1. Security landscape -- 2. Innovation approaches and processes -- 3. Design thinking for Defence and Security -- 4. Innovation in Global health security- bioforensics -- 5. Smart technologies, Public safety and security -- 6. Innovations in intelligence and national security -- 7. Innovations in Border Security- beyond biometrics -- 8. Cross border collaboration to support innovation in security -- 9. Innovations in policing and first responders -- 10. Innovations in nuclear forensics -- 11. Innovations in Disaster Risk Reduction -- 12. Capability analysis and architectural frameworks to support security design.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Contents -- Introduction -- Forensics -- References -- 1 Individual and Societal Risk (RiskIS): Beyond Probability and Consequence During Hurricane Katrina -- Abstract -- 1 Introduction -- 2 Foundations: Culture, Society, and Risk -- 2.1 Engineering Risk -- 2.2 Culture and Risk Analysis -- 2.3 Society and Risk Analysis -- 3 A Review of Literature: The Influence of Culture and Society on Risk Analysis -- 4 Case Application: Hurricane Katrina -- 4.1 Context of Hurricane Katrina -- 4.2 Action Taking: The Case for New Orleans During Katrina -- 4.3 Limitations of RiskIS Framework
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Intro -- Contents -- 1 Introduction -- 1 Security Challenges -- 2 Content -- References -- 2 Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross-Country Comparison -- Abstract -- 1 Introduction -- 2 The EvoCS Analytical Framework -- 2.1 The Human Rights and Ethical Aspects of the Analytical Framework -- 3 Preliminary Results from the Case Studies -- 3.1 The Netherlands -- 3.2 Serbia -- 3.3 United Kingdom (UK) -- 4 Discussion and Conclusions -- References -- 3 National Security in a Hyper-connected World -- Abstract -- 1 Introduction -- 2 National Security in the Age of Hyper-connectivity -- 2.1 The Interdependent World: The Nation-State's in a ``Borderless World'' -- 2.2 From Hobbesian Survival to National Security in an Interconnected World -- 2.3 Economic Security in a Hyper-connected World -- 3 Critical Infrastructure Protection in a Hyper-connected World -- 3.1 Critical Infrastructure Protection: Securing Transnational Dependencies -- 3.2 The Global Supply Chain and National Security -- 4 Cyber Security and National Security: Securing the Global Cyber Domain -- 4.1 National Critical Information Infrastructure and the Global Internet -- 5 Establishing a Holistic Strategy for National Security in a Hyper-connected World -- 6 Conclusion -- References -- 4 Is Maritime Security a Traditional Security Challenge? -- Abstract -- 1 Introduction -- 2 Defining Maritime Security -- 2.1 The Academic Approach -- 3 International Organisations and States -- 4 Maritime Insecurities: Actors Involved and the Causal Factors -- 4.1 Maritime Piracy -- 4.2 Maritime Terrorism -- 4.3 Illegal, Unreported and Unregulated (IUU) Fishing and Fisheries Crime -- 5 Exploring the Human and Maritime Security Nexus -- 6 Conclusion -- References.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
In: International journal of systems and society: IJSS ; an official publication of the Information Resources Management Association ; an official publication of the United Kingdom Systems Society (UKSS), Band 1, Heft 2, S. 51-65
Recent events such as the terrorist attack in Algeria (January 2013), the Boston Marathon Bombing (April 2013), the apprehension of two suspected al-Qaeda linked terrorists in Toronto, (April 2013), highlight the requirement for greater understanding regarding the radicalization and recruitment of terrorists. As detailed in the US Department of State Report (2011), over 10,000 terrorist attacks occurred in 2011, affecting nearly 45,000 victims in 70 countries and resulting in over 12,500 deaths. With a focus on the outcomes and results of terrorist activities, terrorism itself often becomes a 'blackbox' concept that does not capture the essence of the radicalization process nor the mechanisms of recruitment. This conceptual paper introduces Actor Network Theory (ANT) as a systems lens to open the 'blackbox' of terrorism. This systems lens '…is a discipline for seeing wholes. It is a framework for seeing interrelationships rather than things, for seeing patterns of change rather than static snapshots' (Senge, 1990:68). The systems view facilitated by ANT is supported and informed by methods of network analysis and conceptual modelling that highlight how dynamic networked actors shape the radicalization process through the actor network process of translation.
Even before the outbreak of the COVID-19 pandemic, the Central Region faced numerous obstacles to building a stable and prosperous future. The region, which encompasses the Middle East, the Horn of Africa, Central Asia, and South Asia, has been plagued by economic and political uncertainty amidst dramatic shifts in the global power structure. With the pandemic now exacerbating the volatility in this already fragile region, the U.S.'s strategic objectives are rife for re-examination. A complicated stew of factors such as weakening of established governance systems, the emboldening of extremist individuals and groups through advances in digital technology, the humanitarian crises in Afghanistan and Syria, and the intensification of the great power competition with China and Russia are creating a fertile environment for the growth of violent extremist organizations (VEOs). Such organizations take advantage of vulnerable, aggrieved, and traumatized populations to fuel radicalization, recruitment, and unrest, which further undermine stability and the potential for peace and prosperity. While it is still early to fully understand how the ongoing response to the COVID-19 pandemic will impact U.S. policy, this book provides a timely analysis of relevant dynamics such as popular radicalization, digital information ecosystems, networks of influence, and new capabilities to recognize and prepare for other such black swan events in the region.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Over the past decade, the international political system has come to be characterized as a Great Power Competition in which multiple would-be hegemons compete for power and influence. Instead of a global climate of unchallenged United States dominance, revisionist powers, notably China and Russia alongside other regional powers, are vying for dominance through political, military, and economic means. A critical battleground in the Great Powers Competition is the Middle East, the Horn of Africa, and the Central Asia South Asia (CASA), also known as the Central Region. With the planned withdrawal of U.S. military forces from Afghanistan, the U.S. has stated its intention of shifting attention away from the CASA Region in favor of a more isolationist foreign policy approach. This book provides an in-depth understanding of the implications for this shift related to regional diplomacy & politics, economic opportunities & rivalries, security considerations & interests, and the information environment. Amplifying the vital importance of success in the Central Region to U.S. prosperity and security, this volume advances dialogue in identifying key issues for stakeholders within and beyond the Central Region to gain a holistic perspective that better informs decision-making at various levels. This collection of work comes from scholars, strategic thinkers, and subject matter experts who participated in the Great Power Competition Conference hosted by the University of South Florida, in partnership with the National Defense University Near East South Asia Center for Strategic Strategies in January 2020.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
This book explores types of disruptions in defence and security, ways to assess disruptions triggered by technological advancements or the lack of legal frameworks; the consequent delays or disruptions to making decisions, creative idea generation and finally the innovative pathways to counter such disruptions. What do disruption, ideation and innovation have in common? How do disruptions, ideas and innovation coexist within defence and security? They all influence and impact decision-making. Disruptions drive decision-making. Ideation raises solutions to resolve the disruptions and innovation brings ideas into life. While disruptions may be common place in the business world, where disruptive technologies displace pre-existing ones; they are less prevalent in defence, even less so within the realm of security. For the last 10 years, there has been talk of disruptive technologies and even adoption of terms such as emerging and disruptive technologies by the largest military alliance—NATO, yet the means to assess these remain elusive. It offers researchers opportunities to assess different types of disruptions, ideate and innovate on scientific grounds to counter disruptions, thereby bolstering the defence and security community's ability to make decisions better. .
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the criminal and digital policing landscape. Said landscape is both dynamic and intricate, emanating as it does from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have significant impacts on societies around the world. This necessitates a reassessment of what crime, national security and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats and terrorist activities underscore the vulnerabilities of our current security and digital policing posture. This book presents concepts, theories and digital policing applications, offering a comprehensive analysis of current and emerging trends in digital policing. Pursuing an evidence-based approach, it offers an extraordinarily perceptive and detailed view of issues and solutions regarding the crime and digital policing landscape. To this end, it highlights current technological and methodological solutions as well as advances concerning integrated computational and analytical solutions deployed in digital policing. It also provides a comprehensive analysis of the technical, ethical, legal, privacy and civil liberty challenges stemming from the aforementioned advances in the field of digital policing; and accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical and legal approaches when conducting digital policing. The research gathered here fits well into the larger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime and law. It provides a valuable reference for law enforcement, policymakers, cybersecurity experts, digital forensic practitioners, researchers, graduates and advanced undergraduates, and other stakeholders with an interest in counter-terrorism. In addition to this target audience, it offers a valuable tool for lawyers, criminologist and technology enthusiasts
1. Great Power Competition Russia's Invasion of Ukraine -- 2. How the Ukraine war will impact U.S Special Force Operations -- 3. The Impact of Ukraine War on the Middle East in the Context of Great Power Competition -- 4. Great Power Competition and the Russian Invasion of Ukraine -- 5. Understanding the Mental Health of Ukrainian Refugees in Europe -- 6. Learning the wrong lessons from Russia's invasion: Russia's cyberspace lessons learned -- 7. Why Putin Gambled on Russian Military Mobilization -- 8. Great Power Clashes Will Reshape America: Case Study of Ukraine -- 9. The Effect of the Ukrainian War on Central Asia -- 10. Russia's Invasion and the U.S. Response: The view from the Middle East and Central Asia -- 11. Is Russia Fascist? Unravelling Propaganda East and West on the Ukrainian conflict -- 12. How the Ukraine invasion will impact Russia-Iran relations -- 13. Security in the 21st Century: Democracy and Transatlantic Values in an Age of Great Power Competition -- 14. Learning the wrong lessons from Russia's invasion: Russia's cyberspace lessons learned -- 15. Ukraine: An examination of the evolving humanitarian crisis -- 16. Russia–Ukraine crisis: China's Belt Road Initiative Role -- 17. Success or Failure: Intelligence in Ukraine and what it Signals for the Future -- 18. Moral Injury and Moral Crisis in Ukraine -- 19. How China-U.S. Cooperation will impact the Ukraine War -- 20. Weighing the Costs of War and Peace in Ukraine.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Intro -- Introduction -- Policing and Crime Prevention -- Policing Tools and Strategies -- Contents -- Part I: Policing and Crime Prevention -- How Offender Decision-making Can Inform Policing: A Focus on the Perceived Certainty of Apprehension -- 1 Introduction -- 2 Deterrence-Based Policing Strategies -- 2.1 Random Preventative Patrol -- 2.2 Increasing the Number of Police -- 2.3 Hot Spots Policing -- 2.4 Problem-Oriented Policing -- 3 Recent Innovations in Offender Decision-making Research -- 3.1 Updating Perceptions -- 3.2 Tipping Points and Threshold Effects -- 3.3 Ambiguity -- 4 Future Directions -- References -- An Epidemiological Framework for Investigating Organized Crime and Terrorist Networks -- 1 Introduction -- 2 Epidemiology -- 3 Understanding Complexity: Cynefin -- 4 Connecting Epidemiology and Policing Practices -- 5 Applications of Epidemiological Concepts in Policing Operations -- 6 Conclusion -- References -- Sex Offenders' Forensic Awareness Strategies to Avoid Police Detection -- 1 Introduction -- 2 Avoiding Police Detection for Sex Offenders: A Rational Choice Perspective -- 3 What Lead Sex Offenders to Avoid Police Detection? -- 3.1 CSI Effect -- 3.2 Previous Criminal History -- 4 Why Do Some Sex Offenders Not Use FAS? -- 5 How Do Sex Offenders Use Forensic Awareness? -- 6 Is the Use of FAS a Specific Feature of Sexual Offenders? -- 7 Does the Use of FAS Allow Sex Offenders to Avoid Police Detection? -- 8 Criminal Investigations and Forensic Identification -- 8.1 Theory of Forensic Evidence in Sexual Crime Investigation -- 8.2 Detection of Forensic Evidence in Practice -- 8.3 Police Efficiency to Detect and Analyze Forensic Evidences -- 8.4 Investigative Failures -- 9 Conclusion -- References -- Tracking Terrorism: The Role of Technology in Risk Assessment and Monitoring of Terrorist Offenders -- 1 Introduction.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Forward -- Section 1 Emerging threats -- Plagues, Epidemics and Pandemics; R. Izurieta -- Agricultural Emergencies: Factors and Impacts in the Spread of Transboundary Diseases in, and adjacent to, Agriculture -- The Threat within: mitigating the risk of medical error -- Climate Change, Extreme Weather Events and Global Health Security- A lens into vulnerabilities; C. Bell, A. Masys -- Global Health Biosecurity in a Vulnerable World – An Evaluation of Emerging Threats and Current Disaster Preparedness Strategies for the Future -- The emerging threat of Ebola -- Section 2: Mitigation, Preparedness and Response and Recovery -- Natural and Manmade Disasters: Vulnerable Populations -- Sexual Violence -- Global Health Security and Weapons of Mass Destruction; C. Reynolds -- Antimicrobial Resistance in One Health -- Food Security – microbiological and chemical risks -- Section 3: Exploring the technology Landscape for Solutions. Gaussianization of variational Bayesian approximations with correlated non-nested non-negligible posterior mean random effects employing non-negativity constraint analogs and analytical depossinization for iteratively fitting capture point, Aedes aegypti habitat non-zero autocorrelated prognosticators: A case study in evidential probabilities for non-frequentistic forecast epi-entomological time series modeling of arboviral infections -- Simulation, Modeling and Telemedicine in Global Health Security; A. French -- The growing role of social media in international health security: The good, the bad, and the ugly -- Section 4: Leadership and partnerships. Effecting Collective Impact through Collective Leadership on a Foundation of Generative Relationships -- Global Health Innovations.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext: