| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990010067210403321 |
|
|
Autore |
Stedman, John Gabriel <1744-1797> |
|
|
Titolo |
4 |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Milano : dalla tipografia di Giambattista Sonzogno, 1818 |
|
|
|
|
|
|
|
Descrizione fisica |
|
259, [1], III c. di tav : ill., color. ; 12° |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910590091503321 |
|
|
Titolo |
Disruption, ideation and innovation for defence and security / / G. Adlakha-Hutcheon, Anthony Masys, editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (298 pages) |
|
|
|
|
|
|
Collana |
|
Advanced sciences and technologies for security applications |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Military policy |
National security |
Security, International |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Contents -- Understanding the Landscape of Disruption, Ideation and Innovation for Defence and Security -- 1 Introduction -- 2 Global National Security Disruptions -- 3 Disruption, Ideation and Innovation -- 4 Section 2: Ideation -- 5 Section 3: Innovation -- References -- Disruption -- System Reliability: A Cold War Lesson -- 1 Introduction -- 2 The 1983 War Scare -- 2.1 Geopolitical Context -- |
|
|
|
|
|
|
|
|
|
2.2 Doctrinal Context -- 2.3 The War Scare -- 3 Conclusions -- References -- Quantum Computing: Unraveling the Hype -- 1 Quantum Computing: Unraveling the Hype -- 1.1 Quantum Computing: Bottom Line Up Front -- 2 Introduction -- 3 Quantum Fundamentals -- 4 Quantum Technology -- 4.1 Quantum Processing Versus Conventional Processing -- 5 Quantum Information Science -- 6 Quantum Computing Ecosystem -- 7 Quantum Computing Architectures -- 7.1 Quantum Hardware Components -- 8 Quantum Computing Software Stack -- 9 Quantum Algorithms -- 10 Current Capabilities, Constraints, and Dependencies -- 11 Some Key Players in Quantum Computing -- 12 Quantum Computing Applications -- 12.1 Molecular Modeling -- 12.2 Cryptography7 -- 12.3 Financial Modeling7 -- 12.4 Weather Forecasting7 -- 12.5 Particle Physics7 -- 12.6 Biomedical Simulations -- 12.7 Post-Quantum Cryptography -- 13 Learning Path for Quantum Computing -- 14 Quantum Computing Security -- 15 Future of Quantum Computing -- 15.1 National Initiatives -- 15.2 Quantum Artificial Intelligence -- 16 Conclusion -- 17 Resources -- References -- Emerging and Disruptive Technologies and Security: Considering Trade-Offs Between New Opportunities and Emerging Risks -- 1 Introduction -- 2 Emerging and Disruptive Technologies and Security: Opportunities and Challenges -- 3 Emerging and Disruptive Technologies in Security and Defence -- 4 The Emerging Technology Arms Race: The Geopolitics of Technology. |
5 The Precarious Nature of Disruptive Innovation and Technologies: Uncertain Outcomes and Unexpected Risks -- 6 Establishing an Acceptable Balance Between Potential Risks and Opportunities in Adapting EDTs-How Can We Improve Certainty Over Disruptive Technologies? -- 7 Conclusion: Towards a Strategy of Trade-Offs in EDTs -- References -- Ideation -- Human Systems Exploration for Ideation and Innovation in Potentially Disruptive Defense and Security Systems -- 1 Introduction: From Disruption, Ideation and Innovation to Human Systems Exploration -- 2 From Exploration to First Concepts of Human Systems Exploration -- 2.1 Human Systems Exploration and Technology Assessment (TA): Two Facets of the Same Thing -- 3 Theoretical Foundation of Human Systems Exploration -- 3.1 HSE as a Process Metaphor -- 3.2 Human Systems Exploration as a Systemic Method to Bridge the Tension Field of Local and Global -- 3.3 Bridging Exploration with Assessment: Constructive Technology Assessment (CTA) -- 3.4 Dialectic and Tension Fields of Human Systems Exploration -- 4 The Process and Phases of Human Systems Exploration -- 4.1 Fundamental Process Models: Waterfall, V-model and Spiral Model -- 4.2 Balancing Resources: Time, Costs, Functionality, Quality -- 4.3 Exploring from Ideas to Products: Innovation and Exploration Turbine -- 5 Selected Tools for Human Systems Exploration -- 5.1 Horizon Scanning for Human Systems Exploration -- 5.2 Participatory Exploration and Design Workshops for Human Systems Exploration -- 5.3 Wizard-of-Oz and Theatre Method for Human Systems Exploration -- 5.4 Exploroscope as an Open Space for Exploration and Innovation -- 5.5 Exploration Sandbox for the Participatory Exploration of Design Spaces -- 5.6 Exploration Map for the Documentation of Human Systems Explorations. |
5.7 Approaches to Integrate Ethical and Legal Aspects into Human Systems Exploration -- 6 Outlook: Open Research Questions of Human Systems Exploration -- References -- Total War -- 1 Introduction -- 2 War and Total War -- 2.1 Information Dominance and Information Warfare -- 2.2 The Strategy of Shi -- 2.3 Society and the Social Contract -- 3 Engaged in Total War -- 3.1 The Social Contract -- 3.2 |
|
|
|
|
|
|
|
Paths to the Population -- 3.3 Trust in Media-Fake News -- 3.4 Population Tracking and Manipulation-Sources and Methods -- 4 Mitigations to Total War -- 4.1 Cybersecurity -- 4.2 Cyberspace Battlefield and Rules of Engagement -- 4.3 Standards-Specifically the International Standards Organization -- 4.4 Cybersecurity Grand Strategy -- 5 Conclusion -- References -- The Impact of the Internet and Cyberspace on the Rise in Terrorist Attacks Across the US and Europe -- 1 Introduction -- 2 Anonymity -- 3 Communication and Expertise -- 4 Dissemination of Propaganda -- 5 Recruitment -- 6 Financing -- 7 Conclusion -- References -- Innovation -- Shocks and Disruptions in Defence and Security: How to Lead by Inspiring Innovation Through Ideation? -- 1 Introduction -- 2 Need to Rethink/Recalibrate the Way We Innovate -- 3 Innovation Landscape -- 4 The Multi-national Innovation Landscape -- 5 The International Innovation Landscape -- 6 The USA Innovation Landscape -- 7 Innovation: Definitions, Types, Models, Ideation -- 8 Design Thinking Process for Innovation and Ideation -- 9 How to Future Proof Defence Security from Shocks and Disruptions? -- 10 Conclusion -- References -- Health Security and Malaria: A Neural Network iOS Intelligent Platform to Create and Implement Seek and Destroy Integrated Larval Source Management (ILSM) Policies -- 1 Introduction -- 2 Methodology -- 2.1 Study Site -- 2.2 Malaria Transmission in Gulu -- 2.3 Entomological Sampling. |
2.4 Remote Sensing Protocol -- 2.5 Orthomosaic Construction -- 3 Results -- 4 Discussion -- 4.1 Policy Recommendations -- 5 Conclusion -- References -- Convergence -- Legal Principles Governing Disruptive Technologies in Policing -- 1 Introduction -- 2 The Value of Privacy -- 3 Surveillance Cameras -- 3.1 Aims and Promises of Surveillance Cameras -- 3.2 Considerations Related to Surveillance Cameras -- 3.3 Legal Issues Associated with Surveillance Cameras -- 4 Body Cameras -- 4.1 Aims and Promises of Body Cameras -- 4.2 Considerations Related to Body Cameras -- 4.3 Legal Issues Associated with Body Cameras -- 5 Facial Recognition Technology and Biometric Identifiers -- 5.1 Aims and Promises of Facial Recognition Technology and Biometric Identifiers -- 5.2 Considerations Related to Facial Recognition Technology -- 5.3 Legal Issues Associated with Facial Recognition Technology -- 6 Automatic License Plate Readers -- 6.1 Aims and Promises of Automatic License Plate Readers -- 6.2 Considerations Relating to Automatic License Plate Readers -- 6.3 Legal Issues Associated with Automatic License Plate Readers -- 7 Points to Consider and Conclusion -- References -- Being Two Steps Ahead: The Added Value of Anticipatory Intelligence Analysis in Law Enforcement -- 1 Introduction -- 2 Anticipatory Intelligence for Law Enforcement -- 2.1 Anticipatory Intelligence -- 2.2 Process Model of Anticipatory Intelligence -- 2.3 Analysis Questions on Criminal Organisations -- 2.4 Analysis Techniques -- 2.5 Added Value of Analysis Techniques -- 3 Existing Approaches to Anticipatory Intelligence -- 3.1 Case 1: Red Teaming Brainstorming Technique to Identify New Modus Operandi -- 3.2 Case 2: Causal Modelling to Support Scenario Generation and Intervention Identification -- 3.3 Case 3: Agent-Based Modelling for Evaluation of Disruption Strategies. |
4 A Novel Complexity-Based Hybrid Methodology for Anticipatory Intelligence -- 5 Conclusion -- References -- Back to Disruption -- Fifth Generation Warfare? Violent Transnational Social Movements as Security Disruptors -- 1 VTSMs: The Emergence of a New Type of Violent Actor Engaging in a New Type of Warfare? -- 2 Our Modern Understanding of the Nature and Character of War -- 3 Fifth Generation |
|
|
|
|
|
|
|
|
|
|
|
Warfare and the Generations of War -- 4 5GW: Ingroup Versus 'Other' VTSMs -- 5 Domestic Terrorism? -- 6 Defining VTSMs: The Combatants in 5GW Warfare -- 7 Box A: Tools to Alleviate the Disruption of 5G Warfare in Population Centric Environments -- 7.1 5GW Mitigation Impact assessment (MIA) -- 7.2 5GW Mitigation Impact Assessment (MIA) -- 8 Distinction Between Social Movements and Violent Transnational Social Movements -- 9 Soft Violence -- 10 Identity as the Basis of Conflict -- 11 Ethno-cultural Securitisation and Violent Social Movements -- 12 Can We Apply the Term 'Warfare' to Contemporary Social Conflict? -- 13 How Do We Address the Strategic Disruption of 5GW and Identity Conflict? -- 14 Box B: Counter Violence Grid (CVG) -- 14.1 THE 5GW Counter Violence Grid -- References -- Epilogue: What Next?. |
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910791921803321 |
|
|
Autore |
Palmer Mr Jerry |
|
|
Titolo |
Potboilers [[electronic resource] ] : Methods, Concepts and Case Studies in Popular Fiction |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, : Taylor and Francis, 2012 |
|
|
|
|
|
|
|
ISBN |
|
1-134-98430-8 |
9786611142285 |
1-281-14228-X |
0-203-13161-4 |
1-283-54644-2 |
1-134-98431-6 |
9786613858894 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (223 p.) |
|
|
|
|
|
|
Collana |
|
Communication and Society |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
American fiction -- 20th century -- History and criticism -- Theory, etc |
Books and reading -- United States |
Canon (Literature) |
Popular culture -- United States -- History -- 20th century |
Popular literature -- United States -- History and criticism -- Theory, etc |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Potboilers; Copyright Page; Contents; Introduction; Part I: Concepts and methods; 1. Approaches to popular fiction; 2. Narrative grammar; 3. Narrative and connotative processes; 4. The speaking/reading subject; 5. Narrative and ideology; 6. Hegemony and subject position; 7. Genre; Part II: Case studies; 8. Crime fiction: the genre dimension; 9. Crime fiction: film noir and gender; 10. Soap opera, romance and femininity; 11. Reading as a Woman; 12. Sitcom: commercial imperative sand humour; 13. Sitcom and social reality; Notes; Bibliography; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Potboilers looks at the many forms of popular narrative - in print, film and TV. It considers the ways in they have been analysed in literary criticism, sociology, communications, media and cultural studies. The book introduces and summarizes two decades of debate about mass-produced fictions and their position within popular culture. It assesses the methods that have been used in these debates, focussing both on narrative analysis and the communications process. It explores generic conventions, the role of commercial strategies, and the nature of the audience with reference to cr |
|
|
|
|
|
|
|
| |