Стратегии на образователната и научната политика

2023/2, стр. 154 - 169

CHARACTERISTICS AND COMPONENTS OF THE CYBER HYGIENE AS A SUBCLASS OF CYBER SECURITY IN MILITARY ENVIRONMENT AND EDUCATIONAL ISSUES

Резюме:

Ключови думи:

1. Introduction

Cybercrime is on the rise on the global network. Criminal hackers through phishing emails, supply chain, password and malware attack millions of users’ workstations. In the last two years, the number of global ransomware attacks have reached above 600 million. This requires special measures that need to be taken by organizations, network administrators and users to counter this global threat (Singh 2020, Such 2022, Trevors 2017).

Cyber hygiene provides protection and security in maintenance and exploitation of the computer networks. Multiple points of view regarding issues that arise with different cyber attackers, cyber threats and cyber-risks from that can be referred to cyber-hygiene of individuals and institutions are considered in (Singh 2020). Effectiveness of the Cyber Essentials scheme and its security activities that mitigate the threats they were designed for, i.e., those threats exploiting vulnerabilities remotely is discussed in (Such 2022).

Malicious network users scan network devices for vulnerable devices, investigate network security mechanisms, and detect vulnerabilities in the network to retrieve security layer (SSL) certificates or invalid URLs. During the Cyber Kill Chain recognition phase, security software is evaluated and vulnerabilities are identified (FS-ISAC 2021).

Methodology for realization of cyber hygiene practices in Smart Grid Systems, focused on smart metering systems is proposed and tested in (Trevors 2017). It is proven that implementing cyber hygiene instruments can improve smart meter cybersecurity and be suitable for implementing other sensitive Smart Grid components Effective cyber hygiene is challenging tasks for the entire institution, and the responsibility of individual employees. If the role of cyber hygiene is to be summarized, it is responsible for the integrity and availability of data. Cyber hygiene includes many rules and activities to ensure cyber security.

A list of main activities in the scope of the cybersecurity and cyber hygiene including a set of practices for managing the most common and pervasive cybersecurity risks faced by employee and institutions is discussed in (Ead 2022).

It is compulsory, that users must follow strictly a high level of cyber hygiene in financial analytical area, security and military sphere, marine and air traffic control, etc., having in mind that many employee keep not good cyber hygiene. They openly exchange passwords and share private information on social networks.

Analysis of end-user’s behavior to promote the creation of more successful approaches in the financial analytical climate is provided in (Olivares-Rojas 2022). It includes recommendations that allow improving the institution’s cyber hygiene in access to financial solutions in the area. A cyber hygiene checklist to prevent attacks on computer networks and rules of cyber hygiene that has to follow by institutions and internet user are discussed in (Bedrich, RSI Security 2021).

There are different definitions of the term “cyber hygiene”. There is no consensus on what constitutes cyber hygiene. Different national institutions have their own specific recommendations and rules, i.e. there is no single standard or commonly accepted mechanism for an institution to assess, evaluate or demonstrate cyber hygiene. The main characteristic of the cyber hygiene, cybersecurity ratings and measures, common cyber hygiene problems and practices are discussed in (Tyas 2022).

The rest of the article is organized as follow. Section II suggests cyber hygiene definitions, cyber hygiene – basic software issues, cyber hygiene – institutional information security controls. Section III discloses malware infections – cyber hygiene main concerns. Section IV presents a subject of the curriculum in cyber hygiene. Section V gives conclusion remarks.

2. Cyber hygiene as a subclass of cyber security

2.1 Cyber hygiene definitions

Cyber hygiene as a part of cyber security refers to the network users and institutions as a whole. It is a system of instructions and recommendations aimed at improving users' activity to help them gain knowledge and skills that guarantee network security, and thus ensure system cyber health. The cyber hygiene is a multilayer system of rules and activities users have to follow working in Internet. It is a distinctive feature. From other hand, cyber hygiene means abilities and habits that help users and organizations mitigate the networks potential vulnerability to cyber-attacks and enhance resilience against threats of cyber-attacks.

Cyber hygiene includes an aggregate of user’s habitual skills and activities to ensure secure data exchange and resilience of networks and network devices to cyber impacts. It’s similar to the classical medical hygiene each person has to follow. It consists of routine activities to prevent or mitigate health problems. Cyber hygiene practice includes the surveillance of all end devices connected to local networks, control of vulnerabilities, regular update and patching of the computers’ software components. Cyber hygiene is not only responsibilities of detached employee and/or personnel but institution’s and command stuff obligations, and network administrators. Cyber hygiene means training to form professional habits ensuring cybersecurity so that to prevent network cyber threats and internet security issues. Cyber hygiene aims to maintain hardware and software's basic health and security, ensuring they are protected from threats such as malware. Applied in everyday life, cyber hygiene helps to keep data, hardware and software safe and secure. As with any habit to be gained, cyber hygiene skills require learning and practical education to apply specific routine and repetition activities.

The routine in respect of cyber hygiene helps prevent cybercriminals from causing network intrusions, security breaches or stealing personal information. It helps keeping software and operating systems up to date.

2.2 Cyber hygiene – basic software issues

Basic software issues that are in the focus of the cyber hygiene are as follows.

– Security breaches caused by threats from hacker’s attacks as phishing, malware, and viruses.

– Data loss caused by not reserved hard drives and virtual cloud storage vulnerable to unauthorized penetration and corruption.

– Vulnerability to cyber-attacks caused by out of date software;

– Cyber threats caused by obsolescent, i.e. not up to date antivirus security software that is less effective at protecting to newest software attacks.

Therefore, to ensure adequate and effective cyber hygiene, the network user must follow cyber hygiene periodicity of activities and apply the appropriate software instruments to ensure cyber hygiene.

The cyber hygiene periodicity means regular control and test routines, drawing up a schedule of different activities to be fulfilled to keep cyber hygiene on a certain level. For instance, scanning the computer for viruses using up to day antivirus programs, removing the old password and establishing new one, keeping user’s applications, system software, and operating systems of all devices up to date, and cleaning computer’s hard drive. Once the user assimilates the cyber hygiene rules, it becomes part of regular personal cybersecurity routine (Kaspersky lab 2023).

Appropriate software instruments to ensure cyber hygiene are as follow.

– Firewall – prevents an unauthorized access from the internet.

– Software for data-deleting prevents a risk of losing personal data while introducing new software, add on hardware, or modify system files and clears out not necessary data from the hard drive.

– A password manager maintains track of multiple passwords while using strong, complex passwords which are changed regularly to keep internet hygiene.

– Antivirus software of high quality that schedules and performs periodic scanning to detect and remove malware, and protect from multiple network threats.

– Freeing users from unusable electronic communication devices, such as laptops, smartphones, desktops, raises serious questions about cyber hygiene. The user must not only delete their files, but also reformat the hard drive of the devices. This also ensures the deletion of personal information stored on the disk.

The main rule of the cyber hygiene is maintaining the application and system software and hardware up to date. Web browsers, user and mobile applications, and network devices’ operating systems have to be updated regularly. It eliminates software security issues. By regular updates new software patches are delivered to correct software failures. For instance, the vulnerability Joomla – Core – XSS (CrossSite Scripting) Attack Vector via SVG (Scalable Vector Graphics) (2021) (CVE (Common Vulnerabilities and Exposures)-2022-23801) is discovered in versions Joomla 4.0.0 to 4.1.0 embedding in commedia. In updated version Joomla 4.1.1 the problem is fixed. Hardware updates guarantee preventing CPU performance issues.

2.3 Cyber hygiene – institutional information security controls

The basic controls provided by the institution are as follow (Tyas 2022):

1. Control usage of the hardware devices: It means to control only authorized devices to have access to restricted area and sensitive data.

2. Control usage of the system and application software: It means to control and mitigate risk by manage network software so that only certified and licensed software is installed on devices and can exploited.

3. Control continuous network vulnerability and risk management: It means to control acquiring regularly information in respect of new network vulnerabilities, to remove them and reduce the range of their risk impacts.

4. Control usage of administrative rights: It means to control administrative rights by access control and access restriction, such as two-stage authentication or multi-stage authentication, as well as to be created approaches and instruments to track, control, prevent and correct the use, assignment, and configuration of administrative rights.

5. Secure configuration of hardware and software on network devises: mobile sets as tablets, i-phones and laptops, and stationary workstations and servers: It means that institutions must establish, implement and actively manage the security configuration of mobile devices as tablets, i-phones and laptops, and stationary routers, switches, servers and workstations to prevent attackers from exploiting vulnerable services and settings. This should include the use of complex passwords.

6. Analyze of audit documents: It means that institutions must collect, control and analyze audit logs of intrusion events to help the detection, identification and to recover from cyber-attacks.

In addition, there are the following foundational information security controls:

1. Email and web browser protections: It is performed by minimizing the attack fronts and opportunities for attackers to manipulate human behavior through their interaction with web browsers and email systems.

2. Malware defenses: It is performed by controlling the installation, spread, and execution of malicious code and to enable rapid updating of defense, data gathering, and corrective action.

3. Limitation and control of network ports, protocols, and services: It means to control and manage the ongoing functionality of ports, protocols, and services on networked devices in order to minimize vulnerabilities available to attackers and opportunities cyber impacts.

4. Data backup and recovery capabilities: It means applying servers instruments and protocols to reliable back up critical information with an effective methodology for timely recovery of it.

5. Reliable and secure configuration of network devices, such as routers, switches and firewalls: It means the institution and network administrators to establish, implement and manage the security configuration of network infrastructure devices by configuration and processes of management, change and control to prevent cyber-attacks and exploiting vulnerabilities of services and settings.

6. Boundary defense: It means boundary defense controls detection, prevention and correction of the information flow transferring across networks of different trust levels focused on security-damaging data.

7. Data protection: Sensitive data are different types and reside in different places. It means data protection through combination of encryption, integrity protection, and data loss' prevention techniques.

8. Controlled access based on the need to know: It means institutions to use instruments and processes to track, control, prevent and correct secure access to critical data according to access control rights of operators to computers, and applications based on a need or right previously classified.

9. Wireless access control: It means to manage wireless access, processes and tools to track, control, prevent and correct the secure use of wireless local area networks (WLANs), access points and wireless client systems.

10. Account monitoring and control: It requires to control management across the life cycle of system and application accounts – their creation, use, dormancy, and deletion - to reduce opportunities for cyberattacks.

There are four institution information security controls, namely:

1. Establish a security awareness and training program: It means the institutions must build the specific knowledge, cyber security skills and abilities to ensure the cyber defense trough developing and executing a plan for identification and evaluation of problems and remediate through, planning, training and awareness programs.

2. Application software security: It means the institution must control the security of all acquired and used software over its life cycle.

3. Incident response and control: It means institution must protect their information and reputation by developing and implementing an incident emergency response infrastructure (e.g. plans, defined roles, training, communications, and management oversight) to quickly discover attacks and then contain the damage, eradicate the attacker's access and restore the integrity of the network and systems

4. Penetration tests and red team exercises: It means institution must test their overall defense (technology, processes, and employee) by simulating the objectives and actions of an attacker. This may include on-site and off-site penetration testing, network security assessments and testing the implementation of information security policies

3. Malware infection – cyber hygiene main concerns

3.1. Main Definitions

The term “malware” means malicious software that contains a malicious and destructive code. It is intentionally designed to damage, disrupt, and steal information, slow down and disrupt the functions of network devices – computers and servers. The malware is installed on network devices by system and internet users through downloading files or opening e-mails' attached files. Malware can damage the data and software while residing on the storages and memory but it cannot harm the hardware parts of systems or network equipment. The term “virusˮ is usually used to define entire malicious/damaging software. However, the virus is just a type of malware.

Malware infection vectors are a multidirectional transmission of malicious codes to network platforms and devices with the aim to infiltrate, infect and spread through the system by exploiting vulnerabilities. Malware vectors capture victims who

– Trust social networking forums like Facebook, Skype, Viber, etc.

– Show inquisitiveness and curiosity about any interesting event.

– Lack expert awareness and experience.

It is important to know that accessing an account by cracking a user's email password gives the malicious user access to the attacked user's contact list, thereby gaining access to their business contacts on social networks and allowing them to attack others users. The downloaded and embedded malware contains documents as photo, movie, music, and more, providing criminal access to the entire communication system and network of the attacked user.

Local server or network computers can be infected with one or some malicious software as virus, worm, adware, crypto locker, spywares, toolkits, Trojan, botnet, etc. It performs destructive activity according to their nature like stealing of personal or confidential information of users or institutions, tracking and monitor activities of the computer, installs backdoors and keystrokes loggers, makes target server crash, harm performance of online systems, usage of system resources like CPU cycles, memory and network, encrypt sensitive data. The spyware or adware can cause sudden change in functionality. It must be aware that the infection level depends on the system defense and residence of malware on it.

Malware criminals (Kaspersky lab 2014) use social engineering techniques to distribute and infiltrate malware, and inforce users to download, embed, and run a malicious code on their systems without realizing it (Fig. 1).

Figure 1. A worm (virus) attack inside the attached file

Once an attacker infects a system, they can have complete control and access to that system's information and devices. Malware products exploit weak places in in the cyber defense of the computer system. Malware infections find out vulnerabilities in security in previous versions of standard software applications such as picture viewers, Media Players, Adobe and the Windows operating systems (Kaspersky lab, 2014).

Malicious internet users apply social engineering tactics to find out weak security places and to transfer monovalent code in a computer in order to install their malicious code which are able to steal confidential information. They rely on the responsiveness of people as well as their mistakes and poor cyber hygiene. Cybercriminals find vulnerabilities in a computer network to infiltrate it and gain access to personal and confidential information. This damages the security not only of an individual user, but also of the institution as a whole. All malware tools applied by cyber criminals use social engineering technique to perform their monovalent work. Several ways are applied to spread viruses using social engineering (Internet organized crime threat assessment 2015):

– Straight questioning.

– Step-by-step search for information.

– After gaining physical access.

– Reverse social engineering (reverse social engineering is a type of social engineering that aims to steal sensitive information and/or money through psychological manipulation and back contact of the victim).

– Online social engineering (social engineering is performed online).

Market to device: This attack is initiated by the electronic market. The malware author uploads his malicious application to the e-marketplace site using a stolen/ unauthorized identity. In the presence of malicious applications on the e-marketplace site, many users can be attacked (Internet organized crime threat assessment 2015).

Web browser to device: This is a virus's distribution technique typically using downloading tactics, applied recently by network cyber-attacks.

SMS to device: The malicious software is propagated via SMS or MMS.

Network to device: It is performed by exploiting software vulnerabilities and hardware misconfigurations.

Device to device: The infection is disseminated from device to device in pointto-point manner.

USB to Device: The infection is disseminated by USB devices by connecting to an infected computer with new variants of a virus.

Botnet: The term “botnet” means a robotized network. Botnets are networks of computer devices infected with a malicious backdoor program used by a malicious user to automatic carrying out different cyberattacks, such as data theft, server crashing, sending spam from zombie computers to attack government and military networks, DDoS (Distributed Denial of Service) attacks, anonymous Internet access; cyber criminals’ access to web server using zombie machines to commit cybercrimes such as hacking websites or transferring stolen money, selling and leasing, allows distributing malware in computer networks.

Phishing by a botnet: Botnet allows changing the addresses of phishing pages frequently using infected computers as proxy servers (Fig. 2).

Figure 2. Phishing e-mail attack

Virus: a type of malware attached to another software document or a legitimate program. It makes multiple replicates, infects and corrupts other files without user’s awareness.

Trojan horse: a type of malicious malware hidden or embedded in an email attachment or in a program such as a computer game, attractive to encourage a user to install it. The most insidious (and ironic) types of Trojan Horses are programs that offer to clear user's computer of viruses, but instead deliver viruses to victim's computer illustrated in Fig. 3.

Figure 3. Trojan horse: Answer to this e-mail letter instead protection and viruses cleaning delivers viruses to a victim computer

Spyware: a type of malware installed on computers or network devices without knowledge of the user. The spyware activated on computers collects and transmits personal and institutional information as passwords, and numbers of credit card.

Ransomware: is a type of malware applying an encryption code to lock and/or block user’s access to a computer system or user’s files until a specific amount of money is paid – usually by cryptocurrency (e.g. Bitcoin), since the transaction cannot be traced or refunded. In case the ransom is not paid, then the system’s and victim’s files are destroyed.

Computer Worm: a type of malware, a self-replicating program that copies itself from computer to computer. Rather than infect files, its main purpose is to use resources such as computer memory and network bandwidth to inflict damage.

Computer worm infection is illustrated in Fig. 4. The malware (worm) is inside the attached file.

Figure 4. Malware (worm) is inside the attached file. The computer will be infected while opening the attached file

The sender as a rule is under fake e-mail address. To disclose the real e-mail address of the sender and the server location of this e-letter, it is recommended to open the e-letter.

Go to three dots on upper right corner. Click on three dots. Scroll down and follow More option > View > View message details > Message details are presented in Fig. 5.

Figure 5. Message details including a real IP address of the sender 79.172.249.201

Read the message on the row Authentication-Results: spf=softfail (sender IP is 79.172.249.201) > Go to Google Search > Write IP location > Paste 79.172.249.201 The real location of this letter is in city of Magyarlukafa, Hungary as can be seen in Fig. 6.

Figure 6. Real location parameters of the fake sender

3.2. Cyber hygiene instructions to ensure Internet users stay protected

The following cyber hygiene instructions have to be included in the curriculum of military Internet users in order to ensure they stay protected from cyberattacks.

Create safe and secure passwords that are resistant to cracking

– For different accounts and registrations avoid using the same password.

– The passwords need to change on a regular basis.

– The passwords’ length has to be at least 12 characters and longer.

– The passwords have to include a mix of capital and small letters, symbols and numbers.

– The passwords must avoid sequential numbers or personal information, such as date of birth or a pet’s name.

– The default passwords on IoT (Internet of Things) devices need to be changed.

– The passwords is not written down and shared them with other internet users.

– It is recommended to use a password manager to generate, store, and manage all passwords in one secure online account

– Usage of multi-factor authentication access

– The essential accounts – such as email, social media, or banking apps – are protected with MFA (Multi-Factor Authentication) using an app like Google Authenticator or Authy.

– MFA backup codes is saved in a password manager.

Backing up data regularly on external discs and storages

– It is recommended to keep files secure and protected against data loss by backing up essential files oine, either on an external hard drive or in a cloud.

While communicating ensure privacy of information

– It is recommended not to post private information such as a home address, private pictures, phone number, or credit card numbers publicly on social media.

– Privacy settings in usage of social media are to be set to a high level.

– It is recommended to avoid quizzes, games, or surveys on social media that ask for sensitive personal information.

– It is recommended the user to keep a computer and phone locked with a password or PIN

– It is recommended not to disclose private information when using public Wi-Fi

– In case public Wi-Fi, it is recommended to maximize privacy by using a VPN (Virtual Private Network).

– Online transactions are to make via a secure website (URL starts with https://) with a padlock icon on the left of the address.

– Information about online privacy is exchanged with colleagues, friends and family members to help keep them safe as well.

Keep applications, system software, and firmware up to date

– It is recommended to update applications, web browsers, operating systems, and firmware regularly to ensure using the latest versions with possible security issues eliminated or patched.

– It to be set up a system features to ensure automatic software updates.

– It is recommended to delete applications no longer in use, but open security vulnerabilities only download apps from reputable or official sources.

Ensure security of routers

– Default name of home Wi-Fi routers, router’s username and password need to be changed.

– It is recommended to keep router’s firmware up to date.

– It is recommended to disable remote access, Universal Plug and Play, and WiFi Protected Set-up.

– It is recommended to set up a separate network for guests to use.

– It is recommended to ensure that a router offers WPA2 or WPA3 encryption to protect the privacy of information sent via the network.

Protect against social engineering attacks

– It is recommended to avoid clicking on suspicious links or links, opening emails that look suspicious, downloading suspicious attachments from emails or not expected text messages, clicking on ads that promise free money, prizes, or discounts.

Using network protected software – firewalls

– It is recommended to use a correctly configured firewall to prevent malicious software from accessing a computer or network via the internet.

Encrypting devices

– It is recommended to encrypt devices and media as laptops, tablets, smartphones, removable drives, backup tapes, and cloud storage which contain sensitive data.

Remove all information from hard drives

– Before disposal of or sell a computer, tablet, or smartphone, make sure the hard drive is clean up to prevent any personal information from being accessed by others.

Ensuring high-quality antivirus protection

– It is recommended to use high quality antivirus software that scans for and removes computer viruses and other malicious software.

– It is recommended to keep the antivirus software up to date

In conclusion, cyber hygiene means developing and following a protective routine to keep personal and financial information secure when using computers, laptops or other mobile devices. Using strong passwords and changing them regularly, keeping software and operating systems up to date, cleaning hard drives, and using a comprehensive antivirus software like Kaspersky Total Security will help users stay ahead of the latest cyber threats.

4. Subject of the curriculum in cyber hygiene

In conclusion, human errors is among the leading causes of security breaches and data loss in a corporate military computer network. It has to be emphasized that cyber hygiene as a subclass of the cybersecurity is not only a task and obligation of each personnel from military staff but the institution command, and IT administrators, and the organization as a whole. One of the methods to upgrade protection is to educate users and increase their knowledge and skills in working with computer information and communication devices. Each curriculum in the scope of Cyber hygiene has to meet the following educational objectives.

4.1. Objectives

Each educational program aims, through the training provided in it, for the military employees to acquire knowledge, skills and practical experience that will allow them to ensuring the safety in military environment, the life and health of people in the troops, the protection of the military devices and equipment from cyberattacks by mastering theoretical knowledge and practical skills in:

– Recognizing vulnerabilities, threats and attacks in cyberspace;

– Types of cybercrimes and their participants;

– Peculiarities of cyber security in the military area;

– Relationships and information exchange between the military systems;

– Configuration and working with antivirus programs;

– Configuration and working with firewalls;

– Updating user operating systems;

– Backup and recovery of critical data;

– Safe use of internet browsers;

– Safe work on social sites;

– Security when working with e-mail;

– Safe operation when using wireless networks;

– Smart device security

4.2. Exemplary curriculum of cyber hygiene, main topics and tasks

1. Cyber threats and vulnerabilities in the army and military area

1.1. Cybersecurity in the army and military area.

1.2. Basic definitions related to cybersecurity. Vulnerabilities and threats in cyberspace.

1.3. Cybercrimes, cybercriminals and their motives.

1.4. Military institutions, units, equipment and weapons and their vulnerability to cyber attacks

2. Software instruments for protection of personal devices

2.1. Types of computer malware and means of protection against them. Basic rules for working with antivirus programs.

2.2. Firewalls for personal computers – purpose and use.

3. Protection of critical data

3.1. Types of Updates for User Operating Systems. Ways to install and manage them.

3.2. Backing up critical user data - means and methods. Create local and remote archives. Restore data from an archive.

5. Conclusions

Based on the analysis of main characteristics and components of the cyber hygiene as a subject of the educational plan in the cyber security for military staff, teaching questions and their instruments used to be solved are discussed. Based on institutional experience on education in cyber security, a sequence of activities to keep resilient and reliable cyber hygiene in army organizations is defined. Cyber hygiene software issues and institutional information security control functions are disclosed. Malware infection as a main cyber hygiene concern is analyzed. Fundamental cyber hygiene instructions to ensure military Internet users and institutions stay protected are defined. Exemplary curriculum with basic themes for education of military staff is presented.

REFERENCES

BEDRICH, F., A cyber hygiene checklist can help prevent attacks on your business, Article and tools, BDC blog. Available at: https://www.bdc.ca/ en/articles-tools/blog/cyber-hygiene-checklist-can-help-prevent-attackson-your-business.

EAD,W.M.,ABBASSY, M.M., 2022. A General Cyber Hygiene Approach for Financial Analytical Environment. In: Derindere Köseoğlu, S. (eds) Financial Data Analytics, Contributions to Finance and Accounting. Springer, pp.369-384. DOI: 10.1007/978-3-030-83799-0_13.

FS-ISAC, 2021. An Attractive target: why cyber hygiene matters, TLP WHITE, Available at: https://www.fsisac.com/hubfs/Resources/ WhyCyberHygieneMatters.pdf.

KASPERSKY LAB GLOBAL RESEARCH AND ANALYSIS TEAM, 2014. “Syrian Malware, the ever-evolving threat, Version 1.0. Available at: https://www.kaspersky.com/resource-center/preemptive-safety/cyberhygiene-habits.

KASPERSKY LAB, 2023. Top tips for cyber hygiene to keep yourself safe online. Available at: https://www.kaspersky.com/resource-center/ preemptive-safety/cyber-hygiene-habits.

OLIVARES-ROJAS, J. C., REYES-ARCHUNDIA, E., GUTIERREZGNECCHI, PATIƒO, A. N., JACOBO, J. C., MORENO, I. M., 2022. A methodology for cyber hygiene in smart grids. DYNA. January – February 2022, vol. 97, no. 1, pp. 92.97. DOI: 10.6036/10085. Available at: https:// www.revistadyna.com/search/a-methodology-for-cyber-hygiene-insmart-grids.

RSI SECURITY, 2021. The top 11 rules of cyber hygiene for government agencies, available on https://blog.rsisecurity.com/the-top-11-rules-ofcyber-hygiene-for-government-agencies/.

SINGH, D., MOHANTY, N., P, SWAGATIKA, S., KUMAR, S., 2020. Cyber-hygiene: The key concept for cyber security in cyberspace, Test Engineering and Management vol. 83, pp. 8145 – 8152.

SUCH, J., M., CIHOLAS, P., RASHID, A., VIDLER, J., SEABROOK, T., 2022. Basic cyber hygiene: Does it work? Lancaster E-Prints, Feature article, Available at: https://core.ac.uk/reader/224767750.

THE INTERNET ORGANIZED CRIME THREAT ASSESSMENT (IOSTA), 2015, ISBN 978-92-95200-65-4. ISSN 2363-1627. DOI 10.2813/03524.

TREVORS, M.; WALLEN, C. M., 2017. Cyber hygiene: A baseline set of practices. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213, Available at: https://resources.sei.cmu.edu/asset_ files/presentation/2017_017_001_508771.pdf.

TYAS, A. T., 2022. What is cyber hygiene and why is it. Available on https://www.upguard.com/blog/cyber-hygiene.

2025 година
Книжка 4
ТРАНСФОРМАЦИИ НА ПАЗАРА НА ТРУДА И НУЖДАТА ОТ ОБРАЗОВАТЕЛНИ РЕФОРМИ

Ваня Иванова, Андрей Василев, Калоян Ганев, Ралица Симеонова-Ганева

Книжка 3
FORMING ENTREPRENEURIAL CULTURE THROUGH EDUCATION

Prof. Dr. Milena Filipova, Adriana Atanasova, PhD student

Книжка 2s
THE STATE OF INCLUSION IN ADAPTED BASKETBALL

Dr. Stefka Djobova, Assoc. Prof., Dr. Ivelina Kirilova, Assist. Prof.

THE IMPACT OF AGE ON ADULT’S PARTICIPATION IN PHYSICAL ACTIVITIES DURING LEISURE TIME

Dr. Despina Sivevska, Assoc. Prof. Dr. Biljana Popeska, Assoc. Prof.

Книжка 2
MODEL OF PROFESSIONALLY DIRECTED TRAINING OF FUTURE ENGINEER-TEACHERS

Prof. Ivan Beloev, Dr. Valentina Vasileva, Assoc. Prof. Dr. Іnna Savytska, Assoc. Prof., Dr. Oksana Bulgakova, Assoc. Prof. Dr. Lesia Zbaravska, Assoc. Prof., Dr. Olha Chaikovska, Assoc. Prof.

QUALITY OF HIGHER EDUCATION IN BULGARIA: COMMUNICATION AND COMPUTER TECHNOLOGY TRAINING

Prof. Rositsa Doneva, Dr. Silvia Gaftandzhieva, Assoc. Prof.

ВЛИЯНИЕ НА ОБРАЗОВАНИЕТО И ЧОВЕШКИЯ КАПИТАЛ ВЪРХУ ФОРМАЛНАТА И НЕФОРМАЛНАТА ИКОНОМИКА

Проф. д-р Стефан Петранов, доц. д-р Стела Ралева, доц. д-р Димитър Златинов

DETERMINANTS AFFECTING ACADEMIC STAFF SATISFACTION WITH ONLINE LEARNING IN HIGHER MEDICAL EDUCATION

Dr. Miglena Tarnovska, Assoc.Prof.; Dr. Rumyana Stoyanova, Assoc.Prof.; Dr. Angelina Kirkova-Bogdanova; Prof. Rositsa Dimova

Книжка 1s
CHALLENGES FACED BY THE BULGARIAN UNIVERSITIES IN THE CONTEXT OF SCIENCE – INDUSTRY RELATIONS

Dr. Svetla Boneva, Assoc. Prof., Dr. Nikolay Krushkov, Assoc. Prof.

INVENTING THE FUTURE: CAN BULGARIAN UNIVERSITIES FULFILL THEIR MISSION AS CATALYSTS FOR ECONOMIC GROWTH AND SUSTAINABILITY?

Dr. Ralitsa Zayakova-Krushkova, Assist. Prof., Dr. Alexander Mitov, Assoc. Prof.

AN INNOVATIVE MODEL FOR DEVELOPING DIGITAL COMPETENCES OF SOCIAL WORKERS

Prof Dr. Lyudmila Vekova, Dr. Tanya Vazova, Chief Assist. Prof., Dr. Penyo Georgiev, Chief Assist. Prof., Dr. Ekaterina Uzhikanova-Kovacheva

BUSINESS ASPECTS OF ACADEMIC PUBLISHING

Dr. Polina Stoyanova, Chief Assist. Prof.

THE ECONOMIC IMPACT OF MUSIC STREAMING

Dr. Dimiter Gantchev, Assist. Prof.

FILM INCENTIVE SCHEME IN THE REPUBLIC OF BULGARIA

Dr. Ivan Nachev, Assist. Prof.

PATENT PROTECTION OF DIGITAL TWINS

Dr. Vladislava Pаcheva, Chief Assist. Prof.

Книжка 1

МНОГОСТРАНЕН ПОДХОД ЗА ИЗСЛЕДВАНЕ РАВНИЩЕТО НА ДИГИТАЛИЗАЦИЯ В ПОДГОТОВКАТА НА БЪДЕЩИ УЧИТЕЛИ

Доц. д-р Бистра Мизова, проф. д-р Румяна Пейчева-Форсайт Проф. д-р Харви Мелър

2024 година
Книжка 6s
DISRUPTIVE TECHNOLOGIES RISK MANAGEMENT

Dr. Miglena Molhova-Vladova, Dr. Ivaylo B. Ivanov

THE DUAL IMPACT OF ARTIFICIAL INTELLIGENCE: CATALYST FOR INNOVATION OR THREAT TO STABILITY

Prof. Diana Antonova, Dr. Silvia Beloeva, Assist. Prof., Ana Todorova, PhD student

MARKETING IN TOURISM: PRACTICAL EVIDENCES

Dr. Fahri Idriz, Assoc. Prof.

DEVELOPMENT OF THE INFORMATION ECONOMY CONCEPT AND THE TRANSITION TO INDUSTRY 5.0

Dr. Dora Doncheva, Assist. Prof., Dr. Dimitrina Stoyancheva, Assoc. Prof.

THE GLOBAL MARKET AS A PROJECTION OF THE INFORMATION ECONOMY

Dr. Vanya Hadzhieva, Assist. Prof. Dr. Dora Doncheva, Assist. Prof.

ACADEMIC ENTREPRENEURSHIP: PRACTICAL RESULTS AND TRAINING

Prof. Nikolay Sterev, DSc., Dr. Daniel Yordanov, Assoc. Prof.

Книжка 6
AN INTEGRATIVE APPROACH TO ORGANIZING THE FORMATION OF STUDENTS’ COGNITIVE INDEPENDENCE IN CONDITIONS OF INTENSIFICATION OF LEARNING ACTIVITIES

Dr. Albina Volkotrubova, Assoc. Prof. Aidai Kasymova Prof. Zoriana Hbur, DSc. Assoc. Prof. Antonina Kichuk, DSc. Dr. Svitlana Koshova, Assoc. Prof. Dr. Svitlana Khodakivska, Assoc. Prof.

ИНОВАТИВЕН МОДЕЛ НА ПРОЕКТНО БАЗИРАНО ОБУЧЕНИЕ НА ГИМНАЗИАЛНИ УЧИТЕЛИ: ДОБРА ПРАКТИКА ОТ УниБИТ

Проф. д-р Жоржета Назърска, доц. д-р Александър Каракачанов, проф. д-р Магдалена Гарванова, доц. д-р Нина Дебрюне

Книжка 5s
КОНЦЕПТУАЛНА РАМКА ЗА ИЗПОЛЗВАНЕ НА ИЗКУСТВЕНИЯ ИНТЕЛЕКТ ВЪВ ВИСШЕТО ОБРАЗОВАНИЕ

Акад. д.н. Христо Белоев, проф. д.н. Валентина Войноховска, проф. д-р Ангел Смрикаров

ИЗКУСТВЕНИЯТ ИНТЕЛЕКТ В БИЗНЕСА – ФИНАНСОВИ, ИКОНОМИЧЕСКИ И МАРКЕТИНГОВИ АСПЕКТИ

Проф. д-р Андрей Захариев, доц. д-р Драгомир Илиев Гл. ас. д-р Даниела Илиева

RECENT TRENDS AND APPLICATIONS OF THE ARTIFICIAL INTELLIGENCE IN THE EDUCATION

Prof. Dr. Plamen Zahariev, Prof. Dr. Georgi Hristov, Prof. Dr. Ivan Beloev

COMPARATIVE ANALYSIS OF UTILIZING POPULAR INTELLIGENT COMPUTER SYSTEMS IN EDUCATION

Dr. Galina Ivanova, Assoc. Prof. Dr. Aleksandar Ivanov, Assoc. Prof.

CONCEPTUAL MODEL OF TRAINING IN REMOTE VIRTUAL SUPERVISION IN SOCIAL WORK

Dr. Silviya Beloeva, Assist. Prof. Dr. Nataliya Venelinova, Assist. Prof.

ИЗСЛЕДВАНЕ ПРИЛОЖИМОСТТА НА БЛОКОВИ ВЕРИГИ ОТ ПЪРВО НИВО (L1) В СИСТЕМА ЗА ЕЛЕКТРОННО ОБУЧЕНИЕ

Андриан Минчев, проф. Ваня Стойкова, гл. ас. д-р Галя Шивачева Доц д-р Анелия Иванова

DIGITAL DISCRIMINATION RISKS IN THE TRANSFORMATION OF HIGHER EDUCATION

Dr. Silviya Beloeva, Assist. Prof. Dr. Nataliya Venelinova, Assist. Prof.

OPPORTUNITIES, CHALLENGES AND SOLUTIONS FOR DIGITAL TRANSFORMATION OF THE EDUCATIONAL PROCESSES THROUGH 3D TECHNOLOGIES

Prof. Georgi Hristov, Prof. Plamen Zahariev, Dr. Diyana Kinaneva, Assist. Prof., Georgi Georgiev, Assist. Prof.

ДИГИТАЛНОТО ПОКОЛЕНИЕ VS. СЛЯТОТО, ПОЛУСЛЯТОТО И РАЗДЕЛНОТО ПИСАНЕ

Доц. д-р Владислав Маринов, ас. Анита Тодоранова

OPPORTUNITIES AND CHALLENGES FOR THE EDUCATION OF STUDENTS WITH SPECIAL EDUCATIONAL NEEDS IN THE DIGITAL ENVIRONMENT: THE NEW NORMAL

Prof. Julia Doncheva, DSc., Dr. Galina Ivanova, Assoc. Prof. Dilshod Tojievich Oblokulov

ИЗГРАЖДАНЕ НА КОМПЕТЕНЦИИ ЗА РАЗРАБОТВАНЕ НА STEM ОБУЧИТЕЛНИ РЕСУРСИ У БЪДЕЩИ УЧИТЕЛИ ПО ПРИРОДНИ НАУКИ

Доц. д-р Евгения Горанова, проф. д.н. Валентина Войноховска, проф. д-р Ангел Смрикаров

APPLICATION OF ZSPACE TECHNOLOGY IN THE DISCIPLINES OF THE STEM CYCLE

Boyana Ivanova, Assist. Prof. Dr. Kamelia Shoilekova, Assoc. Prof. Dr. Desislava Atanasova, Assoc. Prof. Dr. Rumen Rusev, Assoc. Prof.

TEACHERS' ADAPTATION TO CHANGES IN AN INCREASINGLY COMPLEX WORLD THROUGH THE USE OF AI

Prof. Zhanat Nurbekova, Kanagat Baigusheva, Kalima Tuenbaeva, Bakyt Nurbekov Prof. Tsvetomir Vassilev

АТОСЕКУНДНОТО ОБУЧЕНИЕ – МЕТАФОРА НА ДНЕШНОТО ОБРАЗОВАНИЕ

Проф. д.н. Юлия Дончева, Денис Асенов, проф. д-р Ангел Смрикаров проф. д-р Цветомир Василев

APPLICATION AND ASSESSMENT OF DIGITAL RESOURCES IN THE EDUCATION OF FUTURE PEDAGOGUES

Dr. Galina Ivanova, Assoc. Prof., Dr. Milena Velikova, Assist. Prof.

IDENTIFYING PLAYER TYPES IN THE CLASSROOM FOR EFFECTIVE GAMIFICATION

Dr. Desislava Atanasova, Assoc. Prof., Viliana Molnar

DEVELOPMENT AND INTEGRATION OF AUDIO AND VISUAL MICRO-RESOURCES IN THE LEARNING PROCESS THROUGH THE USE OF ARTIFICIAL INTELLIGENCE SYSTEMS

Dr. Petya Stefanova, Assist. Prof., Dr. Assist. Elitsa Ibryamova, Assist. Prof., Prof. Angel Smrikarov, Dr. Galina Ivanova, Assoc. Prof.

АНАЛИЗ НА ПРОГРАМНИТЕ МОДЕЛИ ЗА АВТОМАТИЗИРАНЕ НА КОГНИТИВНИ ПРОЦЕСИ

Доц. д-р Валентин Атанасов Доц. д-р Анелия Иванова

Книжка 5
MANAGING A POSITIVE AND LIFE-SKILLS DEVELOPMENT IN THE SCHOOL-BASED CURRICULA: A LITERATURE REVIEW ON THE SUSTAINABLE EDUCATION

Dr. Lindita Durmishi, Assoc. Prof., Dr. Ardian Durmishi Prof. Milena Filipova Dr. Silva Ibrahimi

APPLICATION OF THE COMPETENCY MODEL IN BUSINESS ADMINISTARATION HIGHER EDUCATION IN HORIZON 2030

Prof. Nadya Mironova, Dr. Tatyana Kicheva, Assoc. Prof., Dr. Miglena Angelova, Assoc. Prof.

Книжка 4s
THE EDUCATION AND RESEARCH IN THE QUADRUPLE HELIX AND THE REGIONAL INNOVATION PROSPECTS

Prof. Dr. Milen Baltov Dr. Stela Baltova, Assoc. Prof. Dr. Vilyana Ruseva, Assoc. Prof.

Книжка 4
ATTITUDES OF STUDENTS – FUTURE TEACHERS, FOR THE APPLICATION OF GENERATIVE ARTIFICIAL INTELLIGENCE

Assoc. Prof. Nikolay Tsankov, DSc. Dr. Ivo Damyanov, Assist. Prof.

EDUCATIONAL NEEDS OF THE JUDICIAL ADMINISTRATION IN THE CONTEXT OF DIGITALIZATION

Dr. Diana Dimitrova, Dr. Darina Dimitrova, Assoc. Prof., Dr. Velina Koleva

MANAGERIAL ASPECTS OF COOPERATION AMONG HIGHER EDUCATION INSTITUTIONS AND THEIR STAKEHOLDERS

Prof. Olha Prokopenko, DSc. Dr. Svitlana Perova, Assoc. Prof. Prof. Tokhir Rakhimov, DSc.

APPLICATION OF EDUCATIONAL STRATEGIES IN STUDYING THE DYNAMICS OF STATE POWER STRUCTURES: IMPLEMENTATION OF FORMAL AND INFORMAL MECHANISMS OF INFLUENCE

Prof. Stoyan Denchev, DSc. Dr. Miriyana Pavlova, Assist. Prof. Dr. Steliana Yordanova, Assist. Prof.

ДИАГНОСТИКА НА ФОРМИРАНАТА ПРОФЕСИОНАЛНА КОМПЕТЕНТНОСТ НА БЪДЕЩИ ИНЖЕНЕРИ ПО ЕНЕРГЕТИКА

Гл. ас. д-р Надя Илиева Доц. д-р Елена Бояджиева Ивалина Маринова

Книжка 3s
A MODEL FOR CALCULATING THE INDIRECT ADDED VALUE OF AI FOR BUSINESS

Dr. Petya Biolcheva, Assoc. Prof., Prof. Nikolay Sterev, DSc.

AI EFFECTIVENESS AND RISK ASSESSMENT OF INVESTMENTS IN HIGH-RISK START-UPS

Sotir Ivanov, PhD Student, Dr. Petya Biolcheva, Assoc. Prof.

COMPETITIVENESS OF TEXTILE PRODUCERS IN DIGITAL BUSINESS ERA

Prof. Nikolay Sterev, DSc., Dr. Vyara Milusheva, Assoc. Prof.

CHALLANGES OF USING ARTIFICIAL INTELLIGENCE IN MANAGEMENT DECISION MAKING

Dr. Bozhana Stoycheva, Assist. Prof. Dr. Pavel Vitliemov, Assoc. Prof.

THE SIGNIFICANCE OF ERASMUS+ MOBILITY IN BUSINESS EDUCATION: AN EXAMINATION OF A SUCCESSFUL BULGARIAN-MEXICAN COLLABORATION

Dr. Lyudmila Mihaylova, Assoc. Prof. Dr. Emil Papazov, Assoc. Prof. Dr. Diana E. Woolfolk Ruiz

Книжка 3
ИГРОВИ ПОДХОДИ В ОБУЧЕНИЕТО: УНИВЕРСИТЕТСКИ КОНТЕКСТ

Проф. д.н. Цветан Давидков Силвия Тонева, докторант

Книжка 2
FORMATION OF PROFESSIONAL SKILLS OF AGRICULTURAL ENGINEERS DURING LABORATORY PRACTICE WHEN STUDYING FUNDAMENTAL SCIENCE

Dr. Ivan Beloev, Assoc. Prof. Dr. Oksana Bulgakova, Assoc. Prof., Dr. Oksana Zakhutska, Assoc. Prof., Dr. Maria Bondar, Assoc. Prof. Dr. Lesia Zbaravska, Assoc. Prof.

ИМИДЖ НА УНИВЕРСИТЕТА

Проф. д.п.н. Галя Христозова

Книжка 1s
COMPETITIVENESS AS A RESULT OF CREATIVITY AND INNOVATION

Dr. Nikolay Krushkov, Assoc. Prof. Dr. Ralitza Zayakova-Krushkova

INNOVATION, TECHNICAL PROGRESS AND ECONOMIC DEVELOPMENT

Dr. Aleksandar Aleksandrov, Assist. Prof.

ENHANCING ECONOMIC SECURITY THROUGH INTELLECTUAL PROPERTY

Dr. Dimiter Gantchev, Assist. Prof.

INTELLECTUAL PROPERTY AND SECURITY IN THE INTEGRATED CIRCUITS INDUSTRY

Dr. Ivan Nachev, Dr. Yuliana Tomova, Iskren Konstantinov, PhD student, Marina Spasova, student

GREEN TRADEMARKS AND SUSTAINABILITY

Dr. Silviya Todorova, Assist. Prof.

ARTIFICIAL INTELLIGENCE AND ITS PROTECTION AS AN INVENTION

Dr. Vladislava Pаcheva, Assist. Prof.

Книжка 1
PROBLEMS AND PERSPECTIVES FOR SOCIAL ENTREPRENEURSHIP IN HIGHER EDUCATION

Prof. Dr. Milena Filipova Prof. Dr. Olha Prokopenko Prof. Dr. Igor Matyushenko, Dr. Olena Khanova, Assoc. Prof. Dr. Olga Shirobokova, Assoc. Prof. Dr. Ardian Durmishi

RESEARCH OF USING THE SYSTEM APPROACH TO INCREASE PROFESSIONAL COMPETENCE OF STUDENTS IN THE PROCESS OF STUDYING NATURAL SCIENCES

Dr. Ivan Beloev, Assoc. Prof. Dr. Іnna Savytska, Assoc. Prof., Dr. Oksana Bulgakova, Assoc. Prof. Prof. Iryna Yasinetska, Dr. Lesia Zbaravska, Assoc. Prof.

2023 година
Книжка 6s
TRANSFORMING MARITIME EDUCATION FOR A DIGITAL INDUSTRY

Dr. Christiana Atanasova, Assist. Prof.

DEVELOPMENT OF A COMMON INFORMATION SYSTEM TO CREATE A DIGITAL CAREER CENTER TOGETHER WITH PARTNER HIGHER SCHOOLS

Prof. Dr. Yordanka Angelova, Dr. Rossen Radonov, Assoc. Prof. Vasil Kuzmov, Assist. Prof. Stela Zhorzh Derelieva-Konstantinova

DRAFTING A DIGITAL TRANSFORMATION STRATEGY FOR PROJECT MANAGEMENT SECTOR – EMPIRICAL STUDY ON UAE

Mounir el Khatib, Shikha al Ali, Ibrahim Alharam, Ali Alhajeri Dr. Gabriela Peneva, Assist. Prof., Prof. Jordanka Angelova, Mahmoud Shanaa

VOYAGE OF LEARNING: CRUISE SHIPS WEATHER ROUTING AND MARITIME EDUCATION

Prof. Svetlana Dimitrakieva, Dr. Dobrin Milev, Assist. Prof., Dr. Christiana Atanasova, Assist. Prof.

RESEARCH ON THE SUSTAINABLE DEVELOPMENT COMPETENCES OF THE LANDSCAPE ARCHITECT IN PRACTICE

Land. arch. Elena Dragozova, Assoc. Prof., Dr. Stanislava Kovacheva, Assoc. Prof.

STUDY OF THE KEY FACTORS INFLUENCING THE EFFECTIVE PLANNING AND UTILIZATION OF PRODUCTION FACILITIES IN THE INDUSTRIAL ENTERPRISE

Dr. Tanya Panayotova, Assoc. Prof., Dr. Krasimira Dimitrova, Assoc. Prof., Neli Veleva, PhD student

SIMULATOR TRAINING – UNIQUE POWERFUL INSTRUMENT FOR EDUCATING, SKILLS CREATING, MITIGATING SKILLS AND RESILIENCE CREATING

Prof. Dimitar Dimitrakiev, Vencislav Stankov, Assist. Prof., Dr. Christiana Atanasova, Assist. Prof.

СТРУКТУРНИ ПРОМЕНИ В ОБУЧЕНИЕТО НА МЕНИДЖЪРИ ЗА ИНДУСТРИЯ 5.0

Доц. д-р Недко Минчев, доц. д-р Венета Христова, гл. ас. д-р Иван Стоянов

RESEARCH OF THE INNOVATION CAPACITY OF AGRICULTURAL PRODUCERS

Dr. Siya Veleva, Assoc. Prof.; Prof. Dr. Eng. Margarita Mondeshka Dr. Anka Tsvetanova, Assoc. Prof.,

Книжка 6
Книжка 5s
ПРЕСЕЧНАТА ТОЧКА НА СПОРТА, СИГУРНОСТТА И КРИПТО ФЕН ТОКЕНИТЕ

Полк. доц. Георги Маринов Доц. Милена Кулева

ВИДОВЕ ТРАВМИ В ПАРАШУТИЗМА И ПРЕВЕНЦИЯТА ИМ

Капитан III ранг Георги Калинов

ОБУЧЕНИЕ В ХОДЕНЕ С ПОМОЩНИ СРЕДСТВА – РИСКОВЕ И СИГУРНОСТ ЗА ПАЦИЕНТА

Атанас Друмев Доц. д-р Данелина Вачева, доц. д-р Искра Петкова

Книжка 5
ПОДХОДИ ЗА ПСИХОСОЦИАЛНА ПОДКРЕПА НА УНИВЕРСИТЕТСКИ ПРЕПОДАВАТЕЛИ В УСЛОВИЯ НА КРИЗА

Доц. д.н. Цветелина Търпоманова, доц. д.н. Веселина Славова

Книжка 4s
DETERMINING THE DEGREE OF DIGITALIZATION OF A HIGHER EDUCATION INSTITUTION

Acad. DSc. Hristo Beloev, Prof. Dr. Angel Smrikarov, Assoc. Prof. DSc. Valentina Voinohovska, Assoc. Prof. Dr. Galina Ivanova

A STUDY ON THE POSSIBILITIES TO INTEGRATE THE MODERN 3D TECHNOLOGIES IN THE SCIENTIFIC ACTIVITIES OF THE HIGHER EDUCATION INSTITUTIONS

Prof. Dr. Georgi Hristov, Assoc. Prof. Dr. Ivan Beloev, Assoc. Prof. Dr. Plamen Zahariev, Assist. Prof. Dr. Diyana Kinaneva, Assist. Prof. Georgi Georgiev

THE ROLE OF THE UNIVERSITIES AS ACCELERATORS FOR THE INTEGRATION OF THE STEM LEARNING METHODS IN THE PRIMARY AND SECONDARY SCHOOLS

Prof. Dr. Georgi Hristov, Assoc. Prof. Dr. Ivan Beloev, Assoc. Prof. Dr. Plamen Zahariev, Assist. Prof. Georgi Georgiev

ОТ STEM КЪМ BEST: ДВА СТАНДАРТА, ЕДНА ЦЕЛ

Проф. д-р Андрей Захариев, проф. д-р Стефан Симеонов, гл. ас. д-р Таня Тодорова

ВЪЗМОЖНОСТИ ЗА ПРИЛОЖЕНИЕ НА БЛОКЧЕЙН ТЕХНОЛОГИЯТА В ОБРАЗОВАНИЕТО

Докторант Андриан Минчев, доц. д-р Ваня Стойкова

ПРЕДИЗВИКАТЕЛСТВА НА ДИГИТАЛНАТА ТРАНСФОРМАЦИЯ В ОБРАЗОВАНИЕТО – СРАВНИТЕЛЕН АНАЛИЗ НА СТУДЕНТСКОТО МНЕНИЕ

Гл. ас. д-р Мирослава Бонева, доц. д-р Антон Недялков, проф. д.н. Милена Кирова

CHALLENGES, REQUIREMENTS, OPPORTUNITIES AND SOLUTIONS FOR THE DIGITAL TRANSFORMATION OF THE TRANSPORT EDUCATION

Prof. Dr. Georgi Hristov, Assoc. Prof. Dr. Ivan Beloev, Assoc. Prof. Dr. Plamen Zahariev

Книжка 4
EFFECT OF RESILIENCE ON BURNOUT IN ONLINE LEARNING ENVIRONMENT

Dr. Radina Stoyanova, Prof. Sonya Karabeliova, Petya Pandurova, Dr. Nadezhda Zheckova Dr. Kaloyan Mitev

STATE AND PROSPECTS OF DEVELOPMENT OF ACADEMIC MOBILITY IN THE SYSTEM OF TRAINING A SPECIAL EDUCATION SPECIALIST

Dr. Tetiana Dokuchyna, Assoc. Prof., Prof. Dr. Svitlana Myronova, Dr. Tetiana Franchuk, Assoc. Prof.

Книжка 3s
STRATEGIES AND POLICIES TO SUPPORT THE DEVELOPMENT OF AI TECHNOLOGIES IN EUROPE

Assoc. Prof. Miglena Molhova, Assoc. Prof. Petya Biolcheva

BULGARIA'S TECHNOLOGICAL DEVELOPMENT THROUGH THE PRISM OF HIGHER EDUCATION POLICIES

Assoc. Prof. Ivaylo B. Ivanov, Assoc. Prof. Miglena Molhova

INTELLIGENT ANIMAL HUSBANDRY: FARMER ATTITUDES AND A ROADMAP FOR IMPLEMENTATION

Prof. Dr. Dimitrios Petropoulos, Koutroubis Fotios Assoc. Prof. Petya Biolcheva Evgeni Valchev

EFFECTIVE MANAGEMENT OF HUMAN RESOURCES IN TOURISM THROUGH MOTIVATION

Assoc. Prof. Fahri Idriz Assoc. Prof. Marin Geshkov

Книжка 3
САМООЦЕНКА НА ОБЩООБРАЗОВАТЕЛНИТЕ И РЕСУРСНИТЕ УЧИТЕЛИ ЗА РАБОТА В ПАРАДИГМАТА НА ПРИОБЩАВАЩОТО ОБРАЗОВАНИЕ

Проф. д.н. Милен Замфиров, проф. Емилия Евгениева, проф. Маргарита Бакрачева

STUDY OF THE DEVELOPMENT OF THE USE OF COMMUNICATIVE TECHNOLOGIES IN THE EDUCATIONAL PROCESS OF ENGINEERS TRAINING

Assoc. Prof. Ivan Beloev, Assoc. Prof. Valentina Vasileva Assoc. Prof. Sergii Bilan, Assoc. Prof. Maria Bondar, Assoc. Prof. Oksana Bulgakova, Assoc. Prof. Lyubov Shymko

SAFETY THROUGH ARTIFICIAL INTELLIGENCE IN THE MARITIME INDUSTRY

Assoc. Prof. Petya Biolcheva Evgeni Valchev, PhD student

Книжка 2
РАЗПОЛОЖЕНИЕ НА ВИСШИТЕ УЧИЛИЩА В БЪЛГАРИЯ В КОНТЕКСТА НА ФОРМИРАНЕ НА ПАЗАРА НА ТРУДА

Гл. ас. д-р Цветелина Берберова-Вълчева, доц. д-р Камен Петров, доц. д-р Николай Цонков

CHARACTERISTICS AND COMPONENTS OF THE CYBER HYGIENE AS A SUBCLASS OF CYBER SECURITY IN MILITARY ENVIRONMENT AND EDUCATIONAL ISSUES

Prof. Boyan Mednikarov, DSc. Prof. Yuliyan Tsonev Dr. Borislav Nikolov, Prof. Andon Lazarov, DSc.

Книжка 1
MODERNIZATION OF THE CONTENT OF THE LECTURE COURSE IN PHYSICS FOR TRAINING FUTURE AGRICULTURAL ENGINEERS

Dr. Ivan Beloev, Assoc. Prof., Dr. Valentina Vasileva, Assoc. Prof. Prof. Vasyl Shynkaruk, DSc., Assoc. Prof. Oksana Bulgakova, Assoc. Prof. Maria Bondar Assoc. Prof. Lesia Zbaravska, Assoc. Prof. Sergii Slobodian

THE NEW PANDEMIC NORMAL THROUGH THE EYES OF BULGARIAN STUDENTS

Prof. Vyara Stoilova, Assoc. Prof. Todorka Kineva

2022 година
Книжка 6
ORGANIZATION OF AN INCLUSIVE EDUCATIONAL ENVIRONMENT FOR THE STUDENTS WITH SPECIAL NEEDS

Prof. Halyna Bilavych Prof. Nataliia Bakhmat Prof. Tetyana Pantiuk, Prof. Mykola Pantiuk Prof. Borys Savchuk

ДИГИТАЛИЗАЦИЯ НА ОБРАЗОВАНИЕТО В БЪЛГАРИЯ: СЪСТОЯНИЕ И ОБЩИ ТЕНДЕНЦИИ

Д-р Теодора Върбанова, проф. д-р Албена Вуцова, доц. д-р Николай Нетов

СКРИНИНГ НА ЗРЕНИЕТО – ПРОФИЛАКТИКА И ЕЛЕМЕНТ ОТ ПРАКТИКАТА НА СТУДЕНТИ И ОБУЧЕНИЕТО НА УЧЕНИЦИ

Руска Драганова-Христова, д-р Славена Стойкова, доц. д-р Снежана Йорданова

Книжка 5
ПРАВОТО НА ИЗБОР В ЖИВОТА НА ДЕЦАТА В РЕПУБЛИКА БЪЛГАРИЯ

Проф. д.п.н. Сийка Чавдарова-Костова, гл. ас. д-р Даниела Рачева, ас. Екатерина Томова, доц. д-р Росица Симеонова

SUSTAINABLE PROFESSIONAL DEVELOPMENT THROUGH COACHING: BENEFITS FOR TEACHERS AND LEARNERS

Assoc. Prof. Irina Ivanova, Assoc. Prof. Penka Kozhuharova, Prof. Rumyana Todorova

SELF-ASSESSMENT – A COMPONENT OF THE COMPETENCE-BASED TRAINING IN THE PROFESSION “APPLIED PROGRAMMER”

Assoc. Prof. Ivaylo Staribratov, Muharem Mollov, Rosen Valchev Petar Petrov

Книжка 4
BENCHMARKING FOR DEVELOPMENT OF SPEED AND POWER CHARACTERISTICS

Assist. Prof. Dr. Darinka Ignatova Assoc. Prof. Dr. Alexander Iliev

DIAGNOSIS AS A TOOL FOR MONITORING THE EFFECTIVENESS OF ADDICTION PREVENTION IN ADOLESCENTS

Prof. O.A. Selivanova Assoc. Prof. N.V. Bystrova, Assoc. Prof. I.I. Derecha, Assoc. Prof. T.S. Mamontova, Assoc. Prof. O.V. Panfilova

Книжка 3
ПУБЛИЧНОТО РАЗБИРАНЕ НА НАУКАТА В МРЕЖОВИЯ СВЯТ

Д-р Светломир Здравков, д-р Мартин Й. Иванов, д-р Петя Климентова

ОБРАЗОВАНИЕ ЗА УСТОЙЧИВО РАЗВИТИЕ – ПРАКТИКО-ПРИЛОЖНИ АСПЕКТИ

Гл. ас. д-р Златка Ваклева Проф. д-р Тоня Георгиева

Книжка 2
PREPARATION OF PRIMARY SCHOOL TEACHERS FOR COMMUNICATIVE AND RHETORICAL ACTIVITY IN SCHOOL IN THE CONTEXT OF THEIR PRACTICAL TRAINING

Prof. Halyna Bilavych Prof. Nataliia Bakhmat Prof. Tetyana Pantyuk, Prof. Mykola Pantyuk Prof. Borys Savchuk

ПРОЛЕТНА КОНФЕРЕНЦИЯ НА СЪЮЗА НА МАТЕМАТИЦИТЕ В БЪЛГАРИЯ

(Трявна, 5 – 9 април 2022) Гл. ас. д-р Албена Симова

Книжка 1
ДИГИТАЛНАТА ИНТЕРАКЦИЯ ПРЕПОДАВАТЕЛ – СТУДЕНТ В ОНЛАЙН ОБУЧЕНИЕТО В МЕДИЦИНСКИТЕ УНИВЕРСИТЕТИ

Д-р Миглена Търновска, д-р Румяна Стоянова Доц. Боряна Парашкевова, проф. Юлияна Маринова

2021 година
Книжка 6
Книжка 5
ЕДНА РЕКАПИТУЛАЦИЯ НА ИЗСЛЕДВАНИЯ ВЪРХУ ИНТЕРКУЛТУРНИТЕ ОТНОШЕНИЯ. КАКВО СЛЕДВА ОТ ТОВА ЗА ОБРАЗОВАНИЕТО?

Давидков, Ц., 2019. Изследвания върху културите. Културни ориентири на управлението. София: СУ „Св. Климент Охридски“, ISBN 978-954-9399-52-3 Проф. Пламен Макариев

Книжка 4s
RECOGNITION OF FAKE NEWS IN SPORTS

Colonel Assoc. Prof. Petko Dimov

SIGNAL FOR HELP

Ina Vladova, Milena Kuleva

Книжка 4
PREMISES FOR A MULTICULTURAL APPROACH TO EDUCATION

Dr. Anzhelina Koriakina, Assoc. Prof., Prof. Lyudmila Amanbaeva, DSc.

ПОЗИТИВНА ПСИХОЛОГИЯ: ПРОБЛЕМНИ ОБЛАСТИ И ФОРМИРАНЕ НА ЛИЧНОСТТА

Доц. д-р Стоил Мавродиев, Любомира Димитрова

КНИГА ЗА ИСТОРИЯТА НА БЪЛГАРСКОТО ВИСШЕ ИНЖЕНЕРНО ОБРАЗОВАНИЕ

Сгурев, В., Гергов, С., Иванов, Г., 2019. Положителните науки с приложение към индустрията. История на висшето техническо образование в България. София: Изд. на БАН „Проф. Марин Дринов“, Изд. „Захарий Стоянов“. ISBN 978-619-245-004-5, ISBN 978-954-09-1387-2.

Книжка 3
ENTREPRENEURSHIP AND INTERDISCIPLINARY EDUCATION – SEMIOTIC ASPECTS

Prof. Dr. Christo Kaftandjiev Dr. Diana Kotova

THE PRACTICAL IMPORTANCE OF ACCOUNTING EDUCATION FOR FUTURE MANAGERS

Nataliia Radionova, DSc. Dr. Radostina Stoyanova, Assist. Prof.

ЗА ОБРАЗОВАТЕЛНАТА ИНТЕГРАЦИЯ И ЗАЛОЗИТЕ НА НАСТОЯЩЕТО

Нунев, Й., 2020. Мониторинг на процесите на приобщаване и образователна интеграция и модели за десегрегация на ромското образование. Пловдив: Астарта, ISBN 978-954-350-283-7

Книжка 2
Книжка 1
METHODOLOGY OF SAFETY AND QUALITY OF LIFE ON THE BASIS OF NOOSPHERIC EDUCATION SYSTEM FORMATION

Nataliia Bakhmat Nataliia Ridei, Nataliia Tytova, Vladyslava Liubarets, Oksana Katsero

ОБРАЗОВАНИЕ В УСТОЙЧИВО РАЗВИТИЕ И ВЗАИМОДЕЙСТВИЕ „ДЕТЕ – СРЕДА“

Стоянова, М. (2020). Образование в устойчиво развитие и взаимодействие „дете – среда“ София: Авангард принт. ISBN 978-954-337-408-3

2020 година
Книжка 6
HIGHER EDUCATION AS A PUBLIC GOOD

Yulia Nedelcheva, Miroslav Nedelchev

Книжка 5
НАСЪРЧАВАНЕ НА СЪТРУДНИЧЕСТВОТО МЕЖДУ ВИСШИТЕ УЧИЛИЩА И БИЗНЕСА

Добринка Стоянова, Блага Маджурова, Гергана Димитрова, Стефан Райчев

Книжка 4
THE STRATEGY OF HUMAN RIGHTS STUDY IN EDUCATION

Anush Balian Nataliya Seysebayeva Natalia Efremova Liliia Danylchenko

Книжка 3
ПОМОЩНИ СРЕДСТВА И ТЕХНОЛОГИИ В ПРИОБЩАВАЩОТО ОБРАЗОВАНИЕ

Янкова, Ж. (2020). Помощни средства и технологии за деца и ученици със специални образователни потребности в приобщаващото образование.

Книжка 2
МИГРАЦИЯ И МИГРАЦИОННИ ПРОЦЕСИ

Веселина Р. Иванова

SOCIAL STATUS OF DISABLED PEOPLE IN RUSSIA

Elena G. Pankova, Tatiana V. Soloveva, Dinara A. Bistyaykina, Olga M. Lizina

Книжка 1
ETHNIC UPBRINGING AS A PART OF THE ETHNIC CULTURE

Sholpankulova Gulnar Kenesbekovna

ЗА СВЕТЛИНАТА, КОЯТО ИЗЛЪЧВА… В ПАМЕТ НА ПРОФ. Д.П.Н. АСЕМГУЛ МАЛДАЖАНОВА

Нашата редколегия загуби един все- отдаен и неповторим колега и приятел – проф. д.п.н. Асемгул Малдажанова. Пе- дагог по призвание и филолог по мисия! Отиде си от нас нашият приятел, коле- га и член на редколегията на списанието – професор д.п.н. Асемгул Малдажанова – първи заместник-ректор на Евразийския

2019 година
Книжка 6
EMOTIONAL COMPETENCE OF THE SOCIAL TEACHER

Kadisha K. Shalgynbayeva Ulbosin Zh.Tuyakova

Книжка 5
„ОБРАЗОВАТЕЛНИ КИНОХОРИЗОНТИ“ В ПОЛЕТО НА МЕДИА ОБРАЗОВАНИЕТО

(2018). Образователни кинохоризонти. Международен сборник с научни публи- кации по проект „Естетически и образователни проекции на кинодидактиката“. Бургас: Проф. д-р Асен Златаров. Съставител: Маргарита Терзиева. ISBN 978-954-471-496-3

Книжка 4
ВИСШЕТО МОРСКО ОБРАЗОВАНИЕ В КОНКУРЕНТНА СРЕДА

Бакалов, Я. (2019). Висше морско образование. Лидиране в конкурентна среда. Варна: Стено. ISBN 978-619-241-029-2

Книжка 3
УЧИЛИЩЕТО НА БЪДЕЩЕТО

Наталия Витанова

Книжка 2
КНИГА ЗА УСПЕШНИТЕ НАУЧНИ ПУБЛИКАЦИИ

Кожухаров, А. (2018). Успешните научни публикации. Варна: Тера Балканика. ISBN 978-619-90844-1-0

Книжка 1
POST-GRADUATE QUALIFICATION OF TEACHERS IN INTERCULTURAL EDUCATIONAL ENVIRONMENT

Irina Koleva, Veselin Tepavicharov, Violeta Kotseva, Kremena Yordanova

ДЕЦАТА В КОНСТИТУЦИОННИТЕ НОРМИ НА БЪЛГАРИЯ

Румен Василев, Весела Марева

СЪСТОЯНИЕ НА БЪЛГАРСКОТО ОБРАЗОВАНИЕ

Анелия Любенова Любомир Любенов

ИНТЕРКУЛТУРНИЯТ ТРЕНИНГ КАТО ЧАСТ ОТ СТРАТЕГИЯТА ЗА ГЛОБАЛИЗАЦИОННА ИНТЕГРАЦИЯ

Хубенова, М. (2018). Значение на междукултурната комуникация за направления: политически науки, право, икономика и бизнес. София: Издателски комплекс УНСС. ISBN 978-619-232-072-0

ЕДИН НОВ УЧЕБНИК

Дончева, Ю. (2018). Теоретични и методически основи на запознаване с околния свят в детската градина. Русе: Лени Ан

2018 година
Книжка 6
СТРАТЕГИИ НА ОБРАЗОВАТЕЛНАТА И НАУЧНАТА ПОЛИТИКА НАУЧНО СПИСАНИЕ STRATEGIES FOR POLICY IN SCIENCE AND EDUCATION EDUCATIONAL JOURNAL ГОДИНА XXVI / VOLUME 26, 2018 ANNUAL CONTENTS / ГОДИШНО СЪДЪРЖАНИЕ СТРАНИЦИ / PAGES КНИЖКА 1 / NUMBER 1: 1 – 120 КНИЖКА 2 / NUMBER 2: 121 – 224 КНИЖКА 3 / NUMBER 3: 225 – 336 КНИЖКА 4 / NUMBER 4: 337 – 448 КНИЖКА 5 / NUMBER 5: 449 – 560 КНИЖКА 6 / NUMBER 6: 561 – 664

ДИСКУСИОННО / DISCUSSION 211 – 216: Процедурата за назначаване на ръководител на катедра като причина за вло- шаващото се качество на обучението и микроклимата във висшите учи лища у нас [The Procedure for Appointing a Head of Department as a Reason for the Deteriorating Quality of Education and the Microclimate in the Higher School] / Александър Димит- ров / Alexander Dimitrov

Книжка 5
A NEW AWARD FOR PROFESSOR MAIRA KABAKOVA

The staff of the Editorial board of the journal “Strategies for Policy in Science and Education” warmly and sincerely congratulates their Kazakhstan colleague -

ПРОДЪЛЖАВАЩАТА КВАЛИФИКАЦИЯ НА УЧИТЕЛИТЕ – НОРМАТИВЕН И ИЗСЛЕДОВАТЕЛСКИ ОБЗОР

(научно-теоретично обобщение върху проведени обучения на учители)

ЕТНОЦЕНТРИЗМЪТ И ИНЕРЦИИТЕ ОТ МИНАЛОТО – СЕРИОЗНИ ПРОБЛЕМИ В БЪЛГАРСКАТА ОБРАЗОВАТЕЛНА СИСТЕМА

(Eтнопедагогически аспекти на основното и средното образование) Веселин Тепавичаров

Книжка 4
ХРИСТО БОТЕВ И ПОЗНАВАТЕЛНИЯТ КРЪГОЗОР НА СЪВРЕМЕННИТЕ СТУДЕНТИ ЗА ЕВРОПА

Изследователски разказ за един познавателен подвиг и за една познавателна недостатъчност

Книжка 3
BLENDED EDUCATION IN HIGHER SCHOOLS: NEW NETWORKS AND MEDIATORS

Nikolay Tsankov Veska Gyuviyska Milena Levunlieva

ВЗАИМОВРЪЗКАТА МЕЖДУ СПОРТА И ПРАВОТО

Ивайло Прокопов, Елица Стоянова

НАДНАЦИОНАЛНИ И МЕЖДУПРАВИТЕЛСТВЕНИ МЕТОДИ НА ИНТЕГРАЦИЯ В ОБЛАСТТА НА ПРАВОСЪДИЕТО И СИГУРНОСТТА

(Формиране на обща миграционна политика: парадигми и образователни аспекти) Лора Махлелиева-Кларксън

Книжка 2
Книжка 1
ВЪЗПРИЯТИЯ И НАГЛАСИ НА УЧЕНИЦИТЕ ПО ВАЖНИ ОБЩЕСТВЕНИ ВЪПРОСИ

(Данни от Международното изследване на гражданското образование – ICCS 2016)

2017 година
Книжка 6
ЗНАЧИМОСТТА НА УЧЕНЕТО: АНАЛИЗ НА ВРЪЗКИТЕ МЕЖДУ ГЛЕДНИТЕ ТОЧКИ НА УЧЕНИЦИ, РОДИТЕЛИ И УЧИТЕЛИ

Илиана Мирчева, Елена Джамбазова, Снежана Радева, Деян Велковски

ВЪЗПРИЯТИЯ И НАГЛАСИ НА УЧЕНИЦИТЕ ПО ВАЖНИ ОБЩЕСТВЕНИ ВЪПРОСИ

(Данни от Международното изследване на гражданското образование – ICCS 2016)

СТРАТЕГИИ НА ОБРАЗОВАТЕЛНАТА И НАУЧНАТА ПОЛИТИКА НАУЧНО СПИСАНИЕ STRATEGIES FOR POLICY IN SCIENCE AND EDUCATION EDUCATIONAL JOURNAL ГОДИНА XXV / VOLUME 25, 2017 ANNUAL CONTENTS / ГОДИШНО СЪДЪРЖАНИЕ

СТРАНИЦИ / PAGES КНИЖКА 1 / NUMBER 1: 1 – 112 КНИЖКА 2 / NUMBER 2: 113 – 224 КНИЖКА 3 / NUMBER 3: 225 – 336 КНИЖКА 4 / NUMBER 4: 337 – 448 КНИЖКА 5 / NUMBER 5: 449 – 552 КНИЖКА 6 / NUMBER 6: 553 – 672

Книжка 5
ОРГАНИЗАЦИОННА КУЛТУРА В УЧИЛИЩЕ

Ивайло Старибратов, Лилия Бабакова

Книжка 4
КОУЧИНГ. ОБРАЗОВАТЕЛЕН КОУЧИНГ

Наталия Витанова, Нели Митева

Книжка 3
ТЕХНОХУМАНИЗМЪТ И ДЕЙТЪИЗМЪТ – НОВИТЕ РЕЛИГИИ НА БЪДЕЩЕТО

Harari, Y. N. (2016). Homo Deus. A Brief History of Tomorrow. Harvill Secker. ISBN-10: 1910701874

Книжка 2
Книжка 1
РЕФОРМИТЕ В ОБРАЗОВАНИЕТО – ПЕРСПЕКТИВИ И ПРЕДИЗВИКАТЕЛСТВА

Интервю с Габриела Миткова, началник на Регионалното управление на образованието – Силистра

ЕМПАТИЯ И РЕФЛЕКСИЯ

Нели Кънева, Кристиана Булдеева

2016 година
Книжка 6
СТРАТЕГИИ НА ОБРАЗОВАТЕЛНАТА И НАУЧНАТА ПОЛИТИКА НАУЧНО СПИСАНИЕ STRATEGIES FOR POLICY IN SCIENCE AND EDUCATION EDUCATIONAL JOURNAL ГОДИНА XXIV / VOLUME 24, 2016 ANNUAL CONTENT / ГОДИШНО СЪДЪРЖАНИЕ

СТРАНИЦИ / PAGES КНИЖКА 1 / NUMBER 1: 1 – 120 КНИЖКА 2 / NUMBER 2: 121 – 232 КНИЖКА 3 / NUMBER 3: 233 – 344 КНИЖКА 4 / NUMBER 4: 345 – 456 КНИЖКА 5 / NUMBER 5: 457 – 568 КНИЖКА 6 / NUMBER 6: 569 – 672

Книжка 5
Книжка 4
Книжка 3
Книжка 2
Книжка 1
2014 година
Книжка 6
Книжка 5
КОХЕРЕНТНОСТ НА ПОЛИТИКИ

Албена Вуцова, Лиляна Павлова

Книжка 4
ОБРАЗОВАНИЕТО ПО ПРАВАТА НА ЧОВЕКА ПРЕЗ ПОГЛЕДА НА ДОЦ. ЦЕЦКА КОЛАРОВА

Цецка Коларова. (2013). Образование по правата на човека. София: Авангард Прима. ISBN 978-619-160-234-6

USING THE RESULTS OF A NATIONAL ASSESSMENT OF EDUCATIONAL ACHIEVEMENT

Thomas Kellaghan Vincent Greaney T. Scott Murray Chapter 4 Translating Assessment Findings Into Policy And Action Although the primary purpose of a system of national assessment is to describe students’ learning, its role is not limited to description. To justify the effort and expenditure involved, the information that an assessment provides about the achievements of students, their strengths and weaknesses, and how they are distributed in the population (for example, by gender or location

Книжка 3
Книжка 2
PROFESSIONAL DEVELOPMENT OF UNIVERSITY FACULTY: А SOCIOLOGICAL ANALYSIS

Gulnar Toltaevna Balakayeva Alken Shugaybekovich Tokmagambetov Sapar Imangalievich Ospanov

ЗА ПО-ХУМАНИСТИЧНА ТРАДИЦИОННО- ИНОВАЦИОННА ОБРАЗОВАТЕЛНО-ВЪЗПИТАТЕЛНА СТРАТЕГИЯ У НАС

(КОНЦЕПТУАЛНА РАЗРАБОТКА В ПОМОЩ НА ПОДГОТОВКАТА НА НОВ ЗАКОН ЗА ОБРАЗОВАНИЕТО)

Книжка 1
РЕФЛЕКСИЯТА В ИНТЕГРАТИВНОТО ПОЛЕ НА МЕТОДИКАТА НА ОБУЧЕНИЕТО ПО БИОЛОГИЯ

Иса Хаджиали, Наташа Цанова, Надежда Райчева, Снежана Томова

USING THE RESULTS OF A NATIONAL ASSESSMENT OF EDUCATIONAL ACHIEVEMENT

Thomas Kellaghan Vincent Greaney T. Scott Murray Chapter 1 Factors affecting the use and nonuse of national assessment fi ndings The main objectives of a national assessment, as set out in volume 1 of this series, Assessing National Achievement Levels in Education, are to determine (a) how well students are learning in the education system (with reference to general expectations, aims of the curriculum, and preparation for further learning and for life); (b) whether there is evidence of par

2013 година
Книжка 6
Книжка 5
Книжка 4
QUESTIONNAIRE DEVELOPMENT

ÎÖÅÍßÂÀÍÅÒÎ

РОССИЙСКАЯ СИСТЕМА ОЦЕНКИ КАЧЕСТВА ОБРАЗОВАНИЯ: ГЛАВНЫЕ УРОКИ

В. Болотов / И. Вальдман / Г. Ковалёва / М. Пинская

Книжка 3
MASS MEDIA CULTURE IN KAZAKHSTAN

Aktolkyn Kulsariyeva Yerkin Massanov Indira Alibayeva

РОССИЙСКАЯ СИСТЕМА ОЦЕНКИ КАЧЕСТВА ОБРАЗОВАНИЯ: ГЛАВНЫЕ УРОКИ

В. Болотов / И. Вальдман / Г. Ковалёва / М. Пинская

Книжка 2
ОЦЕНЯВАНЕ НА ГРАЖДАНСКИТЕ КОМПЕТЕНТНОСТИ НА УЧЕНИЦИТЕ: ПРЕДИЗВИКАТЕЛСТВА И ВЪЗМОЖНОСТИ

Светла Петрова Център за контрол и оценка на качеството на училищното образование

Книжка 1
Уважаеми читатели,

вет, както и от международния борд за предоставените статии и студии, за да могат да бъдат идентифицирани в полето на образованието пред широката аудитория от педа- гогически специалисти във всички степени на образователната ни система. Благодаря за техния всеотдаен и безвъзмезден труд да създават и популяризират мрежа от научни съобщества по профила на списанието и да насърчават научните изследвания. Благодаря на рецензентите от национално представените висши училища, на- учни институции и

METHODS FOR SETTING CUT SCORES IN CRITERION – REFERENCED ACHIEVEMENT TESTS

ÎÖÅÍßÂÀÍÅÒÎ COMPARATIVE ANALYSIS OF THE QUALITY OF THE SEPARATE METHODS

ПУБЛИКАЦИИ ПРЕЗ 2012 Г.

СПИСАНИЕ „БЪЛГАРСКИ ЕЗИК И ЛИТЕРАТУРА“

2012 година
Книжка 6
DEVELOPMENT OF SCIENCE IN KAZAKHSTAN IN THE PERIOD OF INDEPENDENCE

Aigerim Mynbayeva Maira Kabakova Aliya Massalimova

Книжка 5
Книжка 4
Книжка 3
СИСТЕМАТА ЗА РАЗВИТИЕ НА АКАДЕМИЧНИЯ СЪСТАВ НА РУСЕНСКИЯ УНИВЕРСИТЕТ „АНГЕЛ КЪНЧЕВ“

Христо Белоев, Ангел Смрикаров, Орлин Петров, Анелия Иванова, Галина Иванова

Книжка 2
ПРОУЧВАНЕ НА РОДИТЕЛСКОТО УЧАСТИЕ В УЧИЛИЩНИЯ ЖИВОТ В БЪЛГАРИЯ

* Този материал е изготвен въз основа на резултатите от изследването „Parental Involvement in Life of School Matters“, проведено в България в рамките на проек- та „Advancing Educational Inclusion and Quality in South East Europe“, изпълняван

ВТОРИ ФОРУМ ЗА СТРАТЕГИИ В НАУКАТА

Тошка Борисова В края на 2011 г. в София се проведе второто издание на Форум за страте- гии в науката. Основната тема бе повишаване на международната видимост и разпознаваемост на българската наука. Форумът се организира от „Elsevier“ – водеща компания за разработване и предоставяне на научни, технически и медицински информационни продукти и услуги , с подкрепата на Министер- ството на образованието, младежта и науката. След успеха на първото издание на Форума за стратегии в науката през

Книжка 1
РЕЙТИНГИ, ИНДЕКСИ, ПАРИ

Боян Захариев