<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Orhan Dragaš</style></author><author><style face="normal" font="default" size="100%">Zoran Dragišić</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Coordination in the Security Sector in Response to Natural Disasters: The Serbia Cases of 2014 Floods and Covid-19</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">coordination</style></keyword><keyword><style  face="normal" font="default" size="100%">COVID-19</style></keyword><keyword><style  face="normal" font="default" size="100%">disaster risk</style></keyword><keyword><style  face="normal" font="default" size="100%">floods</style></keyword><keyword><style  face="normal" font="default" size="100%">Natural Disasters</style></keyword><keyword><style  face="normal" font="default" size="100%">security management</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">48</style></volume><pages><style face="normal" font="default" size="100%">213-225</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;This article analyses two different natural disasters, the 2014 floods that hit the Republic of Serbia and several neighboring countries and the Covid-19 pandemic. From the view of coordination in the security sector, these two natural disasters represent excellent case studies, given the entirely different conditions in which the entire national security system had to be engaged.&lt;/p&gt;&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;This study examines the similarities and differences in response to two different security challenges and the effects of the measures taken. We have in mind that these are security challenges that have a common origin &amp;ndash; nature. Still, they also have numerous differences, primarily concerning the population and the unequal potential to harm the health of the population, property, and economy.&lt;/p&gt;&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;With this in mind, we assumed that coordination in the security sector had different models in order to provide the most effective response in addressing the challenges. We concluded that the similarities in these two cases manifested themselves at the normative level. Extraordinary circumstances were declared, and certain regulations changed to provide for the most efficient use of security resources. In both cases, the management of the fight against challenges was centralized. Yet, the difference was manifested in the level of that centralization, which was appropriate to the circumstances and ultimately allowed high efficiency in countering the hazards and their consequences.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">213</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Philipp Fluri</style></author><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Concept of Resilience: Security Implications and Implementation Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">concept</style></keyword><keyword><style  face="normal" font="default" size="100%">crisis management</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">disaster risk</style></keyword><keyword><style  face="normal" font="default" size="100%">European Union</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">institutions</style></keyword><keyword><style  face="normal" font="default" size="100%">maturity</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">peacebuilding</style></keyword><keyword><style  face="normal" font="default" size="100%">police force</style></keyword><keyword><style  face="normal" font="default" size="100%">postconflict reconstruction</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Sendai Framework</style></keyword><keyword><style  face="normal" font="default" size="100%">stabilization</style></keyword><keyword><style  face="normal" font="default" size="100%">theory</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">5-12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Aiming for a more effective and efficient response to diverse and multidimensional threats, an increasing number of defense and security organizations, the United Nations, NATO, and the EU embrace the concept of resilience in their security strategies and policies. This article provides a brief overview of the concept, a sample of definitions used in policy documents, and the types of problems they seek to resolve. Then we introduce the reader to the 15 articles published in the Summer and Fall 2020 issues of Connections that present the evolution of the concept of resilience and its implementation by and within political, defense, and law enforcement organizations, as well as its anticipated contribution to cybersecurity, disaster preparedness, peacebuilding, post-conflict restoration and countering hybrid threats.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">5</style></section></record></records></xml>