You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This handbook offers insights into how science (physical, natural and social) and technology can support new developments to manage the complexity resident within the threat and risk landscape. The security landscape can be described as dynamic and complex stemming from the emerging threats and risks that are both persistent and transborder. Globalization, climate change, terrorism, transnational crime can have significant societal impact and forces one to re-evaluate what ‘national security’ means. Recent global events such as mass migration, terrorist acts, pandemics and cyber threats highlight the inherent vulnerabilities in our current security posture. As an interdisciplinary body o...
The present work will discuss relevant theoretical frameworks and applications pertaining to enabling resilience within the risk, crisis and disaster management domain. The contributions to this book focus on resilience thinking along 4 broad themes: Urban Domain; Cyber Domain; Organizational/Social domain; and Socio-ecological domain. This book would serve as a valuable reference for courses on risk, crisis and disaster management, international development, social innovation and resilience. This will be of particular interest to those working in the risk, crisis and disaster management domain as it will provide valuable insights into enabling resilience. This book will be well positioned to inform disaster management professionals, policy makers and academics on strategies and perspectives regarding disaster resilience.
For millennia, humans waged war on land and sea. The 20th century opened the skies and the stars, introducing air and space as warfare domains. Now, the 21st century has revealed perhaps the most insidious domain of all: cyberspace, the fifth domain. A realm free of physical boundaries, cyberspace lies at the intersection of technology and psychology, where one cannot see one’s enemy, and the most potent weapon is information. The third book in the Great Power Competition series, Cyberspace: The Fifth Domain, explores the emergence of cyberspace as a vector for espionage, sabotage, crime, and war. It examines how cyberspace rapidly evolved from a novelty to a weapon capable of influencing ...
Lessons Learned from Afghanistan: America’s Longest War examines the lessons of how America’s “longest war” came to an ignominious end with staggering consequences for the United States and the Afghan nation. Afghanistan today faces an unprecedented humanitarian crisis, looming threat of a civil war and a resurgence of violent extremism organizations similar to pre-9/11. As the U.S. enters a new era in the strategic geopolitical Great Power Competition, an analysis of the original mission intent, shifting policy and strategic objectives, and ineffective implementation of security, political and economic programs reveal critical lessons and questions such as: What led to the “strate...
This book explores types of disruptions in defence and security, ways to assess disruptions triggered by technological advancements or the lack of legal frameworks; the consequent delays or disruptions to making decisions, creative idea generation and finally the innovative pathways to counter such disruptions. What do disruption, ideation and innovation have in common? How do disruptions, ideas and innovation coexist within defence and security? They all influence and impact decision-making. Disruptions drive decision-making. Ideation raises solutions to resolve the disruptions and innovation brings ideas into life. While disruptions may be common place in the business world, where disrupti...
Even before the outbreak of the COVID-19 pandemic, the Central Region faced numerous obstacles to building a stable and prosperous future. The region, which encompasses the Middle East, the Horn of Africa, Central Asia, and South Asia, has been plagued by economic and political uncertainty amidst dramatic shifts in the global power structure. With the pandemic now exacerbating the volatility in this already fragile region, the U.S.'s strategic objectives are rife for re-examination. A complicated stew of factors such as weakening of established governance systems, the emboldening of extremist individuals and groups through advances in digital technology, the humanitarian crises in Afghanista...
This book provides the conceptual framework and a comprehensive guide to the principles, methods and tools for managing organizations. The authors introduce “New Knowledge” by presenting a methodology, 'The Decalogue’, that portrays a genuinely systemic approach for managing complexity in organizations and Value Chains through focusing on the management of a leverage point called constraint (Theory of Constraints) and the understanding of variation (Theory of Profound Knowledge). This systemic approach leverages the intrinsic process and project-based nature of the work of organizations. Functional hierarchy is replaced by a network-like structure, driven by the goal of the system and ...
Understanding Criminal Networks is a short methodological primer for those interested in studying illicit, deviant, covert, or criminal networks using social network analysis (SNA). Accessibly written by Gisela Bichler, a leading expert in SNA for dark networks, the book is chock-full of graphics, checklists, software tips, step-by-step guidance, and straightforward advice. Covering all the essentials, each chapter highlights three themes: the theoretical basis of networked criminology, methodological issues and useful analytic tools, and producing professional analysis. Unlike any other book on the market, the book combines conceptual and empirical work with advice on designing networking studies, collecting data, and analysis. Relevant, practical, theoretical, and methodologically innovative, Understanding Criminal Networks promises to jumpstart readers’ understanding of how to cross over from conventional investigations of crime to the study of criminal networks.
This book constitutes the thoroughly refereed proceedings of the 5th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2013, held in Vilamoura, Portugal, in September 2013. The 27 full papers presented together with two invited papers were carefully reviewed and selected from 239 submissions. The papers are organized in topical sections on knowledge discovery and information retrieval; knowledge engineering and ontology development; knowledge management and information sharing.
Türkiye successfully conducted both presidential and parliamentarian elections on May 14, the second elections since the change of the governmental system, so completing yet another election process without encountering significant issues. The People’s Alliance led by AK Party has secured the majority in the legislative body, the Grand National Assembly of Türkiye. Although President Recep Tayyip Erdoğan came first in the first round of the presidential elections, he could not pass the 50 percent threshold. President Erdoğan received 52 percent of the votes after the runoff elections on May 28. Thus, both President Erdoğan and AK Party, which has won all general elections since 2002, ...