<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lukáš Vilím</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evolution of Police Roles in Combatting Cybercrime in the Czech Republic, 2015-2020</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Budapest Convention</style></keyword><keyword><style  face="normal" font="default" size="100%">contact point</style></keyword><keyword><style  face="normal" font="default" size="100%">critical information infrastructure</style></keyword><keyword><style  face="normal" font="default" size="100%">cybercrime</style></keyword><keyword><style  face="normal" font="default" size="100%">security system</style></keyword><keyword><style  face="normal" font="default" size="100%">strategy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">15-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The article reviews the expanding roles of the Police of the Czech Republic in countering cybercrime. The author emphasizes the importance of conceptual and strategic considerations underlying the emergence of new legislation, the financial support for purchasing new equipment, and the creation of new staff positions for professionals in cybercrime. Furthermore, it is of utmost importance to develop new strategies in line with the threats, challenges, and opportunities in cyberspace. Enhanced cooperation at all levels of the security system can facilitate the creation of strategies and thus make cyberspace a safer place.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">15</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lukáš Vilím</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Social Media – Hate Speech – Hate Crime</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">criminal activity</style></keyword><keyword><style  face="normal" font="default" size="100%">extremism</style></keyword><keyword><style  face="normal" font="default" size="100%">hate speech</style></keyword><keyword><style  face="normal" font="default" size="100%">prevention</style></keyword><keyword><style  face="normal" font="default" size="100%">security system</style></keyword><keyword><style  face="normal" font="default" size="100%">social network</style></keyword><keyword><style  face="normal" font="default" size="100%">Terrorism</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2021</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">20</style></volume><pages><style face="normal" font="default" size="100%">57-73</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">This article examines the issue of hate speech on social media from the perspective of the security system of the Czech Republic and its tools designed to provide internal security and the necessary legislative amendments to allow law enforcement agencies to address this issue effectively. In the current approach to cyberspace, social networks are becoming a vehicle for the persistent spreading of hate-based ideologies, and this needs to be prevented.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">57</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Klaus Niemeyer</style></author></authors><subsidiary-authors><author><style face="normal" font="default" size="100%">I&amp;S Monitor</style></author></subsidiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Transformation: Military and Science</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">military</style></keyword><keyword><style  face="normal" font="default" size="100%">opera­tions analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Scenarios</style></keyword><keyword><style  face="normal" font="default" size="100%">science</style></keyword><keyword><style  face="normal" font="default" size="100%">security system</style></keyword><keyword><style  face="normal" font="default" size="100%">Transformation</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2009</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">245-258</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Military and science have been complementary throughout history. Military capability has always been built on the advances in science and technology and at the same time it has provided motivation and goals for new technologies and applied science. If technologies and scientific approaches advance the military op­tions, strategies and tactics need to adjust and transform accordingly. In this sense transformation of military is triggered by the advances in science and technology. At the same time, specific scientific disciplines, such as operations analysis, pro­vides the techniques and tools for a pragmatic and effective transformation of mili­tary affairs.
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">245</style></section></record></records></xml>