<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aleksandar Klaic</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Method for the Development of Cyber Security Strategies</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">action plan</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber security</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberspace</style></keyword><keyword><style  face="normal" font="default" size="100%">goals</style></keyword><keyword><style  face="normal" font="default" size="100%">method</style></keyword><keyword><style  face="normal" font="default" size="100%">scope</style></keyword><keyword><style  face="normal" font="default" size="100%">society</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword><keyword><style  face="normal" font="default" size="100%">vision</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2016</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">37-55</style></pages><abstract><style face="normal" font="default" size="100%">Cyberspace has become an intrinsic part of today’s society by creating a distinct virtual dimension in its functioning. Nations and the international community invest significant efforts to assure certain terms and responsibilities in this virtual dimension. The elaboration of national, NATO and EU cyber security strategies in a very short time received a high priority. The questions about the responsible institutions assigned in the strategies, guiding principles to follow, and the way of implementation are approached differently by different nations. The goal of this article is to propose a method that offers a more consistent approach to the development of cyber security strategies. The key research question is whether the proposed approach results in a more consistent national cyber security strategy that covers all the necessary national requirements and expectations, and thus makes it easier to harmonise with the variety of international requirements. In order to verify the proposed method, the article presents a brief overview of the results achieved in the case of the development process of Croatia’s National Cyber Security Strategy.
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">37</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Todor Tagarev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Programme for management of the Institute of Information and Communication Technologies of the Bulgarian Academy of Sciences</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">balanced scorecard</style></keyword><keyword><style  face="normal" font="default" size="100%">budgeting</style></keyword><keyword><style  face="normal" font="default" size="100%">innovation</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">oversight</style></keyword><keyword><style  face="normal" font="default" size="100%">R&amp;D management</style></keyword><keyword><style  face="normal" font="default" size="100%">SWOT analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">TRL</style></keyword><keyword><style  face="normal" font="default" size="100%">vision</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">55</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">„Programme for Managing and Development of the Institute of Information and Communication Technologies of the Bulgarian Academy of Sciences”.  This management programme was prepared for the procedure for appointment of director of the Institute of Information and Communication Technologies (IICT) of the Bulgarian Academy of Sciences, established through merger of three academic institutes. It is based on a SWOT analysis. The report presents the fundament of a balanced scorecard for assessing the results and the performance of a modern research and technology organisation.</style></abstract></record></records></xml>