語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security by Design = Innovative Pers...
~
Masys, Anthony J.
Security by Design = Innovative Perspectives on Complex Problems /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security by Design/ edited by Anthony J. Masys.
其他題名:
Innovative Perspectives on Complex Problems /
其他作者:
Masys, Anthony J.
面頁冊數:
VI, 401 p. 115 illus., 93 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer crimes. -
電子資源:
https://doi.org/10.1007/978-3-319-78021-4
ISBN:
9783319780214
Security by Design = Innovative Perspectives on Complex Problems /
Security by Design
Innovative Perspectives on Complex Problems /[electronic resource] :edited by Anthony J. Masys. - 1st ed. 2018. - VI, 401 p. 115 illus., 93 illus. in color.online resource. - Advanced Sciences and Technologies for Security Applications,1613-5113. - Advanced Sciences and Technologies for Security Applications,.
Chapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Warden’s Concentric Ring Theory to Applegate’s Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security – designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing ‘Deliverology’ for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing.
This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects." .
ISBN: 9783319780214
Standard No.: 10.1007/978-3-319-78021-4doiSubjects--Topical Terms:
564161
Computer crimes.
LC Class. No.: HV6772-6773.3
Dewey Class. No.: 364.168
Security by Design = Innovative Perspectives on Complex Problems /
LDR
:04502nam a22004215i 4500
001
991683
003
DE-He213
005
20200703111125.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319780214
$9
978-3-319-78021-4
024
7
$a
10.1007/978-3-319-78021-4
$2
doi
035
$a
978-3-319-78021-4
050
4
$a
HV6772-6773.3
072
7
$a
JKV
$2
bicssc
072
7
$a
SOC004000
$2
bisacsh
072
7
$a
JKV
$2
thema
072
7
$a
LNQE
$2
thema
082
0 4
$a
364.168
$2
23
245
1 0
$a
Security by Design
$h
[electronic resource] :
$b
Innovative Perspectives on Complex Problems /
$c
edited by Anthony J. Masys.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
VI, 401 p. 115 illus., 93 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
505
0
$a
Chapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Warden’s Concentric Ring Theory to Applegate’s Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security – designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing ‘Deliverology’ for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing.
520
$a
This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects." .
650
0
$a
Computer crimes.
$3
564161
650
0
$a
System safety.
$3
639363
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Management information systems.
$3
561123
650
0
$a
Computer simulation.
$3
560190
650
1 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Security Science and Technology.
$3
783419
650
2 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Software Management.
$3
1069200
650
2 4
$a
Simulation and Modeling.
$3
669249
700
1
$a
Masys, Anthony J.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1024532
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319780207
776
0 8
$i
Printed edition:
$z
9783319780221
776
0 8
$i
Printed edition:
$z
9783030086022
830
0
$a
Advanced Sciences and Technologies for Security Applications,
$x
1613-5113
$3
1266773
856
4 0
$u
https://doi.org/10.1007/978-3-319-78021-4
912
$a
ZDB-2-LCR
912
$a
ZDB-2-SXLC
950
$a
Law and Criminology (SpringerNature-41177)
950
$a
Law and Criminology (R0) (SpringerNature-43727)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入