LEADER 05608nam 22007815 450 001 9910254625503321 005 20200705050301.0 010 $a3-319-27914-9 024 7 $a10.1007/978-3-319-27914-5 035 $a(CKB)3710000000596640 035 $a(EBL)4405866 035 $a(SSID)ssj0001653460 035 $a(PQKBManifestationID)16433080 035 $a(PQKBTitleCode)TC0001653460 035 $a(PQKBWorkID)14982103 035 $a(PQKB)10429696 035 $a(DE-He213)978-3-319-27914-5 035 $a(MiAaPQ)EBC4405866 035 $a(PPN)192222422 035 $a(EXLCZ)993710000000596640 100 $a20160211d2016 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aExploring the Security Landscape: Non-Traditional Security Challenges /$fedited by Anthony J. Masys 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (326 p.) 225 1 $aAdvanced Sciences and Technologies for Security Applications,$x1613-5113 300 $aDescription based upon print version of record. 311 $a3-319-27913-0 327 $aNon-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross Country Comparison -- National Security in a Hyper-Connected World -- Is Maritime Security a Traditional Security Challenge -- Pandemic Influenza Planning for the Mental Health Security of Survivors of Mass Deaths -- An evaluation of the Police Response to Gang-related Violence and Future Security Threat -- The Demographic horizon of the emerging security environment -- Economic Security: An emerging security issue -- Critical Infrastructure vulnerabilities: embracing a network mindset.-Supply Chain Information Security: emerging challenges in the telecommunications industry.-Disrupting terrorist and criminal networks: Crime script analysis through DODAF applications -- Beyond the Castle Model of Cyber-risk and cyber-security -- Food Security as Critical Infrastructure: the importance of safeguarding the food supply for civil security -- The role of Social Network Sites in security risks and crises: The information warfare of terrorism -- Manufactured Risk, complexity and non-traditional security: from world risk society to a networked risk model. 330 $aThis book provides international perspective for those studying or working in the security domain, from enforcement to policy. It focuses on non-traditional threats in a landscape that has been described as transnational in nature and incorporates natural disasters, gang violence, extremism and terrorism, amongst other issues. Chapters provide innovative thinking on themes including cyber security, maritime security, transnational crime, human security, globalization and economic security. Relevant theoretical frameworks are presented and readers are expertly guided through complex threats, from matters pertaining to health security which pose threats not only to humans but also have significant national security implications, to issues regarding critical infrastructure vulnerability and the complexity of understanding terrorist operations. Authors reveal how emerging uncertainties regarding global critical infrastructure and supply chain security, food security, and health security are linked to the notion of human security. Security professionals, policy makers and academics will all gain from the insights, strategies and perspectives in this book. It builds understanding of the deepening and broadening domain of security studies and provides a valuable reference text for courses on security studies and international relations. 410 0$aAdvanced Sciences and Technologies for Security Applications,$x1613-5113 606 $aSystem safety 606 $aPhysics 606 $aHealth promotion 606 $aEnergy policy 606 $aEnergy and state 606 $aComputer security 606 $aNatural disasters 606 $aSecurity Science and Technology$3https://scigraph.springernature.com/ontologies/product-market-codes/P31080 606 $aApplications of Graph Theory and Complex Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/P33010 606 $aHealth Promotion and Disease Prevention$3https://scigraph.springernature.com/ontologies/product-market-codes/H27010 606 $aEnergy Policy, Economics and Management$3https://scigraph.springernature.com/ontologies/product-market-codes/112000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aNatural Hazards$3https://scigraph.springernature.com/ontologies/product-market-codes/G32000 615 0$aSystem safety. 615 0$aPhysics. 615 0$aHealth promotion. 615 0$aEnergy policy. 615 0$aEnergy and state. 615 0$aComputer security. 615 0$aNatural disasters. 615 14$aSecurity Science and Technology. 615 24$aApplications of Graph Theory and Complex Networks. 615 24$aHealth Promotion and Disease Prevention. 615 24$aEnergy Policy, Economics and Management. 615 24$aSystems and Data Security. 615 24$aNatural Hazards. 676 $a530 702 $aMasys$b Anthony J$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910254625503321 996 $aExploring the Security Landscape: Non-Traditional Security Challenges$91807560 997 $aUNINA