{"?xml":{"@version":"1.0"},"edm:RDF":{"@xmlns:dc":"http://purl.org/dc/elements/1.1/","@xmlns:edm":"http://www.europeana.eu/schemas/edm/","@xmlns:wgs84_pos":"http://www.w3.org/2003/01/geo/wgs84_pos","@xmlns:foaf":"http://xmlns.com/foaf/0.1/","@xmlns:rdaGr2":"http://rdvocab.info/ElementsGr2","@xmlns:oai":"http://www.openarchives.org/OAI/2.0/","@xmlns:owl":"http://www.w3.org/2002/07/owl#","@xmlns:rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","@xmlns:ore":"http://www.openarchives.org/ore/terms/","@xmlns:skos":"http://www.w3.org/2004/02/skos/core#","@xmlns:dcterms":"http://purl.org/dc/terms/","edm:WebResource":[{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-O6STC2SV/d250ba6b-e1af-4a3f-9ab7-b7321fc363e8/IMAGE","dcterms:extent":"59 KB"},{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-O6STC2SV/4b1e10fc-3b41-4ca2-962f-b0cfe0dc5b82/PDF","dcterms:extent":"2981 KB"},{"@rdf:about":"http://www.dlib.si/stream/URN:NBN:SI:DOC-O6STC2SV/742cb991-ec82-422c-a647-36b4ffc6f298/TEXT","dcterms:extent":"450 KB"}],"edm:ProvidedCHO":{"@rdf:about":"URN:NBN:SI:DOC-O6STC2SV","dcterms:issued":"2022","dc:contributor":["Karpiuk, Mirosław","Kostrubiec, Jarosław"],"dc:format":{"@xml:lang":"sl","#text":"1 spletni vir (1 datoteka PDF (155 str.))"},"dc:identifier":["DOI:10.4335/2022.1","COBISSID:117820931","ISBN:978-961-7124-10-1","URN:URN:NBN:SI:doc-O6STC2SV"],"dc:language":"en","dc:publisher":{"@xml:lang":"sl","#text":"Institute for Local Self-Government"},"dc:source":{"@xml:lang":"sl","#text":"knjige"},"dc:title":{"@xml:lang":"sl","#text":"The public dimension of cybersecurity|"},"dc:description":{"@xml:lang":"sl","#text":"The development of new communication technologies also entails new threats in the form of various cyber crises caused primarily by external factors that affect both public entities (including states and public administration authorities) and private entities. These crises are also political and military in nature, threatening state sovereignty. Therefore, states must strive to ensure cybersecurity, which cannot be limited to the administrative boundaries of individual states alone, as cyberthreats are transnational in nature. Cybersecurity, understood as the resilience of information systems against actions which compromise the confidentiality, integrity, availability and authenticity of processed data, or the related services provided by those information systems, must be a priority for action in the public sphere to adequately secure the cyberspace against attacks. It must also be a fundamental component in public policy implemented at all levels of governance, be they central, regional or local"},"edm:type":"TEXT","dc:type":[{"@xml:lang":"sl","#text":"knjige"},{"@xml:lang":"en","#text":"books"},{"@rdf:resource":"http://www.wikidata.org/entity/Q571"}]},"ore:Aggregation":{"@rdf:about":"http://www.dlib.si/?URN=URN:NBN:SI:DOC-O6STC2SV","edm:aggregatedCHO":{"@rdf:resource":"URN:NBN:SI:DOC-O6STC2SV"},"edm:isShownBy":{"@rdf:resource":"http://www.dlib.si/stream/URN:NBN:SI:DOC-O6STC2SV/4b1e10fc-3b41-4ca2-962f-b0cfe0dc5b82/PDF"},"edm:rights":{"@rdf:resource":"http://creativecommons.org/licenses/by-nc/4.0/"},"edm:provider":"Slovenian National E-content Aggregator","edm:dataProvider":{"@xml:lang":"en","#text":"National and University Library of Slovenia"},"edm:object":{"@rdf:resource":"http://www.dlib.si/streamdb/URN:NBN:SI:DOC-O6STC2SV/maxi/edm"},"edm:isShownAt":{"@rdf:resource":"http://www.dlib.si/details/URN:NBN:SI:DOC-O6STC2SV"}}}}