<?xml version="1.0"?><rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:edm="http://www.europeana.eu/schemas/edm/" xmlns:wgs84_pos="http://www.w3.org/2003/01/geo/wgs84_pos" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:rdaGr2="http://rdvocab.info/ElementsGr2" xmlns:oai="http://www.openarchives.org/OAI/2.0/" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:ore="http://www.openarchives.org/ore/terms/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:dcterms="http://purl.org/dc/terms/"><edm:WebResource rdf:about="http://www.dlib.si/stream/URN:NBN:SI:DOC-O6STC2SV/d250ba6b-e1af-4a3f-9ab7-b7321fc363e8/IMAGE"><dcterms:extent>59 KB</dcterms:extent></edm:WebResource><edm:WebResource rdf:about="http://www.dlib.si/stream/URN:NBN:SI:DOC-O6STC2SV/4b1e10fc-3b41-4ca2-962f-b0cfe0dc5b82/PDF"><dcterms:extent>2981 KB</dcterms:extent></edm:WebResource><edm:WebResource rdf:about="http://www.dlib.si/stream/URN:NBN:SI:DOC-O6STC2SV/742cb991-ec82-422c-a647-36b4ffc6f298/TEXT"><dcterms:extent>450 KB</dcterms:extent></edm:WebResource><edm:ProvidedCHO rdf:about="URN:NBN:SI:DOC-O6STC2SV"><dcterms:issued>2022</dcterms:issued><dc:contributor>Karpiuk, Mirosław</dc:contributor><dc:contributor>Kostrubiec, Jarosław</dc:contributor><dc:format xml:lang="sl">1 spletni vir (1 datoteka PDF (155 str.))</dc:format><dc:identifier>DOI:10.4335/2022.1</dc:identifier><dc:identifier>COBISSID:117820931</dc:identifier><dc:identifier>ISBN:978-961-7124-10-1</dc:identifier><dc:identifier>URN:URN:NBN:SI:doc-O6STC2SV</dc:identifier><dc:language>en</dc:language><dc:publisher xml:lang="sl">Institute for Local Self-Government</dc:publisher><dc:source xml:lang="sl">knjige</dc:source><dc:title xml:lang="sl">The public dimension of cybersecurity|</dc:title><dc:description xml:lang="sl">The development of new communication technologies also entails new threats in the form of various cyber crises caused primarily by external factors that affect both public entities (including states and public administration authorities) and private entities. These crises are also political and military in nature, threatening state sovereignty. Therefore, states must strive to ensure cybersecurity, which cannot be limited to the administrative boundaries of individual states alone, as cyberthreats are transnational in nature. Cybersecurity, understood as the resilience of information systems against actions which compromise the confidentiality, integrity, availability and authenticity of processed data, or the related services provided by those information systems, must be a priority for action in the public sphere to adequately secure the cyberspace against attacks. It must also be a fundamental component in public policy implemented at all levels of governance, be they central, regional or local</dc:description><edm:type>TEXT</edm:type><dc:type xml:lang="sl">knjige</dc:type><dc:type xml:lang="en">books</dc:type><dc:type rdf:resource="http://www.wikidata.org/entity/Q571" /></edm:ProvidedCHO><ore:Aggregation rdf:about="http://www.dlib.si/?URN=URN:NBN:SI:DOC-O6STC2SV"><edm:aggregatedCHO rdf:resource="URN:NBN:SI:DOC-O6STC2SV" /><edm:isShownBy rdf:resource="http://www.dlib.si/stream/URN:NBN:SI:DOC-O6STC2SV/4b1e10fc-3b41-4ca2-962f-b0cfe0dc5b82/PDF" /><edm:rights rdf:resource="http://creativecommons.org/licenses/by-nc/4.0/" /><edm:provider>Slovenian National E-content Aggregator</edm:provider><edm:dataProvider xml:lang="en">National and University Library of Slovenia</edm:dataProvider><edm:object rdf:resource="http://www.dlib.si/streamdb/URN:NBN:SI:DOC-O6STC2SV/maxi/edm" /><edm:isShownAt rdf:resource="http://www.dlib.si/details/URN:NBN:SI:DOC-O6STC2SV" /></ore:Aggregation></rdf:RDF>