<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Pavel Varbanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Perspectives in the Design of a Modern  Cybersecurity Training Programme: The ECHO Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competencies</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity skills</style></keyword><keyword><style  face="normal" font="default" size="100%">design</style></keyword><keyword><style  face="normal" font="default" size="100%">framework</style></keyword><keyword><style  face="normal" font="default" size="100%">training program</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">177-190</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper leverages the training and education-related research outputs developed under the ECHO project. They are compared to the progress of the workgroups in ENISA (European Union Agency for Cybersecurity) and ECSO (European Cybersecurity Organization) that classify, structure and define the competencies, skills, and knowledge and risk factors. The approach digested by the ECHO project explores the methods for achieving a more vital balance between the market demands and talent supply. The scope of the research activities covers four main and interconnected components – i) Contextualization; ii) Competences; iii) Generic Curriculum; iv) Assessment methodology. The proposed approach explores and gradually builds upon the generic definitions of the skills and knowledge toward specific requirements on what an ICT or cybersecurity professional must know and be able to do in order to implement initial and further cyber-incident response actions. The paper considers mainly the design methods for building cybersecurity training programs for professionals. Still, it could be applied in academic settings as well, enriching the academic programs with practical learning experiences. Several examples are provided to demonstrate the relevance and applicability of the proposed methods.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">177</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aneta Nowakowska-Krystman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Maritime Piracy as a Form of Organized Crime: A Strategic Management Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">competencies</style></keyword><keyword><style  face="normal" font="default" size="100%">Maritime terrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">resources</style></keyword><keyword><style  face="normal" font="default" size="100%">skills</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">41-53</style></pages><abstract><style face="normal" font="default" size="100%">The features of successful criminal organizations, including maritime piracy organizations, seem to be consistent with those that have been observed in business organizations. Research has proved that the sources of advantage and value creation in business organizations are intangible factors, including leadership, obsession for action, and creativity, among others. The idea behind this presentation of maritime piracy is based on the theory of the resources, skills and competencies of strategic management. According to the classification which has been adopted, it has been observed that the success factors of maritime piracy are: skill capital, innovative capital, and client capital. The observations were made using office-based research and a diagnostic survey.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">41</style></section></record></records></xml>