<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michel Rademaker</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing Cyber Security 2015</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber attacks</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">strategies</style></keyword><keyword><style  face="normal" font="default" size="100%">trends</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">93-104</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article is based on the HCSS Report Assessing Cyber Security. Following the introduction, it identifies fragmentation of reporting and presents threat assessment. Then it highlights the trends in cyber security, followed by a discussion on the importance of developing national cyber strategies. Last but not least, the authors provide general recommendations. The article is based on a review of 70 studies published by public authorities, companies, and research organizations from 15 countries over the last few years, and calls for international efforts to develop shared, commonly agreed definitions, metrics, and reporting standards to enhance threat assessments; to systematically anticipate trends and attempt to foresee potential new threats; to develop evidence-based cyber security policies that rely more on data and indicators, rather than subjective perceptions; and to consider setting up a mechanism to harmonize the collection and reporting of cyber statistics.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">93</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vase Rusumanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Use of the Internet by Terrorist Organizations</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">communication</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber attacks</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">propaganda</style></keyword><keyword><style  face="normal" font="default" size="100%">Terrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">terrorist organizations</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">137-150</style></pages><abstract><style face="normal" font="default" size="100%">Human life progress has successfully defined multiple epochs’ evolution with specific peculiarities. Today we live in the modern digital era, numerous computer devices, services and networks are actually significant. At the same time, these new science and technology achievements are rated both as good and bad for their users. The digital progress is however visible and of utility for terrorist organizations. This article focuses on selected illustrations of Internet technologies used by terrorist organizations. Special discussion emphases are given to uses towards (i) terrorist organizations radicalization of young people; (ii) spreading propaganda; (iii) internal communication, training, planning, coordination and committing terrorist acts.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">137</style></section></record></records></xml>