LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information managemen… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives.
Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.
Students in homeland security and national security as well as information security programs in US and EMEA; law enforcement and intelligence practitioners in US, UK, & Europe
Acknowledgments
Organizations
People
About the Authors
Foreword
Chapter 1. Introduction: Strategy Formation in a Globalized and Networked Age—A Review of the Concept and its Definition
Introduction
National strategy and strategy formulation process
National security
Strategic intelligence
Interconnected world
National security, ICT, and strategy
Section One: National Security Strategies and Issues
Chapter 2. Securing the State: Strategic Responses for an Interdependent World
A catalyst for change
Lessons learned
Contesting terror
National security frameworks
Strategic responses
National security machinery
Security context today
From threat to threat
Challenges ahead
Chapter 3. We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security
Introduction
Defining the insider threat
The amerithrax case
Summary
Chapter 4. An Age of Asymmetric Challenges—4th Generation Warfare at Sea
Introduction
Definitions: from naval AW to MIAS
Case study: the indian-pacific and sea lines of communication security
Discussion: from asymmetries and irregularities to 4GW
3GW reloaded: a caveat
Conclusion: the perils of “swimming in the instantaneousness of postmodernism”
Chapter 5. Port and Border Security: The First and Last Line of National Security Defense
A new era
Second wave
Independent review
Trans-atlantic terror
Securing the border
All hazards approach
Section Two: The Public, Communication, Risk, and National Security
Chapter 6. Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices
Introduction
Risk communication: a pillar of national security
The importance of effective risk communication
Risk perception: a foundation for understanding public responses to extreme events
Behavior: understanding likely public responses to extreme events
Risk communication in practice
Chapter 7. Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism
Introduction
Beyond prevention and security in counterterrorism: promoting public resilience and managing risk
Resilience and the role of the public
Public perceptions, risk communication, and the promotion of resilience
Conclusions: public resilience, CBRN, and human factors
Chapter 8. From Local to Global: Community-based Policing and National Security
Introduction
Policing by consent, community, and prevent
Devilry through the dark web: preventing online radicalization
Implications of online behavior for national security
Conclusion
Chapter 9. The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts
Introduction
Lessons from past crisis situations
The role of ICT tools and social media in crisis
The iSAR + Way: approaching a multidimensional problem
Conclusion
About the contributors
Chapter 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities
Introduction
A brief survey of emerging surveillance technologies
Nongovernmental organization policy research: intervention and accountability on surveillance
Human rights and surveillance technologies
Conclusions
Section Three: Technologies, Information, and Knowledge for National Security
Chapter 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication
User requirements elicitation
Conducting user requirements elicitation
Security case study
Identifying training needs
Discussion
Conclusion
Acknowledgments
Chapter 12. Exploring the Crisis Management/Knowledge Management Nexus
Introduction
Crisis management
Knowledge management
Concluding reflections: implications for CM
Chapter 13. A Semantic Approach to Security Policy Reasoning
Introduction
Current approaches
Best practice
Business rules
Enterprise architecture frameworks
Threats, vulnerabilities, and security concepts in cgs
Financial trading case study
Security reasoning with the ft transaction graph
Business rule and evolving security policy
Concluding remarks
Chapter 14. The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation
Introduction
The athena vision
Architecture narrative
Formal concept analysis
Formal concept analysis for deriving crisis information
Building on prior projects
Conclusion
Chapter 15. Exploiting Intelligence for National Security
Big data: challenges and opportunities
Discussion
Chapter 16. Re-thinking Standardization for Interagency Information Sharing
Introduction
Situation awareness and intelligence gathering
Sources of intelligence data
Creating value-added information
Recognizing developing threats
The benefits of structured data
The limitations of data structuring
The particular problems of natural language information
An agency is not an island
A nation is not an island…
Specific problems in with natural language information
Finding a common representation
A solution for security and law enforcement out of nato
C2LG: A solution for security and law enforcement
C2LG Variant: a language for intelligence and law enforcement
C2LG Variant: crisis management language
Conclusions
Section Four: Future Threats and Cyber Security
Chapter 17. Securing Cyberspace: Strategic Responses for a Digital Age
Cyber terror
Cyber threats
Strategic responses
A new approach
UK Cyber security guiding principles
Cyber collaboration
Chapter 18. National Cyber Defense Strategy
Introduction
Training cyber defense professionals
Types of cyber warrior
Acknowledgments
Chapter 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations
Introduction
Conclusion
Chapter 20. Cyber Security Countermeasures to Combat Cyber Terrorism
Introduction
Cyberphysical attacks
Malware candidates for cyber terrorism
The insider threat
Countermeasures to combat cyber terrorism
The future
Key issues
Chapter 21. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals
Introduction
Crime prevention theories
Crime prevention models
Challenges facing preventive measures
Conclusion
Acknowledgments
Chapter 22. Conclusion: National Security in the Networked Society
National security today and in the future
The public, threats, and new media
Deploying network technologies for national security
Threats to the infrastructure of the networked society
Conclusion
References
Index
BA
SY
the University of Liverpool (UK).