Book description
Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives.
Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.
- Hot topics like cyber terrorism, Big Data, and Somali pirates, addressed in terms the layperson can understand, with solid research grounding
- Fills a gap in existing literature on intelligence, technology, and national security
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Acknowledgments
- About the Authors
- Foreword
- Chapter 1. Introduction: Strategy Formation in a Globalized and Networked Age—A Review of the Concept and its Definition
-
Section One: National Security Strategies and Issues
- Chapter 2. Securing the State: Strategic Responses for an Interdependent World
- Chapter 3. We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security
- Chapter 4. An Age of Asymmetric Challenges—4th Generation Warfare at Sea
- Chapter 5. Port and Border Security: The First and Last Line of National Security Defense
-
Section Two: The Public, Communication, Risk, and National Security
- Chapter 6. Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices
- Chapter 7. Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism
- Chapter 8. From Local to Global: Community-based Policing and National Security
- Chapter 9. The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts
- Chapter 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities
-
Section Three: Technologies, Information, and Knowledge for National Security
- Chapter 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication
- Chapter 12. Exploring the Crisis Management/Knowledge Management Nexus
- Chapter 13. A Semantic Approach to Security Policy Reasoning
- Chapter 14. The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation
- Chapter 15. Exploiting Intelligence for National Security
-
Chapter 16. Re-thinking Standardization for Interagency Information Sharing
- Introduction
- Situation awareness and intelligence gathering
- Sources of intelligence data
- Creating value-added information
- Recognizing developing threats
- The benefits of structured data
- The limitations of data structuring
- The particular problems of natural language information
- An agency is not an island
- A nation is not an island…
- Specific problems in with natural language information
- Finding a common representation
- A solution for security and law enforcement out of nato
- C2LG: A solution for security and law enforcement
- C2LG Variant: a language for intelligence and law enforcement
- C2LG Variant: crisis management language
- Conclusions
-
Section Four: Future Threats and Cyber Security
- Chapter 17. Securing Cyberspace: Strategic Responses for a Digital Age
- Chapter 18. National Cyber Defense Strategy
- Chapter 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations
- Chapter 20. Cyber Security Countermeasures to Combat Cyber Terrorism
- Chapter 21. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals
- Chapter 22. Conclusion: National Security in the Networked Society
- References
- Index
Product information
- Title: Strategic Intelligence Management
- Author(s):
- Release date: January 2013
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780124072190
You might also like
book
Strategic Intelligence for the Future 1
Information in all its forms is at the heart of the economic intelligence process. It is …
book
Corporate Security Intelligence and Strategic Decision Making
Despite a clear and compelling need for an intelligence-led approach to security, operational, and reputational risks, …
book
Strategic Intelligence for the Future 2
Information in all its forms is at the heart of the economic intelligence process. It is …
book
Strategic Analytics
More than ever, data drives decisions in organizations—and we have more data, and more ways to …