Strategic intelligence management national security imperatives and information and communications technologies / edited by Babak Akhgar, Simeon Yates.
| Author/creator | Akhgar, Babak |
| Other author | Yates, Simeon. |
| Format | Electronic |
| Edition | First edition. |
| Publication Info | Waltham, MA : Elsevier/Butterworth-Heinmann, [2013] |
| Description | xxiv, 316 pages : color illustrations ; 25 cm |
| Supplemental Content | Full text available from Ebook Central - Academic Complete |
| Supplemental Content | Full text available from eBook - Forensics, Security, and Criminal Justice 2013 [EBCFOR13] |
| Subjects |
| Contents | Introduction : strategy formation in the a globalised and networked age : a review of the concept and its definition -- National security strategies and issues -- Securing the state : strategic responses for an interdependent world -- We have met the enemy and they are us : insider threat and its challenge to national security -- An age of asymmetric challenges--4th generation warfare at sea -- Port and border security - the first and last line of national security defence -- The public, communication, risk and national security -- Risk communication, risk perception and behaviour as foundations of effective national security practices -- Promoting public resilience against CBRN terrorism -- From local to global : policing and national security -- The role of social media in crisis : a European holistic approach to the adoption of online and mobile communications in crisis response and search and rescue efforts -- Emerging technologies and the human rights challenge of rapidly expanding -- State surveillance capacities -- Technologies, information and knowledge for national security -- User requirements and training needs within security applications : methods for capture and communication -- Exploring the crisis management/knowledge management nexus -- A semantic approach to security policy reasoning -- The Athena project : using formal concept analysis to facilitate the actions of responders in a crisis situation -- Exploiting intelligence for national security -- Re-thinking standardization for interagency information sharing -- Future threats and cyber security -- Securing cyberspace : strategic responses for a digital age -- National cyber defense strategy -- From cyber terrorism to state actors : covert cyber operations -- Cybersecurity countermeasures to combat cyberterrorism -- Developing a model to reduce and/or prevent cyber crime victimization among the user individuals -- Conclusion. |
| Bibliography note | Includes bibliographical references (pages 273-295) and index. |
| Access restriction | Available only to authorized users. |
| Technical details | Mode of access: World Wide Web |
| Genre/form | Electronic books. |
| LCCN | 2012043042 |
| ISBN | 9780124071919 (alk. paper) |
| ISBN | 0124071910 (alk. paper) |
Availability
| Library | Location | Call Number | Status | Item Actions |
|---|---|---|---|---|
| Electronic Resources | ✔ Available |