Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1758
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMasys, Anthony J. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:32:22Z-
dc.date.available2020-05-17T08:32:22Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319780214 ;en_US
dc.identifier.isbn9783319780207 (Print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1758-
dc.descriptionQA76en_US
dc.descriptionHdig ; SFX ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; Security by Design ; 9783319780207 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis edited book captures salient global security challenges and presents design solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects." . ;en_US
dc.description.statementofresponsibilityedited by Anthony J. Masys.en_US
dc.description.tableofcontentsChapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Wardens Concentric Ring Theory to Applegates Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing Deliverology for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing. ;en_US
dc.format.extentVI, 401 p. 115 illus., 93 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesAdvanced Sciences and Technologies for Security Applications, ; 1613-5113 ;en_US
dc.relation.ispartofseriesAdvanced Sciences and Technologies for Security Applications, ; 1613-5113 ;en_US
dc.relation.haspart9783319780207.pdfen_US
dc.subjectManagement Information Systemsen_US
dc.subjectComputer simulation. ;en_US
dc.subjectSystem safety. ;en_US
dc.subjectComputational intelligence. ;en_US
dc.subjectComputer crimes. ;en_US
dc.subjectCriminology and Criminal Justice. ;en_US
dc.subjectCybercrime. ;en_US
dc.subjectSecurity Science and Technology. ;en_US
dc.subjectComputational Intelligence. ;en_US
dc.subjectSoftware Management. ;en_US
dc.subjectSimulation and Modeling. ;en_US
dc.titleSecurity by Designen_US
dc.title.alternativeInnovative Perspectives on Complex Problems /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319780207.pdf9.88 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMasys, Anthony J. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:32:22Z-
dc.date.available2020-05-17T08:32:22Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319780214 ;en_US
dc.identifier.isbn9783319780207 (Print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1758-
dc.descriptionQA76en_US
dc.descriptionHdig ; SFX ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; Security by Design ; 9783319780207 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis edited book captures salient global security challenges and presents design solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects." . ;en_US
dc.description.statementofresponsibilityedited by Anthony J. Masys.en_US
dc.description.tableofcontentsChapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Wardens Concentric Ring Theory to Applegates Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing Deliverology for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing. ;en_US
dc.format.extentVI, 401 p. 115 illus., 93 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesAdvanced Sciences and Technologies for Security Applications, ; 1613-5113 ;en_US
dc.relation.ispartofseriesAdvanced Sciences and Technologies for Security Applications, ; 1613-5113 ;en_US
dc.relation.haspart9783319780207.pdfen_US
dc.subjectManagement Information Systemsen_US
dc.subjectComputer simulation. ;en_US
dc.subjectSystem safety. ;en_US
dc.subjectComputational intelligence. ;en_US
dc.subjectComputer crimes. ;en_US
dc.subjectCriminology and Criminal Justice. ;en_US
dc.subjectCybercrime. ;en_US
dc.subjectSecurity Science and Technology. ;en_US
dc.subjectComputational Intelligence. ;en_US
dc.subjectSoftware Management. ;en_US
dc.subjectSimulation and Modeling. ;en_US
dc.titleSecurity by Designen_US
dc.title.alternativeInnovative Perspectives on Complex Problems /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319780207.pdf9.88 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMasys, Anthony J. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:32:22Z-
dc.date.available2020-05-17T08:32:22Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319780214 ;en_US
dc.identifier.isbn9783319780207 (Print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1758-
dc.descriptionQA76en_US
dc.descriptionHdig ; SFX ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionPrinted edition: ; Security by Design ; 9783319780207 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis edited book captures salient global security challenges and presents design solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects." . ;en_US
dc.description.statementofresponsibilityedited by Anthony J. Masys.en_US
dc.description.tableofcontentsChapter 1: Principles of Design Thinking -- Chapter 2: An Integral Futures lens on the future security issues -- Chapter 3: Innovations in Active Shooting Emergency Medical Response and Triage -- Chapter 4: Mass Migration, Humanitarian Assistance and Crisis Management: Embracing Social Innovation and Organizational Learning -- Chapter 5: system dynamic humanitarian aid -- Chapter 6: Cyber-Physical Systems Governance: A Framework for (meta)CyberSecurity Design -- Chapter 7: To feel secure or to be secure, that is the question -- Chapter 8: Clustering Heterogeneous Semi-Structured Social Science Datasets for Security Applications -- Chapter 9: Critical Infrastructure and Resilience: integrating interdependencies -- Chapter 10: The Application of Wardens Concentric Ring Theory to Applegates Offensive Cyber Maneuver Strategy in Modern Conflicts -- Chapter 11: Fentanyl Crisis: a National Security matter -- Chapter 12: Risk-based aviation security designing-out terror -- Chapter 13: Customizing Web-EOC Crisis Management Software to Facilitate Collaboration and Increase Situational Awareness: Advances in Business Resource Center (BRC) Design for Business Continuity Management -- Chapter 14 Advances in Cybersecurity Design: An Integrated Framework to Quantify the Economic Impacts of Cyber-terrorist Behavior -- Chapter 15: Operationalizing Deliverology for Humanitarian Aid and Disaster Risk Reduction: Accelerating improvement in delivery -- Chapter 16: Nuclear Waste Management: Security and Safety Implications -- Chapter 17: Building Effective Emergency Management Public-Private Partnerships (PPP) for Information Sharing. ;en_US
dc.format.extentVI, 401 p. 115 illus., 93 illus. in color. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesAdvanced Sciences and Technologies for Security Applications, ; 1613-5113 ;en_US
dc.relation.ispartofseriesAdvanced Sciences and Technologies for Security Applications, ; 1613-5113 ;en_US
dc.relation.haspart9783319780207.pdfen_US
dc.subjectManagement Information Systemsen_US
dc.subjectComputer simulation. ;en_US
dc.subjectSystem safety. ;en_US
dc.subjectComputational intelligence. ;en_US
dc.subjectComputer crimes. ;en_US
dc.subjectCriminology and Criminal Justice. ;en_US
dc.subjectCybercrime. ;en_US
dc.subjectSecurity Science and Technology. ;en_US
dc.subjectComputational Intelligence. ;en_US
dc.subjectSoftware Management. ;en_US
dc.subjectSimulation and Modeling. ;en_US
dc.titleSecurity by Designen_US
dc.title.alternativeInnovative Perspectives on Complex Problems /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319780207.pdf9.88 MBAdobe PDFThumbnail
Preview File