<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nikola Saranov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cooperation Model for Establishing Secure Digital Transformation in Corporations: Overview of Regulatory Issues</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">digital transformation</style></keyword><keyword><style  face="normal" font="default" size="100%">legal framework</style></keyword><keyword><style  face="normal" font="default" size="100%">private sector</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">98-112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Digital transformation is not only a one-time effort that a company wishes to go through, but an entirely new vision on the evolution of business processes in the context of inevitable movement to the information age. Having in mind the nature of this movement, organizations should work hand in hand with each other and together to cooperate with the governments worldwide in order to establish secure environment for developing and implementing new technologies and innovations. This paper is focused on the essence of such interactions and the challenges before the organizations and gives valuable examples and suggestions for ensuring on-site security, as well as the best practices which demonstrate how the business could impact the creation of cybersecurity norms locally and globally. Additionally, the paper reviews the most recognized regulations in the area of cybersecurity and industry best practices applicable to the demands of the digital transformation.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">98</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valeri Kopchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The European Union Moves Ahead on Cybersecurity Research Through Enhanced Cooperation and Coordination</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competence</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">industrial capacity</style></keyword><keyword><style  face="normal" font="default" size="100%">legal framework</style></keyword><keyword><style  face="normal" font="default" size="100%">Regulation 630</style></keyword><keyword><style  face="normal" font="default" size="100%">research and technology</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">42</style></volume><pages><style face="normal" font="default" size="100%">67-81</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Due to a dispersed research and industrial capacity and often disconnected national markets, it is challenging for the European Union to compete with world leaders providing cybersecurity products and services and thus to support its ambition to achieve strategic autonomy in the cyber domain. This article explores one of the intended remedies - the proposal for an EU Regulation establishing the European Cybersecurity Industrial, Technology and Research Competence Centre and the Network of National Coordination Centres. Analysing legal, organisational and financial measures, the author posits that the expected regulation, if properly implemented, can fill in an important gap in the current legislative framework of the European Union.  </style></abstract><section><style face="normal" font="default" size="100%">67</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Strategy, Partnerships and Human Capital for Cyber Resilience</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">academic network</style></keyword><keyword><style  face="normal" font="default" size="100%">civil-military cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">e-signature</style></keyword><keyword><style  face="normal" font="default" size="100%">legal framework</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">strategic planning</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">42</style></volume><pages><style face="normal" font="default" size="100%">5-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The editorial article introduces volume 42 of &lt;em&gt;Information &amp;amp; Security: An International Journal&lt;/em&gt; covering topics from strategy development through building of digital ecosystem to academic support of cyber security entities and the European Union initiative to enhance cybersecurity competencies through coordination among national centres and networks. The review covers specific aspects of talent development by an innovative e-platform for training. Specific aspects of the role of Chief Information Officer / Chief Information Security Officer in public administration are highlighted and approaches for improvement using new IT are discussed. A review of the EU legal developments in cyber research and network of expertise evolving are addressed. As in every issue special paper is covering STEM problem, related to &lt;em&gt;ElGamal digital signature&lt;/em&gt;.&lt;/p&gt;</style></abstract><section><style face="normal" font="default" size="100%">5</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valentyn Petrov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Establishing a National Cybersecurity System in the Context of National Security and Defence Sector Reform</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity system</style></keyword><keyword><style  face="normal" font="default" size="100%">legal framework</style></keyword><keyword><style  face="normal" font="default" size="100%">security and defence reform</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2014</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">31</style></volume><pages><style face="normal" font="default" size="100%">73-77</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Experience of recent years indicates that cyberattacks are often aimed at informational systems of state bodies, healthcare, energy, financial and transport sector, etc. with increasing, unpredictable consequences. The 2012 National Security Strategy of Ukraine includes a provision on establishing a national cybersecurity system. Its effective implementation requires to take into account not only threats of a criminal nature, but a full range of threats with varying origin, tools used, targets and purpose. This paper presents an analysis of the current state of threats, related to transnational cybercrime and attempts to use modern informational technologies by foreign governments, organisations and individuals. The national cybersecurity system—the set of administrative, legal, technical measures related to informational security and data protection—continues to be one of the key elements to guarantee national security. This article is focused on the cyber dimension of the national security, in particular its legal aspect in context of an ongoing defence and security sector reform.</style></abstract><section><style face="normal" font="default" size="100%">73</style></section></record></records></xml>