You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
On April 20, 2010, the crew of the floating drill rig Deepwater Horizon lost control of the Macondo oil well forty miles offshore in the Gulf of Mexico. Escaping gas and oil ignited, destroying the rig, killing eleven crew members, and injuring dozens more. The emergency spiraled into the worst human-made economic and ecological disaster in Gulf Coast history. Senior systems engineers Earl Boebert and James Blossom offer the most comprehensive account to date of BP’s Deepwater Horizon oil spill. Sifting through a mountain of evidence generated by the largest civil trial in U.S. history, the authors challenge the commonly accepted explanation that the crew, operating under pressure to cut c...
After a major disaster, when investigators are piecing together the story of what happened, a striking fact often emerges: before disaster struck, some people in the organization involved were aware of dangerous conditions that had the potential to escalate to a critical level. But for a variety of reasons, this crucial information did not reach decision-makers. So, the organization moved ever closer to catastrophe, effectively unaware of the possible threat—despite the fact that some of its employees could see it coming. What is the problem with communication about risk in an organization, and why does this problem exist? What stops people in organizations or project teams from freely rep...
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the poss...
Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.
When you visit the doctor, information about you may be recorded in an office computer. Your tests may be sent to a laboratory or consulting physician. Relevant information may be transmitted to your health insurer or pharmacy. Your data may be collected by the state government or by an organization that accredits health care or studies medical costs. By making information more readily available to those who need it, greater use of computerized health information can help improve the quality of health care and reduce its costs. Yet health care organizations must find ways to ensure that electronic health information is not improperly divulged. Patient privacy has been an issue since the oath...
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book co...
Whether or not you use a computer, you probably use a telephone, electric power, and a bank. Although you may not be aware of their presence, networked computer systems are increasingly becoming an integral part of your daily life. Yet, if such systems perform poorly or don't work at all, then they can put life, liberty, and property at tremendous risk. Is the trust that weâ€"as individuals and as a societyâ€"are placing in networked computer systems justified? And if it isn't, what can we do to make such systems more trustworthy? This book provides an assessment of the current state of the art procedures for building trustworthy networked information systems. It proposes directions fo...
In this provocative and original study, George A. Gonzalez argues that the relationship between energy and the state, as well as global politics, has become more and more deeply intertwined, reaching something of a crescendo with the global hegemony of Pax Americana in the twentieth and early twenty-first centuries. He presents a clear and concise case for viewing the modern state as the collaborative and affirmative union of capitalism and political authority in a setting where energy resources, be it wind, coal, or oil, provide the basis for the relatively inexpensive projection of political power. More broadly, energy serves as the foundation of the modern economy and, because of this, a prime function of the modern state is ensuring access to cheap, reliable sources to power and grow the economy. Historically, energy is more of a zero-sum resource than capital, markets, labor, or technology, and thus is a greater source of geopolitical tension and violence. Energy politics, and by extension international politics is, moreover, shaped by domestic corporate elites, especially those within the United States.
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data ...