<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aleksandar Klaic</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Method for the Development of Cyber Security Strategies</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">action plan</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">goals</style></keyword><keyword><style  face="normal" font="default" size="100%">method</style></keyword><keyword><style  face="normal" font="default" size="100%">scope</style></keyword><keyword><style  face="normal" font="default" size="100%">society</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">vision</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">37-55</style></pages><abstract><style face="normal" font="default" size="100%">Cyberspace has become an intrinsic part of today’s society by creating a distinct virtual dimension in its functioning. Nations and the international community invest significant efforts to assure certain terms and responsibilities in this virtual dimension. The elaboration of national, NATO and EU cyber security strategies in a very short time received a high priority. The questions about the responsible institutions assigned in the strategies, guiding principles to follow, and the way of implementation are approached differently by different nations. The goal of this article is to propose a method that offers a more consistent approach to the development of cyber security strategies. The key research question is whether the proposed approach results in a more consistent national cyber security strategy that covers all the necessary national requirements and expectations, and thus makes it easier to harmonise with the variety of international requirements. In order to verify the proposed method, the article presents a brief overview of the results achieved in the case of the development process of Croatia’s National Cyber Security Strategy.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">37</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author><author><style face="normal" font="default" size="100%">Petya Ivanova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Analytical Support to Critical Infrastructure Protection Policy and Investment Decision-Making</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CASoS</style></keyword><keyword><style  face="normal" font="default" size="100%">CIP</style></keyword><keyword><style  face="normal" font="default" size="100%">complex adaptive systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Decision Support</style></keyword><keyword><style  face="normal" font="default" size="100%">ECI</style></keyword><keyword><style  face="normal" font="default" size="100%">EU Directive 114/2008</style></keyword><keyword><style  face="normal" font="default" size="100%">interdependency</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge management</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge portal</style></keyword><keyword><style  face="normal" font="default" size="100%">method</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword><keyword><style  face="normal" font="default" size="100%">tool</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">13-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Critical infrastructures are complex, interlinked socio-technical systems, with impact often crossing state borders. Their protection involves governments and business organisations, interacting in the application of a broad variety of measures to provide safety and security while investing a considerable amount of public and private resources. This paper examines the challenge of making respective policy and investment decisions transparent, and a sample of methods and tools used to facilitate decision making. It also calls for contributions to a knowledge portal on security and safety of critical infrastructures. </style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>