»
Strategic Intelligence Management
 
 

Strategic Intelligence Management, 1st Edition

National Security Imperatives and Information and Communications Technologies

 
Strategic Intelligence Management, 1st Edition,Babak Akhgar,Simeon Yates,ISBN9780124071919
 
 
 

Akhgar   &   Yates   

Butterworth-Heinemann

9780124071919

9780124072190

340

235 X 191

Breaks new ground in managing intelligence through information and communication technologies (ICT) applications!

Print Book + eBook

USD 95.34
USD 158.90

Buy both together and save 40%

Print Book

Hardcover

In Stock

Estimated Delivery Time
USD 79.95

eBook
eBook Overview

VST (VitalSource Bookshelf) format

DRM-free included formats : EPUB, Mobi (for Kindle), PDF

USD 78.95
Add to Cart
 
 

Key Features

  • Hot topics like cyber terrorism, Big Data, and Somali pirates, addressed in terms the layperson can understand, with solid research grounding
  • Fills a gap in existing literature on intelligence, technology, and national security

Description

Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives.

Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.

Readership

Students in homeland security and national security as well as information security programs in US and EMEA; law enforcement and intelligence practitioners in US, UK, & Europe

Babak Akhgar

Babak Akhgar is Professor of Informatics and Director of CENTRIC (Center of Excellence in Terrorism, Resilience, Intelligence and Organized Crime Research) at Sheffield Hallam University (UK) and Fellow of the British Computer Society. He has more than 100 refereed publications in international journals and conferences on information systems with specific focus on knowledge management (KM). He is member of editorial boards of several international journals and has acted as Chair and Program Committee Member for numerous international conferences. He has extensive and hands-on experience in the development, management and execution of KM projects and large international security initiatives (e.g., the application of social media in crisis management, intelligence-based combating of terrorism and organized crime, gun crime, cyber-crime and cyber terrorism and cross cultural ideology polarization). In addition to this he is the technical lead of two EU Security projects: “Courage” on Cyber-Crime and Cyber-Terrorism and “Athena” onthe Application of Social Media and Mobile Devices in Crisis Management. He has co-edited several books on Intelligence Management.. His recent books are titled “Strategic Intelligence Management (National Security Imperatives and Information and Communications Technologies)”, “Knowledge Driven Frameworks for Combating Terrorism and Organised Crime” and “Emerging Trends in ICT Security”. Prof Akhgar is member of the academic advisory board of SAS UK.

Affiliations and Expertise

Professor of Informatics, Sheffield Hallam University, Sheffield, UK

View additional works by Babak Akhgar

Simeon Yates

Simeon Yates was formerly at Sheffield Hallam University and CENTRIC, and is now Director of the Institute of Cultural Capital, a strategic collaboration between Liverpool John Moores University and the University of Liverpool (UK).

Strategic Intelligence Management, 1st Edition

Acknowledgments

Organizations

People

About the Authors

Foreword

Chapter 1. Introduction: Strategy Formation in a Globalized and Networked Age—A Review of the Concept and its Definition

Introduction

National strategy and strategy formulation process

National security

Strategic intelligence

Interconnected world

National security, ICT, and strategy

Section One: National Security Strategies and Issues

Chapter 2. Securing the State: Strategic Responses for an Interdependent World

A catalyst for change

Lessons learned

Contesting terror

National security frameworks

Strategic responses

National security machinery

Security context today

From threat to threat

Challenges ahead

Chapter 3. We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security

Introduction

Defining the insider threat

The amerithrax case

Summary

Chapter 4. An Age of Asymmetric Challenges—4th Generation Warfare at Sea

Introduction

Definitions: from naval AW to MIAS

Case study: the indian-pacific and sea lines of communication security

Discussion: from asymmetries and irregularities to 4GW

3GW reloaded: a caveat

Conclusion: the perils of “swimming in the instantaneousness of postmodernism”

Chapter 5. Port and Border Security: The First and Last Line of National Security Defense

A new era

Second wave

Independent review

Trans-atlantic terror

Securing the border

All hazards approach

Section Two: The Public, Communication, Risk, and National Security

Chapter 6. Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices

Introduction

Risk communication: a pillar of national security

The importance of effective risk communication

Risk perception: a foundation for understanding public responses to extreme events

Behavior: understanding likely public responses to extreme events

Risk communication in practice

Chapter 7. Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism

Introduction

Beyond prevention and security in counterterrorism: promoting public resilience and managing risk

Resilience and the role of the public

Public perceptions, risk communication, and the promotion of resilience

Conclusions: public resilience, CBRN, and human factors

Chapter 8. From Local to Global: Community-based Policing and National Security

Introduction

Policing by consent, community, and prevent

Devilry through the dark web: preventing online radicalization

Implications of online behavior for national security

Conclusion

Chapter 9. The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts

Introduction

Lessons from past crisis situations

The role of ICT tools and social media in crisis

The iSAR + Way: approaching a multidimensional problem

Conclusion

About the contributors

Chapter 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities

Introduction

A brief survey of emerging surveillance technologies

Nongovernmental organization policy research: intervention and accountability on surveillance

Human rights and surveillance technologies

Conclusions

Section Three: Technologies, Information, and Knowledge for National Security

Chapter 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication

User requirements elicitation

Conducting user requirements elicitation

Security case study

Identifying training needs

Discussion

Conclusion

Acknowledgments

Chapter 12. Exploring the Crisis Management/Knowledge Management Nexus

Introduction

Crisis management

Knowledge management

Concluding reflections: implications for CM

Chapter 13. A Semantic Approach to Security Policy Reasoning

Introduction

Current approaches

Best practice

Business rules

Enterprise architecture frameworks

Threats, vulnerabilities, and security concepts in cgs

Financial trading case study

Security reasoning with the ft transaction graph

Business rule and evolving security policy

Concluding remarks

Chapter 14. The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation

Introduction

The athena vision

Architecture narrative

Formal concept analysis

Formal concept analysis for deriving crisis information

Building on prior projects

Conclusion

Chapter 15. Exploiting Intelligence for National Security

Big data: challenges and opportunities

Discussion

Chapter 16. Re-thinking Standardization for Interagency Information Sharing

Introduction

Situation awareness and intelligence gathering

Sources of intelligence data

Creating value-added information

Recognizing developing threats

The benefits of structured data

The limitations of data structuring

The particular problems of natural language information

An agency is not an island

A nation is not an island…

Specific problems in with natural language information

Finding a common representation

A solution for security and law enforcement out of nato

C2LG: A solution for security and law enforcement

C2LG Variant: a language for intelligence and law enforcement

C2LG Variant: crisis management language

Conclusions

Section Four: Future Threats and Cyber Security

Chapter 17. Securing Cyberspace: Strategic Responses for a Digital Age

Cyber terror

Cyber threats

Strategic responses

A new approach

UK Cyber security guiding principles

Cyber collaboration

Chapter 18. National Cyber Defense Strategy

Introduction

Training cyber defense professionals

Types of cyber warrior

Acknowledgments

Chapter 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations

Introduction

Conclusion

Chapter 20. Cyber Security Countermeasures to Combat Cyber Terrorism

Introduction

Cyberphysical attacks

Malware candidates for cyber terrorism

The insider threat

Countermeasures to combat cyber terrorism

The future

Key issues

Chapter 21. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals

Introduction

Crime prevention theories

Crime prevention models

Challenges facing preventive measures

Conclusion

Acknowledgments

Chapter 22. Conclusion: National Security in the Networked Society

National security today and in the future

The public, threats, and new media

Deploying network technologies for national security

Threats to the infrastructure of the networked society

Conclusion

References

Index

Quotes and reviews

"...an important work and should be of interest to public officials, executives in the private sector, and others who have a serious appetite for a broader and deeper understanding of the security challenges we are all facing."--Security Management, Strategic Intelligence Management

"International contributors in computing, communications systems, criminology, and emergency medicine provide a detailed overview for scholars, policy makers, and those in law, security, government, and business. The book examines current issues of national security strategy in the context of new global communication networks and global connections among regions and resources."--Reference & Research Book News, December 2013

 
 
Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy
FAQ

Contact Us