National Security Imperatives and Information and Communications Technologies
De som köpt den här boken har ofta också köpt The 48 Laws of Power av Robert Greene (häftad).
Köp båda 2 för 1024 kr"...an important work and should be of interest to public officials, executives in the private sector, and others who have a serious appetite for a broader and deeper understanding of the security challenges we are all facing." --Security Management
"International contributors in computing, communications systems, criminology, and emergency medicine provide a detailed overview for scholars, policy makers, and those in law, security, government, and business. The book examines current issues of national security strategy in the context of new global communication networks and global connections among regions and resources." --Reference & Research Book News, December 2013
Babak Akhgar is Professor of Informatics and Director of CENTRIC (Center of Excellence in Terrorism, Resilience, Intelligence and Organized Crime Research) at Sheffield Hallam University (UK) and Fellow of the British Computer Society. He has more than 100 refereed publications in international journals and conferences on information systems with specific focus on knowledge management (KM). He is member of editorial boards of several international journals and has acted as Chair and Program Committee Member for numerous international conferences. He has extensive and hands-on experience in the development, management and execution of KM projects and large international security initiatives (e.g., the application of social media in crisis management, intelligence-based combating of terrorism and organized crime, gun crime, cyber-crime and cyber terrorism and cross cultural ideology polarization). In addition to this he is the technical lead of two EU Security projects: "Courage on Cyber-Crime and Cyber-Terrorism and "Athena onthe Application of Social Media and Mobile Devices in Crisis Management. He has co-edited several books on Intelligence Management.. His recent books are titled "Strategic Intelligence Management (National Security Imperatives and Information and Communications Technologies), "Knowledge Driven Frameworks for Combating Terrorism and Organised Crime and "Emerging Trends in ICT Security. Prof Akhgar is member of the academic advisory board of SAS UK. Simeon Yates was formerly at Sheffield Hallam University and CENTRIC, and is now Director of the Institute of Cultural Capital, a strategic collaboration between Liverpool John Moores University and
the University of Liverpool (UK).
Foreword (Lord Carlile of Berriew CBE, QC)
Part 1: National Security Strategies and Issues 1 Introduction: Strategy Formation in a Globalized and Networked Age-A Review of the Concept and its Definition 2 Securing the State: Strategic Responses for an Interdependent World 3 We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security 4 An Age of Asymmetric Challenges-4th Generation Warfare at Sea 5 Port and Border Security: The First and Last Line of National Security Defense
Part 2: The Public, Communication, Risk, and National Security 6 Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices 7 Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism 8 From Local to Global: Community-based Policing and National Security 9 The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts 10 Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities
Part 3: Technologies, Information, and Knowledge for National Security 11 User Requirements and Training Needs within Security Applications: Methods for Capture and Communication 12 Exploring the Crisis Management/Knowledge Management Nexus 13 A Semantic Approach to Security Policy Reasoning 14 The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation 15 Exploiting Intelligence for National Security 16 Re-thinking Standardization for Interagency Information Sharing
Part 4: Future Threats and Cyber Security 17 Securing Cyberspace: Strategic Responses for a Digital Age 18 National Cyber Defense Strategy 19 From Cyber Terrorism to State Actors' Covert Cyber Operations 20 Cyber Security Countermeasures to Combat Cyber Terrorism 21 Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals
Concluding remarks