Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security by design = innovative pers...
~
SpringerLink (Online service)
Security by design = innovative perspectives on complex problems /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Security by design/ edited by Anthony J. Masys.
Reminder of title:
innovative perspectives on complex problems /
other author:
Masys, Anthony J.
Published:
Cham :Springer International Publishing : : 2018.,
Description:
vi, 401 p. :digital ; : 24 cm.;
Contained By:
Springer eBooks
Subject:
Security systems. -
Online resource:
http://dx.doi.org/10.1007/978-3-319-78021-4
ISBN:
9783319780214
Security by design = innovative perspectives on complex problems /
Security by design
innovative perspectives on complex problems /[electronic resource] :edited by Anthony J. Masys. - Cham :Springer International Publishing :2018. - vi, 401 p. :digital ;24 cm. - Advanced sciences and technologies for security applications,1613-5113. - Advanced sciences and technologies for security applications..
Chapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Warden's Concentric Ring Theory to Applegate's Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security - designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing 'Deliverology' for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing.
This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects."
ISBN: 9783319780214
Standard No.: 10.1007/978-3-319-78021-4doiSubjects--Topical Terms:
716291
Security systems.
LC Class. No.: HV8290
Dewey Class. No.: 621.3892
Security by design = innovative perspectives on complex problems /
LDR
:03962nam a2200301 a 4500
001
927872
003
DE-He213
005
20190125163454.0
006
m d
007
cr nn 008maaau
008
190626s2018 gw s 0 eng d
020
$a
9783319780214
$q
(electronic bk.)
020
$a
9783319780207
$q
(paper)
024
7
$a
10.1007/978-3-319-78021-4
$2
doi
035
$a
978-3-319-78021-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV8290
082
0 4
$a
621.3892
$2
23
090
$a
HV8290
$b
.S446 2018
245
0 0
$a
Security by design
$h
[electronic resource] :
$b
innovative perspectives on complex problems /
$c
edited by Anthony J. Masys.
260
$a
Cham :
$c
2018.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
vi, 401 p. :
$b
digital ;
$c
24 cm.
490
1
$a
Advanced sciences and technologies for security applications,
$x
1613-5113
505
0
$a
Chapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Warden's Concentric Ring Theory to Applegate's Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security - designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing 'Deliverology' for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing.
520
$a
This edited book captures salient global security challenges and presents 'design' solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects."
650
0
$a
Security systems.
$3
716291
650
0
$a
Private security services.
$3
639664
650
0
$a
Crisis management.
$3
584249
650
1 4
$a
Criminology and Criminal Justice.
$3
1113744
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Software Management.
$3
1069200
650
2 4
$a
Simulation and Modeling.
$3
669249
700
1
$a
Masys, Anthony J.
$3
1024532
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
830
0
$a
Advanced sciences and technologies for security applications.
$3
1103354
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-78021-4
950
$a
Law and Criminology (Springer-41177)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login