Exploring the Security Landscape : Non-Traditional Security Challenges.
Material type:
- text
- computer
- online resource
- 9783319279145
- 352.379
- TH9701-9745
Intro -- Contents -- 1 Introduction -- 1 Security Challenges -- 2 Content -- References -- 2 Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross-Country Comparison -- Abstract -- 1 Introduction -- 2 The EvoCS Analytical Framework -- 2.1 The Human Rights and Ethical Aspects of the Analytical Framework -- 3 Preliminary Results from the Case Studies -- 3.1 The Netherlands -- 3.2 Serbia -- 3.3 United Kingdom (UK) -- 4 Discussion and Conclusions -- References -- 3 National Security in a Hyper-connected World -- Abstract -- 1 Introduction -- 2 National Security in the Age of Hyper-connectivity -- 2.1 The Interdependent World: The Nation-State's in a ``Borderless World'' -- 2.2 From Hobbesian Survival to National Security in an Interconnected World -- 2.3 Economic Security in a Hyper-connected World -- 3 Critical Infrastructure Protection in a Hyper-connected World -- 3.1 Critical Infrastructure Protection: Securing Transnational Dependencies -- 3.2 The Global Supply Chain and National Security -- 4 Cyber Security and National Security: Securing the Global Cyber Domain -- 4.1 National Critical Information Infrastructure and the Global Internet -- 5 Establishing a Holistic Strategy for National Security in a Hyper-connected World -- 6 Conclusion -- References -- 4 Is Maritime Security a Traditional Security Challenge? -- Abstract -- 1 Introduction -- 2 Defining Maritime Security -- 2.1 The Academic Approach -- 3 International Organisations and States -- 4 Maritime Insecurities: Actors Involved and the Causal Factors -- 4.1 Maritime Piracy -- 4.2 Maritime Terrorism -- 4.3 Illegal, Unreported and Unregulated (IUU) Fishing and Fisheries Crime -- 5 Exploring the Human and Maritime Security Nexus -- 6 Conclusion -- References.
5 Pandemic Influenza Planning for the Mental Health Security of Survivors of Mass Deaths -- Abstract -- 1 Introduction -- 1.1 Pandemic Influenza -- 1.2 Mental Health of Survivors of Mass Deaths -- 1.3 Aims and Objectives -- 2 Mass Fatality Management Planning -- 2.1 Planning Essentials -- 2.1.1 Coordination -- 2.1.2 Stockpiling of Resources -- 2.1.3 Information Management -- 2.1.4 Death Management -- 2.1.5 Identification and Death Certification -- 2.1.6 Family Support and Assistance -- 3 Conclusions -- References -- 6 An Evaluation of the Police Response to Gang-Related Violence and Future Security Threats -- Abstract -- 1 Introduction -- 2 Security Threat---Gang Violence and Organized Crime -- 2.1 History of Gangs in Bermuda -- 2.2 Current Overview of Gangs in Bermuda -- 3 Understanding Crime and Gangs: Theories and Concepts -- 3.1 Crime Rate as Pertains to Gangs -- 3.2 Situational Crime Prevention Theories -- 3.3 Social Crime Prevention Theories -- 3.3.1 Social Control Theory -- 3.3.2 Social Learning Theory -- 3.3.3 Deviant Behaviour -- 4 Research Methodology -- 5 Findings and Discussion -- 5.1 Assessing the Police Response -- 5.1.1 Pre-2003 -- 5.1.2 2003 -- 5.1.3 2004 -- 5.1.4 2005 -- 5.1.5 2006--2008 -- 5.1.6 2009 -- 5.1.7 2010 -- 5.1.8 2011 -- 5.1.9 2012 -- 5.1.10 Summary of 2009--2012 -- 5.1.11 2013 -- 5.2 Theory Testing -- 5.2.1 What Caused the Outbreak of Violence? -- 5.2.2 Did Police Actions Affect Crime? -- 6 Conclusion -- References -- 7 Scanning the Consequences of Demographic Change for the Emerging Security Landscape -- Abstract -- 1 Introduction -- 2 Scanning the Demographic Horizon -- 3 Population Aging -- 4 The Demographic Economy of National Defence -- 5 Collective In/Security: Supply and Demand -- 6 Conclusion -- References -- 8 Economic Security: An Analysis of the Strait of Malacca -- Abstract -- 1 Introduction.
2 Constructing a Framework for Economic Security -- 3 The Case of Lloyd's of London and the Strait of Malacca -- 4 Applying the Economic Security Framework -- 5 A Discussion of Safeguards -- References -- 9 Critical Infrastructure Vulnerabilities: Embracing a Network Mindset -- Abstract -- 1 Introduction: Concept and Definitions -- 2 Critical Infrastructures Operation: Growing Complexity and Mutual Dependence -- 3 Hyper-critical Infrastructure (Hyper/Hybrid Risks) -- 4 Emerging Systemic Risks to Critical Infrastructure Protection -- 5 CI Interdependence and Vulnerability Analysis -- 6 Enhancing Security Through Understanding Infrastructure Interdependencies -- 7 Interdependency-Induced CI Vulnerabilities -- 8 Systems Thinking -- 9 Conclusions -- References -- 10 Supply Chain Information Security: Emerging Challenges in the Telecommunications Industry -- Abstract -- 1 Supply Chain Management and Information Challenge -- 1.1 Supply Chain Management Concept -- 1.2 ICTs for Managing Supply Chains -- 1.3 Information-Sharing Challenges -- 2 Auto-ID Technology and SCM -- 2.1 Auto-ID Systems -- 2.1.1 Linear Barcodes -- 2.1.2 2D Barcodes -- 2.1.3 RFID -- 2.1.4 Other Auto-ID Tracking Technology -- 2.2 Auto-ID Applications -- 2.3 Auto-ID Applications in Supply Chains -- 2.3.1 RFID in Logistics, Warehousing and Transportation -- 2.3.2 RFID in Retail -- 2.3.3 RFID in Manufacturing -- 2.3.4 RFID for Security, Authentication and Counterfeit Protection -- 2.3.5 RFID Integrated with Environmental Sensors -- 2.4 Auto-ID Information Security Challenge -- 2.4.1 Confidentiality Threats -- 2.4.2 Authenticity Threats -- 2.4.3 Integrity Threat -- 2.4.4 Availability Threats -- 3 Emerging RFID Security Challenges and Vulnerabilities -- 3.1 Technical Challenge -- 3.2 Security Challenge -- 3.2.1 Application Layer Threats -- 3.2.2 Communication Layer Threats.
3.2.3 Physical Layer Threats -- 3.3 Privacy and Regulatory Challenge -- 3.3.1 Privacy Challenge -- 3.3.2 Regulatory Challenge -- 4 RFID Applications in Telecommunications -- 4.1 Product Identification and Tracking -- 4.1.1 Telecommunications Product Package Tracking -- 4.1.2 Shipping Data and RFID Tracking -- 4.2 Implementation Challenge -- 4.2.1 Financial Challenge -- 4.2.2 Technical Challenge -- 4.2.3 Regulatory and Environmental Challenge -- 4.3 RFID: Availability Versus Confidentiality -- 4.3.1 Confidentiality -- 4.3.2 Integrity -- 4.3.3 Availability -- 4.3.4 Authenticity -- 4.4 Security Control Proposals -- 5 Conclusion -- 5.1 Auto-ID/RFID Application Protection Mechanisms: A Conceptual Framework -- 5.1.1 Policy and Legal Propositions -- 5.1.2 Operational Propositions -- 5.1.3 Technical Propositions -- References -- 11 Disrupting Terrorist and Criminal Networks: Crime Script Analysis Through DODAF Applications -- Abstract -- 1 Introduction -- 2 Network Analysis -- 3 Crime Script Analysis -- 4 DODAF -- 5 Methodology -- 6 Discussion -- 6.1 Contextual analysis -- 6.2 DODAF and SNA: Topology and Functionality -- 6.3 Conclusion -- References -- 12 Computing in Compromised Environments: Beyond the Castle Model of Cyber-Security -- Abstract -- 1 Introduction -- 2 Organizations Are Tearing Down Walls from the Inside -- 3 Technological Developments Are Destroying Walls from the Outside -- 4 Changes in Human Interaction Are Blurring the Distinction Between Inside and Outside -- 5 Conclusion: Data Assurance in Compromised Environments -- References -- 13 Food Security as Critical Infrastructure: The Importance of Safeguarding the Food Supply for Civil Security -- Abstract -- 1 Introduction -- 2 Safeguarding the Critical Infrastructure: Food Security -- 2.1 Food as Critical Infrastructure -- 2.1.1 Safeguarding the Food Supply Chain.
2.1.2 Mitigation Supply Chains Risk -- 2.1.3 Promote Supply Chain Resilience -- 2.2 Case Study: Emergency Food Services (Canada) -- 3 Hazards and Their Impacts on the Critical Infrastructure Food -- 3.1 Exposure to Hazards and Past Disasters Regarding the Food Supply -- 3.1.1 Ensuring the Food Supply During Past Disasters -- Queensland Floods (Australia) -- Hurricane Sandy (USA) -- 3.1.2 Lessons Learned from Past Disasters -- Lessons from the Queensland Floods (Australia) -- Lessons from Hurricane Sandy (USA) -- 3.2 Disruption of the Critical Infrastructure Food: Impact on the Population -- 3.2.1 Household Preparedness -- 4 Conclusion -- References -- 14 The Role of Social Network Sites in Security Risks and Crises: The Information Warfare of Terrorism -- Abstract -- 1 Introduction -- 2 Historical Background -- 3 Objective of the Study -- 4 SNS and Terrorism -- 4.1 SNS and Their Influence on Terrorism -- 4.2 To Shut or not to Shut? -- 5 Theoretical Framework -- 5.1 Risk Communication -- 5.2 Crisis Communication -- 6 Methodology -- 7 Research Findings and Results -- 7.1 RQ1: How Are SNS Users Accountable in the Global War on Terrorism? -- 7.2 Responsibility to Self -- 7.3 Responsibility to the Audience -- 7.4 Responsibility to Employer(s) -- 8 Discussion -- 9 Conclusion -- References -- 15 Manufactured Risk, Complexity and Non-traditional Security: From World Risk Society to a Networked Risk Model -- Abstract -- 1 Introduction -- 2 Non-traditional Security -- 3 Beck's Risk Society -- 3.1 Shaping the Security Agenda -- 4 Networking Thinking and Risk Society (A Networked Risk Model) -- 5 Conclusion -- References.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.