05608nam 22007815 450 991025462550332120200705050301.03-319-27914-910.1007/978-3-319-27914-5(CKB)3710000000596640(EBL)4405866(SSID)ssj0001653460(PQKBManifestationID)16433080(PQKBTitleCode)TC0001653460(PQKBWorkID)14982103(PQKB)10429696(DE-He213)978-3-319-27914-5(MiAaPQ)EBC4405866(PPN)192222422(EXLCZ)99371000000059664020160211d2016 u| 0engur|n|---|||||txtccrExploring the Security Landscape: Non-Traditional Security Challenges /edited by Anthony J. Masys1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (326 p.)Advanced Sciences and Technologies for Security Applications,1613-5113Description based upon print version of record.3-319-27913-0 Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross Country Comparison -- National Security in a Hyper-Connected World -- Is Maritime Security a Traditional Security Challenge -- Pandemic Influenza Planning for the Mental Health Security of Survivors of Mass Deaths -- An evaluation of the Police Response to Gang-related Violence and Future Security Threat -- The Demographic horizon of the emerging security environment -- Economic Security: An emerging security issue -- Critical Infrastructure vulnerabilities: embracing a network mindset.-Supply Chain Information Security: emerging challenges in the telecommunications industry.-Disrupting terrorist and criminal networks: Crime script analysis through DODAF applications -- Beyond the Castle Model of Cyber-risk and cyber-security -- Food Security as Critical Infrastructure: the importance of safeguarding the food supply for civil security -- The role of Social Network Sites in security risks and crises: The information warfare of terrorism -- Manufactured Risk, complexity and non-traditional security: from world risk society to a networked risk model.This book provides international perspective for those studying or working in the security domain, from enforcement to policy. It focuses on non-traditional threats in a landscape that has been described as transnational in nature and incorporates natural disasters, gang violence, extremism and terrorism, amongst other issues. Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security. Relevant theoretical frameworks are presented and readers are expertly guided through complex threats, from matters pertaining to health security which pose threats not only to humans but also have significant national security implications, to issues regarding critical infrastructure vulnerability and the complexity of understanding terrorist operations. Authors reveal how emerging uncertainties regarding global critical infrastructure and supply chain security, food security, and health security are linked to the notion of human security. Security professionals, policy makers and academics will all gain from the insights, strategies and perspectives in this book. It builds understanding of the deepening and broadening domain of security studies and provides a valuable reference text for courses on security studies and international relations.Advanced Sciences and Technologies for Security Applications,1613-5113System safetyPhysicsHealth promotionEnergy policyEnergy and stateComputer securityNatural disastersSecurity Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Applications of Graph Theory and Complex Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/P33010Health Promotion and Disease Preventionhttps://scigraph.springernature.com/ontologies/product-market-codes/H27010Energy Policy, Economics and Managementhttps://scigraph.springernature.com/ontologies/product-market-codes/112000Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Natural Hazardshttps://scigraph.springernature.com/ontologies/product-market-codes/G32000System safety.Physics.Health promotion.Energy policy.Energy and state.Computer security.Natural disasters.Security Science and Technology.Applications of Graph Theory and Complex Networks.Health Promotion and Disease Prevention.Energy Policy, Economics and Management.Systems and Data Security.Natural Hazards.530Masys Anthony Jedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910254625503321Exploring the Security Landscape: Non-Traditional Security Challenges1807560UNINA