<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Marleen Easton</style></author><author><style face="normal" font="default" size="100%">Vanessa Laureys</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Behind Blue Lights: Exploring Police Officers’ Resilience after the Terrorist Attack at Brussels Airport on March 22, 2016</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">coping</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">police</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">resources</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">77-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This case study on the terrorist attack at Brussels Airport on March 22, 2016 explores the experiences of police officers concerning (a) their coping strategies after the terrorist attack and (b) the (in)formal workplace social support that affects their resilience. A qualitative, exploratory research method was used to answer the research questions, consisting of a content analysis of the police organization, a participant observation and 31 in-depth interviews with police officers who were on active duty during the terrorist attack. The results of this research show that the interviewed police officers primarily adopt engagement coping strategies after the terrorist attack, of which the most cited one is talking to others, followed by engaging in positive action, behavioral distraction, self-evaluation, positive self-talk and emotional numbing. Second, this study revealed that (in)formal workplace social support plays a significant role to foster police officers’ resilience after a terrorist attack. Informally, getting acknowledged for the efforts made during the terrorist attack and for psychological loss afterwards is crucial in this process. Besides, emotional support from both colleagues and supervisors is identified as essential. However, the ruling ‘macho’ culture within the police organization is perceived as hampering to talk freely about emotions. Formally, respondents place emphasis on a proper debriefing and a well-organized, easily accessible psychological aftercare. This scientific contribution provides insight into the best practices the police organization can apply to promote the resilience and performance of its employees.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">77</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yantsislav Yanakiev</style></author><author><style face="normal" font="default" size="100%">Dimitrina Polimirova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Role of the Human Factor in Cyber Security: Results from an Expert Survey in Bulgaria</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">culture</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">expert assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;While technological solutions are being developed to enhance cyber security, there is increasing awareness that besides a technical approach the role of human performance, decision making and organizational culture are critical to increase the effectiveness of responses to evolving cyber threats. Hence, the focus of this paper is on the role of the human factors in cyber security. It presents an analysis of data from a Subject Matter Experts&amp;rsquo; study carried out in Bulgaria in the end of 2018 in the framework of the project &amp;ldquo;Cyber security and opportunities for application of innovative technologies in the state administration of the Republic of Bulgaria.&amp;rdquo; The data was collected via online survey from 92 experts from the state administration, academia and business organizations.&lt;/p&gt;&lt;p&gt;&amp;nbsp; The paper covers the following topics: 1) The most important issues in cyber security in Bulgaria and the role of the human factors among them; 2) Recruitment, Retention, Education &amp;amp; Training of IT personnel; 3) The human factors as a source of security breaches; and 4) Future research in the area of human factors in cyber security. Based on the analysis of the data, conclusions and recommendations are summarized regarding the ways to change the role of the human factor from the system&amp;rsquo;s &amp;ldquo;weakest link&amp;rdquo; to a powerful resource to detect and mitigate cyber threats.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael Dimitrov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Why the Organization Needs Information Security Policy and Programme</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">adaptability</style></keyword><keyword><style  face="normal" font="default" size="100%">Information</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information security policy</style></keyword><keyword><style  face="normal" font="default" size="100%">information security programme</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">resources</style></keyword><keyword><style  face="normal" font="default" size="100%">threat</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2013</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">109</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This report outlines the reasons why each organization needs to adopt an information security policy and an information security programme, emphasising the competitive advantages based on improved adaptation capabilities. First, it examines the concept of information security. On that basis, the author represents possible formulation of organizational objectives. The examination of organizational activities in a competitive context allows to formulate specific ways in which information becomes of utmost significance. The report includes examples demonstrating the need to establish an information security policy and an information security programme, including description of threats and vulnerabilities that, unless adequately managed, could decrease the organizational capabilities to achieve their goals.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petko Petkov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity: Emerging Characteristics and Impact on Defence</style></title><secondary-title><style face="normal" font="default" size="100%">It4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CERT</style></keyword><keyword><style  face="normal" font="default" size="100%">CIRC</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">ENISA</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">standard</style></keyword><keyword><style  face="normal" font="default" size="100%">taxonomy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">98</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This report provides an overview of threats in cyber space and their potential impact on the defence potential. First, it outlines the features of cyber threats, suggests a respective classification and presents related standards. The second part provides analysis of selected examples for organizing cyber security in the experience of the US, UK, France, etc. The final part discusses the potential implementation of identified good practice in Bulgaria, and specifically in the defence ministry.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lachezar Milushev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Methodological Issues in Planning for Crises and Natural Disasters</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">coordination</style></keyword><keyword><style  face="normal" font="default" size="100%">estimates</style></keyword><keyword><style  face="normal" font="default" size="100%">evaluation</style></keyword><keyword><style  face="normal" font="default" size="100%">inter­action.</style></keyword><keyword><style  face="normal" font="default" size="100%">Models</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword><keyword><style  face="normal" font="default" size="100%">Plan</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">24</style></volume><pages><style face="normal" font="default" size="100%">17-26</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Advance planning of actions for crises and natural disasters constitutes a significant element in the preparation of governmental agencies and local au­thorities from the executive branch, the legal entities and individual businesses, which have obligations under the legislation of the country. A basic requirement of emergency planning is coordination, which requires a unified planning methodol­ogy and the establishment of an interdepartmental organization to facilitate the process. The quality of advance planning is of great importance for the efficient management of forces and capabilities in order to ensure timely reaction to crises and natural disasters.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Handy</style></author><author><style face="normal" font="default" size="100%">John Kimball</style></author><author><style face="normal" font="default" size="100%">Jeffrey Winbourne</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Building a Sound and Flexible Emergency Response System Hard Won Lessons in Disaster Management</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">Disaster Management</style></keyword><keyword><style  face="normal" font="default" size="100%">Emergency Response System</style></keyword><keyword><style  face="normal" font="default" size="100%">Hurricane Katrina</style></keyword><keyword><style  face="normal" font="default" size="100%">Leadership</style></keyword><keyword><style  face="normal" font="default" size="100%">Organization</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">31-38</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Emergency management systems’ failure to mitigate the devastation caused by hurricane Katrina imposed a number of unfortunate lessons from this disaster, lessons hard won and learned. These lessons are worth repeating for the benefit of the international emergency management community. Lessons this paper seeks to convey: the significance of organization and leadership, with communications as the critical link between them, to advance disaster responsiveness. Particular emphasis is placed on the role of communications, in its multiple modes, as it applies to disaster response management relevant to both Bulgaria and the Black Sea Basin/ Balkan region.</style></abstract></record></records></xml>