COVID-19 Update: We are currently shipping orders daily. However, due to transit disruptions in some geographies, deliveries may be delayed. To provide all customers with timely access to content, we are offering 50% off Science and Technology Print & eBook bundle options. Terms & conditions.
Strategic Intelligence Management - 1st Edition - ISBN: 9780124071919, 9780124072190

Strategic Intelligence Management

1st Edition

National Security Imperatives and Information and Communications Technologies

Editors: Babak Akhgar Simeon Yates
Hardcover ISBN: 9780124071919
eBook ISBN: 9780124072190
Imprint: Butterworth-Heinemann
Published Date: 11th March 2013
Page Count: 340
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST

Institutional Subscription

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives.

Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.

Key Features

  • Hot topics like cyber terrorism, Big Data, and Somali pirates, addressed in terms the layperson can understand, with solid research grounding
  • Fills a gap in existing literature on intelligence, technology, and national security


Students in homeland security and national security as well as information security programs in US and EMEA; law enforcement and intelligence practitioners in US, UK, & Europe

Table of Contents




About the Authors


Chapter 1. Introduction: Strategy Formation in a Globalized and Networked Age—A Review of the Concept and its Definition


National strategy and strategy formulation process

National security

Strategic intelligence

Interconnected world

National security, ICT, and strategy

Section One: National Security Strategies and Issues

Chapter 2. Securing the State: Strategic Responses for an Interdependent World

A catalyst for change

Lessons learned

Contesting terror

National security frameworks

Strategic responses

National security machinery

Security context today

From threat to threat

Challenges ahead

Chapter 3. We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security


Defining the insider threat

The amerithrax case


Chapter 4. An Age of Asymmetric Challenges—4th Generation Warfare at Sea


Definitions: from naval AW to MIAS

Case study: the indian-pacific and sea lines of communication security

Discussion: from asymmetries and irregularities to 4GW

3GW reloaded: a caveat

Conclusion: the perils of “swimming in the instantaneousness of postmodernism”

Chapter 5. Port and Border Security: The First and Last Line of National Security Defense

A new era

Second wave

Independent review

Trans-atlantic terror

Securing the border

All hazards approach

Section Two: The Public, Communication, Risk, and National Security

Chapter 6. Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices


Risk communication: a pillar of national security

The importance of effective risk communication

Risk perception: a foundation for understanding public responses to extreme events

Behavior: understanding likely public responses to extreme events

Risk communication in practice

Chapter 7. Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism


Beyond prevention and security in counterterrorism: promoting public resilience and managing risk

Resilience and the role of the public

Public perceptions, risk communication, and the promotion of resilience

Conclusions: public resilience, CBRN, and human factors

Chapter 8. From Local to Global: Community-based Policing and National Security


Policing by consent, community, and prevent

Devilry through the dark web: preventing online radicalization

Implications of online behavior for national security


Chapter 9. The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts


Lessons from past crisis situations

The role of ICT tools and social media in crisis

The iSAR + Way: approaching a multidimensional problem


About the contributors

Chapter 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities


A brief survey of emerging surveillance technologies

Nongovernmental organization policy research: intervention and accountability on surveillance

Human rights and surveillance technologies


Section Three: Technologies, Information, and Knowledge for National Security

Chapter 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication

User requirements elicitation

Conducting user requirements elicitation

Security case study

Identifying training needs




Chapter 12. Exploring the Crisis Management/Knowledge Management Nexus


Crisis management

Knowledge management

Concluding reflections: implications for CM

Chapter 13. A Semantic Approach to Security Policy Reasoning


Current approaches

Best practice

Business rules

Enterprise architecture frameworks

Threats, vulnerabilities, and security concepts in cgs

Financial trading case study

Security reasoning with the ft transaction graph

Business rule and evolving security policy

Concluding remarks

Chapter 14. The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation


The athena vision

Architecture narrative

Formal concept analysis

Formal concept analysis for deriving crisis information

Building on prior projects


Chapter 15. Exploiting Intelligence for National Security

Big data: challenges and opportunities


Chapter 16. Re-thinking Standardization for Interagency Information Sharing


Situation awareness and intelligence gathering

Sources of intelligence data

Creating value-added information

Recognizing developing threats

The benefits of structured data

The limitations of data structuring

The particular problems of natural language information

An agency is not an island

A nation is not an island…

Specific problems in with natural language information

Finding a common representation

A solution for security and law enforcement out of nato

C2LG: A solution for security and law enforcement

C2LG Variant: a language for intelligence and law enforcement

C2LG Variant: crisis management language


Section Four: Future Threats and Cyber Security

Chapter 17. Securing Cyberspace: Strategic Responses for a Digital Age

Cyber terror

Cyber threats

Strategic responses

A new approach

UK Cyber security guiding principles

Cyber collaboration

Chapter 18. National Cyber Defense Strategy


Training cyber defense professionals

Types of cyber warrior


Chapter 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations



Chapter 20. Cyber Security Countermeasures to Combat Cyber Terrorism


Cyberphysical attacks

Malware candidates for cyber terrorism

The insider threat

Countermeasures to combat cyber terrorism

The future

Key issues

Chapter 21. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals


Crime prevention theories

Crime prevention models

Challenges facing preventive measures



Chapter 22. Conclusion: National Security in the Networked Society

National security today and in the future

The public, threats, and new media

Deploying network technologies for national security

Threats to the infrastructure of the networked society





No. of pages:
© Butterworth-Heinemann 2013
11th March 2013
Hardcover ISBN:
eBook ISBN:

About the Editors

Babak Akhgar

Babak Akhgar is Professor of Informatics and Director of CENTRIC (Center of Excellence in Terrorism, Resilience, Intelligence and Organized Crime Research) at Sheffield Hallam University (UK) and Fellow of the British Computer Society. He has more than 100 refereed publications in international journals and conferences on information systems with specific focus on knowledge management (KM). He is member of editorial boards of several international journals and has acted as Chair and Program Committee Member for numerous international conferences. He has extensive and hands-on experience in the development, management and execution of KM projects and large international security initiatives (e.g., the application of social media in crisis management, intelligence-based combating of terrorism and organized crime, gun crime, cyber-crime and cyber terrorism and cross cultural ideology polarization). In addition to this he is the technical lead of two EU Security projects: “Courage” on Cyber-Crime and Cyber-Terrorism and “Athena” onthe Application of Social Media and Mobile Devices in Crisis Management. He has co-edited several books on Intelligence Management.. His recent books are titled “Strategic Intelligence Management (National Security Imperatives and Information and Communications Technologies)”, “Knowledge Driven Frameworks for Combating Terrorism and Organised Crime” and “Emerging Trends in ICT Security”. Prof Akhgar is member of the academic advisory board of SAS UK.

Affiliations and Expertise

Professor of Informatics, Sheffield Hallam University, Sheffield, UK

Simeon Yates

Simeon Yates was formerly at Sheffield Hallam University and CENTRIC, and is now Director of the Institute of Cultural Capital, a strategic collaboration between Liverpool John Moores University and

the University of Liverpool (UK).


" important work and should be of interest to public officials, executives in the private sector, and others who have a serious appetite for a broader and deeper understanding of the security challenges we are all facing."--Security Management, Strategic Intelligence Management

"International contributors in computing, communications systems, criminology, and emergency medicine provide a detailed overview for scholars, policy makers, and those in law, security, government, and business. The book examines current issues of national security strategy in the context of new global communication networks and global connections among regions and resources."--Reference & Research Book News, December 2013

Ratings and Reviews