Vai al contenuto principale della pagina

Disruption, ideation and innovation for defence and security / / G. Adlakha-Hutcheon, Anthony Masys, editors



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Disruption, ideation and innovation for defence and security / / G. Adlakha-Hutcheon, Anthony Masys, editors Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (298 pages)
Disciplina: 355.0335
Soggetto topico: Military policy
National security
Security, International
Persona (resp. second.): Adlakha-HutcheonG
MasysAnthony
Nota di bibliografia: Includes bibliographical references.
Nota di contenuto: Intro -- Contents -- Understanding the Landscape of Disruption, Ideation and Innovation for Defence and Security -- 1 Introduction -- 2 Global National Security Disruptions -- 3 Disruption, Ideation and Innovation -- 4 Section 2: Ideation -- 5 Section 3: Innovation -- References -- Disruption -- System Reliability: A Cold War Lesson -- 1 Introduction -- 2 The 1983 War Scare -- 2.1 Geopolitical Context -- 2.2 Doctrinal Context -- 2.3 The War Scare -- 3 Conclusions -- References -- Quantum Computing: Unraveling the Hype -- 1 Quantum Computing: Unraveling the Hype -- 1.1 Quantum Computing: Bottom Line Up Front -- 2 Introduction -- 3 Quantum Fundamentals -- 4 Quantum Technology -- 4.1 Quantum Processing Versus Conventional Processing -- 5 Quantum Information Science -- 6 Quantum Computing Ecosystem -- 7 Quantum Computing Architectures -- 7.1 Quantum Hardware Components -- 8 Quantum Computing Software Stack -- 9 Quantum Algorithms -- 10 Current Capabilities, Constraints, and Dependencies -- 11 Some Key Players in Quantum Computing -- 12 Quantum Computing Applications -- 12.1 Molecular Modeling -- 12.2 Cryptography7 -- 12.3 Financial Modeling7 -- 12.4 Weather Forecasting7 -- 12.5 Particle Physics7 -- 12.6 Biomedical Simulations -- 12.7 Post-Quantum Cryptography -- 13 Learning Path for Quantum Computing -- 14 Quantum Computing Security -- 15 Future of Quantum Computing -- 15.1 National Initiatives -- 15.2 Quantum Artificial Intelligence -- 16 Conclusion -- 17 Resources -- References -- Emerging and Disruptive Technologies and Security: Considering Trade-Offs Between New Opportunities and Emerging Risks -- 1 Introduction -- 2 Emerging and Disruptive Technologies and Security: Opportunities and Challenges -- 3 Emerging and Disruptive Technologies in Security and Defence -- 4 The Emerging Technology Arms Race: The Geopolitics of Technology.
5 The Precarious Nature of Disruptive Innovation and Technologies: Uncertain Outcomes and Unexpected Risks -- 6 Establishing an Acceptable Balance Between Potential Risks and Opportunities in Adapting EDTs-How Can We Improve Certainty Over Disruptive Technologies? -- 7 Conclusion: Towards a Strategy of Trade-Offs in EDTs -- References -- Ideation -- Human Systems Exploration for Ideation and Innovation in Potentially Disruptive Defense and Security Systems -- 1 Introduction: From Disruption, Ideation and Innovation to Human Systems Exploration -- 2 From Exploration to First Concepts of Human Systems Exploration -- 2.1 Human Systems Exploration and Technology Assessment (TA): Two Facets of the Same Thing -- 3 Theoretical Foundation of Human Systems Exploration -- 3.1 HSE as a Process Metaphor -- 3.2 Human Systems Exploration as a Systemic Method to Bridge the Tension Field of Local and Global -- 3.3 Bridging Exploration with Assessment: Constructive Technology Assessment (CTA) -- 3.4 Dialectic and Tension Fields of Human Systems Exploration -- 4 The Process and Phases of Human Systems Exploration -- 4.1 Fundamental Process Models: Waterfall, V-model and Spiral Model -- 4.2 Balancing Resources: Time, Costs, Functionality, Quality -- 4.3 Exploring from Ideas to Products: Innovation and Exploration Turbine -- 5 Selected Tools for Human Systems Exploration -- 5.1 Horizon Scanning for Human Systems Exploration -- 5.2 Participatory Exploration and Design Workshops for Human Systems Exploration -- 5.3 Wizard-of-Oz and Theatre Method for Human Systems Exploration -- 5.4 Exploroscope as an Open Space for Exploration and Innovation -- 5.5 Exploration Sandbox for the Participatory Exploration of Design Spaces -- 5.6 Exploration Map for the Documentation of Human Systems Explorations.
5.7 Approaches to Integrate Ethical and Legal Aspects into Human Systems Exploration -- 6 Outlook: Open Research Questions of Human Systems Exploration -- References -- Total War -- 1 Introduction -- 2 War and Total War -- 2.1 Information Dominance and Information Warfare -- 2.2 The Strategy of Shi -- 2.3 Society and the Social Contract -- 3 Engaged in Total War -- 3.1 The Social Contract -- 3.2 Paths to the Population -- 3.3 Trust in Media-Fake News -- 3.4 Population Tracking and Manipulation-Sources and Methods -- 4 Mitigations to Total War -- 4.1 Cybersecurity -- 4.2 Cyberspace Battlefield and Rules of Engagement -- 4.3 Standards-Specifically the International Standards Organization -- 4.4 Cybersecurity Grand Strategy -- 5 Conclusion -- References -- The Impact of the Internet and Cyberspace on the Rise in Terrorist Attacks Across the US and Europe -- 1 Introduction -- 2 Anonymity -- 3 Communication and Expertise -- 4 Dissemination of Propaganda -- 5 Recruitment -- 6 Financing -- 7 Conclusion -- References -- Innovation -- Shocks and Disruptions in Defence and Security: How to Lead by Inspiring Innovation Through Ideation? -- 1 Introduction -- 2 Need to Rethink/Recalibrate the Way We Innovate -- 3 Innovation Landscape -- 4 The Multi-national Innovation Landscape -- 5 The International Innovation Landscape -- 6 The USA Innovation Landscape -- 7 Innovation: Definitions, Types, Models, Ideation -- 8 Design Thinking Process for Innovation and Ideation -- 9 How to Future Proof Defence Security from Shocks and Disruptions? -- 10 Conclusion -- References -- Health Security and Malaria: A Neural Network iOS Intelligent Platform to Create and Implement Seek and Destroy Integrated Larval Source Management (ILSM) Policies -- 1 Introduction -- 2 Methodology -- 2.1 Study Site -- 2.2 Malaria Transmission in Gulu -- 2.3 Entomological Sampling.
2.4 Remote Sensing Protocol -- 2.5 Orthomosaic Construction -- 3 Results -- 4 Discussion -- 4.1 Policy Recommendations -- 5 Conclusion -- References -- Convergence -- Legal Principles Governing Disruptive Technologies in Policing -- 1 Introduction -- 2 The Value of Privacy -- 3 Surveillance Cameras -- 3.1 Aims and Promises of Surveillance Cameras -- 3.2 Considerations Related to Surveillance Cameras -- 3.3 Legal Issues Associated with Surveillance Cameras -- 4 Body Cameras -- 4.1 Aims and Promises of Body Cameras -- 4.2 Considerations Related to Body Cameras -- 4.3 Legal Issues Associated with Body Cameras -- 5 Facial Recognition Technology and Biometric Identifiers -- 5.1 Aims and Promises of Facial Recognition Technology and Biometric Identifiers -- 5.2 Considerations Related to Facial Recognition Technology -- 5.3 Legal Issues Associated with Facial Recognition Technology -- 6 Automatic License Plate Readers -- 6.1 Aims and Promises of Automatic License Plate Readers -- 6.2 Considerations Relating to Automatic License Plate Readers -- 6.3 Legal Issues Associated with Automatic License Plate Readers -- 7 Points to Consider and Conclusion -- References -- Being Two Steps Ahead: The Added Value of Anticipatory Intelligence Analysis in Law Enforcement -- 1 Introduction -- 2 Anticipatory Intelligence for Law Enforcement -- 2.1 Anticipatory Intelligence -- 2.2 Process Model of Anticipatory Intelligence -- 2.3 Analysis Questions on Criminal Organisations -- 2.4 Analysis Techniques -- 2.5 Added Value of Analysis Techniques -- 3 Existing Approaches to Anticipatory Intelligence -- 3.1 Case 1: Red Teaming Brainstorming Technique to Identify New Modus Operandi -- 3.2 Case 2: Causal Modelling to Support Scenario Generation and Intervention Identification -- 3.3 Case 3: Agent-Based Modelling for Evaluation of Disruption Strategies.
4 A Novel Complexity-Based Hybrid Methodology for Anticipatory Intelligence -- 5 Conclusion -- References -- Back to Disruption -- Fifth Generation Warfare? Violent Transnational Social Movements as Security Disruptors -- 1 VTSMs: The Emergence of a New Type of Violent Actor Engaging in a New Type of Warfare? -- 2 Our Modern Understanding of the Nature and Character of War -- 3 Fifth Generation Warfare and the Generations of War -- 4 5GW: Ingroup Versus 'Other' VTSMs -- 5 Domestic Terrorism? -- 6 Defining VTSMs: The Combatants in 5GW Warfare -- 7 Box A: Tools to Alleviate the Disruption of 5G Warfare in Population Centric Environments -- 7.1 5GW Mitigation Impact assessment (MIA) -- 7.2 5GW Mitigation Impact Assessment (MIA) -- 8 Distinction Between Social Movements and Violent Transnational Social Movements -- 9 Soft Violence -- 10 Identity as the Basis of Conflict -- 11 Ethno-cultural Securitisation and Violent Social Movements -- 12 Can We Apply the Term 'Warfare' to Contemporary Social Conflict? -- 13 How Do We Address the Strategic Disruption of 5GW and Identity Conflict? -- 14 Box B: Counter Violence Grid (CVG) -- 14.1 THE 5GW Counter Violence Grid -- References -- Epilogue: What Next?.
Titolo autorizzato: Disruption, Ideation and Innovation for Defence and Security  Visualizza cluster
ISBN: 3-031-06636-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910590091503321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Advanced sciences and technologies for security applications.