<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oleh Semenenko</style></author><author><style face="normal" font="default" size="100%">Liliia Semenenko</style></author><author><style face="normal" font="default" size="100%">Roman Sirchenko</style></author><author><style face="normal" font="default" size="100%">Mariia Yarmolchyk</style></author><author><style face="normal" font="default" size="100%">Vitalii Kostrach</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modernizing Personnel Management in the Armed Forces of Ukraine During Military Conflict: Training New Officers</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">defense capability</style></keyword><keyword><style  face="normal" font="default" size="100%">international experience</style></keyword><keyword><style  face="normal" font="default" size="100%">partnership</style></keyword><keyword><style  face="normal" font="default" size="100%">pedagogical innovations</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">teaching methods</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2023</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">105-124</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Considering the ongoing military conflict with the Russian Federation, the modernization of the personnel management system of the Armed Forces of Ukraine is of utmost significance. Effective training of new officers is becoming a strategic task to strengthen the country’s defense capability and ensure national security. This research aims to thoroughly analyze and justify ways to modernize the personnel management system of the Armed Forces of Ukraine in the context of the current military conflict, focusing on improving the education and training of the new generation of officers. It is based on a statistical analysis of data obtained through expert analysis and a survey of highly qualified professionals. The study demonstrated that the existing personnel management system of the Armed Forces of Ukraine requires significant modifications to respond to the current challenges of military operations. In particular, there is a need to introduce advanced teaching methods and use modern technologies in training officers. Additionally, improving the organizational structures that provide officer training is essential. This includes revising programs, adapting to modern conflicts, and implementing international training standards. Psychological and social aspects of the officer corps' design and development should be considered to ensure long-term stability and productivity. Special emphasis is placed on introducing international experience and cooperation with partner countries, exchange of experiences, joint exercises, and training programs.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">105</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Gábor Sinkó</style></author><author><style face="normal" font="default" size="100%">János Besenyő</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">More than Survival: The Role of al-Shabaab Secret Service, Amniyat, in Information-Gathering</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">al-Shabaab</style></keyword><keyword><style  face="normal" font="default" size="100%">Amniyat</style></keyword><keyword><style  face="normal" font="default" size="100%">intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Somalia</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">99-111</style></pages><abstract><style face="normal" font="default" size="100%">The article examines the development and employment of the al-Shabaab secret service, Amniyat, in its fight against African Union troops and security forces in Somalia. It first elaborates on the historical background of the terrorist group, which may serve as an introduction to understanding the roots of the organization and how its resurgence is tied to the effective management of Amniyat. The governance structure and intelligence activities of the terror group are also scrutinized. The study then analyzes the capacities and capabilities of the al-Shabaab intelligence apparatus, highlighting the elements that have contributed to its efficiency. In light of the growing importance of intelligence and counter-intelligence, the development of a secret service proved to be crucial for the survival of the terrorist group. Over the last decade, not only has al-Shabaab survived but also managed to thrive, presenting a number of obstacles to better-equipped multinational forces and the international community. Even if al-Shabaab was to be defeated, Amniyat could outlast its dissolution and may be “reborn” in various entities or merge into a criminal network.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><num-vols><style face="normal" font="default" size="100%">99-111</style></num-vols></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Rights, Goals, Security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">metrics</style></keyword><keyword><style  face="normal" font="default" size="100%">purpose</style></keyword><keyword><style  face="normal" font="default" size="100%">rights</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">students</style></keyword><keyword><style  face="normal" font="default" size="100%">University</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2023</style></year></dates><number><style face="normal" font="default" size="100%">45</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Rights, goals and security are terms, that have entered widely into people&amp;#39;s daily lives, but the interrelationship between them is rarely studied. Placed in a certain context and addressed to specific subjects, the study of the existing connections between rights, goals and security reveals dependencies and tendencies invisible in the interpretation of the concepts in separation. This report presents the results of a study of the interrelationships between the concepts of rights, goals and security, placed in the context of the university and addressed to students. The research is based on generally accepted methods, with the help of which the deviation of the degree of the current achievement of the objectives is measured from their target values. At the end of the research, based on the results, it is concluded that the current state of the rights given by the university to the students and the ways of their use leads to the generation of uncertainty.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bozhidar Ivanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Contemporary Challenges for Bulgaria in the Changing Black Sea Security Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">A2/AD</style></keyword><keyword><style  face="normal" font="default" size="100%">Black Sea</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Russian Federation</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">51</style></volume><pages><style face="normal" font="default" size="100%">25-35</style></pages><abstract><style face="normal" font="default" size="100%">The author presents the results of a study on the evolving security environment in the Black sea region. The focus is on Russia’s Black Sea security policy and the ways in which it combines kinetic and non-kinetic instruments in its hybrid strategy. The militarization of Crimea, in particular, led to the positioning of assertive Russia as the dominant military power in the Black Sea, with all the consequent negative repercussions for littoral and other states in the region. </style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">25</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Selen Baldıran</style></author><author><style face="normal" font="default" size="100%">Dinçer Bayer</style></author><author><style face="normal" font="default" size="100%">Hüseyin Gençer</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Importance of the 1936 Montreux Convention for the Black Sea Security: A Close Look into Russia-NATO Controversy on the Russian-Ukrainian Conflict in 2022</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Black Sea</style></keyword><keyword><style  face="normal" font="default" size="100%">Montreux Convention</style></keyword><keyword><style  face="normal" font="default" size="100%">Russia’s Intervention</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Ukraine</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">51</style></volume><pages><style face="normal" font="default" size="100%">11-23</style></pages><abstract><style face="normal" font="default" size="100%">Russia’s intervention in Ukraine on February 24, 2022, once again brought into view the current variety of risks to Black Sea security. Lengthy diplomatic and political negotiations and statements made by NATO and primarily US authorities before Russia launched its military operation in Ukraine were not enough to deter Russia’s military action. It is considered that NATO’s reactions to deter Russia from operations in Ukraine have been insufficient due to NATO’s weakness in naval power projection capability to the Black Sea due to the Montreux Convention’s restrictions. Montreux Convention is recognized as the main international agreement that provides barriers to an efficient naval deployment from external sources to the Black Sea. This article examines the effects of the Montreux Convention on regional security within the framework of the historical background and the situations that threatened regional security in the past and reveals the importance of this convention for Black Sea security in the future.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">11</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velizar Shalamanov</style></author><author><style face="normal" font="default" size="100%">Ivan Blagoev</style></author><author><style face="normal" font="default" size="100%">Iliyan Iliev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Level of maturity of the Cybersecurity of the infrastructure in the domain iict.bas.bg</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">E-Mail</style></keyword><keyword><style  face="normal" font="default" size="100%">firewall</style></keyword><keyword><style  face="normal" font="default" size="100%">FTP</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Web Services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">143</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Description of the level of maturity of the IT infrastructure for the domain iict.bas.bg.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anna Kovalenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Neo-Authoritarianism and Leadership: Outcomes for Modern Ukraine</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">authoritarianism</style></keyword><keyword><style  face="normal" font="default" size="100%">China</style></keyword><keyword><style  face="normal" font="default" size="100%">defense</style></keyword><keyword><style  face="normal" font="default" size="100%">democracy</style></keyword><keyword><style  face="normal" font="default" size="100%">EU</style></keyword><keyword><style  face="normal" font="default" size="100%">ideology</style></keyword><keyword><style  face="normal" font="default" size="100%">mentality</style></keyword><keyword><style  face="normal" font="default" size="100%">mobilization</style></keyword><keyword><style  face="normal" font="default" size="100%">political regimes</style></keyword><keyword><style  face="normal" font="default" size="100%">politicization</style></keyword><keyword><style  face="normal" font="default" size="100%">Putin</style></keyword><keyword><style  face="normal" font="default" size="100%">Russia</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Ukraine</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">105-120</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article examines the notions of authoritarianism and neo-authoritarianism as well as their features in terms of ideology, mentality, mobilization, and politicization of a population, state control, level of political pluralism, and leadership style. Incorporating evidence from reviews, surveys, and scientific research, the study identifies the main difference between the regimes and opposition to democracy, providing samples throughout history with different characteristics, causes, and backgrounds. It presents a vision of authoritarianism as an intermediate stop on the path of a particular state to democracy or totalitarianism. Finally, this article reflects upon Ukraine’s future in the European paradigm and contrasts it with Russia. Ukraine is at a crossroads and must continue to carefully navigate toward the institutionalized democracy it has begun to establish.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">105</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Productive and Counter-Productive Balance in Security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">balance</style></keyword><keyword><style  face="normal" font="default" size="100%">capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">resources</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">threats</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><number><style face="normal" font="default" size="100%">44</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The research efforts in the field of security strengthens its relevance in conditions of crises, which are not lacking in modern times. Returning to fundamental questions such as why security is important and what makes it difficult to create an acceptable level of security allows, on the one hand, to reveal some erroneous theses, and on the other hand, to add perspectives in the search for rational answers. The material draws a parallel between two types of security balances, defined as productive and counter-productive. Based on the comparison, challenges to finding balanced solutions to security issues viewed as multifactorial functions are presented.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Albena Popova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Airport Security Management System’ Model</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">airport</style></keyword><keyword><style  face="normal" font="default" size="100%">management</style></keyword><keyword><style  face="normal" font="default" size="100%">model</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">system</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">140</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The airport is a complex system comprising various subsystems, one of which is designed to ensure the safety and security of the carriage of passengers and cargo by air. The concentration in the area of the airport of a large number of people, aircraft, cargo, complex and expensive information, communication and navigation systems and a number of other assets make it an attractive target for organized criminal groups and terrorist organizations. Countering threats to the airport security requires a systematic approach and compliance with a number of international and national regulations. All these features require the creation and implementation of an airport security management system that is resilient to threats and at the same time adaptable to changes in the security environment. The material presents the results of a study aimed at developing and validating a model of airport security management system with a higher level of efficiency and offering a solution to the main weaknesses of the currently applied similar system.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Conceptual Model for Resilience in the field of Secuirty</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">assets</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">technologies</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">141</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;It is already understood that security cannot be guaranteed. Numerous examples of security incidents prove that, and direct both researchers and practioners to explore the opportunities for development of security systems that are resilient. A common feature of the resilient systems is that they preserve the functionality of core processes and their supporting assets under perturbations. This report presents the results of a study aiming to deliver a conceptual model of the system for resilience in the field of security, that is supported by theoretical arguments and applicable in practice.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Timothy Parsons</style></author><author><style face="normal" font="default" size="100%">James J. Nolan</style></author><author><style face="normal" font="default" size="100%">Frank Crispino</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multinational Cooperation and Intervention: Small Steps to Better Results</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">intervention</style></keyword><keyword><style  face="normal" font="default" size="100%">multinational</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">48</style></volume><pages><style face="normal" font="default" size="100%">160-170</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;Through the latter years of the twentieth century and early years of the twenty-first century, there have been a number of high-profile multinational interven&amp;shy;tions by the international community in countries deemed to be sufficiently un&amp;shy;stable to present a threat to global peace or, more controversially, to local pop&amp;shy;ulations. Beginning with the tardy but largely successful intervention in the Yu&amp;shy;goslav civil war in 1990 and culminating in the soon to conclude intervention in Afghanistan after the Al Qaeda attacks on the USA in 2001, there have also been military interventions in Iraq in 2003 and Libya in 2011. The list is not exhaustive. There have been other interventions elsewhere, but these particular examples of military intervention mainly conducted by western powers provide illuminat&amp;shy;ing insights into the success and, sometimes, the failure of such multinational security responses to perceived international threats.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">160</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">George Sharkov</style></author><author><style face="normal" font="default" size="100%">Christina Todorova</style></author><author><style face="normal" font="default" size="100%">Pavel Varbanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Strategies, Policies, and Standards in the EU Towards a Roadmap for Robust and Trustworthy AI Certification</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">certification</style></keyword><keyword><style  face="normal" font="default" size="100%">Ethics</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">lawfulness</style></keyword><keyword><style  face="normal" font="default" size="100%">robust AI</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">trustworthy AI</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">11-22</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;Within recent years, governments in the EU member states have put increasing efforts into managing the scope and speed of socio-technical transformations due to rapid advances in Artificial Intelligence (AI). With the expanding deployment of AI in autonomous transportation, healthcare, defense, and surveillance, the topic of ethical and secure AI is coming to the forefront. However, even against the backdrop of a growing body of technical advancement and knowledge, the governance of AI-intensive technologies is still a work in progress facing numerous challenges in balancing between the ethical, legal and societal aspects of AI technologies on the one hand and investment, financial and technological on the other. Guaranteeing and providing access to reliable AI is a necessary prerequisite for the proper development of the sector. One way to approach this challenge is through governance and certification. This article discusses initiatives supporting a better understanding of the magnitude and depth of adoption of AI. Given the numerous ethical concerns posed by unstandardized AI, it further explains why certification and governance of AI are a milestone for the reliability and competitiveness of technological solutions.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Albena Popova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Tools for Managing an Airport Security System</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">airport</style></keyword><keyword><style  face="normal" font="default" size="100%">balanced scorecard</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">strategic map</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy for development</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><number><style face="normal" font="default" size="100%">142</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The airport security management system is a complex system that includes provision of the security of personnel and passengers, aviation equipment, cargo, information, technical systems and various other assets. First and foremost, it needs to be comprehensive and sustainable. At the same time, against the background of changes in the security environment, the studied airport security management system should have sufficient flexibility, allow for changes and able to adapt. This report presents the results of a study on the possibilities for adaptation and application of classic management tools in the interest of ensuring sustainable development of the airport security management system.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maksym Brazhenenko</style></author><author><style face="normal" font="default" size="100%">Victor Shevchenko</style></author><author><style face="normal" font="default" size="100%">Oleksiy Bychkov</style></author><author><style face="normal" font="default" size="100%">Boyan Jekov</style></author><author><style face="normal" font="default" size="100%">Pepa Petrova</style></author><author><style face="normal" font="default" size="100%">Eugenia Kovatcheva</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Adopting Machine Learning for Images Transferred with LoRaWAN</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cloud</style></keyword><keyword><style  face="normal" font="default" size="100%">IoT</style></keyword><keyword><style  face="normal" font="default" size="100%">LoRa</style></keyword><keyword><style  face="normal" font="default" size="100%">machine learning</style></keyword><keyword><style  face="normal" font="default" size="100%">Raspberry PI</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">172-186</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">LPWAN (Low-power Wide-area network) networks are well-known since the 1980s, but due to low efficiency were not in active use for a long time. Modern LPWAN is a game-changing technology with true power in net-work coverage, cost efficiency, and low operational expenses. LPWAN services’ most frequent market is in smart cities, agriculture, healthcare, and civil defence systems. LoRa is considered one of the market leaders in LPWAN; however, the low bandwidth of its physical layer makes it unsuitable for high-speed transmission. The provision of integrity, availability, and confidentiality in IoT networks is still of major concern. Data accuracy and lack of control over the transmission of personal information prevents the active use of the technology in regulated industries, such as healthcare and civil defence. In this article, we adopt LoRa for the trans-mission of media content, with an ability to regulate the quality of data and achieve desired level of integrity and availability. This allows the system to self-configure (train) via more reliable machine learning techniques.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">172</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">On Conflicts, Interests, Goals, Power, and Security</style></title><secondary-title><style face="normal" font="default" size="100%">CSDM Views</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">conflict</style></keyword><keyword><style  face="normal" font="default" size="100%">goals</style></keyword><keyword><style  face="normal" font="default" size="100%">hard power</style></keyword><keyword><style  face="normal" font="default" size="100%">interests</style></keyword><keyword><style  face="normal" font="default" size="100%">lessons learned</style></keyword><keyword><style  face="normal" font="default" size="100%">protests</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">soft power</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">40</style></number><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&amp;nbsp;For people who are results-oriented, there are two basic rules. The first says that what is important is to achieve the goal, not the effort spent or the time wasted. Achieving the goal in practice means defending the interests in the course of a conflict with the help of adequate means, including power if necessary. The metric for achieving the goal is the security desired and sought by the subjects whose interests are defended with the tools of power. The second rule states that regardless of the result achieved, a benefit can be derived from the lessons learned.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Yuriy Ponochovnyi</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybernetic Approach to Developing Resilient Systems: Concept, Models and Application</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">online verification</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience control system</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">77-90</style></pages><abstract><style face="normal" font="default" size="100%">The paper contains the results of the development and implementation of a cybernetic approach to the creation of resilient systems. The architecture of a resilient system contains redundant components compared to a traditional feedback control system. This is primarily due to the need to implement additional channels in the control system to respond to changes in requirements, environment, or unspecified faults and failures. The general structure of a resilient system is based on the principle of dividing control channels for functional and non-functional characteristics. This allows to react to changes in the information component of the environment during attacks on the system to ensure its cybersecurity. The case for a space resilient system with online verification is described. Three scenarios of the system behavior to assure resilience are suggested and the first scenario is explored by the use of Markov model. That allows offering options for improving availability function and other indicators of resilient systems.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">77</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Venelin Georgiev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Demography, Capabilies and Security</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">demographics</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">security capabilities</style></keyword><keyword><style  face="normal" font="default" size="100%">security functions</style></keyword><keyword><style  face="normal" font="default" size="100%">security policies</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">134</style></number><pages><style face="normal" font="default" size="100%">1-10</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Demographic processes and security are related and interdependent. The author argues for an appropriate integrating component that accounts for the demographic factors and their influence on the level of security. The concept of capabilities can perform this role. In this report, the link between demographic processes and policies and the state of security is examined through the lens of security capabilities and the human factor as their basic component. Equally appealing is the study of the link between security functions, security policies and the level of security in general, and the demographic security in particular.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Petar Antonov</style></author><author><style face="normal" font="default" size="100%">Nikoleta Georgieva</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Analysis of Diceware Passphrases</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">diceware passphrase</style></keyword><keyword><style  face="normal" font="default" size="100%">password</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">276-282</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The purpose of this study is to analyse the security of Diceware pass-phrases in comparison with various symmetric authenticated encryption schemes against the brute force attack. It proves that the security of these passphrases is deficient and, therefore, its use should end gradually. Additionally, this study offers ways on how Diceware could enhance its security.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">276</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elisaveta Staneva</style></author><author><style face="normal" font="default" size="100%">Mariyan Rachev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Tactical Approach to Cyber Defence in IoT Computer Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">architecture</style></keyword><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet of Things</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Vulnerabilities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">135-140</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Securing Internet of Things’ devices has been an ongoing struggle since the technology's recognition. Finding methods to prevent or counter those threats through the experience of the hackers themselves is a promising way of securing these devices. The approach described in this article uses that experience and transforms it into useful models and algorithms for IoT security.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">135</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dafina Zoteva</style></author><author><style face="normal" font="default" size="100%">Peter Vassilev</style></author><author><style face="normal" font="default" size="100%">Lyudmila Todorova</style></author><author><style face="normal" font="default" size="100%">Krassimir Atanassov</style></author><author><style face="normal" font="default" size="100%">Lyubka Doukovska</style></author><author><style face="normal" font="default" size="100%">Valery Tzanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Generalized Net Model of Cyber-control of the Firm’s Dumpers and Crushers</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2019</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">data mining</style></keyword><keyword><style  face="normal" font="default" size="100%">generalized net</style></keyword><keyword><style  face="normal" font="default" size="100%">model</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2-4 October</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Sofia, Bulgaria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper presents generalized net model of a system for tracking and monitoring the movement and actions of a rm&amp;#39;s dumpers and crushers. The model permits analysis regarding possible cyber manipulation of data, and highlights the key vulnerabilities of such systems.&lt;/p&gt;&lt;p&gt;This paper is included in the program of &lt;a href=&quot;https://digilience.org&quot;&gt;DIGILIENCE 2019&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rosen Iliev</style></author><author><style face="normal" font="default" size="100%">Kristina Ignatova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Implementation of Cloud Technologies for Building Data Centers in Defence and Security</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cloud computing</style></keyword><keyword><style  face="normal" font="default" size="100%">cloud technologies</style></keyword><keyword><style  face="normal" font="default" size="100%">data centre</style></keyword><keyword><style  face="normal" font="default" size="100%">defence</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">virtualization</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">89-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents an analysis of cloud technologies as key current trend in the development of IT infrastructure, their main characteristics, security levels and the increased requirements they must meet when considered for defence and security applications. It provides an overview of main standards and requirements that modern data centres have to meet to ensure a high level of availability of the provided IT services. Specific requirements have been formulated for building a sustainable system of modern data centres for defence and security needs, and attention has been paid to data protection when using cloud technologies. A solution is proposed for implementing cloud technologies and an approach for building an integrated data centre system for defence and security needs in organizing collaborative work between officials within the organization.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">89</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sergiy Dotsenko</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Sergii Kamenskyi</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrated Security Management System for Enterprises in Industry 4.0</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">control system</style></keyword><keyword><style  face="normal" font="default" size="100%">enterprise management system</style></keyword><keyword><style  face="normal" font="default" size="100%">industry 4.0</style></keyword><keyword><style  face="normal" font="default" size="100%">integrated security management system</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">standards</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">294-304</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This paper presents results from the analysis of methodologies and standards aiming to meet the requirements to security management of enterprises implementing Industry 4.0 principles. Key standards such as ISO/IEC 7498, 15408, 18045, 20000, 27000 have been analysed to suggest an approach to the development of integrated security and safety management system structure considering threats of intrusion into physical, information and signal spaces. This system, based on the cybernetic principles of control, is part of the enterprise management system. Security subsystems check and control according to individual and general objectives for physical, information and signal spaces and respective requirements-based models. On that basis the paper presents results and recommendations for enhancing and implementing integrated security management systems. </style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">294</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Khayal Iskandarov</style></author><author><style face="normal" font="default" size="100%">Gregory Simons</style></author><author><style face="normal" font="default" size="100%">Piotr Gawliczek</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The South Caucasus: Stage for a ‘New Great Game’ between NATO and Russia?</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">frozen conflict</style></keyword><keyword><style  face="normal" font="default" size="100%">great power competition</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">Russia</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer-Fall 2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">7-34</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The South Caucasus is one of the most important geostrategic regions between Europe and Asia, a playground for many regional and global actors with enduring interests. These interests have been clashing through the centuries. Each actor endeavors to impose its rules and tries to capitalize on the geostrategic benefits of the region. This article analyzes the main aspects, challenges, and prospects of cooperation between the countries in the South Caucasus and Russia and NATO. The authors describe the competition for power and influence in the region, the “Old Great Game,” the regional state of affairs, and possible effects of the Russian factor on the South Caucasus-NATO cooperation. They illustrate Russia’s security interests in the South Caucasus vis-à-vis NATO’s enlargement policy, outline the reasons for the Alliance’s reluctance to engage in the region actively, and current and future prospects of South Caucasus-NATO cooperation. NATO’s presence is said to counterbalance the Russian military presence in the region, but how is this managed without antagonizing the incumbent government in Moscow and what is its contribution to resolving the so-called “frozen conflicts” in order to maintain the security and prosperity of the South Caucasus? The combination of competition and confrontation has been designated as the “New Great Game,” with clear similarities and differences vis-à-vis the “Old Great Game.” The authors question whether a “New Great Game” currently exists and apply comparative analysis, synthesis, inductive, and deductive methods to come up with conclusive answers.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">7</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mihail Naydenov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Building the Capacity of NATO’s Eastern European  Members to Fight Hybrid War</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capacity building</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid war</style></keyword><keyword><style  face="normal" font="default" size="100%">institutions</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">Russia</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">subversion</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">45-58</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The Russian Federation has been waging a hybrid war campaign against NATO and the EU for years. The Kremlin has so far skillfully managed to exploit the vulnerabilities of the West. The NATO Eastern flank members are particularly exposed to the Kremlin-orchestrated systematic subversion and this is a problem of growing significance to the Alliance as it is undermining its cohesion and is preventing the build-up of strong national security and defense systems of its Eastern European member states. In order to effectively remedy this dangerous situation, the Eastern flank NATO member states must immediately start implementing a coherent national institutional capacity building programs, supported by NATO and the EU, aimed at timely mitigation of existing vulnerabilities and building up long-lasting resilient national security structures able to tackle hybrid threats coming from any direction. To carry out this ambition, a number of capacity building steps are proposed.</style></abstract><section><style face="normal" font="default" size="100%">45</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nebojsa Nikolic</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Connecting Conflict Concepts: Hybrid Warfare and Warden’s Rings</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">decision making</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">system approach</style></keyword><keyword><style  face="normal" font="default" size="100%">unrestricted warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">Warden’s rings</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">21-34</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article explores connections among existing descriptive concepts of conflict. The focus is on connecting the “five rings” concept of John Warden and hybrid threats in a wider sense. The motivation is three-fold: firstly, to explore, compare and complement old and new concepts; secondly, to contribute to the systematization of numerous modes of security violation; and thirdly, to propose some basics for the creation of a tool for optimal choice of hybrid activities and countermeasures. Contemporary security violations are complex, not always visible, hard to detect, hard to be attributed and very different by nature and characteristics. Systemic analyses of indicated attempts of hybrid security violations through the prism of Warden’s rings contribute to better perception and recognition of the real purpose of hybrid attack and even indicate possible initiators. For the defender’s side, this approach is useful to analyse and recognize own vulnerabilities, which is a good starting point to prepare defences and countermeasures. For a hybrid attacker, this approach offers good tool for optimal choice of appropriate options from the spectrum of hybrid warfare tools.
</style></abstract><section><style face="normal" font="default" size="100%">21</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Krassen Daskalov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Hybrid Warfare and the Challenge It Poses to the Psychological Resilience Training in the Bulgarian Military</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">military</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">training programme</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">197-205</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article provides an overview of hybrid warfare and psychological resilience, and the related challenges faced by individuals, communities and societal security in regard to the psychological effects of hybrid threats. Since the concept of psychological resilience is new and almost unknown in Bulgaria, and even less so in the Bulgarian military, the article introduces the reader to the concept of psychological resilience. It then suggests a model of developing resilience training in the Bulgarian armed forces.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alberto Bin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">NATO’s Defense Institution Building and Projecting Stability: Current Priorities and Activities</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capacity</style></keyword><keyword><style  face="normal" font="default" size="100%">Defense Institution Building</style></keyword><keyword><style  face="normal" font="default" size="100%">DIB</style></keyword><keyword><style  face="normal" font="default" size="100%">partnership</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Stability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">8-22</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Emphasizing the interdependence between the security of the Allies and that of their neighborhood, NATO’s “Projecting Stability” agenda constitutes an important step in the organization’s adaptation to the current security environment. Defense Institution Building (DIB) plays a key role in this agenda by supporting partners in developing their defense sectors, thereby contributing to their own stability and that of the entire region.
Under the framework of Partnership Action Plan on Defense Institution Building (PAP-DIB), several programs were developed in order to reach the objectives of the different aspects of DIB, with the ultimate goal of achieving democratic progress and maintaining stability; that is, a modern and democratically-managed security sector which is respected and trusted by the society. 
As this article stipulates, the success of these programs is dependent upon many variables including credibility of DIB interventions, their continuity, and the political buy-in and national ownership of reform, as well as the extent to which the interventions are tailored to local conditions.

</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Marcin Kozieł</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">NATO’s Defense Institution Building in the Age of Hybrid Warfare</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">capacity building</style></keyword><keyword><style  face="normal" font="default" size="100%">Defense Institution Building</style></keyword><keyword><style  face="normal" font="default" size="100%">DIB</style></keyword><keyword><style  face="normal" font="default" size="100%">Hybrid threats</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Stability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">39-51</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Defense Institution Building (DIB) plays a crucial role in NATO’s “Projecting Stability” agenda by assisting Partners in developing their defense and security sectors, thereby increasing not only their security, but also that of the Euro-Atlantic region. At the same time, the current security environment is defined by complex and diffuse threats coming from both state and non-state actors, where the adversary aims at incapacitating the state. For this reason, increasing the resilience of the defense and security institutions against the hybrid threats in particular is key – a reality which should inform adaptation of the NATO’s DIB instruments. 
This article discusses a number of key implications of the hybrid warfare for NATO’s DIB policies and processes, emphasizing that capacity building should aim to help the state institutions increase their ability to recognize and respond to hybrid warfare and, if necessary, to sustain the functioning of the state and its institutions under hybrid warfare conditions.
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nebojsa Nikolic</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Obstacles in Inter-Organizational Cooperation and Hybrid Threats</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">defence</style></keyword><keyword><style  face="normal" font="default" size="100%">hybrid warfare</style></keyword><keyword><style  face="normal" font="default" size="100%">Inter-organizational</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">39</style></volume><pages><style face="normal" font="default" size="100%">29-41</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Inter-organizational cooperation at both national and international level depends on many factors. Some can have negative influence and be perceived as obstacles to efficient inter-organizational cooperation. Obstacles could be caused by bureaucratic rivalries, parochial mentality, rigid organizational rules and procedures, inappropriate information, harmful leadership, etc. Due to a variety of hybrid threats, the logical response of states’ leaders should be directed to gathering information from all available sources in order to become resilient and respond adequately to hybrid threats. Identification of obstacles and evaluation of their influence may contribute to the ability to resolve problems, to avoid obstacles or, at least, to clarify needs and opportunities for improvement.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">29</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oksana Medvedchuk</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Self-regulation as a Risk Mitigation Tool in the Design and Construction of Critical Infrastructures</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">construction</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">exploitation</style></keyword><keyword><style  face="normal" font="default" size="100%">risk management</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">self-regulation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">40</style></volume><pages><style face="normal" font="default" size="100%">129-133</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Critical infrastructures are of strategic significance for the functioning of the economy, the security of a state, society and the population. Their breakdown or destruction has a considerable impact on the national security and defence, the natural environment, leads to material and financial losses and possibly casualties. Therefore, ensuring quality and reliability of such infrastructure is a priority of the state policy. The state policy in this regard is implemented through state regulation mechanisms aiming to protect life, health, property, and the environment, as well as by establishing ways of organizing or conducting activities, licensing rules, place and time of activities, volume of production or provision of services, etc. Control and supervisory functions are also important elements of the state regulation. In the Ukrainian experience, traditional mechanisms of state regulation do not ensure a relevant culture in construction. Thus, it is necessary to study and implement best international practices of avoiding risks in construction, in particular by self-regulation. This paper reviews approaches to self-regulation and the extent to which such practices contribute to risk mitigation in the design and construction of critical infrastructure assets, as currently implemented in Ukraine.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">129</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maksym Bugriy</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Ukraine’s Security Sector Reform: Is Ukraine Taking Western Advice?</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">complexity theory</style></keyword><keyword><style  face="normal" font="default" size="100%">Cynefin</style></keyword><keyword><style  face="normal" font="default" size="100%">DCAF</style></keyword><keyword><style  face="normal" font="default" size="100%">defense</style></keyword><keyword><style  face="normal" font="default" size="100%">EU</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">security sector reform</style></keyword><keyword><style  face="normal" font="default" size="100%">Ukraine</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">72-91</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The ongoing Western support to Ukraine’s security sector reform requires the assessment of the reform success. This article considers whether Ukraine’s reform is achieving effectiveness, efficiency, and democratic governance objectives. The author uses a theoretical framework of complexity theory applied to the change management research in organizational studies. The application of this framework is appealing from the perspective of complex and chaotic organizational contexts, in which the security sector can stimulate the emergence of ‘strange attractors’ for system’s adaptability. The findings suggest that Ukraine is building a shared vision following up on chaotic-framed Security Sector Reform acceleration since 2014. The gap between increased confidence in the volunteers and the army and declining confidence in general government institutions, economic burden, and Western cohesion issues constitute the risks that Ukraine’s Europeanization faces.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">72</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Amar Causevic</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Facing an Unpredictable Threat: Is NATO Ideally Placed to Manage Climate Change as a Non-Traditional Threat Multiplier?</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">climate change</style></keyword><keyword><style  face="normal" font="default" size="100%">international relations</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2017</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">59-80</style></pages><abstract><style face="normal" font="default" size="100%">This paper examines NATO’s perception of climate change as a non-traditional threat multiplier. For well over a decade, European as well as Pentagon and other U.S. government studies and policy documents have noted that as the planet continues to warm, arable land continues to disappear, cyclones become more powerful, droughts increase in impact, food shortages are more frequent, and thousands of climate migrants are on the move. All of these climate change-related factors significantly increase the likelihood of conflict escalation. The threat multiplier characteristic of climate change will only exacerbate problems such as government instability, the spread of disease, conflicts over water supplies, the strengthening of terrorism, and widespread migration. This research explores NATO’s initiatives to deal with this non-traditional threat multiplier and analyzes how different schools of international relations theory define climate change and address this security concern. In addition, the article provides insights into how climate change-induced threats affect the socio-economic and political security of nation states and what that means for NATO. Finally, the research provides a review of the Alliance’s engagement, policy frameworks, operations, and units re-sponsible for tackling threats originating from climate change. It concludes with the recommendation that NATO has made significant progress on placing climate change on its threat radar, but that the Alliance will have to do more to integrate these concerns because current efforts are not sufficient to meet future security challenges stimulated by increase in the average global temperature.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elman Nasirov</style></author><author><style face="normal" font="default" size="100%">Khayal Iskandarov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Prospects of Azerbaijan to Enhance Military Interoperability with NATO</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">exercise</style></keyword><keyword><style  face="normal" font="default" size="100%">Interoperability</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">training</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Fall 2017</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">89-99</style></pages><abstract><style face="normal" font="default" size="100%">After the end of the Cold War, NATO recognized the importance of extending far beyond its traditional borders in order to maintain peace and stability throughout Europe. The incorporation of new members into the Alliance came to the fore. In the light of this approach, cooperation with partner nations became an important area for discussion. Ensuring that partner forces could work together effectively was one of the main objectives and this, in turn, highlighted the term ‘interoperability’ once again. Thus, the evolution of interoperability between NATO and partner nations after the demise of Cold War is considered in this essay, its importance is underscored, the levels of interoperability are introduced and the feasibility of Azerbaijan’s engagement in these levels is analyzed in this article. Different tools and mechanism that the Alliance has launched over the last decades are scrutinized and useful recommendations are considered for Azerbaijan to enhance its military interoperability with NATO. From this perspective of interoperability, different successful models have been outlined as examples for Azerbaijan to follow.</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">91</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elman Nasirov</style></author><author><style face="normal" font="default" size="100%">Khayal Iskandarov</style></author><author><style face="normal" font="default" size="100%">Sadi Sadiyev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The South Caucasus: A playground between NATO and Russia?</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">contribution</style></keyword><keyword><style  face="normal" font="default" size="100%">cooperation</style></keyword><keyword><style  face="normal" font="default" size="100%">counterbalance</style></keyword><keyword><style  face="normal" font="default" size="100%">frozen conflict</style></keyword><keyword><style  face="normal" font="default" size="100%">membership</style></keyword><keyword><style  face="normal" font="default" size="100%">NATO</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2017</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">47-56</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In this article, the challenges and prospects of cooperation between the South Caucasus countries and NATO have been analyzed. The geo-economic, geopolitical and geostrategic importance of the region for both NATO and the Collective Security Treaty Organization (Russia particularly) and reciprocal expectations of further cooperation with the Alliance have been considered. The regional state of affairs in the South Caucasus has been analyzed and the possible impacts of Russian influence on forging closer relations with NATO have been examined. The security environment after the Russo-Georgian war and its repercussions for the South Caucasus-NATO cooperation have been illustrated. NATO’s vested interest in the region to contribute to a European security system for the foreseeable future was brought to the fore. The reasons for the Alliance’s reluctance to actively engage in the region are examined. The recommendations are intended to counterbalance the Russian military presence in the region, without antagonizing the incumbent government in Moscow, and to eradicate the so-called “frozen conflicts” in order to maintain security and prosperity for the South Caucasus region as a whole.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">47</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oksana Pomorova</style></author><author><style face="normal" font="default" size="100%">Sergii Lysenko</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Formal and Intelligent Methods  for Security and Resilience:  Education and Training Issues</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">B-method</style></keyword><keyword><style  face="normal" font="default" size="100%">computer networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Formal methods</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">resilient system</style></keyword><keyword><style  face="normal" font="default" size="100%">secure protocol</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">software development</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">133-150</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents the results of the implementation of TEMPUS SEREIN project in the Khmelnitsky National University. The main challenge was to develop curriculum and course materials for masters and PhD students. The authors introduce the module description of the course “Formal and Intelligent Methods for Security and Resilience.” The module deals with the issues of development and usage of formal methods for designing secure software systems and implementation of formal methods for assuring security of computer networks. We also present some issues on the usage of intelligent systems for security and address the questions of enhancing systems’ resilience. The implementation of the developed training course will improve the quality of education and will make graduates more successful on the labour market.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">133</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jasmin Čajić</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Relevance of Clausewitz’s Theory of War to Contemporary Conflict Resolution</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Clausewitz</style></keyword><keyword><style  face="normal" font="default" size="100%">conflict resolution</style></keyword><keyword><style  face="normal" font="default" size="100%">policy</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">war</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">72-78</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article argues that Clausewitz’s writing on war nearly 200 years ago is still relevant for contemporary conflict resolution from at least three aspects: his idea that war is “the continuation of policy by other means”; secondly his analysis of the nature of war and the trinity theory; and finally his understanding of the nature of the strategy. The analysis in this article found that, if there is good policy from which to derive a strategy, and if we are able to apply it efficiently, with support of the people and international community, we have created solid preconditions to win the war. In addition, Clausewitz’s view of the issues associated with war, strategy and conflict resolution is important for understanding the major issues and decision making even while history and reality constrain his abstractions with today’s experience. His theories and concepts are as relevant today as they were two hundred years ago. Therefore, the twenty-first century strategists and leaders are recommended to take into consideration Clausewitz’s theories on war and strategy because they are still applicable today. In short, Clausewitz is a theorist for the twenty-first century.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Artem Boyarchuk</style></author><author><style face="normal" font="default" size="100%">Oleg Illiashenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Jüri Vain</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Serein Project: Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">dissemination</style></keyword><keyword><style  face="normal" font="default" size="100%">European project</style></keyword><keyword><style  face="normal" font="default" size="100%">master studies</style></keyword><keyword><style  face="normal" font="default" size="100%">PhD studies</style></keyword><keyword><style  face="normal" font="default" size="100%">resilience</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">35</style></volume><pages><style face="normal" font="default" size="100%">29-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper presents the ongoing EC-funded Tempus project TEMPUS SEREIN (Modernization of Postgraduate Studies on Security and Resilience for Human and Industry Related Domains, http://serein.net.ua) executed by consortia of academia and industry partners from Ukraine and EU countries. The state-of-the-art, completed work as well as the next steps of the development of teaching courses of master and doctoral level and in-service training modules on security and resilience for human and industry related domains are described.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">29</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Predrag Tasevski</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Macedonian Path Towards Cybersecurity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber</style></keyword><keyword><style  face="normal" font="default" size="100%">establishment</style></keyword><keyword><style  face="normal" font="default" size="100%">Macedonia</style></keyword><keyword><style  face="normal" font="default" size="100%">MKD-CIRT</style></keyword><keyword><style  face="normal" font="default" size="100%">National security</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">109-119</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Information and communication technologies in Macedonia have experienced a phenomenal growth throughout the last decades, which has had a tremendous impact on governmental services&amp;rsquo; presence in the Internet, as well as on everyday life. Against this background, technologies-based growth introduces new risks and threats to the cyber domain in the country. To respond to those challenges the Macedonian government is pursing the establishment of a national authority to react to cyber attacks that occur, or a Computer Incident Response Team &amp;ndash; MKD-CIRT, and the adoption of a National Cybersecurity Strategy. However, it should be taken into account that such tasks are neither easy nor simple. There are several issues that should be considered, for instance: the improvement of the measures for protection of information systems and of the critical infrastructure; the legal and policy framework; the international approach; and the formation of a cybersecurity culture, to name but a few. Simultaneously, considering that Macedonia is a candidate for accession to the EU and NATO, it has to comply with their standards when performing the reforms in the cybersecurity field. The current article briefly introduces the country&amp;rsquo;s steps towards cybersecurity, provides an analysis of the legal, policy and institutional progress achieved, and suggests recommendations that should be considered to ensure safer, secure, trustworthy and resilient cyber space in the country.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nebojsa Nikolic</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Serbian Security Perceptions: Motivations to Serve</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Active Reserve</style></keyword><keyword><style  face="normal" font="default" size="100%">manning</style></keyword><keyword><style  face="normal" font="default" size="100%">Military organisation</style></keyword><keyword><style  face="normal" font="default" size="100%">motiva¬tion</style></keyword><keyword><style  face="normal" font="default" size="100%">ranking</style></keyword><keyword><style  face="normal" font="default" size="100%">recruitment</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Serbia</style></keyword><keyword><style  face="normal" font="default" size="100%">South-Eastern Europe</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">122-137</style></pages><abstract><style face="normal" font="default" size="100%">An empirical study was conducted to find out the level of propensity to serve in the Active Reserve of the Serbian armed forces and Ministry of Defence according to a newly established concept of manning. The concept of Active Reserve corresponds to similar concepts in other countries and is of growing importance and actuality, particularly in countries which have recently abandoned their military conscription system aiming to create professional military forces that citizens can join voluntarily. The concept of Active Reserve assumes that a citizen signs a contract with the Ministry of Defence, confirming his or her willingness and readiness to serve in the military on call, while in the meantime living and working on their own. Active Reserve offers mutual benefits: it relaxes temporary problems related to manning of military units and is a source of additional money for individuals engaged in it. One of the main questions related to the Active Reserve is the level of propensity to serve in it, while equally interesting is the investigation of motivational factors which stand behind the willingness to serve. The results show a very high propensity of population to serve in the country and a significant level of readiness to participate in peace missions abroad. The structure of motivational factors to join the Active Reserve indicated a meaningful level of a security awareness of the population. These findings are in concordance with some novel results about security perceptions in the South-Eastern Europe, including Serbia.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sabina Baraković</style></author><author><style face="normal" font="default" size="100%">Jasmina Baraković Husić</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">“We Have Problems for Solutions”: The State of Cybersecurity in Bosnia and Herzegovina</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Bosnia and Herzegovina</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">32</style></volume><pages><style face="normal" font="default" size="100%">131-154</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The Internet and information communication technologies (ICT) became the most important components in everyday life, given the fact that they have altered the behaviour patterns and in many aspects made our lives simpler. Upcoming Internet of Things (IoT) will additionally have a positive influence on our Quality of Life (QoL). However, even now, the society is extremely vulnerable to disturbances that may affect the functioning of the Internet and ICT systems, and thereby jeopardize the reliability and security of the information they contain. The situation tends to become even more complicated when IoT takes effect and cyber threats exceed the perimeter of information security and include physical security, existence and health. The world has shyly started to raise questions and perceive problems regarding the IoT, QoL and security issues that it will bring to the cyber space in order to find the appropriate solutions in time. Bosnia and Herzegovina, as well as any other modern country, needs to take place in these processes and newly opened research fields. Therefore, this paper gives an overview of Bosnia and Herzegovina&amp;rsquo;s existing cyber security infrastructure and capacities in terms of legislation, security management structure, corresponding cyber security units, as well as their cooperation and qualification level. Based on the elaborated, the cyber security is not among the priorities in Bosnia and Herzegovina. Also, the country &amp;ldquo;offers&amp;rdquo; problems for adequate and generally accepted solutions in the cyber security domain and needs to work on its readiness to contribute to the safety of IoT and cyber space, and consequently improving citizens&amp;rsquo; QoL.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dana Procházková</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The EU Civil Protection Upgrading Needs</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Civil protection</style></keyword><keyword><style  face="normal" font="default" size="100%">critical infrastruc¬ture</style></keyword><keyword><style  face="normal" font="default" size="100%">daily human needs</style></keyword><keyword><style  face="normal" font="default" size="100%">protection in emergencies</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">88-108</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Civil protection has two pillars. The first one supports the humans´ daily lives and the other ensures the protection of humans at emergency and critical situations. Both consist of systems aiming to provide human security, welfare and critical infrastructure protection. This paper describes the three types of civil protection systems existing in the EU Member States and summarizes the results of original research. The results demonstrate a need for individual public assets’ protection. The paper includes suggestions on domains for future research to fulfil identified requirements.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">88</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ricard Munné</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Future Security Trends and Their Impact from an Industry Point of View</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">comprehen¬sive approach</style></keyword><keyword><style  face="normal" font="default" size="100%">Critical Infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">EU framework</style></keyword><keyword><style  face="normal" font="default" size="100%">foresight</style></keyword><keyword><style  face="normal" font="default" size="100%">global actor</style></keyword><keyword><style  face="normal" font="default" size="100%">impact</style></keyword><keyword><style  face="normal" font="default" size="100%">industry</style></keyword><keyword><style  face="normal" font="default" size="100%">Natural Disasters</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">supply chain</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">147-160</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Impacts from future security trends on industry have been derived from the work performed in the scenario foresight for alternative futures, and for embedded scenarios of security research in the FOCUS project. For each FOCUS theme,  and for each scenario found in project reports, changes from the current situation have been analyzed and their impacts for different industries and activity sectors have been assessed. Trends have been grouped by industry/activity in each theme and those with significant ground in each scenario have been selected. According to scenario analysis, public services, ICT and technology, and critical infrastructure sectors are those which are more impacted by detected security trends from the scenarios analyzed. Specifically ICT has some cross cutting trends impacting in more than one theme, like information integration; intelligent knowledge based monitoring of new social media and other open information sources, information management and common situational pictures. Natural disasters, global environmental change and comprehensive approach are the most impacted FOCUS themes by future industry security trends. The analysis presented here may be useful for the assessment in the development of new research tracks or new products in the industry.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">147</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dana Procházková</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Natural Disasters’ Management and Detection of Priority Problems for Future Research</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Disaster Management</style></keyword><keyword><style  face="normal" font="default" size="100%">Human System</style></keyword><keyword><style  face="normal" font="default" size="100%">management</style></keyword><keyword><style  face="normal" font="default" size="100%">Natural Disasters</style></keyword><keyword><style  face="normal" font="default" size="100%">safety</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2013</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">127-144 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Natural disasters threaten human society from time immemorial. They are caused by processes in the Earth core and Earth surface, or in the atmosphere, and by processes in the vicinity of the Planet. Various phenomena in the human system occur as a result of its own development or under the impact of other processes. This research was targeted at natural disasters such as avalanches, hot wet summer days, drought, dams rupture, floods, tsunamis, earthquakes, volcanic eruptions, landslides, rocks tumbling down, forest fires, wind storms, tornadoes, excessive rain or snow falls, and gas erosions from the core. It identifies deficits at natural disaster management from the viewpoint of the safe community concept that has been promoted by the EU since 2004.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">127</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anatoliy Gorbenko</style></author><author><style face="normal" font="default" size="100%">Vyacheslav Kharchenko</style></author><author><style face="normal" font="default" size="100%">Olga Tarasyuk</style></author><author><style face="normal" font="default" size="100%">Alexander Romanovsky</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Intrusion-Avoidance via System Diversity</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">diversity</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion avoidance.</style></keyword><keyword><style  face="normal" font="default" size="100%">Risk</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">13</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">154-158</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper discusses a generic intrusion-avoidance architecture allowing the system architects to decrease the risk of intrusions. The architecture employs software diversity at various system levels and dynamically reconfigures the deployment environment to avoid intrusions. This solution reduces the so-called system’s days-of-risk which is a period of an increased security risk between the time when a vulnerability is publicly disclosed to the time when a patch is available to fix it. To select the less vulnerable system configuration we propose metrics estimating security risks by accounting a number of not-fixed vulnerabilities and their severity.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kateryna Netkachova</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Model and Implementation of Safety Case Cores</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">ASCE plug-in</style></keyword><keyword><style  face="normal" font="default" size="100%">OTS component assessment</style></keyword><keyword><style  face="normal" font="default" size="100%">Safety case core</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">vulnerability</style></keyword><keyword><style  face="normal" font="default" size="100%">web service</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">23</style></number><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">286-295</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The paper introduces a general concept of Safety Case Core, which is an extension of the Safety Case methodology. The definition of the safety case core is provided, the scope, principles and structure of a core are outlined, and a general set-theoretical model is presented. An approach to tracking and managing vulnerability information, assessing security and reliability characteristics of ready-made software components is discussed. To demonstrate the practical relevance and applicability of the proposed approach, a safety case core for assessing off-the-shelf components is developed. The database schema of the developed safety case core, modelled using the entity-relationship diagram, is presented; the important design and implementation details and techniques are outlined. The integration of the core with ASCE software tool as a plug-in and implementation as a web service for off-the-shelf component assessment are presented.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ahmad Mashhour</style></author><author><style face="normal" font="default" size="100%">Zakaria Saleh</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating Wireless Networks Security in Jordan: A Field Study</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Wardriving</style></keyword><keyword><style  face="normal" font="default" size="100%">WEP</style></keyword><keyword><style  face="normal" font="default" size="100%">Wired Equivalent Privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">Wirless Local Area Network</style></keyword><keyword><style  face="normal" font="default" size="100%">WLAN</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">26</style></volume><pages><style face="normal" font="default" size="100%">34-43</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The attractiveness of wireless networks, combined with the vulnerabilities those networks are exposed to, has caused an increase in the number of insecure computer networks that can be accessed without authorisation. The purpose of the study is to provide an evaluation of the Wireless Network environment in Jordan in view of the use of the WLAN equipment as well as the use of security setting of the equipment. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. In this paper, we will demonstrate through field evaluation of the Wireless Local Area Network that the problem of wardriving can be quite severe, and some measures need to be taken to improve security by wireless network users.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">34</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Thomas Allen</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">US Department of Defense Modeling and Simulation: New Approaches and Initiatives</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Interagency</style></keyword><keyword><style  face="normal" font="default" size="100%">JIM</style></keyword><keyword><style  face="normal" font="default" size="100%">Joint and Multinational</style></keyword><keyword><style  face="normal" font="default" size="100%">Modeling and Simulation; Management; Strategy; Analysis; Business Plan; Irregular Warfare; Global War On Terror; GWOT</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">SSTR</style></keyword><keyword><style  face="normal" font="default" size="100%">Stability</style></keyword><keyword><style  face="normal" font="default" size="100%">Transition and Reconstruction</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">32-48</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In order to more effectively analyze strategic, force structure, and sys­tems choices associated with the national security environment of the 21st Century, the US Department of Defense is attempting to improve its approach to the devel­opment, management and application of Modeling and Simulation (M&amp;S). It has established a new structure to oversee and integrate M&amp;S activity and directed DoD communities to develop internal business plans to focus that effort. The Analysis Community has responded by identifying desired analytic M&amp;S goals, measuring current capabilities, prioritizing capability gaps, and then outlining potential solu­tions. These activities are being captured as part of an analysis M&amp;S business plan product and process. This paper notes that a key desired outcome is improved M&amp;S to address three areas of particular concern: Irregular Warfare and the Global War on Terror; Stability, Security, Transition and Reconstruction operations; and Joint, Interagency, and Multinational operations. In these areas, the Department is seeking a broad, collaborative approach to engage interagency and allied partners in devel­oping and using new analytic approaches and tools.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Artur Gruszczak</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Networked Security Governance: Reflections on the E.U.’s Counterterrorism Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Global Change and Governance</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">European Union</style></keyword><keyword><style  face="normal" font="default" size="100%">governance</style></keyword><keyword><style  face="normal" font="default" size="100%">Networks</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Terrorism</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Summer 2008</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">I</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">One of the objectives of the European Union has been to secure its territory and provide its citizens with
personal safety. In the global war on terror the challenge of global threats must be met as effectively as
possible. The E.U. had been developing its counterterrorist policy within an intergovernmental formula. In
the aftermath of Sepember 11 it had to look for new supranational arrangements. The politics of insecurity
strengthened by the effects of terrorist attacks on the European soil (Madrid 2004 and London 2005)
inspired the E.U.’s institutions as well as the member states to establish a networked form of security
governance based on information sharing, border control and virtual fencing as well as digital
identification and management of identity through biometrics.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue><section><style face="normal" font="default" size="100%">1-23</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Magnus Wallmark</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Interoperability between Agencies and Nations</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Interoperability</style></keyword><keyword><style  face="normal" font="default" size="100%">Network-based Defence</style></keyword><keyword><style  face="normal" font="default" size="100%">Open Architecture</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Services.</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">5-9</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article describes how secure and robust communications and information solutions, adapted for the National Security and Public Safety (NSPS) segment, can be obtained using commercial technology and existing infrastructure. Application areas include, for instance, emergency dispatch and command centres, agency communication and collaboration, and coast and border surveillance. The communication and information solutions follow the principles of a service-oriented architecture. The proposed approach to communications and information services for National Security and Public Safety facilitates improved operational capabilities and efficiency by providing access to much more advanced and timely information, by supporting efficient management of operations and by enabling cooperation and sharing of resources and information.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Chun-Ta Li</style></author><author><style face="normal" font="default" size="100%">Jau-Ji Shen</style></author><author><style face="normal" font="default" size="100%">Yen-Ping Chu</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges in E-Government and Security of Information</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Critical Success</style></keyword><keyword><style  face="normal" font="default" size="100%">e-Government</style></keyword><keyword><style  face="normal" font="default" size="100%">Factor</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">9-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Due to the advances made in Information and Communication Technologies (ICT), e-Government users can easily use the available services from places and at time that are convenient to them through WWW browsers. To easily and securely provide the required services through Information Technology (IT) has been an important issue in e-Government. In this article, the authors propose an explicit classification of e-Government applications and some challenges and obstacles in e-Government considered from four perspectives. Finally, a comprehensive view of some critical success factors in e-Government is proposed.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Justin Zhan</style></author><author><style face="normal" font="default" size="100%">Li-Wu Chang</style></author><author><style face="normal" font="default" size="100%">Stan Matwin</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy-Preserving Electronic Voting</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Electronic Voting.</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">Randomization</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2004</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">165-180</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Privacy is an important issue in electronic voting. Several electronic voting schemes have been developed in the past and some of them provided methods for dealing with privacy protection in the electronic voting system. To further enhance the privacy level, in this paper, we propose a new approach to tackle the privacy problem inherent in the electronic voting system. A privacy measure is proposed and extensive privacy analysis is conducted for the proposed scheme. It is shown via experiments that the proposed method is effective in electronic voting systems.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Editorial</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Advances in Modelling and Simulation</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">defence</style></keyword><keyword><style  face="normal" font="default" size="100%">Modelling and Simulation</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">5-15</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Editorial article by the I&amp;amp;S Editorial Board, presenting major current challenges and a summary of the contributions this volume makes in providing solutions.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">005</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Javier Carbo</style></author><author><style face="normal" font="default" size="100%">José M. Molina</style></author><author><style face="normal" font="default" size="100%">Jorge Davila</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Argumentative Negotiations with Anonymous Informer Agents</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">anonymity</style></keyword><keyword><style  face="normal" font="default" size="100%">argumentative negotiation</style></keyword><keyword><style  face="normal" font="default" size="100%">informers</style></keyword><keyword><style  face="normal" font="default" size="100%">intelligence agencies</style></keyword><keyword><style  face="normal" font="default" size="100%">Multi-agent system</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">194-206</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we present a scheme of multi-agent argumentative negotiation in the generic domain encompassing intelligence agencies and informers. Two agents, an intelligence agency and a potential informer, negotiate multiple criteria through the sequential exchange of agreement offers and counteroffers. The goal of the negotiation phase in our work is to persuade the other party by argumentative reasons. We have studied several typical arguments, which may be useful in this context, such as ultimatums, promises of future fidelity, past behaviour, and other offerings received. Furthermore, privacy protection is one of the major issues of such negotiation of secrets with informers. This can be accomplished through the exchange of arguments in counteroffer attributes and by using encryption techniques.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Iuon-Chang Lin</style></author><author><style face="normal" font="default" size="100%">Hsia-Hung Ou</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Two Secure Transportation Schemes for Mobile Agents</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Mobile agents</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">secure transportation</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">87-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Mobile agents are a new emerging popular research topic. Nowadays, the mobile agents are widely spread and implemented on the Internet. Application areas of mobile agents include electronic commerce, electronic marketing, enterprise information systems, etc. Since all the information about a mobile agent is transported over the Internet, the security policies become very important. However, the transportation security is usually neglected. In this paper, we propose two secure transportation schemes for mobile agents. They can prevent all possible attacks during the process of transporting agents. Furthermore, users can choose the best transportation scheme according to the system's scale.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Veselin Tselkov</style></author><author><style face="normal" font="default" size="100%">Dragomir Pargov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Assurance in C4I Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">C4I systems</style></keyword><keyword><style  face="normal" font="default" size="100%">common criteria.</style></keyword><keyword><style  face="normal" font="default" size="100%">cryptography</style></keyword><keyword><style  face="normal" font="default" size="100%">evaluation criteria</style></keyword><keyword><style  face="normal" font="default" size="100%">information assurance</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">security policy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">43-59</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article presents a broader definition of security and examines the components of information assurance, as well as the main features of the information security policy, a set of requirements, and a system for information security. It reflects the authors' experience in development and implementation of information security systems in the Automated Information System of the Bulgarian armed forces, as well as their participation in the creation of the Strategy for Development of Information Society in Bulgaria. Some conclusions and recommendations from the 1999 U.S.-Bulgarian study of the C4 systems in the Bulgarian armed forces were also taken into account</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Metodi Popov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Aspects of the Cellular Communications</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">authentication</style></keyword><keyword><style  face="normal" font="default" size="100%">cellular communications</style></keyword><keyword><style  face="normal" font="default" size="100%">coding</style></keyword><keyword><style  face="normal" font="default" size="100%">GSM</style></keyword><keyword><style  face="normal" font="default" size="100%">secrecy</style></keyword><keyword><style  face="normal" font="default" size="100%">security</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">73-94</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article describes the basic principles and approaches used in cellular communications to guarantee protection of voice and data massages, connections, network and system equipment. It is well known that Public Land Mobile Networks (PLMN) needs a higher level of protection than traditional telecommunication networks. The second generation cellular systems as a kind of mobile digital radio systems allow to guarantee the so called information and subscriber security to their users discussed in the paper as secrecy and authentication. In the second generation cellular systems the terms “security” and “protection” (based on the GSM-standard) mean preventing unauthorized use of the system resources and ensuring secrecy of conversations (based on RSA-algorithm) between mobile users. In this aspect, the author describes the following approach to protection and security: authentication; secrecy of transmitted voice and data; secrecy of subscriber; secrecy of equipment; secrecy of connections; and secrecy of signals for command and control. Because in wider sense the term security includes also error protection of information, various standards for coding in cellular systems are described and compared.</style></abstract></record></records></xml>