| |
| |
Acknowledments | |
| |
| |
About the Authors | |
| |
| |
Foreword | |
| |
| |
| |
Introduction: Strategy Formation in a Globalized and Networked Age-A Review of the Concept and its Definition | |
| |
| |
| |
| |
National Security Strategies and Issues | |
| |
| |
| |
Securing the State: Strategic Responses for an Interdependent World | |
| |
| |
| |
| |
We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security | |
| |
| |
| |
| |
An Age of Asymmetric Challenges-4th Generation Warfare at Sea | |
| |
| |
| |
| |
Port and Border Security: The First and Last Line of National Security Defense | |
| |
| |
| |
| |
The Public, Communication, Risk, and National Security | |
| |
| |
| |
Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices | |
| |
| |
| |
| |
Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism | |
| |
| |
| |
| |
From Local to Global: Community-based Policing and National Security | |
| |
| |
| |
| |
The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts | |
| |
| |
| |
| |
Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities | |
| |
| |
| |
| |
Technologies, Information, and Knowledge for National Security | |
| |
| |
| |
User Requirements and Training Needs within Security Applications: Methods for Capture and Communication | |
| |
| |
| |
| |
Exploring the Crisis Management/Knowledge Management Nexus | |
| |
| |
| |
| |
A Semantic Approach to Security Policy Reasoning | |
| |
| |
| |
| |
The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation | |
| |
| |
| |
| |
Exploiting Intelligence for National Security | |
| |
| |
| |
| |
Re-thinking Standardization for Interagency Information Sharing | |
| |
| |
| |
| |
Future Threats and Cyber Security | |
| |
| |
| |
Securing Cyberspace: Strategic Responses for a Digital Age | |
| |
| |
| |
| |
National Cyber Defense Strategy | |
| |
| |
| |
| |
From Cyber Terrorism to State Actors' Covert Cyber Operations | |
| |
| |
| |
| |
Cyber Security Countermeasures to Combat Cyber Terrorism | |
| |
| |
| |
| |
Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals | |
| |
| |
| |
| |
Conclusion: National Security in the Networked Society | |
| |
| |
| |
References | |
| |
| |
Index | |