<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-22-020</article-id><article-id pub-id-type="doi">10.5604/01.3001.0012.7224</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>THE BALKANS AND NON-MILITARY SECURITY THREATS – QUALITY COMPARATIVE ANALYSES OF RESILIENCE CAPABILITIES REGARDING HYBRID THREATS</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><name><surname>MITROVIC</surname><given-names>Miroslav</given-names></name><degrees>PhD</degrees><email>mitrovicmm@gmail.com</email></contrib><aff id="aff1">Strategic Research Institute, University of Defense, Republic of Serbia</aff></contrib-group><pub-date pub-type="epub"><day>31</day><month>12</month><year>2018</year></pub-date><volume>22</volume><issue>5</issue><fpage>20</fpage><lpage>45</lpage><permissions><copyright-statement>© 2018 Miroslav Mitrovic, published by War Studies University, Poland</copyright-statement><copyright-year>2018</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.</license-p></license></permissions><abstract><p>The contemporary security environment indicates non-conventional, asymmetric and hybrid security threats as potentially the most accurate threats to global and regional security. Conflict risks in the regional frame strongly depend on strategically aimed non-military, but hybrid acts. The great powers mostly attempt to achieve their own interests’ goals in fulfillment of self-orientated strategic dominance. The Balkan region is a crossroads of strongly exposed interest spheres of regional as well as global powers. The article aims to determine areas of influence in the Balkan States that could become targets of predominantly non-military but hybrid influences. Multi-Value Quality Comparative Analyses (mvQCA) of state power, stability and resilience capacities were used in the research. The methodology used was based on the approach with multi-valued sets of variables and conditions. A theoretical framework was based on contemporary theories of state power and hybrid warfare concept. Used databases were brought together from generated open source databases of approved international academic or think-tank organisations. Based on a hypothesis regarding hybrid security threats, a theoretical framework of understanding of power and analysing a wide spectra of databases, the article aims to contribute a rational and objective understanding of two main indicators: the potential to become a target and the resilience capacities of countries in the face of hybrid security threats. Its findings indicate that most countries in the Balkan region are potentially under unarmed influences and have very low resilience capabilities against possible hybrid influences. The conclusions reached help to clarify that the Balkan States are vulnerable to hybrid security threats.</p></abstract><kwd-group><kwd>un-conventional security</kwd><kwd>hybrid security threats</kwd><kwd>Balkans</kwd><kwd>Quality Comparative Analyses</kwd><kwd>national resilience capacities</kwd></kwd-group></article-meta></front><body><sec id="S1" sec-type="intro"><title>Introduction</title><p><italic>‘The Balkans are the most geostrategically important region in Europe today, and truth be told, they’ve held this role for centuries before despite whether or not various Great Powers acknowledged this at the time…The cusp of their contemporary importance is in serving as a geographic facilitator for two Russian and Chinese megaprojects that aim to penetrate the ‘unipolar continent’ with unshakable multipolar influence, and herein lays the reason why they’re the second most likely to fall victim to Hybrid War.’ (<xref ref-type="bibr" rid="ref34">Korybko 2016</xref>)</italic></p><p>Contemporary literature’s discussions about global and regional security promptly contribute to the actualisation of the way non-military or limited- force predominates and interest groups or other power-based forces prevail. The Balkans are usually colloquially labelled as a region of interest for many regional (<xref ref-type="bibr" rid="ref34">Korybko 2016</xref>) and global powers (<xref ref-type="bibr" rid="ref17">Chivvis 2017</xref>). The Balkan States (BS) have in the same role in present (previous communist countries, violence and war history, political, economic and social transition) and future (EU membership, liberal economy, democracy, security cooperation, rule of law) development and solving of regional issues. At the same time, the Balkan region (BR) is recognised as a zone where strategic interests clash with new, hybrid forms of strategic interest for global powers<sup><xref ref-type="fn" rid="fn1">1</xref></sup> and regional players<sup><xref ref-type="fn" rid="fn2">2</xref></sup>.</p><p>This research contributes to revealing a gap in the existing research, particularly by applying the Multi-Value Quality Comparative Analyses (mvQCA) methodology in the field of states resilience capabilities against hybrid influences. Considering that the research aimed to closely analyse the capabilities of BS, it could be underlined that the research results indicate that the most resilience capable state in Balkan region is Slovenia, which is strongest in the political, economic, human rights and freedom of media categories. At the same time, Slovenia is highly integrated into the international political and security system. Data indicates that Kosovo<sup><xref ref-type="fn" rid="fn3">3</xref></sup> is the weakest, the most fragile with the burden of a violent history, a comprehensively low social level, rural, with a non-accountable democracy and institutional system, and widespread poverty and economic unsustainability. All other BS are more or less potentially exposed to hybrid influences, and recognised areas of weakness are given in the conclusions.</p><p>In this article, the discussion is related to two important topics: to elaborate on the level of potential vulnerability and resilience capabilities of BS regarding hybrid security influences, and to attempt to predict possible niches of future hybrid influences. The research is based on analyses of theoretical postulates of state power and resilience, in the scope of a hypothetical frame of hybrid threat to national stability, through comparing validation of databases in the software support application for mvQCA, TOSMANA v.1.54.</p><p>The remainder of the paper is structured as follows. In the next section, the theoretical foundations of state power and resilience capabilities are examined, and a framework of understanding of hybrid security introduced with database sets that were used in the research and introduced with mvQCA. The third section tackles the methodology, logic and variable setting. The last section presents and analyses the results and points at final hypothesis discussion with some recommendations and inconclusive remarks.</p></sec><sec id="S2"><title>Theoretical framework of state power, resilience, and threats to hybrid security</title><p>The question of vulnerability is a discussion about power. The resilience of some countries to non-military influences is multi-valued, complex, dynamic, changeable and unstable. Predicting possible weakness points on which hybrid influence could be exposed in the aim of accomplishing some-power goals is a demanding but strategically orientated task. Elements of power, which are at the same time signs of weakness, are difficult to measure or quantify. Because of that, the approach to the research should be grounded on theoretical roots and solid indicators and variables assessments.</p></sec><sec id="S3"><title>State power and resilience capacities</title><p>Theoretical findings lead to conclusions that analysis of state power is a very problematic issue in the scope of the actual complexity of international relations (<xref ref-type="bibr" rid="ref44">Mišović and Kovač 2006</xref>, pp. 30–53). In the approach to analysis of potential strength, power, weakness, vulnerability and resilience potential of countries to security threats, it could be useful to start with Baldwin’s (1979) thoughts that power always depends on context. For example, <xref ref-type="bibr" rid="ref36">Kulski (1968)</xref> suggested that state power could be indicated by material (armed forces, population regarding age, knowledge and skills, economy, science and technology and its rate, geographic position, natural resources etc.) and non-material indicators (quality of foreign policy, moral power and national solidarity of population, political talent and character of state leader’s elite etc.). <xref ref-type="bibr" rid="ref2">Aron (2003)</xref> suggested that it is the location of political subjects, products, and knowledge, which have the potential to become arms, capabilities of collective reaction in the form of armed forces, its discipline, and quality, civil society leadership in peace and war and the solidarity of the state population. Furthermore, since rapid globalisation and the end of the Cold War, visons of power in international relationships are based on indicators such as territory and population, the economy and economic system, and the level of a state’s integration and political power (Gavranov and Stojkovic 1972).</p><p>The theory of the complex, multidimensional and hybrid approach to power was introduced by Nye (<xref ref-type="bibr" rid="ref47">Nye 2004</xref>; <xref ref-type="bibr" rid="ref48">Nye 1990</xref>) through the Soft and Smart power theory as a result of the global security environment changing, which cause a problem for the previous mostly rational approach to the power of states. Moreover, <xref ref-type="bibr" rid="ref49">Nye (2011)</xref> recognised that power, with global and technological influences, diverges into new sources and dimensions, compiling the diffusion of power, and is not as easily measured as military power, territory, gross national income, and the structure of the population. Furthermore, power indicators could be presented through the complex synergic interpretation of so-called traditional, soft and smart power. By this approach, the focus of further research could be hybrid power, which is the self-sublimate multivariable dynamic of aggregated indicators. In addition, <xref ref-type="bibr" rid="ref49">Nye (2011)</xref> suggested that power does not necessarily lead to influence, but could be used in a hybrid combination manner of hard and soft power, and used as a pre-emptive defence potential. In those conditions, it might be considered that power could be recognised as a preventive and resilience capability.</p><p>The Balkan region (BR) has a complex history with frozen conflicts in relations among countries there. Also, BR underwent a long and painful transition period from communism to a democracy. There is a rational need for pointing out weak points in the region’s structure. The complexities of BR interrelation as well as the countries inner problems are presented in scholars’ analyses. Some cover historical burden (Odak and Benčić 2016), democracy implementation (<xref ref-type="bibr" rid="ref33">Komar and Živković 2016</xref>), the complexity of cooperation with the International Hague tribunal in the scope of EU integration (<xref ref-type="bibr" rid="ref64">Subotic 2010</xref>), and minority political rights (<xref ref-type="bibr" rid="ref39">Lončar 2016</xref>; <xref ref-type="bibr" rid="ref52">Protsyk and Sachariew 2012</xref>; <xref ref-type="bibr" rid="ref63">Spirova and Stefanova 2012</xref>). Also, political election questions (<xref ref-type="bibr" rid="ref50">Obradovic-Wochnik and Wochnik 2014</xref>), the International Justice system (Attila Hoare 2010), low implementation problems (<xref ref-type="bibr" rid="ref31">Joireman 2016</xref>), democratisation and regime sustainability (<xref ref-type="bibr" rid="ref1">Alexander 2008</xref>), corruption (<xref ref-type="bibr" rid="ref5">Aymaliev 2017</xref>), and overall post- communist identity problems (<xref ref-type="bibr" rid="ref23">Ekiert et al. 2007</xref>) were some of topics.</p><p>In the article, power, resilience capabilities of Balkan’s countries against particularly non-military, but more hybrid pressures that could jeopardise national and regional security are examined. The approach to power analysis has the aim of delegating two main functions of Balkans states: pre-emptive resilience and effective solving of consequences.</p><p>Hybrid vulnerability in contemporary discussions is a synonym for the exposing of hybrid warfare acts, and in infrequent usage to explain non-military foreign influence and pressure. Th ose vulnerabilities need to be elaborated on using an analytical approach to the theoretical analyses of scholarly literature.</p></sec><sec id="S4"><title>Hybrid warfare concept</title><p>Hybrid warfare is a term widely used in everyday colloquial discussions, but the idea and the concept of hybrid warfare are not new at all (Watson n.d.). Discussion about recognition delivers a wide range of theoretical and conceptual contributions: asymmetric and ‘mixed’ conflicts (<xref ref-type="bibr" rid="ref43">Messner 1971</xref>; <xref ref-type="bibr" rid="ref42">Messner 1960</xref>), conflicts beyond the conventional and indirect conflicts (<xref ref-type="bibr" rid="ref30">Hart 1954</xref>; <xref ref-type="bibr" rid="ref38">Lind et al. 1989</xref>) or as future wars (<xref ref-type="bibr" rid="ref62">Slipchenko 1999</xref>). Also, works about unrestricted wars (<xref ref-type="bibr" rid="ref37">Liang and Xiangsui 1999</xref>), network-centric warfare (<xref ref-type="bibr" rid="ref15">Cebrowski and Garstka 1998</xref>; <xref ref-type="bibr" rid="ref60">Savin 2011</xref>), chaotic wars (<xref ref-type="bibr" rid="ref61">Shashkov 2011</xref>; <xref ref-type="bibr" rid="ref46">Nazemroaya 2014</xref>; <xref ref-type="bibr" rid="ref40">Mann 1992</xref>), irregular and covert warfare (Eric Rosenbach and Aki J. Peritz 2009) contribute to the topic. Contemporary elaboration of the hybrid warfare concept has been made since 2014 and it is indicated mostly by a non-conventional achievement of strategic interests of power that conduct hybrid attacks<sup><xref ref-type="fn" rid="fn4">4</xref></sup>.</p><p>All the above listed scholarly works underline a group of indicators, or potential challenges for national security which are non-military but more hybrid, such as: economic weakness, lack of democracy, an undeveloped political system, a dysfunctional state, a lack of state sovereignty, media and internet manipulation, the existence of frozen conflicts, unresolved territorial disputes, the presence of arbitration or control of a territory by supranational entities, ethnic and religious problems, separatism, extremism, unemployment, the existence of general poverty, long-term dissatisfaction of the population with the political and social solutions of the country’s leadership, corruption, powerful criminal elements, institutions with separate centres of power and governance, etc. In the correlation to listed indicators, looking through the scope of hybrid threats four basic pillows of the hybrid concept of security (<xref ref-type="bibr" rid="ref45">Mitrovic 2017</xref>):</p><list list-type="simple"><list-item><p>– Special and psychological operations - limited time performance, high intensity with very significant direct effects. Mostly used for escalation and the final stage of accomplishments of a hybrid strategy.</p></list-item><list-item><p>– Economic, energy and political pressures – actions of variable duration and intensity, depending on the interaction, relationship and buck effects which could be affected by the side who applies pressure.</p></list-item><list-item><p>– Information, media, internet and its platforms - variable intensity activities, depending on the phase of other forms/fields implementation. Time of submission is usually long-term and depends on the goals and the phase of implementation of other hybrid activities.</p></list-item><list-item><p>– Public diplomacy-low-intensity, very long-term-oriented, comprehensive hybrid operation tool, which makes it more diverse in the sphere of social life: culture, education, education, religion, the entertainment industry, non- governmental organisations, political movements and associations, civil initiatives and others that are undertaken to influence public opinion.</p></list-item></list><p>All listed forms of activities have the purpose of destabilising the country or changing political and government power in it, organised and carried out with the purpose of achieving the strategic interests of external power centres, in order to establish the state of disruption of balance in international relations, and realisation of their own interests, mostly by non-combat means. On the basis of these theories, it could be concluded that hybrid warfare does not present warfare <italic>per se</italic>, but a form of conflicting concept in which a wide range of military and non-conventional activities are applied, with the purpose of achieving strategic advantages for applying entity.</p><p>Besides military aspects (special and psychological operations), which will not be analysed in this research, because of its more executive and hard power related nature, the focus of the article is on soft and smart indicators of hybrid threats to security. Namely, in the mvQCA analyses process, databases which are related with a political system, political stability, transparency of government and civil control, economic development, energy safety, the fragility of the transition state system, corruption, freedom of the media, history, and state of conflicts and disputes are involved.</p><p>Contemporary and ongoing security issues, defence, political, economic, energy cultural and media, as well as relations with international organisational, state integration in the EU and NATO, indicate interactive events of global and regional powers in Balkan region. This leads to the hypothesis:</p><p>Hypothesis 1: Balkan states are exposed to non-military but hybrid external influence.</p><p>Hypothesis 2: Balkan countries are vulnerable to non-military, hybrid attacks.</p></sec><sec id="S5" sec-type="methods"><title>Methodology, logic and variable setting and TOSMANA mvQCA proceeding</title><p>Basically, the methodology used is founded on the Qualitative comparative analysis (QCA), which is both a research approach and a data analysis technique. QCA has been characterised as a new, contemporary way to conduct social science research that combines the strengths of traditional quantitative and qualitative methods. It was presented by Ragin, Mayer, and Drass (1984), as the method of Qualitative Comparative Analysis (QCA) (<xref ref-type="bibr" rid="ref54">Ragin 2009</xref>; <xref ref-type="bibr" rid="ref53">Ragin 2000</xref>) and the contribution elaborated on in the work of Rihoux and <xref ref-type="bibr" rid="ref54">Ragin (2009)</xref>. Up to now, researchers in the fields of social science, such as sociologists, political scientists, and management scholars have found that application of QCA methodology approach has wide applicable potential in future social science research.</p></sec><sec id="S6"><title>What are Quality Comparative Analyses and Multi-Value Quality Comparative Analyses?</title><p>In general, Multi-Value Quality Comparative Analyses (mvQCA) is one of the interpretations of Quality Comparative Analyses (QCA), which aims to compare cases systematically while still preserving a strong focus on individual cases<sup><xref ref-type="fn" rid="fn5">5</xref></sup>. The goal of most QCA is thus to explain all cases as comprehensively as possible by taking into account a set of explanatory factors and their complex combinations. On the contrary, variable-oriented methods are focused on the net effects of one or more variables over a large number of cases. Such an approach allows researchers to generalise their findings more easily but usually does not lead to encompassing complex explanations for a given phenomenon (<xref ref-type="bibr" rid="ref25">Fischer 2014</xref>).</p><p>In general, the case orientation of QCA fits well with the wide spectra of social science research, which seek out the factors causing a given phenomenon, such as law-making outputs (<xref ref-type="bibr" rid="ref18">Christmann and Danaci 2012</xref>), government spending (<xref ref-type="bibr" rid="ref68">Vis 2011</xref>), coalition formation and policy change (<xref ref-type="bibr" rid="ref25">Fischer 2014</xref>), or the success of policy projects (<xref ref-type="bibr" rid="ref67">Verweij et al. 2013</xref>), welfare states (<xref ref-type="bibr" rid="ref4">Avdagic 2010</xref>), social movements (<xref ref-type="bibr" rid="ref70">Wright and Boudet 2012</xref>), labour markets (<xref ref-type="bibr" rid="ref22">Dixon et al. 2004</xref>), and corporate governance (<xref ref-type="bibr" rid="ref9">Bell et al. 2014</xref>). Some researchers in international relations and security indicate the link between resources scarcity and armed conflicts (<xref ref-type="bibr" rid="ref14">Bretthauer 2015</xref>) based upon QCA, a third party involved in war crimes (<xref ref-type="bibr" rid="ref10">Berlin 2016</xref>), specific interactions between partisan politics and the benefits states wish to secure by contributing to a multilateral intervention operation (<xref ref-type="bibr" rid="ref29">Haesebrouck 2017</xref>) or the logic of UN intervention response (<xref ref-type="bibr" rid="ref13">Binder 2015</xref>). However, implementation of a QCA methodology in security and international relations issues seems to contribute more objective findings of social and political science.</p><p>In short, a QCA generally aims to explain elements of the social science reflected process as well as its outputs and outcomes that lie at the end of a (hypothetically) complex causal chain. Moreover, the QCA test the hypothesis or existing theories and contribute to developing new theoretical arguments in form of the hypothesis (<xref ref-type="bibr" rid="ref58">Rihoux and De Meur 2009</xref>). It could be said that a QCA is ‘’…the approach [that] might be better characterised as an attempt to redesign or transcend existing qualitative and quantitative approaches, not substituting them but complementing them under certain circumstances’’ (<xref ref-type="bibr" rid="ref20">Devers et al. 2013</xref>). For this reason, the QCA approach needs to be critically applied, with carefully selected variables and clarified criteria, just because of possible ambiguities that are indicated (Baumgartner and Th iem 2017). In this research, mvQCA is implemented (<xref ref-type="bibr" rid="ref19">Cronquist and Berg-Schlosser 2009</xref>), which considers the usage of multi-value variables, with contemplation for preventing information loss and a large number of contradictory configurations are considered, which could be a case in basic QCA, or Crisp-set Quality Comparative Analyses (csQCA) (<xref ref-type="bibr" rid="ref58">Rihoux and De Meur 2009</xref>) and considers a metalogic created notation (<xref ref-type="bibr" rid="ref19">Cronquist and Berg-Schlosser 2009</xref>). In general, mvQCA was developed to meet the limitations of csQCA and prevent a simplified dichotomous approach in multivalued, aggregated variables usage. In the research, csQCA was applied in the second stage of case analyses, to support findings and case sensitivity visualisation settings.</p></sec><sec id="S7"><title>Databases of aggregated variables</title><p>Data for theory checking is introduced upon an assessment of drivers that contribute to state power and its stability. The main indicators of aggregate databases introduce political stability, political system, and stability of governance, corruption sensitivity and fragility regarding valiant political acts, economic strength, and development, free-market orientation, the role of law, civil society freedom and transparency of governance, freedom, and the structure of the media. Databases are related to the security and have a broad reliability rate based on institutional recognition and the methodology approach involved. The following databases<sup><xref ref-type="fn" rid="fn6">6</xref></sup> were used in the research: the Bertelsmann Transformation Index (BTI) (Bertelsmann n.d.), Corruption Perceptions Index (CPI) (Transparency International n.d.), Countries at the Crossroads (COUCROS) (Freedom House n.d.), Major Episodes of Political Violence Effectiveness (MEPV) (Center for Systemic Peace n.d.) and Freedom of the Press (WRPF) (Freedom House n.d.).</p><table-wrap id="T1" orientation="portrait" position="float"><label>Table 1</label><caption><p>Multi-valued variables gathered from databases</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>Variable</th><th>Database</th><th>Aggregated multi-valued variables</th></tr></thead><tbody valign="top"><tr><td>BTI</td><td>Bertelsmann Transformation Index</td><td>stateness, political participation, rule of law, stability of democratic institutions, political and social integration, level of socioeconomic development, organisation of the market and competition, currency and price stability, private property, welfare regime, economic performance, sustainability, level of difficulty, steering capability, resource efficiency, consensus-building, international cooperation</td></tr><tr><td>CPI</td><td>Corruption Perceptions Index</td><td>transparency, accountability, and corruption in the public sector, auditing of state spending; regulation of party fi nancing; citizen and media access to information; accountability of officeholders (asset declarations, conflict of interest rules, codes of conduct); transparent public procurement systems; effective prosecution of corruption</td></tr><tr><td>COUCROS</td><td>Countries at the Crossroads</td><td>government accountability, civil liberties, rule of law, and anti-corruption and transparency efforts, involving of the system in political efforts, electoral freedom, campaigns, fi nancing of political parties, the role of law, independent and efficiency of law system civil right and freedom, involving of state in the economy</td></tr><tr><td>MEPV</td><td>Major Episodes of Political Violence Effectiveness</td><td>security legitimacy, political legitimacy, economic legitimacy and social legitimacy, armed conflict indicator, regime type, net oil production or consumption, regional effects, political effectiveness, economic effectiveness, social effectiveness</td></tr><tr><td>WRPF</td><td>Freedom of the Press</td><td>law environment, laws which influence the media and its freedom of expression and press organisation, political environment, level of political control of media, editorial independence of private and public media, availability of sources of news, censuring, and auto censuring, freedom of reporting, repercussions for reporters, economic environment of importance for media functioning, ownership, transparency of media ownership, influence of corruption on the media, and the economic situation of the state’s affect on the media</td></tr></tbody></table><table-wrap-foot><p><sup>†</sup>Description of variables used in the mvQCA process of comparing the power/resilience of the Balkan states against non-military threats to security.</p></table-wrap-foot></table-wrap><p>The software platform TOSMANA 1.54<sup><xref ref-type="fn" rid="fn7">7</xref></sup> was used to analyse the mvQCA research.</p></sec><sec id="S8"><title>Settings of variable logic and their values</title><p>The foundry based theory in the research indicates sets of variables that are observed. Case descriptions indicate that the observed subjects are present in a variable set of Balkan states (BSTAT): Albania, Bosnia and Herzegovina, Bulgaria, Croatia, Kosovo, Macedonia, Montenegro, Romania, Serbia, and Slovenia</p><p>For the purpose of validating the logic (‘low-high’), some original values of variables are a market ‘-’ with a purpose to meet the necessity of value unification and merger of calculation in a logic frame of a difference of variable expression. Namely, in conditions variables, BTI, CPI, and WRPF, scaling numbers are a market with ‘-’ to allow the logic which is that lowest values amplify criteria closes to a dedicated logic system of values. For the purpose of creating a balanced and unique logical frame, indicators for ‘0’, ‘1’ and ‘2’ correspond with a description of the original value scaling system, given a ‘-’ pre-mark.</p><p>In this particular research, mvQCA allows multinomial categorical data to be used (0, 1 and 2). As results of analyses, indicators of numerical values are set by logic criteria:</p><list list-type="simple"><list-item><p>‘O’ – no particularly hybrid vulnerability, high resilience capacities.</p></list-item><list-item><p>‘1’ – possible hybrid vulnerability, predicted possibilities of hybrid acts.</p></list-item><list-item><p>‘2’ – strongly exposed hybrid vulnerability, low resilience capabilities.</p></list-item></list><p>The data table was created in TOSMANA application and appears as <xref ref-type="fig" rid="F1">Fig. 1</xref>.</p><fig id="F1" orientation="portrait" position="float"><label>Fig. 1</label><caption><p>Designed table for mvQCA with variables and data</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g001_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g001.jpg"/></fig><p>In Two level thresholds are used for the purpose of indicating the area of variable criteria influence. TOSMANA generated thresholds divergences by variables regarding two levels of criteria are shown in <xref ref-type="fig" rid="F2">Fig. 2 to 6</xref>.</p><fig id="F2" orientation="portrait" position="float"><label>Fig. 2</label><caption><p>Thresholds divergence for variable BTI</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g002_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g002.jpg"/></fig><fig id="F3" orientation="portrait" position="float"><label>Fig. 3</label><caption><p>Thresholds divergence for variable CPI</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g003_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g003.jpg"/></fig><fig id="F4" orientation="portrait" position="float"><label>Fig. 4</label><caption><p>Thresholds divergence for variable COUCROS</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g004_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g004.jpg"/></fig><fig id="F5" orientation="portrait" position="float"><label>Fig. 5</label><caption><p>Thresholds divergence for variable MEPV</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g005_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g005.jpg"/></fig><fig id="F6" orientation="portrait" position="float"><label>Fig. 6</label><caption><p>Thresholds divergence for variable WRPF</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g006_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g006.jpg"/></fig><p>After applying the mvQCA calculation in TOSMANA, results of analyses are expressed in <xref ref-type="table" rid="T2">Table 2</xref>. below.</p><table-wrap id="T2" orientation="portrait" position="float"><label>Table 2</label><caption><p>Results of the calculation process in TOSMANA on criteria for mvQCA</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>BSTAT</th><th>BTI</th><th>CPI</th><th>COUCROS</th><th>MEPV</th><th>WRPF</th><th>OUTCOME</th><th/></tr></thead><tbody valign="top"><tr><td>Slovenia</td><td>0</td><td>0</td><td>0</td><td>0</td><td>0</td><td>0</td></tr><tr><td>Croatia</td><td>1</td><td>1</td><td>1</td><td>0</td><td>2</td><td>1</td></tr><tr><td>Montenegro, Romania</td><td>1</td><td>1</td><td>1</td><td>1</td><td>2</td><td>1</td></tr><tr><td>Bulgaria</td><td>1</td><td>2</td><td>1</td><td>0</td><td>1</td><td>1</td></tr><tr><td>Serbia</td><td>1</td><td>2</td><td>1</td><td>1</td><td>2</td><td>1</td></tr><tr><td>Macedonia</td><td>2</td><td>2</td><td>2</td><td>0</td><td>1</td><td>1</td></tr><tr><td>Albania</td><td>2</td><td>2</td><td>2</td><td>0</td><td>2</td><td>1</td></tr><tr><td>Bosnia and Herzegovina</td><td>2</td><td>2</td><td>2</td><td>1</td><td>2</td><td>1</td></tr><tr><td>Kosovo</td><td>2</td><td>2</td><td>2</td><td>2</td><td>2</td><td>1</td></tr></tbody></table><table-wrap-foot><p><sup>†</sup>Algorithm Settings including: Minimizing: 0 1including C; Variable Thresholds Settings: BTI=(- 8.12,-7.22); CPI=(-52.67,-44.33); COUCROS=(3.01,3.99); MEPV=(2.33,4.67); WRPF=(-43.47,- 33.97).</p></table-wrap-foot></table-wrap><p>Equations of logic expression for the mvQCA process are:</p><disp-formula id="eq1"><mml:math id="eqn1"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>WRPF</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>+</mml:mo><mml:mfenced><mml:mrow><mml:mtext>Albania</mml:mtext><mml:mo>+</mml:mo><mml:mtext>Bosnia and Herzegovina</mml:mtext><mml:mo>+</mml:mo><mml:mtext>Kosovo</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>   </mml:mtext><mml:mfenced><mml:mtext>1</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><disp-formula id="eq2"><mml:math id="eqn2"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>MEPV</mml:mtext><mml:mfenced close="}" open="{"><mml:mn>0</mml:mn></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>WRPF</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>+</mml:mo><mml:mfenced><mml:mrow><mml:mtext>Bulgaria</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>   </mml:mtext><mml:mfenced><mml:mtext>2</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><disp-formula id="eq3"><mml:math id="eqn3"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>MEPV</mml:mtext><mml:mfenced close="}" open="{"><mml:mn>0</mml:mn></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>WRPF</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>+</mml:mo><mml:mfenced><mml:mrow><mml:mtext>Croatia</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>     </mml:mtext><mml:mfenced><mml:mtext>3</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><disp-formula id="eq4"><mml:math id="eqn4"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>MEPV</mml:mtext><mml:mfenced close="}" open="{"><mml:mn>0</mml:mn></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>WRPF</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>+</mml:mo><mml:mfenced><mml:mrow><mml:mtext>Macedonia</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>	</mml:mtext><mml:mfenced><mml:mtext>4</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><disp-formula id="eq5"><mml:math id="eqn5"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>MEPV</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>WRPF</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>+</mml:mo><mml:mtext> </mml:mtext><mml:mfenced><mml:mrow><mml:mtext>Montenegro</mml:mtext><mml:mo>,</mml:mo><mml:mtext> Romania</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>      </mml:mtext><mml:mfenced><mml:mtext>5</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><disp-formula id="eq6"><mml:math id="eqn6"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>MEPV</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>1</mml:mtext></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>WRPF</mml:mtext><mml:mfenced close="}" open="{"><mml:mtext>2</mml:mtext></mml:mfenced><mml:mo>+</mml:mo><mml:mfenced><mml:mrow><mml:mtext>Serbia</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>       </mml:mtext><mml:mfenced><mml:mtext>6</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><disp-formula id="eq7"><mml:math id="eqn7"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mfenced close="}" open="{"><mml:mn>0</mml:mn></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mfenced close="}" open="{"><mml:mn>0</mml:mn></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mfenced close="}" open="{"><mml:mn>0</mml:mn></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>MEPV</mml:mtext><mml:mfenced close="}" open="{"><mml:mn>0</mml:mn></mml:mfenced><mml:mo>*</mml:mo><mml:mtext>WRPF</mml:mtext><mml:mfenced close="}" open="{"><mml:mn>0</mml:mn></mml:mfenced><mml:mo>+</mml:mo><mml:mfenced><mml:mrow><mml:mtext>Slovenia</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>   </mml:mtext><mml:mfenced><mml:mtext>7</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><p>Regarding derived values of multi-value QCA (‘2’,’1’ and ‘0’), all BS, with the excep-tion of Slovenia, have significant dedicated values of vulnerability against hybrid threats to national security. According to these derived values, Crisp-set Qualita- tive Comparative Analysis (csQCA) was created, with the purpose of indicating potentially existing hybrid attempts.</p><p>A one level threshold is used for the purpose of indicating the area of criteria influence and csQCA analyses.</p><fig id="F7" orientation="portrait" position="float"><label>Fig. 7</label><caption><p>Thresholds divergence for variable BTI (csQCA)</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g007_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g007.jpg"/></fig><fig id="F8" orientation="portrait" position="float"><label>Fig. 8</label><caption><p>Thresholds divergence for variable CPI (csQCA)</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g008_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g008.jpg"/></fig><fig id="F9" orientation="portrait" position="float"><label>Fig. 9</label><caption><p>Thresholds divergence for variable COUCROS (csQCA)</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g009_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g009.jpg"/></fig><fig id="F10" orientation="portrait" position="float"><label>Fig. 10</label><caption><p>Thresholds divergence for variable MEPV (csQCA)</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g010_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g010.jpg"/></fig><fig id="F11" orientation="portrait" position="float"><label>Fig. 11</label><caption><p>Thresholds divergence for variable WRPF</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g011_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g011.jpg"/></fig><p>A dta table for the criteria was created in the TOSMANA application and is shown in <xref ref-type="fig" rid="F12">Fig. 12</xref>.</p><fig id="F12" orientation="portrait" position="float"><label>Fig. 12</label><caption><p>Designed table for csQCA with variables and data</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g012_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g012.jpg"/></fig><p>After applying for an csQCA calculation in TOSMANA, results of analyses are shown in <xref ref-type="table" rid="T3">Table 3</xref>.</p><table-wrap id="T3" orientation="portrait" position="float"><label>Table 3</label><caption><p>Results of the calculation process in TOSMANA upon criteria for csQCA</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th>BSTAT</th><th>BTI</th><th>CPI</th><th>COUCROS</th><th>MEPV</th><th>WRPF</th><th>OUTCOME</th></tr></thead><tbody valign="top"><tr><td>Slovenia</td><td>0</td><td>0</td><td>0</td><td>0</td><td>0</td><td>0</td></tr><tr><td>Croatia, Montenegro, Romania</td><td>0</td><td>0</td><td>0</td><td>0</td><td>1</td><td>1</td></tr><tr><td>Bulgaria</td><td>0</td><td>1</td><td>0</td><td>0</td><td>0</td><td>1</td></tr><tr><td>Serbia</td><td>0</td><td>1</td><td>0</td><td>0</td><td>1</td><td>1</td></tr><tr><td>Macedonia</td><td>1</td><td>1</td><td>1</td><td>0</td><td>0</td><td>1</td></tr><tr><td>Albania, Bosnia and Herzegovina</td><td>1</td><td>1</td><td>1</td><td>0</td><td>1</td><td>1</td></tr><tr><td>Kosovo</td><td>1</td><td>1</td><td>1</td><td>1</td><td>1</td><td>1</td></tr></tbody></table><table-wrap-foot><p><sup>†</sup>Algorithm Settings including: Minimizing: 0 1including C; Variable Thresholds Settings: BTI=(1); CPI=(1); COUCROS=(1); MEPV=(1); WRPF=(1).</p></table-wrap-foot></table-wrap><p>Equations of logic expression for the mvQCA process are:</p><disp-formula id="eq8"><mml:math id="eqn8"><mml:mrow><mml:mtext>bti</mml:mtext><mml:mo>*</mml:mo><mml:mtext>coucros</mml:mtext><mml:mo>*</mml:mo><mml:mtext>mepv</mml:mtext><mml:mo>+</mml:mo><mml:mfenced><mml:mrow><mml:mtext>Bularia</mml:mtext><mml:mo>+</mml:mo><mml:mtext>Croatia</mml:mtext><mml:mo>,</mml:mo><mml:mtext>Montenegro</mml:mtext><mml:mo>,</mml:mo><mml:mtext>Romania</mml:mtext><mml:mo>+</mml:mo><mml:mtext>Serbia</mml:mtext><mml:mo>+</mml:mo><mml:mtext>Slovenia</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>          </mml:mtext><mml:mfenced><mml:mtext>8</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><disp-formula id="eq9"><mml:math id="eqn9"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mo>*</mml:mo><mml:mtext>WRPF</mml:mtext><mml:mo>+</mml:mo><mml:mfenced><mml:mrow><mml:mtext>Albania</mml:mtext><mml:mo>,</mml:mo><mml:mtext>Bosnia and Herzegovina</mml:mtext><mml:mo>+</mml:mo><mml:mtext>Kosovo</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>  	</mml:mtext><mml:mfenced><mml:mtext>9</mml:mtext></mml:mfenced></mml:mrow></mml:math></disp-formula><disp-formula id="eq10"><mml:math id="eqn10"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mo>*</mml:mo><mml:mtext>mepv</mml:mtext><mml:mfenced><mml:mrow><mml:mtext>Albania</mml:mtext><mml:mo>,</mml:mo><mml:mtext>Bosnia and Herzegovina</mml:mtext><mml:mo>+</mml:mo><mml:mtext>Macedonia</mml:mtext></mml:mrow></mml:mfenced><mml:mtext>   </mml:mtext><mml:mfenced><mml:mrow><mml:mn>10</mml:mn></mml:mrow></mml:mfenced></mml:mrow></mml:math></disp-formula><p>Results lead to the conclusion that all observed Balkan countries, with the exception of Slovenia, are potentially recognised as having low resilience against hybrid attacks, which marks them as potential targets of interest and for various strategies and operational approaches.</p><p>A Venn diagram corresponding to the findings in (8), (9) and (10) shows the visualisation of the csQCA process derived by dedicated criteria in <xref ref-type="fig" rid="F13">Fig. 13</xref>.</p><fig id="F13" orientation="portrait" position="float"><label>Fig. 13</label><caption><p>Venn diagram corresponding to Table III, produced by the ‘visualiser’ tool, TOSMANA 1.54</p></caption><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g013_min.jpg" xlink:fullhref="https://securityanddefence.pl/f/fulltexts/103314/SDQ-22-020-g013.jpg"/></fig></sec><sec id="S9"><title>Findings of QCA regarding non-military resilience capacities of BS states</title><p>Outcomes that are produced by TOSMANA upon a logic set of variables, and generated from databases, reveal the following findings:</p><list list-type="simple"><list-item><p>a) Based on <xref ref-type="disp-formula" rid="eq8">equation (8)</xref>, Bulgaria, Croatia, Montenegro, Romania, Serbia, and Slovenia are under modest, low-intensity non-military pressure. In addition, it is possible to indicate that by some specifications, countries are separated into subgroups or they have some unique examples: Bulgaria (some unique), Croatia, Montenegro and Romania (subgroup with some unique), Serbia (some unique) and Slovenia (some unique). Using <xref ref-type="disp-formula" rid="eq8">equation (8)</xref> is reveals that listed countries have low, unknown but present hybrid pressure in variable values groups which are illustrated in BTI, COUCROS, and MEPV.</p></list-item><list-item><p>a1) <xref ref-type="disp-formula" rid="eq9">Equation (9)</xref> indicates a strong presence of hybrid pressure on Albania, Bosnia and Herzegovina and Kosovo (with some specification) in the area covered by BTI, CPI, COUCROS, WRPF variables.</p></list-item><list-item><p>a2) <xref ref-type="disp-formula" rid="eq10">Equation (10)</xref> indicates a strong presence of hybrid pressure on Albania, Bosnia and Herzegovina and Macedonia (with some unique) in the area covered by BTI, CPI, COUCROS variables, and with low intensity, but predicting a possible present influence in the MEPV set of variables.</p></list-item></list><p>Analysis of the Venn diagram (<xref ref-type="fig" rid="F13">Fig. 13</xref>) indicates that Slovenia is outside hybrid influence that could be labelled an actual threat to national capacities.</p><p>Influence in the media and public audience management (WRPF) is indicated in Croatia, Montenegro, and Romania.</p><p>Results indicate that Bulgaria is under pressure in the zone of the COUCROS group of variable parameters. Serbia is under strong hybrid influence in the area of free media, communications and public audience management (WRPF), which is in synergy pressure in the COUCROS group of parameters (see <xref ref-type="table" rid="T1">Table 1</xref>).</p><p>The most exposed to hybrid pressure is Kosovo by all criteria, followed by Albania and Bosnia and Herzegovina and Macedonia. The descriptive formula which expresses the conditions in listed countries is:</p><disp-formula id="eq11"><mml:math id="eqn11"><mml:mrow><mml:mtext>BTI</mml:mtext><mml:mo>*</mml:mo><mml:mtext>CPI</mml:mtext><mml:mo>*</mml:mo><mml:mtext>COUCROS</mml:mtext><mml:mo>*</mml:mo><mml:mfenced close="" open="{"><mml:mtable columnalign="left"><mml:mtr><mml:mtd><mml:mtext>WRPF</mml:mtext></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mtext>mepv</mml:mtext></mml:mtd></mml:mtr></mml:mtable></mml:mfenced><mml:mtext>                    </mml:mtext><mml:mo stretchy="false">(</mml:mo><mml:mn>11</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:math></disp-formula><p><xref ref-type="disp-formula" rid="eq11">Equation (11)</xref> is read as follows:</p><p>The considerable hybrid pressure in Albania, Bosnia, and Herzegovina, Macedonia and Kosovo is in all areas of political and social life, including the economy, energy, democracy, rule of law, public security and state governance. The cumulative effect of pressure is expressed through limited freedom of the press, media manipulation, and intensive public audience management to support hybrid attacks. All findings indicate modest, latent but existing possibilities for violent episodes connected to of the achievement of hybrid goals.</p><p>Overall conclusions from previous arguments indicate the approval of <italic>Hypothesis 1</italic>: Balkan states are exposed to non-military but hybrid influence of outside powers. The intensity and areas of influence can be revealed more closely in relation to the specific group of countries or individual countries, which could be a starting point for some future researchers.</p><p>b) Expressions of the interaction of variables with data sets indicate founder data is for multi-values qualitative–comparative analyses. With this information in mind, itis possible to indicate groups of resilience/ vulnerability indicators for groups or separate countries. Logical calculations in <xref ref-type="disp-formula" rid="eq1">equations (1) to (7)</xref> indicate that some groups of variables care related to the grouping of states regarding similarity of expressions:</p><list list-type="simple"><list-item><p>– Albania, Bosnia and Hercegovina have an exception for MPV vulnerability, and similar strong weakness in areas of BTI, CPI, COUCROS and WRPF indexes conditions.</p></list-item><list-item><p>– Montenegro and Romania have the same logic results in all indicators. These two countries are potentially under hybrid influence, but the most significant lack of resilience is in the area of WRPF.</p></list-item><list-item><p>– Bulgaria, Croatia, Macedonia, and Serbia are exposed to similar hybrid acts. Lack of resilience is different from country to country, but overall conclusions indicate that all four countries are potentially exposed to hybrid actions, have some level of vulnerability against hybrid threats and that it is possible to indicate specific areas of possible influence (BTI, CPI, COUCROS, and WRPF).</p></list-item><list-item><p>– Slovenia has the most developed resilience capabilities. In this case, Slovenia could be observed as an example or correlated factorial for Western Balkan stability and cohesion.</p></list-item><list-item><p>– Kosovo has zero resistance against possible future hybrid attacks. The situation is critical in all listed areas of generic variable indicators (see <xref ref-type="table" rid="T1">Table 1</xref>).</p></list-item></list><p>The overall conclusion of multi-values analyses indicates partial approval of Hypothesis 2:</p><p>Balkan countries, with the exception of Slovenia, are vulnerable to non-military, hybrid attacks, which means they are potential targets for such operations. Areas of vulnerability and lack of resilience capabilities are different, as well as a level of capabilities. Indicators, which could bring clearer conclusions, may be developed for each country, supported by more precise analytical methodology such as Fuzzy Sets QCA (fsQCA) (<xref ref-type="bibr" rid="ref54">Ragin 2009</xref>) and individual database sets. In this way, areas of necessary national resilience capacity development can be identified with greater precision.</p></sec><sec id="S10" sec-type="conclusions"><title>Conclusions</title><p>The Balkans’ is declared as a ‘region of interest’ by global and regional powers. In contemporary analyses made by politicians, journalist and scholars, attempts by the great powers to achieve their own strategic goals and preponderance in the Balkans are highlighted, mainly without the use of military means. Contemporary geopolitical relations, evaluation of conflicts, new doctrines and strategies, supported by the escalation of technology, economic interdependence, energy instability and differences in the understanding of democracy and governance, forcefully introduce a not completely new, but more uncertain, hybrid global security environment. In an effort to make variable based, comparative and qualitative analytics supported arguments, this research has raised a hypothesis by which it attempts to clarify or deny colloquial and describable conclusions about the presence of hybrid security threats and hybrid resilience niches in the countries of the Balkan region. The conclusion of multivariable generated analyses indicates existing hybrid security threats in all Balkan countries, with variable sets of different areas of influence. In addition, all countries, with the exception of Slovenia, have variable, but obvious ‘weak areas’ in their own existing political, economic and media practices. Based on these findings, it is possible to predict that most Balkan countries could and will become future targets for hybrid attacks. It is also clear that every specific country needs deep analytic work to identify the most vulnerable areas, by which strategies for resilience empowerment could be developed. Some also point to the possibility of using the QCA methodology approach in the definition and analyses of foreign politics, security and defence.</p></sec></body><back><fn-group><fn id="fn1"><label>1</label><p>Regarding the Correlates to War project, the USA, Russia, UK, France, China, Germany, and Japan are great powers in international relations (the Correlates of War Project n.d.).</p></fn><fn id="fn2"><label>2</label><p>Regional powers, also known as pivotal powers can be recognised as South Africa, Canada, Argentina, Brazil, Mexico, South Korea, Iran, Saudi Arabia, Israel, Turkey and Australia (<xref ref-type="bibr" rid="ref8">Beck 2006</xref>; <xref ref-type="bibr" rid="ref12">Betz and Taylor 2007</xref>).</p></fn><fn id="fn3"><label>3</label><p>Kosovo is the southern autonomy region of the Republic of Serbia, which self-declared independence in 2008. OUN doesn’t recognise Kosovo as an independent state. The number of states which recognise Kosovo as an independent state is between 106 and 114. Kosovo’s status is defined by Resolution 1244 of OUN, and the territory is under observation and the protective presence of OUN and the EU with a strong presence of armed forces, police and administrative staff from the international community. Kosovo has a parliamentary system of governance with the president as an elected leader. All specified characteristics indicate the necessity for introducing Kosovo as a separate subject for analyses, and besides, it is not officially recognised as a state. All references to Kosovo, whether to the territory, institution or population, in this text should not be prejudged and be understood in full compliance with United Nations Security Council Resolution 1244.</p></fn><fn id="fn4"><label>4</label><p>Contemporary hybrid warfare is mostly analysed as the non-armed achievement of strategic dominance trough ‘coloured revolution’, cyber-attacks, involving in separatists movements, support of some ideologies or ethnical extremist organizations, propaganda information campaigns, economical and energy pressure, etc. Work which presents most of the listed forms are (<xref ref-type="bibr" rid="ref41">McCulloh and Johnson 2013</xref>; <xref ref-type="bibr" rid="ref57">Renz and Smith 2016</xref>; <xref ref-type="bibr" rid="ref35">Korybko 2015</xref>; <xref ref-type="bibr" rid="ref32">Kofman and McDermott 2015</xref>)</p></fn><fn id="fn5"><label>5</label><p>Logic and explanation of Quality Comparative Analyses (QCA) could be found in (<xref ref-type="bibr" rid="ref56">Ragin et al. 1984</xref>; Rihoux and <xref ref-type="bibr" rid="ref54">Ragin 2009</xref>)</p></fn><fn id="fn6"><label>6</label><p>Listed data bases, among others, are generated from the Catalogue of Databases for Security-related Research in (<xref ref-type="bibr" rid="ref21">Dimitrijevic and Parausuc 2017</xref>)</p></fn><fn id="fn7"><label>7</label><p>The software application with manuals for using TOSMANA 1.54 is available at <ext-link ext-link-type="uri" xlink:href="http://www.tosmana.net">http://www.tosmana.net</ext-link> [accessed 10 Jan 2018].</p></fn></fn-group><ref-list><ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alexander</surname>, <given-names>M</given-names></string-name></person-group>., <year>2008</year>. <article-title>Democratization and Hybrid Regimes: Comparative Evidence from Southeast Europe</article-title>. <source>East European Politics &amp; Societies</source>, <volume>22</volume> (<issue>4</issue>), <fpage>928</fpage>–<lpage>954</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://eep.sagepub.com/cgi/doi/10.1177/0888325408327634">http://eep.sagepub.com/cgi/doi/10.1177/0888325408327634</ext-link> [Accessed 6 Feb 2018].</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Aron</surname>, <given-names>R</given-names></string-name></person-group>., <year>2003</year>. <chapter-title><italic>Peace &amp; war: a theory of international relations</italic></chapter-title>. <publisher-name>New Brunswick New Jersey: Transaction Publishers</publisher-name>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Attilab Hoare</surname>, <given-names>M</given-names></string-name></person-group>., <year>2010</year>. <article-title>Bosnia-Hercegovina and International Justice: Past Failures and Future Solutions</article-title>. <source>East European Politics &amp; Societies</source>, <volume>24</volume> (<issue>2</issue>), <fpage>191</fpage>–<lpage>205</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://eep.sagepub.com/cgi/doi/10.1177/0888325409356462">http://eep.sagepub.com/cgi/doi/10.1177/0888325409356462</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Avdagic</surname>, <given-names>S</given-names></string-name></person-group>., <year>2010</year>. <article-title>When Are Concerted Reforms Feasible? Explaining the Emergence of Social Pacts in Western Europe</article-title>. <source>Comparative Political Studies</source>, <volume>43</volume> (<issue>5</issue>), <fpage>628</fpage>–<lpage>657</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177/0010414009356178">http://journals.sagepub.com/doi/10.1177/0010414009356178</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Aymaliev</surname>, <given-names>I. M</given-names></string-name></person-group>., <year>2017</year>. <article-title>Corporate Motivations for Donating to the Police in Bulgaria</article-title>. <source>East European Politics and Societies</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177/0888325417710080">http://journals.sagepub.com/doi/10.1177/0888325417710080</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Baldwin</surname>, <given-names>D. A</given-names></string-name></person-group>., <year>1979</year>. <article-title>Power analysis and world politics: New trends versus old tendencies</article-title>. <source>World politics</source>, <volume>31</volume>(<issue>2</issue>).</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Baumgartner</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Thiem</surname>, <given-names>A</given-names></string-name></person-group>., <year>2017</year>. <article-title>Model Ambiguities in Configurational Comparative Research</article-title>. <source>Sociological Methods &amp; Research</source>, <volume>46</volume> (<issue>4</issue>), <fpage>954</fpage>–<lpage>987</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177/0049124115610351">http://journals.sagepub.com/doi/10.1177/0049124115610351</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Beck</surname>, <given-names>M</given-names></string-name></person-group>., <year>2006</year>. <article-title>The Concept of Regional Power - The Middle East as a Devian Case</article-title>. In <source>German Institute of Global and Area Studies</source>. <publisher-loc>Hamburg</publisher-loc>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bell</surname>, <given-names>R. G</given-names></string-name>., <string-name><surname>Filatotchev</surname>, <given-names>I</given-names></string-name>. and <string-name><surname>Aguilera</surname>, <given-names>R. V</given-names></string-name></person-group>., <year>2014</year>. <article-title>Corporate Governance and Investors’ Perceptions of Foreign IPO Value: An Institutional Perspective</article-title>. <source>Academy of Management Journal</source>, <volume>57</volume>(<issue>1</issue>), pp. <fpage>301</fpage>–<lpage>320</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.aom.org/doi/10.5465/amj.2011.0146">http://journals.aom.org/doi/10.5465/amj.2011.0146</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Berlin</surname>, <given-names>M. S</given-names></string-name></person-group>., <year>2016</year>. <article-title>Why (not) arrest? Third-party state compliance and noncompliance with international criminal tribunals</article-title>. <source>Journal of Human Rights</source>, <volume>15</volume> (<issue>4</issue>), <fpage>509</fpage>–<lpage>532</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.tandfonline.com/doi/full/10.1080/14754835.20%2015.1103160">https://www.tandfonline.com/doi/full/10.1080/14754835.2015.1103160</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Bertelsmann</collab></person-group>, <article-title>BTI - Bertelsmann Transformation Index</article-title>. <source>BTI - Bertelsmann Transformation Index</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.bti-project.org/en/home/">https://www.bti-project.org/en/home/</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Betz</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Taylor</surname>, <given-names>I</given-names></string-name></person-group>., <year>2007</year>. <article-title>The Rise of (new) regional powers in Asia, Africa, Latin America–contribution to regional and world peace or protracted conflicts</article-title>. <source>Workshop presented at the European Consortium for Political Research Joint Sessions</source>.</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Binder</surname>, <given-names>M</given-names></string-name></person-group>., <year>2015</year>. <article-title>Paths to intervention: What explains the UN’s selective response to humanitarian crises</article-title>? <source>Journal of Peace Research</source>, <volume>52</volume> (<issue>6</issue>), <fpage>712</fpage>–<lpage>726</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177/0022343315585847">http://journals.sagepub.com/doi/10.1177/0022343315585847</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bretthauer</surname>, <given-names>J. M</given-names></string-name></person-group>., <year>2015</year>. <article-title>Conditions for Peace and Conflict</article-title>. <source>Journal of Conflict Resolution</source>, <volume>59</volume>(<issue>4</issue>), pp. <fpage>593</fpage>–<lpage>616</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177%20/0022002713516841">http://journals.sagepub.com/doi/10.1177/0022002713516841</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cebrowski</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Garstka</surname>, <given-names>J</given-names></string-name></person-group>., <year>1998</year>. <chapter-title>Network-centric warfare: Its origin and future</chapter-title>. <italic>US Naval Institute Proceedings</italic>.</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="web"><article-title>Center for Systemic Peace, MEPV - Major Episodes of Political Violence Effectiveness</article-title>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://www.systemicpeace.org/inscrdata.html">http://www.systemicpeace.org/inscrdata.html</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chivvis</surname>, <given-names>C.S</given-names></string-name></person-group>., <year>2017</year>. <article-title>Understanding Russian “Hybrid Warfare” And What Can Be Done About it</article-title>. <source>RAND Cooperation</source>, pp. <fpage>1</fpage>–<lpage>12</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://www.rand.org/pubs/testimonies/CT468.html">http://www.rand.org/pubs/testimonies/CT468.html</ext-link> [Accessed 31 Jan 2018].</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Christmann</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Danaci</surname>, <given-names>D</given-names></string-name></person-group>., <year>2012</year>. <article-title>Direct Democracy and Minority Rights: Direct and Indirect Effects on Religious Minorities in Switzerland</article-title>. <source>Politics and Religion</source>, <volume>5</volume> (<issue>01</issue>), <fpage>133</fpage>–<lpage>160</lpage>.</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Cronquist</surname>, <given-names>L</given-names></string-name>. and <string-name><surname>Berg-Schlosser</surname>, <given-names>D</given-names></string-name></person-group>., <year>2009</year>. <article-title>Multi-Values QCA (mvQCA)</article-title>. In <person-group person-group-type="editor"><string-name><given-names>B.</given-names><surname>Rihoux</surname></string-name> and <string-name><surname>C.</surname><given-names>Ragin</given-names></string-name></person-group>, (eds) <source>Configurational Comparative Methods: Qualitative Comparative Analysis (QCA) and Related Techniques</source>. <publisher-name>SAGE Publications</publisher-name>, pp. <fpage>69</fpage>–<lpage>85</lpage>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Devers</surname>, <given-names>K. J</given-names></string-name>. <etal/></person-group>., <year>2013</year>. <article-title>Using Qualitative Comparative Analysis (QCA) to Study Patient-Centered Medical Homes</article-title>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.urban.org/sites/default/files/publication/24261/412969-Using-Qualitative-Comparative-Analysis-QCA-to-Study-Patient-Centered-Medical-Homes.PDF">https://www.urban.org/sites/default/files/publication/24261/412969-Using-Qualitative-Comparative-Analysis-QCA-to-Study-Patient-Centered-Medical-Homes.PDF</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Dimitrijevic</surname>, <given-names>I</given-names></string-name>. &amp;<string-name><surname>Parausuc</surname>, <given-names>A</given-names></string-name></person-group>., <year>2017</year>. <chapter-title><italic>Katalogbazapodatakazaistraživanja u oblastibezbednosti</italic></chapter-title>, <publisher-loc>Belgrade</publisher-loc>: <publisher-name>Univerzitet u Beogradu – FakultetbezbednostiCentarzaprimenjenubezbednostFak ultetabezbednosti</publisher-name>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dixon</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Roscigno</surname>, <given-names>V</given-names></string-name>. and <string-name><surname>Hodson</surname>, <given-names>R</given-names></string-name></person-group>., <year>2004</year>. <article-title>Unions, Solidarity, and Striking</article-title>. <source>SOCIAL FORCES</source>, <volume>83</volume>(<issue>1</issue>).</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ekiert</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Kubik</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Vachudova</surname>, <given-names>M. A</given-names></string-name></person-group>., <year>2007</year>. <article-title>Democracy in the Post-Communist World: An Unending Quest</article-title>? <source>East European Politics &amp; Societies</source>, <volume>21</volume> (<issue>1</issue>), <fpage>7</fpage>–<lpage>30</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://eep.sagepub.com/cgi/doi/10.1177/0888325406297170">http://eep.sagepub.com/cgi/doi/10.1177/0888325406297170</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Eric</surname><given-names>Rosenbach</given-names></string-name> and <string-name><surname>Aki Peritz</surname><given-names>J.</given-names></string-name></person-group>, <year>2009</year>. <article-title>Covert Action</article-title>. <source>BelferCenter for Science and International Affairs</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.belfercenter.org/publication/covert-action">https://www.belfercenter.org/publication/covert-action</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fischer</surname>, <given-names>M</given-names></string-name></person-group>., <year>2014</year>. <article-title>Coalition Structures and Policy Change in a Consensus Democracy</article-title>. <source>Policy Studies Journal</source>, <volume>42</volume> (<issue>3</issue>), <fpage>344</fpage>–<lpage>366</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://doi.wiley.com/10.1111/psj.12064">http://doi.wiley.com/10.1111/psj.12064</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref26"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Freedom House</collab></person-group>, <article-title>COUCROS – Countries at the Crossroads</article-title>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://freedomhouse.org/">https://freedomhouse.org/</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref27"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Freedom House</collab></person-group>, <article-title>WRPF - Freedom of the Press Freedom House</article-title>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://freedomhouse.org/report-types/freedom-press">https://freedomhouse.org/report-types/freedom-press</ext-link> [Accessed 25 Jan2018].</mixed-citation></ref><ref id="ref28"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Gavranov</surname>, <given-names>V</given-names></string-name>. and <string-name><surname>Stojkovič</surname>, <given-names>M</given-names></string-name></person-group>., <year>1972</year>. <chapter-title><italic>Teroijskoshvatanje sile: sila u međunarodnimodnosima</italic></chapter-title>. <publisher-loc>Belgrade</publisher-loc>: <publisher-name>SavremenaAdministracija</publisher-name>.</mixed-citation></ref><ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Haesebrouck</surname>, <given-names>T</given-names></string-name></person-group>., <year>2017</year>. <article-title>NATO Burden Sharing in Libya</article-title>. <source>Journal of Conflict Resolution</source>, <volume>61</volume> (<issue>10</issue>), <fpage>2235</fpage>–<lpage>2261</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177/0022002715626248">http://journals.sagepub.com/doi/10.1177/0022002715626248</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref30"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Hart</surname>, <given-names>B.L</given-names></string-name></person-group>., <year>1954</year>. <chapter-title><italic>Strategy the indirect approach</italic></chapter-title>., <publisher-loc>London</publisher-loc>: <publisher-name>Faber and Faber</publisher-name>.</mixed-citation></ref><ref id="ref31"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Joireman</surname>, <given-names>S.F</given-names></string-name></person-group>., <year>2016</year>. <article-title>External Conditionalities and Institutional Change</article-title>. <source>East European Politics and Societies</source>, <volume>30</volume> (<issue>2</issue>), <fpage>315</fpage>–<lpage>331</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177/0888325415593631">http://journals.sagepub.com/doi/10.1177/0888325415593631</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref32"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Kofman</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>McDermott</surname>, <given-names>R</given-names></string-name></person-group>., <year>2015</year>.<article-title>No Return to Cold War in Russia’s New Military Doctrine</article-title>. <source>Eurasia Review</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.eurasiareview.com/03022015-no-return-cold-war-russias-new-military-doctrine-analysis/">https://www.eurasiareview.com/03022015-no-return-cold-war-russias-new-military-doctrine-analysis/</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Komar</surname>, <given-names>O</given-names></string-name>. and <string-name><surname>Živković</surname>, <given-names>S</given-names></string-name></person-group>., <year>2016</year>. <article-title>Montenegro: A democracy without alternations</article-title>. <source>East European Politics and Societies</source>, <volume>30</volume> (<issue>4</issue>), <fpage>785</fpage>–<lpage>804</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177/0888325416652229">http://journals.sagepub.com/doi/10.1177/0888325416652229</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref34"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Korybko</surname>, <given-names>A</given-names></string-name></person-group>., <year>2016</year>. <article-title>Hybrid Wars: Breaking the Balkans</article-title>. <source>Global Research - Centre for Research on Globalization</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.globalresearch.ca/hybrid-wars-breaking-the-balkans/5523932">https://www.globalresearch.ca/hybrid-wars-breaking-the-balkans/5523932</ext-link> [Accessed <date-in-citation content-type="access-date">31 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref35"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Korybko</surname>, <given-names>A</given-names></string-name></person-group>., <year>2015</year>. <chapter-title><italic>Hybrid Wars: The Indirect Adaptive Approach To Regime Change</italic></chapter-title>, <publisher-name>The People’s Friendship University of Russia</publisher-name>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://newcoldwar.orgwp-content/uploads/2015/08/Korybko-book-Hybrid-Wars.pdf">http://newcoldwar.orgwp-content/uploads/2015/08/Korybko-book-Hybrid-Wars.pdf</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref36"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kulski</surname>, <given-names>W</given-names></string-name></person-group>., <year>1968</year>. <chapter-title><italic>International policies in a revolutionary age</italic></chapter-title>. <edition>2nd</edition> rev. (ed.), <publisher-loc>New York</publisher-loc>: <publisher-name>Lippincott</publisher-name>.</mixed-citation></ref><ref id="ref37"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Liang</surname>, <given-names>Q</given-names></string-name>. and <string-name><surname>Xiangsui</surname>, <given-names>W</given-names></string-name></person-group>., <year>1999</year>. <chapter-title><italic>Unrestricted Warfare</italic></chapter-title>. <publisher-loc>Beijing</publisher-loc>: <publisher-name>PLA Literature and Arts Publishing House Arts</publisher-name>.</mixed-citation></ref><ref id="ref38"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lind</surname>, <given-names>W.S</given-names></string-name>. <etal/></person-group>., <year>1989</year>. <article-title>The Changing Face of War: Into the Fourth Generation</article-title>. <source>Marine Corps Gazette</source>, October, pp. <fpage>22</fpage>–<lpage>26</lpage>.</mixed-citation></ref><ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lončar</surname>, <given-names>J</given-names></string-name></person-group>., <year>2016</year>. <article-title>Electoral Accountability and Substantive Representation of National Minorities: The Case of Serbia</article-title>. <source>East European Politics and Societies</source>, <volume>30</volume>(<issue>4</issue>), pp. <fpage>703</fpage>–<lpage>724</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://journals.sagepub.com/doi/10.1177/0888325416650252">http://journals.sagepub.com/doi/10.1177/0888325416650252</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref40"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Mann</surname>, <given-names>S</given-names></string-name></person-group>., <year>1992</year>. <chapter-title><italic>Chaos Theory and Strategic Thought</italic></chapter-title>., <publisher-loc>Ft. Belvoir</publisher-loc>: <publisher-name>Defense Technical Information Center</publisher-name>.</mixed-citation></ref><ref id="ref41"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>McCulloh</surname>, <given-names>T</given-names></string-name>. and <string-name><surname>Johnson</surname>, <given-names>R</given-names></string-name></person-group>., <year>2013</year>. <article-title>Hybrid warfare</article-title>. <source>JSOU Report 13-4</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://www.dtic.mil/docs/citations/ADA591803">http://www.dtic.mil/docs/citations/ADA591803</ext-link> .</mixed-citation></ref><ref id="ref42"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Messner</surname>, <given-names>J</given-names></string-name></person-group>., <year>1960</year>. <chapter-title><italic>Mutiny – the Name of the Third World War (Мятеж — имятретьейвсемирной</italic>)</chapter-title> in: Е.Э. <publisher-name>Месснер, Хочешьмира,победимятежевойну!,</publisher-name>, <publisher-loc>Mockвa</publisher-loc> 2005, pp <fpage>101</fpage>-<lpage>175</lpage>.</mixed-citation></ref><ref id="ref43"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Messner</surname>, <given-names>J</given-names></string-name></person-group>., <year>1971</year>. <chapter-title><italic>Mutinywar (Мятежевойна</italic>)</chapter-title> In Е.Э. <source>Месснер, Хочешьмира,победимятежевойну!</source>, <publisher-loc>Mockвa</publisher-loc> <year>2005</year>, pp <fpage>392</fpage>-<lpage>476</lpage>.</mixed-citation></ref><ref id="ref44"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Mišović</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Kovač</surname>, <given-names>M</given-names></string-name></person-group>., <year>2006</year>. <chapter-title><italic>Sistemiodbrane</italic></chapter-title>. <publisher-loc>Belgrade</publisher-loc>.</mixed-citation></ref><ref id="ref45"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Mitrovic</surname>, <given-names>M</given-names></string-name></person-group>., <year>2017</year>. <article-title>Hybrid Security Threats and Contemporary Approach to National Security</article-title>. <source>Thematic Conference Proceedings of International Significance, International Conference ‘Archibald Reiss Days’</source>, <fpage>1</fpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3070803">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3070803</ext-link> [Accessed 25 Jan <conf-date>2018</conf-date>].</mixed-citation></ref><ref id="ref46"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Nazemroaya</surname>, <given-names>M. D</given-names></string-name></person-group>., <year>2014</year>. <article-title>Iraq and Syria are Burning, “Constructive Chaos” and America’s Broader Strategy to Conquer Eurasia</article-title>. <source>GlobalResearch.ca</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.globalresearch.ca/iraq-and-syria-burning-a-collection-of-articles-about-constructive-chaos-at-work/5388270">https://www.globalresearch.ca/iraq-and-syria-burning-a-collection-of-articles-about-constructive-chaos-at-work/5388270</ext-link> [Accessed <date-in-citation content-type="access-date">18 Feb 2018</date-in-citation>].</mixed-citation></ref><ref id="ref47"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Nye</surname>, <given-names>J. S</given-names></string-name></person-group>., <year>2004</year>. <chapter-title><italic>Soft power: The means to success in world politics</italic></chapter-title>. <publisher-loc>New York</publisher-loc>: <publisher-name>Public Affairs</publisher-name>.</mixed-citation></ref><ref id="ref48"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Nye</surname>, <given-names>J. S</given-names></string-name></person-group>., <year>1990</year>. <chapter-title>Soft power</chapter-title>. <source>Foreign policy</source>, <publisher-loc>Autumn</publisher-loc>.</mixed-citation></ref><ref id="ref49"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Nye</surname>, <given-names>J. S</given-names></string-name></person-group>., <year>2011</year>. <chapter-title><italic>The Future of Power</italic></chapter-title>. <publisher-loc>New York</publisher-loc>: <publisher-name>Public Affairs</publisher-name>.</mixed-citation></ref><ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Obradovic-Wochnik</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Wochnik</surname>, <given-names>A</given-names></string-name></person-group>., <year>2014</year>. <article-title>Invalid Ballots and the &amp;quot;Crisis of Representative Democracy: Re-inventing Protest at the 2012 Serbian Elections</article-title>. <source>East European Politics &amp; Societies</source>, <volume>28</volume> (<issue>4</issue>), <fpage>808</fpage>–<lpage>835</lpage>.</mixed-citation></ref><ref id="ref51"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Odak</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>Benčć</surname>, <given-names>A</given-names></string-name></person-group>., <year>2016</year>. <article-title>Jasenovac—A Past That Does Not Pass: The Presence of Jasenovac in Croatian and Serbian Collective Memory of Conflict</article-title>. <source>East European Politics and Societies</source>, <volume>30</volume> (<issue>4</issue>), <fpage>805</fpage>–<lpage>829</lpage>.</mixed-citation></ref><ref id="ref52"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Protsyk</surname>, <given-names>O</given-names></string-name>. and <string-name><surname>Sachariew</surname>, <given-names>K</given-names></string-name></person-group>., <year>2012</year>. <article-title>Recruitment and Representation of Ethnic Minorities under Proportional Representation: Evidence from Bulgaria</article-title>. <source>East European Politics &amp; Societies</source>, <volume>26</volume>(<issue>2</issue>), <fpage>313</fpage>–<lpage>339</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://eep.sagepub.com/cgi/doi/10.1177/0888325410364672">http://eep.sagepub.com/cgi/doi/10.1177/0888325410364672</ext-link> [Accessed 6 Feb 2018].</mixed-citation></ref><ref id="ref53"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Ragin</surname>, <given-names>C</given-names></string-name></person-group>., <year>2000</year>. <chapter-title><italic>Fuzzy-set social science</italic></chapter-title>. <publisher-name>University of Chicago Press</publisher-name>.</mixed-citation></ref><ref id="ref54"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Ragin</surname>, <given-names>C</given-names></string-name></person-group>., <year>2009</year>. <chapter-title>Qualitative Comparative Analyses Using Fuzzy Sets (fsQCA)</chapter-title>. In <person-group person-group-type="editor"><string-name><given-names>B.</given-names><surname>Rihoux</surname></string-name> and <string-name><given-names>C.</given-names><surname>Ragin</surname></string-name></person-group>, (eds) <source>Configurational Comparative Methods: Qualitative Comparative Analysis (QCA) and Related Techniques</source>. <publisher-name>SAGE Publications</publisher-name>, pp. <fpage>87</fpage>–<lpage>121</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://methods.sagepub.com/book/configurational-comparative-methods">http://methods.sagepub.com/book/configurational-comparative-methods</ext-link> [Accessed 6 Feb 2018].</mixed-citation></ref><ref id="ref55"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Ragin</surname>, <given-names>C</given-names></string-name></person-group>., <year>2009</year>. <chapter-title><italic>Redesigning social inquiry: Fuzzy sets and beyond</italic></chapter-title>. <publisher-name>University of Chicago Press</publisher-name>.</mixed-citation></ref><ref id="ref56"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ragin</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Mayer</surname>, <given-names>S</given-names></string-name>. and <string-name><surname>KA</surname>, <given-names>D</given-names></string-name></person-group>., <year>1984</year>. <article-title>Assessing discrimination: A Boolean approach</article-title>. <source>American Sociological Review</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.jstor.org/stable/2095572">https://www.jstor.org/stable/2095572</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref57"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Renz</surname>, <given-names>B</given-names></string-name>. and <string-name><surname>Smith</surname>, <given-names>H</given-names></string-name></person-group>., <year>2016</year>. <article-title>Russia and Hybrid warfare - going beyond the label</article-title>. <source>Aleksanteri Papers</source>, <volume>1</volume>.</mixed-citation></ref><ref id="ref58"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Rihoux</surname>, <given-names>B</given-names></string-name>. and <string-name><surname>De Meur</surname>, <given-names>G</given-names></string-name></person-group>., <year>2009</year>. <chapter-title>Crisp-set Qualitative Comparative Analysis (csQCA)</chapter-title>. In <person-group person-group-type="editor"><string-name><given-names>B.</given-names><surname>Rihoux</surname></string-name> and <string-name><given-names>C.</given-names><surname>Ragin</surname></string-name></person-group> (eds) <source>Configurational Comparative Methods: Qualitative Comparative Analysis (QCA) and Related Techniques</source>. <publisher-name>SAGE Publications</publisher-name>, pp. <fpage>33</fpage>–<lpage>68</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://methods.sagepub.com/book/configurational-comparative-methods">http://methods.sagepub.com/book/configurational-comparative-methods</ext-link> [Accessed 6 Feb 2018].</mixed-citation></ref><ref id="ref59"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Rihoux</surname>, <given-names>B</given-names></string-name>. and <string-name><surname>Ragin</surname>, <given-names>C</given-names></string-name></person-group>., <year>2009</year>. <chapter-title><italic>Configurational Comparative Methods: Qualitative Comparative Analysis (QCA) and Related Techniques</italic></chapter-title>. <publisher-name>London</publisher-name>: <publisher-name>Sage</publisher-name>.</mixed-citation></ref><ref id="ref60"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Savin</surname>, <given-names>L</given-names></string-name></person-group>., <year>2011</year>. <article-title>Network centric strategies in the Arab spring</article-title>. <source>Open Revolt!</source> [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://openrevolt.info/2011/12/29/network-centric-strategies/">https://openrevolt.info/2011/12/29/network-centric-strategies/</ext-link> [Accessed <date-in-citation content-type="access-date">28 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref61"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Shashkov</surname>, <given-names>S</given-names></string-name></person-group>., <year>2011</year>. <article-title>The theory of ‘manageable chaos’ put into practice</article-title>. <source>Strategic Culture Foundation</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="https://www.strategic-culture.org/news/2011/03/01/the-theory-of-manageable-chaos-put-into-practice.html">https://www.strategic-culture.org/news/2011/03/01/the-theory-of-manageable-chaos-put-into-practice.html</ext-link> [Accessed <date-in-citation content-type="access-date">6 Feb 2018</date-in-citation>].</mixed-citation></ref><ref id="ref62"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Slipchenko</surname>, <given-names>V</given-names></string-name></person-group>., <year>1999</year>. <chapter-title><italic>Voinabudushchego (War of the Future)</italic></chapter-title>. <publisher-loc>Moscow</publisher-loc>.</mixed-citation></ref><ref id="ref63"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Spirova</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Stefanova</surname>, <given-names>B</given-names></string-name></person-group>., <year>2012</year>. <article-title>The European Dimension of Minority Political Representation: Bulgaria and Romania Compared</article-title>. <source>East European Politics &amp; Societies</source>, <volume>26</volume> (<issue>1</issue>), <fpage>75</fpage>–<lpage>92</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://eep.sagepub.com/cgi/doi/10.1177/0888325410388831">http://eep.sagepub.com/cgi/doi/10.1177/0888325410388831</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref64"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Subotic</surname>, <given-names>J</given-names></string-name></person-group>., <year>2010</year>. <chapter-title>Explaining Diffi cult States: The Problems of Europeanization in Serbia</chapter-title>. <source>European Politics &amp; Societies</source>, <volume>24</volume> (<issue>4</issue>), <fpage>595</fpage>–<lpage>616</lpage>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://eep.sagepub.com/cgi/doi/10.1177/0888325410368847">http://eep.sagepub.com/cgi/doi/10.1177/0888325410368847</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref65"><mixed-citation publication-type="web"><article-title>The Correlates of War Project, Correlates of War Project Website</article-title>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://correlatesofwar.org/">http://correlatesofwar.org/</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref66"><mixed-citation publication-type="web"><article-title>Transparency International, Corruption Perceptions Index</article-title>. <source>CPI - Corruption Perceptions Index</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://cpi.transparency.org">http://cpi.transparency.org</ext-link> [Accessed <date-in-citation content-type="access-date">25 Jan 2018</date-in-citation>].</mixed-citation></ref><ref id="ref67"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Verweij</surname>, <given-names>S.</given-names></string-name><etal>et al</etal></person-group>., <year>2013</year>. <article-title>What Makes Governance Networks Work? A Fuzzy Set Qualitative Comparative Analysis Of 14 Dutch Spatial Planning Projects</article-title>. <source>Public Administration</source>, <volume>91</volume>(<issue>4</issue>), <fpage>1035</fpage>–<lpage>1055</lpage>.</mixed-citation></ref><ref id="ref68"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Vis</surname>, <given-names>B</given-names></string-name></person-group>., <year>2011</year>. <article-title>Under which conditions does spending on active labor market policies increase? An fsQCA analysis of 53 governments between 1985 and 2003</article-title>. <source>European Political Science Review</source>, <volume>3</volume>(<issue>02</issue>), <fpage>229</fpage>–<lpage>252</lpage>.</mixed-citation></ref><ref id="ref69"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Watson</surname>, <given-names>J</given-names></string-name></person-group>., <article-title>Chapter 3: Attack by Stratagem</article-title>. In <source>Sun Tzu’s Art of War</source>. [online] Available from: <ext-link ext-link-type="uri" xlink:href="http://suntzusaid.com/book/3">http://suntzusaid.com/book/3</ext-link> [Accessed 25 Jan 2018].</mixed-citation></ref><ref id="ref70"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wright</surname>, <given-names>R. A</given-names></string-name>. and <string-name><surname>Boudet</surname>, <given-names>H. S</given-names></string-name></person-group>., <year>2012</year>. <article-title>To Act or Not to Act: Context, Capability, and Community Response to Environmental Risk</article-title>. <source>American Journal of Sociology</source>, <volume>118</volume> (<issue>3</issue>), <fpage>728</fpage>–<lpage>777</lpage>.</mixed-citation></ref></ref-list></back></article>
