This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.
Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an...
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance resear...
The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leaders have highlighted a second fight surrounding the spread of COVID-19, namely disinformation and preparing to face adversaries willing to exploit the public health crisis for nefarious purposes. The current pandemic is a breeding ground for the propagation of disinformation, as it represents the first major global health event in which large social media platforms have become the main distributor of information. This multi-national edited volume...
The COVID-19 pandemic is not only a threat to our health and economy, but also has strong implications for defence and security. Indeed, defence leade...
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social sciences and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative solutions and big data-powered applications to cope with the real world challenges for building...
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case ...
This book assesses potential developments of terrorism and ways to prevent it—the growing threats as new technologies become available — and how the same new technologies may help trap those with potential mal-intent. The drumbeat of terror resonates from everywhere; how can we stop it? What are the tripping points along the road and how can we avoid them?
Increasingly more people have access to increasingly more information and increasingly more destructive technologies. In the meantime, increasingly advanced technologies help us create an increasingly...
This book assesses potential developments of terrorism and ways to prevent it—the growing threats as new technologies become available —&n...
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem.
The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed...
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing...
Since the end of bipolarism, the concept of asymmetric warfare, and of asymmetric conflict in general, has been increasingly applied with regard to armed forces activities and tasks. This book presents the findings of comparative empirical research conducted in selected military units by a group of distinguished experts on military organization, who hail from the eight participating countries: Bulgaria, Cameroon, Denmark, Finland, Italy, Lithuania, the Philippines and Spain. It discusses remarks made by military leaders with extensive experience in the field regarding current doctrines...
Since the end of bipolarism, the concept of asymmetric warfare, and of asymmetric conflict in general, has been increasingly applied with regard to...
This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as ‘messes’ and ‘wicked problems’ that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences.
Sensemaking is the activity that enables us...
This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and in...
This book describes an adaptable biothreat assessment process to complement overall biorisk management programs, incorporating threat management and the unique natures of biological assets. Further, this book examines the nexus between public health, international security, and developing technologies, building a case for augmenting biosecurity to levels beyond the laboratory constraints. With the face of biological and biomedical sciences changing, this book describes how with proper biosecurity development, these can become assets, rather than liabilities, to secure our world from...
This book describes an adaptable biothreat assessment process to complement overall biorisk management programs, incorporating threat management an...
This book explores and analyzes the rapid pace of technological evolution in diplomatic, information, military, and economic sectors, which has contributed to a dynamic international policy environment. Global political stability is greatly influenced by innovations originating from numerous sources, including university labs, the technology sector, and military research. Collectively, these innovations guide the movement of people, ideas, and technology that in turn affect the international balance of power. The objective of this volume is to develop new insights into how the...
This book explores and analyzes the rapid pace of technological evolution in diplomatic, information, military, and economic sectors, which has con...
This book focuses on threats, especially contaminants, to drinking water and the supply system, especially in municipalities but also in industrial and even residential settings. The safety, security, and suitability landscape can be described as dynamic and complex stemming from necessity and hence culpability due to the emerging threats and risks, vis-a-vis globalization resulting in new forms of contaminants being used due to new technologies. The book provides knowledge and guidance for engineers, scientists, designers, researchers, and students who are involved in water,...
This book focuses on threats, especially contaminants, to drinking water and the supply system, especially in municipalities but also in in...