Cover image for Strategic Intelligence Management : National Security Imperatives and Information and Communications Technologies.
Strategic Intelligence Management : National Security Imperatives and Information and Communications Technologies.
Title:
Strategic Intelligence Management : National Security Imperatives and Information and Communications Technologies.
Author:
Akhgar, Babak.
ISBN:
9780124072190
Personal Author:
Physical Description:
1 online resource (341 pages)
Contents:
Front Cover -- Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies -- Copyright -- Table of Contents -- Acknowledgments -- Organizations -- People -- About the Authors -- Lord Carlile of Berriew CBE QC -- Babak Akhgar -- Simon Andrews -- Liz Bacon -- David Chadwick -- Mohammad Dastbaz -- David Fortune -- Dimitrios Frangiskatos -- Peter Fussey -- Diane Gan -- Edward Halpin -- Christopher P. Holstege -- Hamid Jahankhani -- Jan Kallberg -- Mats Koraeus -- Kristian Krieger -- Ivan Launders -- Glyn Lawson -- Peter Lehr -- Eleanor Lockley -- George Loukas -- Lachlan MacKinnon -- Bárbara Manso -- Marco Manso -- Franck Mignet -- Seyed Mohammad Reza Nasserzadeh -- Troy Nold -- Patrick de Oude -- Gregor Pavlin -- Julia M. Pearce -- Simon Polovina -- Thomas Quillinan -- Kellyn Rein -- M. Brooke Rogers -- Gregory B. Saathoff -- Rose Saikayasit -- Paul de Souza -- Andrew Staniforth -- Alex W. Stedmon -- Eric Stern -- Fahimeh Tabatabaei -- Bhavani Thuraisingham -- Steve Wright -- Simeon Yates -- Foreword -- Chapter 1: Introduction: Strategy Formation in a Globalized and Networked Age-A Review of the Concept and its Definition -- Introduction -- National strategy and strategy formulation process -- National security -- Strategic intelligence -- Interconnected world -- National security, ICT, and strategy -- Section 1: National Security Strategies and Issues -- Chapter 2: Securing the State: Strategic Responses for an Interdependent World -- A catalyst for change -- Lessons learned -- Contesting terror -- National security frameworks -- Strategic responses -- National security machinery -- Security context today -- From threat to threat -- Challenges ahead -- Chapter 3: We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security -- Introduction.

Defining the insider threat -- How the Insider Threat is Different from the External Threat -- Enhanced Capabilities of the Insider -- Categories of Insider Threat -- Carrying Out the Attack -- The amerithrax case -- Substance Dependence -- Homicidality -- Suicidality -- Substance Abuse -- Summary -- Chapter 4: An Age of Asymmetric Challenges-4th Generation Warfare at Sea -- Introduction -- Definitions: from naval AW to MIA s -- Case study: the indian-pacific and sea lines of communication security -- Criminal Nonstate Actors: Smugglers, Traffickers, and Pirates -- Political Nonstate Actors: (Maritime) Terrorists -- Substate Actors: From al-Shabaab (Somalia) to Moro Islamic Liberation Front (Philippines) -- State Actors: Iran and the IRGCN -- Discussion: from asymmetries and irregularities to 4GW -- 3GW reloaded: a caveat -- Conclusion: the perils of "swimming in the instantaneousness of postmodernism" -- Chapter 5: Port and Border Security: The First and Last Line of National Security Defense -- A new era -- Second wave -- Independent review -- Trans-atlantic terror -- Securing the border -- All hazards approach -- Section 2: The Public, Communication, Risk, and National Security -- Chapter 6: Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices -- Introduction -- Risk communication: a pillar of national security -- The importance of effective risk communication -- Acknowledging Variations in Behavioral Responses to Risk Communication -- Implications for Physical Health -- Implications for the Ability of Systems to Respond -- Inspiring Trust, Influencing Response -- Risk perception: a foundation for understanding public responses to extreme events -- Expert Perceptions of Risk -- Public Perceptions of Risk -- Behavior: understanding likely public responses to extreme events.

Professional Planning Assumptions and Public Behavior -- Public Behavioral Response Assumptions during an Extreme Event -- Risk communication in practice -- Chapter 7: Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism -- Introduction -- Beyond prevention and security in counterterrorism: promoting public resilience and managing risk -- Resilience and the role of the public -- Public perceptions, risk communication, and the promotion of resilience -- Public Risk Perceptions of the CBRN Threat -- Public Perceptions of the Trustworthiness of Emergency Managers and Policy Makers -- Public Perceptions of Response Costs and Efficacy -- Quality of Risk Communication -- Conclusions: public resilience, CBRN, and human factors -- Chapter 8: From Local to Global: Community-based Policing and National Security -- Introduction -- Policing by consent, community, and prevent -- The Challenge of New Forms of Networked Communities -- Devilry through the dark web: preventing online radicalization -- Self-radicalization Process -- Implications of online behavior for national security -- Conclusion -- Chapter 9: The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communicat... -- Introduction -- Lessons from past crisis situations -- The role of ICT tools and social media in crisis -- Hurdles to the Use of New Communication/Social Media in Crisis Situations -- Old Habits are Difficult to Change and they are not Exclusive to PPDR Organizations -- The iSAR + way: approaching a multidimensional problem -- The iSAR + Platform and Services -- The i112 Portal (for Citizens and PPDRs) -- Interoperability with Existing Social Media and ICT Tools for Crisis -- The iSAR + Fusion Center -- iSAR + PPDR Services -- iSAR + Mobile Services -- iSAR + Interfaces: The iSAR + Network -- Conclusion.

About the contributors -- Chapter 10: Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities -- Introduction -- A brief survey of emerging surveillance technologies -- Biometric Technologies -- Location-based and Tracking Technologies -- Through-the-wall Surveillance Technology -- Mobile Surveillance and Wireless Sensor Systems -- Virtual Reality, Surveillance, and Security Systems -- Nongovernmental organization policy research: intervention and accountability on surveillance -- Digitalization and Dataveillance -- Surveillance Flows and Dataveillance Networks -- Algorithmic Surveillance and Geolocation -- Accountability -- Human rights and surveillance technologies -- Conclusions -- Section 3: Technologies, Information, and Knowledge for National Security -- Chapter 11: User Requirements and Training Needs within Security Applications: Methods for Capture and Communication -- User requirements elicitation -- User Requirements Elicitation in Sensitive Domains -- Conducting user requirements elicitation -- Human Factors Methods and Visualization Tools -- Security case study -- User Interviews -- Personas -- Field Observation -- Link Analysis -- Identifying training needs -- Empowering Staff -- Access to Training Resources -- In-house Training -- Generalizing from Specifics -- Integrated and Tailored Training -- Raised Awareness and Skill Fade -- Certificates -- Knowledge Elicitation -- Discussion -- Conclusion -- Acknowledgments -- Chapter 12: Exploring the Crisis Management/Knowledge Management Nexus -- Introduction -- Crisis management -- Threat to Core Values -- Uncertainty -- Urgency -- CM Tasks -- Knowledge management -- What is Knowledge? -- Tacit and Explicit Knowledge -- Transfer and Conversion of Knowledge -- The SECI Process -- Socialization -- Externalization -- Combination -- Internalization.

Implications of KM -- Communities of Practice -- Meta-knowledge -- Empathic Knowledge -- Second-order Knowledge -- Knowledge Brokerage -- Concluding reflections: implications for CM -- SECI and CM -- Expertise and CM -- Knowledge Workers in Crises -- Knowledge Under Pressure -- (Re)integrating KM -- Chapter 13: A Semantic Approach to Security Policy Reasoning -- Introduction -- Current approaches -- Best practice -- Business rules -- Enterprise architecture frameworks -- Threats, vulnerabilities, and security concepts in CGs -- Conceptual Graphs -- Business Rules for Vulnerabilities -- Business Threats in Enterprise Architecture -- Security Threats -- Financial trading case study -- The Automated FT TG in CoGui -- Reasoning with Business Rules -- Security reasoning with the FT transaction graph -- Business rule and evolving security policy -- Concluding remarks -- Chapter 14: The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation -- Introduction -- The athena vision -- Architecture narrative -- ATHENA System Overview -- ATHENA Components -- Crisis Mobile -- Sending Tools -- Receiving Tools -- Crisis Information Processing Center -- Information Acquisition and Preprocessing Tools -- Aggregation and Analysis Tools -- Crisis Command and Control Intelligence Dashboard -- Crisis Map (CCCID Version). -- Mobile Communications Center -- Social Media Content Management Tool. -- Crisis Summary and Query Tools. -- Social Media -- Interoperability -- Crisis Management Language -- Decentralized Intelligence Processing Framework -- ATHENA Cloud Secure Information Center -- Formal concept analysis -- Formal concept analysis for deriving crisis information -- London Bombing Example -- Building on prior projects -- ATHENA Concepts in Related Domains -- Conclusion.

Chapter 15: Exploiting Intelligence for National Security.
Abstract:
Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives. Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats. Hot topics like cyber terrorism, Big Data, and Somali pirates, addressed in terms the layperson can understand, with solid research grounding Fills a gap in existing literature on intelligence, technology, and national security.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: