Strategic Intelligence Management

Strategic Intelligence Management

National Security Imperatives and Information and Communications Technologies

1st Edition - January 17, 2013

Write a review

  • Editors: Babak Akhgar, Simeon Yates
  • Hardcover ISBN: 9780124071919
  • eBook ISBN: 9780124072190

Purchase options

Purchase options
Available
DRM-free (Mobi, PDF, EPub)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives. Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.

Key Features

  • Hot topics like cyber terrorism, Big Data, and Somali pirates, addressed in terms the layperson can understand, with solid research grounding
  • Fills a gap in existing literature on intelligence, technology, and national security

Readership

Students in homeland security and national security as well as information security programs in US and EMEA; law enforcement and intelligence practitioners in US, UK, & Europe

Table of Contents

  • Acknowledgments

    Organizations

    People

    About the Authors

    Foreword

    Chapter 1. Introduction: Strategy Formation in a Globalized and Networked Age—A Review of the Concept and its Definition

    Introduction

    National strategy and strategy formulation process

    National security

    Strategic intelligence

    Interconnected world

    National security, ICT, and strategy

    Section One: National Security Strategies and Issues

    Chapter 2. Securing the State: Strategic Responses for an Interdependent World

    A catalyst for change

    Lessons learned

    Contesting terror

    National security frameworks

    Strategic responses

    National security machinery

    Security context today

    From threat to threat

    Challenges ahead

    Chapter 3. We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security

    Introduction

    Defining the insider threat

    The amerithrax case

    Summary

    Chapter 4. An Age of Asymmetric Challenges—4th Generation Warfare at Sea

    Introduction

    Definitions: from naval AW to MIAS

    Case study: the indian-pacific and sea lines of communication security

    Discussion: from asymmetries and irregularities to 4GW

    3GW reloaded: a caveat

    Conclusion: the perils of “swimming in the instantaneousness of postmodernism”

    Chapter 5. Port and Border Security: The First and Last Line of National Security Defense

    A new era

    Second wave

    Independent review

    Trans-atlantic terror

    Securing the border

    All hazards approach

    Section Two: The Public, Communication, Risk, and National Security

    Chapter 6. Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices

    Introduction

    Risk communication: a pillar of national security

    The importance of effective risk communication

    Risk perception: a foundation for understanding public responses to extreme events

    Behavior: understanding likely public responses to extreme events

    Risk communication in practice

    Chapter 7. Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism

    Introduction

    Beyond prevention and security in counterterrorism: promoting public resilience and managing risk

    Resilience and the role of the public

    Public perceptions, risk communication, and the promotion of resilience

    Conclusions: public resilience, CBRN, and human factors

    Chapter 8. From Local to Global: Community-based Policing and National Security

    Introduction

    Policing by consent, community, and prevent

    Devilry through the dark web: preventing online radicalization

    Implications of online behavior for national security

    Conclusion

    Chapter 9. The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts

    Introduction

    Lessons from past crisis situations

    The role of ICT tools and social media in crisis

    The iSAR + Way: approaching a multidimensional problem

    Conclusion

    About the contributors

    Chapter 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities

    Introduction

    A brief survey of emerging surveillance technologies

    Nongovernmental organization policy research: intervention and accountability on surveillance

    Human rights and surveillance technologies

    Conclusions

    Section Three: Technologies, Information, and Knowledge for National Security

    Chapter 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication

    User requirements elicitation

    Conducting user requirements elicitation

    Security case study

    Identifying training needs

    Discussion

    Conclusion

    Acknowledgments

    Chapter 12. Exploring the Crisis Management/Knowledge Management Nexus

    Introduction

    Crisis management

    Knowledge management

    Concluding reflections: implications for CM

    Chapter 13. A Semantic Approach to Security Policy Reasoning

    Introduction

    Current approaches

    Best practice

    Business rules

    Enterprise architecture frameworks

    Threats, vulnerabilities, and security concepts in cgs

    Financial trading case study

    Security reasoning with the ft transaction graph

    Business rule and evolving security policy

    Concluding remarks

    Chapter 14. The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation

    Introduction

    The athena vision

    Architecture narrative

    Formal concept analysis

    Formal concept analysis for deriving crisis information

    Building on prior projects

    Conclusion

    Chapter 15. Exploiting Intelligence for National Security

    Big data: challenges and opportunities

    Discussion

    Chapter 16. Re-thinking Standardization for Interagency Information Sharing

    Introduction

    Situation awareness and intelligence gathering

    Sources of intelligence data

    Creating value-added information

    Recognizing developing threats

    The benefits of structured data

    The limitations of data structuring

    The particular problems of natural language information

    An agency is not an island

    A nation is not an island…

    Specific problems in with natural language information

    Finding a common representation

    A solution for security and law enforcement out of nato

    C2LG: A solution for security and law enforcement

    C2LG Variant: a language for intelligence and law enforcement

    C2LG Variant: crisis management language

    Conclusions

    Section Four: Future Threats and Cyber Security

    Chapter 17. Securing Cyberspace: Strategic Responses for a Digital Age

    Cyber terror

    Cyber threats

    Strategic responses

    A new approach

    UK Cyber security guiding principles

    Cyber collaboration

    Chapter 18. National Cyber Defense Strategy

    Introduction

    Training cyber defense professionals

    Types of cyber warrior

    Acknowledgments

    Chapter 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations

    Introduction

    Conclusion

    Chapter 20. Cyber Security Countermeasures to Combat Cyber Terrorism

    Introduction

    Cyberphysical attacks

    Malware candidates for cyber terrorism

    The insider threat

    Countermeasures to combat cyber terrorism

    The future

    Key issues

    Chapter 21. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals

    Introduction

    Crime prevention theories

    Crime prevention models

    Challenges facing preventive measures

    Conclusion

    Acknowledgments

    Chapter 22. Conclusion: National Security in the Networked Society

    National security today and in the future

    The public, threats, and new media

    Deploying network technologies for national security

    Threats to the infrastructure of the networked society

    Conclusion

    References

    Index

Product details

  • No. of pages: 340
  • Language: English
  • Copyright: © Butterworth-Heinemann 2013
  • Published: January 17, 2013
  • Imprint: Butterworth-Heinemann
  • Hardcover ISBN: 9780124071919
  • eBook ISBN: 9780124072190

About the Editors

Babak Akhgar

Babak Akhgar is Professor of Informatics and Director of CENTRIC (Center of Excellence in Terrorism, Resilience, Intelligence and Organized Crime Research) at Sheffield Hallam University (UK) and Fellow of the British Computer Society. He has more than 100 refereed publications in international journals and conferences on information systems with specific focus on knowledge management (KM). He is member of editorial boards of several international journals and has acted as Chair and Program Committee Member for numerous international conferences. He has extensive and hands-on experience in the development, management and execution of KM projects and large international security initiatives (e.g., the application of social media in crisis management, intelligence-based combating of terrorism and organized crime, gun crime, cyber-crime and cyber terrorism and cross cultural ideology polarization). In addition to this he is the technical lead of two EU Security projects: “Courage” on Cyber-Crime and Cyber-Terrorism and “Athena” onthe Application of Social Media and Mobile Devices in Crisis Management. He has co-edited several books on Intelligence Management.. His recent books are titled “Strategic Intelligence Management (National Security Imperatives and Information and Communications Technologies)”, “Knowledge Driven Frameworks for Combating Terrorism and Organised Crime” and “Emerging Trends in ICT Security”. Prof Akhgar is member of the academic advisory board of SAS UK.

Affiliations and Expertise

Professor of Informatics, Sheffield Hallam University, Sheffield, UK

Simeon Yates

Simeon Yates was formerly at Sheffield Hallam University and CENTRIC, and is now Director of the Institute of Cultural Capital, a strategic collaboration between Liverpool John Moores University and

the University of Liverpool (UK).

Ratings and Reviews

Write a review

There are currently no reviews for "Strategic Intelligence Management"