Security by Design Innovative Perspectives on Complex Problems /

This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can supp...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Masys, Anthony J. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Advanced Sciences and Technologies for Security Applications,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05402nam a2200565 4500
001 978-3-319-78021-4
003 DE-He213
005 20191220130536.0
007 cr nn 008mamaa
008 180730s2018 gw | s |||| 0|eng d
020 |a 9783319780214  |9 978-3-319-78021-4 
024 7 |a 10.1007/978-3-319-78021-4  |2 doi 
040 |d GrThAP 
050 4 |a HV6772-6773.3 
072 7 |a JKV  |2 bicssc 
072 7 |a SOC004000  |2 bisacsh 
072 7 |a JKV  |2 thema 
072 7 |a LNQE  |2 thema 
082 0 4 |a 364.168  |2 23 
245 1 0 |a Security by Design  |h [electronic resource] :  |b Innovative Perspectives on Complex Problems /  |c edited by Anthony J. Masys. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a VI, 401 p. 115 illus., 93 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
505 0 |a Chapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Warden's Concentric Ring Theory to Applegate's Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security - designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing 'Deliverology' for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing. 
520 |a This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects." . 
650 0 |a Computer crimes. 
650 0 |a System safety. 
650 0 |a Computational intelligence. 
650 0 |a Management information systems. 
650 0 |a Computer simulation. 
650 1 4 |a Cybercrime.  |0 http://scigraph.springernature.com/things/product-market-codes/1B7000 
650 2 4 |a Security Science and Technology.  |0 http://scigraph.springernature.com/things/product-market-codes/P31080 
650 2 4 |a Computational Intelligence.  |0 http://scigraph.springernature.com/things/product-market-codes/T11014 
650 2 4 |a Software Management.  |0 http://scigraph.springernature.com/things/product-market-codes/522050 
650 2 4 |a Simulation and Modeling.  |0 http://scigraph.springernature.com/things/product-market-codes/I19000 
700 1 |a Masys, Anthony J.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319780207 
776 0 8 |i Printed edition:  |z 9783319780221 
776 0 8 |i Printed edition:  |z 9783030086022 
830 0 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
856 4 0 |u https://doi.org/10.1007/978-3-319-78021-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-LCR 
950 |a Law and Criminology (Springer-41177)