoration and countering hybrid threats.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mihail Naydenov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Building the Capacity of NATO’s Eastern European  Members to Fight Hybrid War</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capacity building</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid war</style></keyword><keyword><style  face="normal" font="default" size="100%">institutions</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">Russia</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">subversion</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">45-58</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The Russian Federation has been waging a hybrid war campaign against NATO and the EU for years. The Kremlin has so far skillfully managed to exploit the vulnerabilities of the West. The NATO Eastern flank members are particularly exposed to the Kremlin-orchestrated systematic subversion and this is a problem of growing significance to the Alliance as it is undermining its cohesion and is preventing the build-up of strong national security and defense systems of its Eastern European member states. In order to effectively remedy this dangerous situation, the Eastern flank NATO member states must immediately start implementing a coherent national institutional capacity building programs, supported by NATO and the EU, aimed at timely mitigation of existing vulnerabilities and building up long-lasting resilient national security structures able to tackle hybrid threats coming from any direction. To carry out this ambition, a number of capacity building steps are proposed.</style></abstract><section><style face="normal" font="default" size="100%">45</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Natalia Spinu</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Creating and Strengthening Cybersecurity in the Republic of Moldova</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">institutions</style></keyword><keyword><style  face="normal" font="default" size="100%">law enforcement</style></keyword><keyword><style  face="normal" font="default" size="100%">legal base</style></keyword><keyword><style  face="normal" font="default" size="100%">Republic of Moldova</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">97-108</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Like most of the countries, Republic of Moldova faced the need of protecting its cyberspace against emerging cybersecurity threats. The lack of coordination between responsible institutions, established cybersecurity mechanisms, and well-trained specialists made private companies and public institutions an easy target for cyber attacks performed by malicious actors like hacktivist groups, terrorist organisations and state-sponsored companies. The consequences of such attacks damage reputation, business processes and affect the image of the country on the international scene. This article shares the experience of Moldova in the efforts of planning and building cybersecurity. It is written from the point of view of Moldova&amp;rsquo;s Cybersecurity Centre &amp;ndash; CERT-GOV-MD, whose governmental status and active involvement in national cybersecurity development processes allow to provide a broad overview of different situations, in which Moldova and its state institutions found themselves, and the problems faced along the road to achieving the stated goal. In this regard, the article covers the period from the initiation of building cybersecurity until the most current results.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>