<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gergana Antonova</style></author><author><style face="normal" font="default" size="100%">Niya Prisadashka</style></author><author><style face="normal" font="default" size="100%">Radoslav Dimitrov</style></author><author><style face="normal" font="default" size="100%">Ioan Yonkov</style></author><author><style face="normal" font="default" size="100%">Daniel Radev</style></author><author><style face="normal" font="default" size="100%">Hristo Pavlov</style></author><author><style face="normal" font="default" size="100%">Mario Mladenov</style></author><author><style face="normal" font="default" size="100%">Ilian Grigorov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybercrime Strategy (modeling example)</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">PESTLE - analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">SWOT - analysis</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">149</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The widespread penetration of technology and networks into people’s professional and personal lives brings cyber security challenges to the front line of our society. Cyberattacks and cybercrimes аre accompanying the daily lives of modern Internet users, and the damages caused by them are significant enough to be considered as a major component of modern cybersecurity. The diversity of criminal acts, perpetrators, and consequences requires a countering cybercrimes solution that has to be planned and implemented based on a strategic approach. Part of the countries are specifying their cyber security strategies with separate strategies for countering cybercrimes, and this turns out to be the right approach. The study defends the idea of the need and usefulness of developing and implementing a cybercrime strategy. Based on international good practices, authors’ ideas and research, a model for such a strategy, tailored to the Bulgarian environment is proposed. The aim is to provoke a discussion in the direction of assessing the need to create a national cybercrime strategy.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The ‘Balance’ As a Panacea for Achieving (Cyber)Security</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">balance</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">panacea</style></keyword><keyword><style  face="normal" font="default" size="100%">risks</style></keyword><keyword><style  face="normal" font="default" size="100%">Scenarios</style></keyword><keyword><style  face="normal" font="default" size="100%">security controls</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">145</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Decision-making in a complex, complex, multi-layered and multifactorial environment, such as the security environment, requires a balance between threat factors and strategies to counter them. In this sense, the search for a single, simple solution, seen as a panacea, is an irrational management approach. The report presents the results of a study to develop a model for balancing cybersecurity solutions.
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Security Capabilities Maturity Model Based on a Balanced Scorecard</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">benchmark</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">efficiency</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity</style></keyword><keyword><style  face="normal" font="default" size="100%">model</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">146</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Measuring the maturity of cybersecurity capabilities is a key element of the overall concept of building and maintaining security in cyberspace. The report presents the results of the creation of a model for assessing the maturity of cybersecurity capabilities as a combination of the advantages of the balanced scorecard and benchmark model. The developed model has the strength of theoretical validity and practical applicability.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Productive and Counter-Productive Balance in Security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">balance</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">resources</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">44</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The research efforts in the field of security strengthens its relevance in conditions of crises, which are not lacking in modern times. Returning to fundamental questions such as why security is important and what makes it difficult to create an acceptable level of security allows, on the one hand, to reveal some erroneous theses, and on the other hand, to add perspectives in the search for rational answers. The material draws a parallel between two types of security balances, defined as productive and counter-productive. Based on the comparison, challenges to finding balanced solutions to security issues viewed as multifactorial functions are presented.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Comparative Analysis of Models for Assessing the Maturity of Cybersecurity Capabilities</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity areas</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity level</style></keyword><keyword><style  face="normal" font="default" size="100%">measurement</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">138</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The examination of all issues of interest in the field of cybersecurity, cyber resilience and the fight against cybercrime can be focused on one term, and that is the term cybersecurity capabilities. Cybersecurity capabilities demonstrate the ability to implement policies, standards, guidelines, and operational procedures for the security of information systems, networks, applications, and information. In turn, cybersecurity capabilities are a dynamic object that is built, maintained, developed, modified and adapted to the changing security environment. The dynamics of security capabilities require measuring the degree of their maturity and comparing them with the target levels. This report provides a comparative analysis of existing models for assessing the maturity of cybersecurity capabilities, thus creating an opportunity for a reasonable choice of such a method for the needs of specific assessment.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleksandr Polischuk</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ecosystem Platform for the Defence and Security Sector of Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">block chain</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">clusters</style></keyword><keyword><style  face="normal" font="default" size="100%">complex systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Comprehensive approach</style></keyword><keyword><style  face="normal" font="default" size="100%">defence ecosystem</style></keyword><keyword><style  face="normal" font="default" size="100%">ecosystem approach</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid war</style></keyword><keyword><style  face="normal" font="default" size="100%">security and defence sector</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">45</style></volume><pages><style face="normal" font="default" size="100%">7-19</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;While success in current and future conflicts will increasingly be predicated by optimisation of high-tech solutions rather than military capabilities based on mass, the application of modern business approaches is of key importance for reforms aiming to adapt security and defence to the new realities. This article presents detailed analysis of ways to adapt the security and defence sector of Ukraine to Euro-Atlantic standards, taking into account Ukraine&amp;rsquo;s trajectory and growing interaction with the international security systems and the specific context shaped by the external aggression against Ukraine. Based on the analysis of existing legislation and review of theoretical sources, the author concludes that the present archaic, post-Soviet type security and defence sector of Ukraine is not adequate to the future complex challenges. Further, he applies the ecosystem approach to elaborate recommendations for the development of a modern model of national security and defence organisation based on functional integration of the capabilities of all main security and defence actors, emphasising the strategic importance of the integration of Ukraine&amp;rsquo;s security and defence sector into European and Euro-Atlantic security systems.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">John L. Clarke</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Pandemics and Armed Forces: Which Roles Are Appropriate?</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">COVID-19</style></keyword><keyword><style  face="normal" font="default" size="100%">crisis management</style></keyword><keyword><style  face="normal" font="default" size="100%">defense support to civilian authorities</style></keyword><keyword><style  face="normal" font="default" size="100%">Disaster</style></keyword><keyword><style  face="normal" font="default" size="100%">law enforcement</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">77-88</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the current pandemic crisis, the armed forces of many nations are being called upon to provide assistance and support to the civil authorities in an ever-expanding fashion. This article explores the kinds of roles, missions, tasks, and functions that the armed forces are carrying out in this crisis and identifies a number of policy considerations for decision-makers to ponder when they consider tasking the armed forces to provide these services.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">77</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Uwe Nerlich</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges in a 2035 Perspective: Roles for the EU as a Global Security Provider?</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber</style></keyword><keyword><style  face="normal" font="default" size="100%">defence</style></keyword><keyword><style  face="normal" font="default" size="100%">energy security</style></keyword><keyword><style  face="normal" font="default" size="100%">EU decision-making</style></keyword><keyword><style  face="normal" font="default" size="100%">EU missions</style></keyword><keyword><style  face="normal" font="default" size="100%">foresight</style></keyword><keyword><style  face="normal" font="default" size="100%">maritime</style></keyword><keyword><style  face="normal" font="default" size="100%">progressive framing</style></keyword><keyword><style  face="normal" font="default" size="100%">space</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">77-87</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Within the 2035 timeframe Europe and EU will need throughout to re¬spond to impacts from changing global environments, i.e. above all to adapt inter¬nal structures and to widen collective mission profiles (“progressive framing”). The European Security Strategy (ESS), the Internal Security Strategy (ISS) and the Re¬port on the Implementation of the ESS identified emerging key threats. Both strat¬egy and capability developments—for cyber, energy security, maritime security, space, CBRN, etc.—will require consistent effort and new approaches. The roles Europe could assume as a global security provider will determine Europe’s future. Plausible future EU missions are examined in this paper in a global context and in view of risks and challenges on a global scale.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">77</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Robert K. Murphy</style></author><author><style face="normal" font="default" size="100%">Scott D. Beach</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Using Strategic Planning in Support of Defense Acquisitions</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">airpower</style></keyword><keyword><style  face="normal" font="default" size="100%">analytical hierarchy process.</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">defense planning</style></keyword><keyword><style  face="normal" font="default" size="100%">force structuring</style></keyword><keyword><style  face="normal" font="default" size="100%">multi-attribute value theory</style></keyword><keyword><style  face="normal" font="default" size="100%">procure­ment</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">25</style></volume><pages><style face="normal" font="default" size="100%">57-77</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Our environment is continuously changing. Government must address challenges in global security that includes traditional conflicts as well as catastro­phic events, irregular warfare, and disruptive technologies. The economy is just as important, where jobless rates remain high and markets are unstable. The outcome of this will be multiple priorities, all requiring a portion of the budget, which in turn will result in fewer dollars for defense. Fortunately, there are ways to ensure that defense priorities receive the required funding. By following a simple process for developing an analytically-based strategic plan, the defense sector will dramati­cally improve the chances of acquiring funding. The outcome of this will be to pro­cure best value solutions that support a nation’s national security strategy. This will dramatically improve a country’s military defense posture. This paper will review the strategic planning process as applied to military force structure and procurement decisions. In addition, the paper will discuss the Force Matrix Model, a key analy­sis tool to identify and assess best value solutions within this strategic planning paradigm.</style></abstract></record></records></xml>