top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applications of Systems Thinking and Soft Operations Research in Managing Complexity [[electronic resource] ] : From Problem Framing to Problem Solving / / edited by Anthony J. Masys
Applications of Systems Thinking and Soft Operations Research in Managing Complexity [[electronic resource] ] : From Problem Framing to Problem Solving / / edited by Anthony J. Masys
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (320 p.)
Disciplina 658.403
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Statistical physics
Dynamical systems
Operations research
Decision making
Social sciences
System safety
Computer simulation
Complex Systems
Operations Research/Decision Theory
Methodology of the Social Sciences
Security Science and Technology
Simulation and Modeling
Statistical Physics and Dynamical Systems
ISBN 3-319-21106-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: Organizational Theme -- Using systems modeling to examine law enforcement collaboration in the response to serious crime -- Managing Complexity in Organizations through a Systemic Network of Projects -- Family of Related Systemic Elements (FoRSE™) Matrix: Big(ger) Picture Thinking and Application for Business and Organizations -- Part 2: Disaster Management Theme -- Disentangling wicked problems: a reflexive approach towards resilience governance -- Post-disaster reconstruction – what does it mean to rebuild with resilience -- Black swans, dragon kings and beyond: towards predictability and suppression of extreme all-hazards events through modeling and simulation -- Part 3: Systems approaches Theme -- Supporting Intelligence Analysis through visual thinking -- The Benefits of systems-thinking approach to accident investigation -- Systems Theory as a foundation for discovery of pathologies from complex system problem formulation -- Soft (?) social systems and shocks: an experiment with an agent based model -- System Failure? Why humanitarian assistance can’t met its objectives without systems thinking- and why it finds it so hard to use it -- Using First Nations systems thinking to operationalize sustainable development.
Record Nr. UNINA-9910254612303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Asia-Pacific Security Challenges [[electronic resource] ] : Managing Black Swans and Persistent Threats / / edited by Anthony J. Masys, Leo S.F. Lin
Asia-Pacific Security Challenges [[electronic resource] ] : Managing Black Swans and Persistent Threats / / edited by Anthony J. Masys, Leo S.F. Lin
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 304 p. 46 illus., 24 illus. in color.)
Disciplina 355.03301823
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Natural disasters
Energy security
Terrorism
Political violence
Organized crime
Business logistics
Natural Hazards
Energy Security
Terrorism and Political Violence
Organized Crime
Supply Chain Management
ISBN 3-319-61729-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Complexity and Security: New ways of thinking and seeing -- Risk and Resilience in the Asia-Pacific region: managing the expected, preparing for the unexpected -- Climate Change and Security in the Asia-Pacific Region -- Cybercrime in East and Southeast Asia: The Case of Taiwan -- Natural disasters and health risks of first responders -- The March, 2011 Fukushima Daiichi nuclear power plant disaster – a foreseeable system accident -- The Maori Response to Seismic ‘Swans’ -- Building Energy Resiliency in the Asia Pacific - Providing transition pathways for a more secure and sustainable future -- From Data Modeling to Algorithmic Modeling in the Big Data Era: Water Resources Security in the Asia-Pacific Region under Conditions of Climate Change -- From Gas Explosions to Earthquakes: Case Studies of Disaster Response in Taiwan -- The missing link in the Global Aviation Safety and Security Network: the case of Taiwan -- Universal Participation without Taiwan? A Study of Taiwan’s Participation in the Global Health Governance Sponsored by the World Health Organization -- Dacoity in India: Investigating Thievery and Banditry in the British Raj’s Jewel.
Record Nr. UNINA-9910299385703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Disaster Forensics [[electronic resource] ] : Understanding Root Cause and Complex Causality / / edited by Anthony J. Masys
Disaster Forensics [[electronic resource] ] : Understanding Root Cause and Complex Causality / / edited by Anthony J. Masys
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (418 p.)
Disciplina 530
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico System safety
Natural disasters
Environmental law
Environmental policy
Social sciences
Security Science and Technology
Natural Hazards
Environmental Law/Policy/Ecojustice
Methodology of the Social Sciences
ISBN 3-319-41849-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Individual and Societal Risk (RiskIS): Beyond probability and consequence during Hurricane Katrina -- Application of problem inversion to cascading critical infrastructure failure -- Heroes and Villains in Complex Socio-Technical Systems -- Patient Safety and Disaster Forensics: understanding complex causality through Actor Network ethnography -- The Fog of Battle in risk and crisis communication: Towards the goal of interoperability in the digital age -- Disaster Forensics: Governance, Adaptivity and Social Innovation -- Disasters and Mishaps: The Merits of Taking a Global View.-Dynamics of information flow before major crises: Lessons from the collapse of Enron, the subprime mortgage crisis and other high impact disasters in the industrial sector -- Climate Change and Disaster Forensics -- The Complex Dynamic Causality of Violent Extremism: Applications of the VERA-2 Risk Assessment Method to CVE initiatives -- Staying alive in the business of terror -- Counter-terrorism and Design Thinking: Supporting strategic insights and influencing operations -- Economic Disruptions, Business Continuity Planning and Disaster Forensic Analysis: The Hawaii Business Recovery Center (HIBRC) Project -- An Event-Driven, Scalable and Real-Time Geo-spatial Disaster Forensics Architecture: Decision Support for Integrated Disaster Risk Reduction describes -- Advances in Economics and Disaster Forensics: A Multi-Criteria Disaster Forensics Analysis (MCDFA) of the 2012 Kahuku Wind Farm Battery Fire on Oahu, Hawaii.-Complexity and Disaster Forensics: Paradigms, Models and Approaches for Natural Hazards Management in the Pacific Island Region. .
Record Nr. UNINA-9910254626203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Exploring the Security Landscape: Non-Traditional Security Challenges / / edited by Anthony J. Masys
Exploring the Security Landscape: Non-Traditional Security Challenges / / edited by Anthony J. Masys
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (326 p.)
Disciplina 530
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico System safety
Physics
Health promotion
Energy policy
Energy and state
Computer security
Natural disasters
Security Science and Technology
Applications of Graph Theory and Complex Networks
Health Promotion and Disease Prevention
Energy Policy, Economics and Management
Systems and Data Security
Natural Hazards
ISBN 3-319-27914-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Non-traditional Transnational Security Challenges in Serbian, British and Dutch Security Discourses: A Cross Country Comparison -- National Security in a Hyper-Connected World -- Is Maritime Security a Traditional Security Challenge -- Pandemic Influenza Planning for the Mental Health Security of Survivors of Mass Deaths -- An evaluation of the Police Response to Gang-related Violence and Future Security Threat -- The Demographic horizon of the emerging security environment -- Economic Security: An emerging security issue -- Critical Infrastructure vulnerabilities: embracing a network mindset.-Supply Chain Information Security: emerging challenges in the telecommunications industry.-Disrupting terrorist and criminal networks: Crime script analysis through DODAF applications -- Beyond the Castle Model of Cyber-risk and cyber-security -- Food Security as Critical Infrastructure: the importance of safeguarding the food supply for civil security -- The role of Social Network Sites in security risks and crises: The information warfare of terrorism -- Manufactured Risk, complexity and non-traditional security: from world risk society to a networked risk model.
Record Nr. UNINA-9910254625503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Global Health Security [[electronic resource] ] : Recognizing Vulnerabilities, Creating Opportunities / / edited by Anthony J. Masys, Ricardo Izurieta, Miguel Reina Ortiz
Global Health Security [[electronic resource] ] : Recognizing Vulnerabilities, Creating Opportunities / / edited by Anthony J. Masys, Ricardo Izurieta, Miguel Reina Ortiz
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (425 pages)
Disciplina 362.1
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Economic development
Epidemiology
Technology—Sociological aspects
Environmental health
System safety
Development and Health
Science and Technology Studies
Environmental Health
Security Science and Technology
Water and Health
ISBN 3-030-23491-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Forward -- Section 1 Emerging threats -- Plagues, Epidemics and Pandemics; R. Izurieta -- Agricultural Emergencies: Factors and Impacts in the Spread of Transboundary Diseases in, and adjacent to, Agriculture -- The Threat within: mitigating the risk of medical error -- Climate Change, Extreme Weather Events and Global Health Security- A lens into vulnerabilities; C. Bell, A. Masys -- Global Health Biosecurity in a Vulnerable World – An Evaluation of Emerging Threats and Current Disaster Preparedness Strategies for the Future -- The emerging threat of Ebola -- Section 2: Mitigation, Preparedness and Response and Recovery -- Natural and Manmade Disasters: Vulnerable Populations -- Sexual Violence -- Global Health Security and Weapons of Mass Destruction; C. Reynolds -- Antimicrobial Resistance in One Health -- Food Security – microbiological and chemical risks -- Section 3: Exploring the technology Landscape for Solutions. Gaussianization of variational Bayesian approximations with correlated non-nested non-negligible posterior mean random effects employing non-negativity constraint analogs and analytical depossinization for iteratively fitting capture point, Aedes aegypti habitat non-zero autocorrelated prognosticators: A case study in evidential probabilities for non-frequentistic forecast epi-entomological time series modeling of arboviral infections -- Simulation, Modeling and Telemedicine in Global Health Security; A. French -- The growing role of social media in international health security: The good, the bad, and the ugly -- Section 4: Leadership and partnerships. Effecting Collective Impact through Collective Leadership on a Foundation of Generative Relationships -- Global Health Innovations.
Record Nr. UNINA-9910370247203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Great Power Competition Volume 5 : The Russian Invasion of Ukraine and Implications for the Central Region / Adib Farhadi, Mark Grzegorzewskia and Anthony J, Masys
The Great Power Competition Volume 5 : The Russian Invasion of Ukraine and Implications for the Central Region / Adib Farhadi, Mark Grzegorzewskia and Anthony J, Masys
Edizione [1st ed.]
Pubbl/distr/stampa Cham, : Springer, , 2023
Descrizione fisica 1 online resource (413 pages)
Disciplina 947.7086
ISBN 3-031-40451-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Acknowledgments -- Contents -- Contributors -- Russia's Invasion of Ukraine: Evolving Crises and Economic Power Politics in the Central Asia-South Asia (CASA) Region -- 1 Introduction -- 2 Russia's Invasion of Ukraine: An Evolving Global Crisis -- 3 Russia's Invasion of Ukraine: Rival Power Alliances in the CASA Region -- 4 The Future of Great Power Competition: CASA and the Race for Critical Resources -- 5 Conclusion -- References -- Regional Ambivalence Towards Russia and Ukraine -- 1 Introduction -- 2 UN Votes -- 3 Deepened Commercial Ties -- 3.1 The Gulf States -- 3.2 Turkey -- 3.3 Iraq, Egypt and Other Arab States -- 4 Kremlin Narrative Resonates -- 5 Conclusion -- References -- Great Power Competition Following the Ukraine War -- 1 Introduction -- 2 Great Power Competition in Eastern Europe -- 3 Changing Periphery -- 4 China's Game -- 5 Economic Element-Burdening Europe, the Middle East, and Africa -- 6 India's Power: Sideline Observer -- 7 Conclusion -- References -- Russia's 2022 Cyber-Enabled Warfare Against Ukraine: Why Russia Failed to Perform to Expectations -- 1 Introduction -- 2 The Missing "Cyber War" -- 3 What is Russia Competing for in Ukraine? -- 4 Establishing the Strike Zone -- 5 Past Performance May Not Be Indicative of Future Results -- 6 Dysfunctional Front Office -- 7 Playing Away Games are Hard! -- 8 "It's Tough to Make Predictions, Especially About the Future" ~ Yogi Berra -- 9 Conclusion -- References -- Navigating the Middle Ground: The Central Region's Middle Powers' Response to the Russo-Ukrainian War -- 1 Introduction -- 2 Middle Power Theory and Why Middle Powers Matter -- 3 Framing the Uncertainty in the Region -- 4 The Central Region's Middle Powers' Behavior -- 4.1 The Revisionists -- 4.2 The Hedgers -- 5 Conclusion -- References.
Iran's Drone Industry and Its Military Cooperation with Russia in Ukraine -- 1 Introduction -- 2 Iranian Drones: A Brief History -- 3 Iranian Involvement and Regional Drones in Syria, Libya, and Nagorno-Karabakh -- 3.1 Syria -- 3.2 Libya -- 3.3 Nagorno-Karabakh -- 4 Iranian Drones and Other Military Aid to Ethiopia During the Tigray War -- 5 Iranian Drone Transfers and Military Cooperation with Russia in Ukraine -- 6 Conclusion -- References -- The War in Ukraine: The Turning Point of Russia-Iran Relations -- 1 Introduction -- 2 Background Study on Russo-Persian Relations -- 2.1 Cooperation (1465-the 1640s) -- 2.2 Enmity (1650-1820s) -- 2.3  Asymmetric Partnership (1830-the 1910s) -- 2.4 Brief Friendship (the 1920s) -- 2.5 Hostility (1940-1990s) -- 2.6 Cooperation (1990-2020s) -- 3 Transformation to a Semi-interdependent Partnership -- 3.1 Military Cooperation -- 3.2 Economic Cooperation -- 4 Obstacles Ahead of Russo-Persian Relations -- 5 Conclusion -- Bibliography -- Putin's Playbook: The Development of Russian Tactics, Operations, and Strategy from Chechnya to Ukraine -- 1 Introduction -- 2 The Second Chechen War -- 3 The Munich Security Conference and Estonia -- 4 Georgia: The 5-Day War -- 5 Military Reform and Russia's Special Operations Forces Command -- 6 Euromaidan and the Annexation of Crimea -- 7 Eastern Ukraine and the "Novorossiya Campaign" -- 8 Syria: Russia's Training Ground -- 9 Ukraine 2.0: Russia's 2022 Invasion of Ukraine -- 10 "I Need Ammo, Not a Ride" -- 11 Lies, Law, and Why Words Matter -- 12 "All is According to Plan" -- 13 Conclusion -- Bibliography -- Impact Analysis of the War in Ukraine on Non-traditional Security: An Examination of the Emerging Risks to the Sustainable Development Goals -- 1 Introduction -- 2 Sustainable Development Goals -- 3 Analysis of Systemic and Transborder Risks.
4 Nontraditional Security Implications -- 5 Energy Security -- 6 Food Security -- 7 Environmental Security -- 8 Health Security -- 9 Fragility -- 10 Influence on SDGs -- 11 SDGs Food, Poverty, Health, Economic Growth, Inequality, Gender Inequality -- 12 Conclusion -- References -- Russia's Backyard: China and Central Asia after the Invasion of Ukraine -- 1 Introduction -- 2 China and Central ASIA-Strategic Proximity -- 3 Five Countries-Five Stories: China and Central Asia -- 3.1 Kazakhstan and China -- 3.2 Kyrgyzstan and China -- 3.3 Tajikistan and China -- 3.4 Uzbekistan and China -- 3.5 Turkmenistan and China -- 4 China's Growing Hegemony in Central Asia-Washington and Beijing -- 5 China's Hegemony in Central Asia: Geopolitical Challenges to the US -- 5.1 Return of US Military Bases to Central Asia: Very Unlikely if not Impossible -- 5.2 China's Military Rise in Central Asia -- 5.3 Return to Multi-levelled Hegemonic Competition (with New Actors) -- 6 Conclusion -- References -- Intelligence in Ukraine: Success, Failure, or Signaling Revolutionary Change? -- 1 Introduction -- 2 Spring/Fall 2021: Prelude to an Invasion -- 3 Good Work Intelligence!/Another Intelligence Failure! -- 4 Intelligence Definition? Intelligence Practitioner? -- 5 Conclusion: How the Strategic Environment Shapes Intelligence -- Moral Injury in Refugee Communities: The Connection Between Displacement and Disorientation -- 1 Introduction -- 2 Identity, Community, and Meaning-Making -- 3 Displacement and Moral Injury -- 4 Disorientation: A Salient Consequence of Moral Injury for Refugees -- 5 Two Dire Concerns for Refugees -- 6 Conclusion -- References -- The Energy War: How Europe Turned the Tables on Russia -- 1 Introduction -- 2 Applying Theory to Practice -- 3 No Clear Way to Offset Russian Losses -- 4 Why Was Germany so Vulnerable? -- 5 Applying More Theory to Practice.
6 Why Boom and Bust Energy Instability? -- 7 Booms Sow the Seeds of Busts -- 8 Toward International Energy Stability -- 9 Russia Gets Ready for the Energy War -- 10 Global Support for Russia is Growing -- 11 Russia's Repeated Cutbacks of Gas to Europe -- 12 Russia Halts Gas Exports to Poland and Bulgaria -- 13 Negative Economic Impact on Europe -- 14 Questions Over EU's Hard Pivot -- 15 The Showdown -- 16 Would EU Leaders Stand Up to Putin? -- 17 EU Starts Winning -- 18 Rising EU Confidence -- 19 How Did the EU Turn the Tables on Russia? -- 20 The EU's Amazing Turnaround -- 21 Initial LNG Pessimism -- 22 The Situation Changes -- 23 The LNG Game Changer -- 24 How Was It Possible to Scale Up LNG So Fast? -- 25 The Demand Response -- 26 Russia's Coercion Loses Its Potency -- 27 Russia's Long-Term Decline -- 28 Warning Signs for Russian Oil -- 29 The Price Cap and Embargo -- 30 The "Goldilocks" Level -- 31 European Energy Opportunities -- 32 European Energy Challenges -- Notes -- Ukraine's National Recovery: Opportunities and Challenges -- 1 Introduction: The Time Is Now -- 2 Russia Degrades Ukraine's Economy -- 3 The Cost of War -- 4 Physical Damage -- 4.1 Damage Assessment -- 4.2 Losses Due to the War -- 4.3 Total Damage and Loss -- 5 President Zelensky's National Recovery Plan -- 6 Transforming the Plan into Concrete Achievements -- 7 Needed: A Coherent Economic Transition -- 8 A Market Friendly Economy for Ukraine -- 9 Previous East European Reforms: Lessons Learned -- 10 The Sequencing of Economic Reforms -- 11 Redefining the Role of the Ukrainian State -- 12 Toward Price Liberalization -- 13 Toward Trade Liberalization Again -- 14 Privatization -- 15 The Pace of Economic Reforms -- 16 The Importance of Anti-corruption Reforms -- 17 Conclusion: A Window of Opportunity for Better Governance -- Notes.
To the Bastion: NATO's Return to Europe Leaves Its Troubled Southern Flank Open for Competition -- 1 Introduction -- 2 The Historical Development of NATO's Divisive Southern Flank -- 2.1 Rifts Between Friends -- 2.2 Soviet Competition to the South -- 3 Major Post-9/11 Operations and Divided Interests in the South -- 3.1 NATO 360-Degree -- 4 To the Bastion! Russia Invades Ukraine -- 4.1 NATO's Growing Pains and Conflicting Interests -- 4.2 Russia and China Move South -- 5 Conclusion -- References -- How CENTCOM Can Exploit Russia's Failure in Ukraine -- 1 Recommendation 1: A New Narrative to Reframe the War in Ukraine -- 2 Recommendation 2: Build on the Reframed View of the War to Discredit the Abandonment Narrative -- 3 Recommendation 3: Build on the Reframed View of the War to Discredit Russia -- 4 Recommendation 4: Build on the New Assessment of Russia, and China's Lukewarm Support for Russia, to Discredit China -- 5 Tailoring These Messages for Specific Audiences -- 6 Why the War in Ukraine Looks Different to Nations in the CENTCOM AOR -- 7 Israel and the Arab States -- 7.1 Oil -- 8 Recommended CENTCOM Messaging to Israel and the Arab States -- 9 Central Asian States -- 10 Recommended CENTCOM Messaging to the Central Asian States -- 11 Iran and Syria -- 12 Recommended CENTCOM Messaging and Actions Regarding Syria and Iran to Exploit the War in Ukraine -- 13 Pakistan and Afghanistan -- 14 Recommended CENTCOM Messaging and Actions in Pakistan and Afghanistan -- 15 Conclusion -- The Invasion of Ukraine and the Global Food Crisis of 2022: Responding to Food Supply Shocks -- 1 Introduction -- 2 Part I: Understanding the Food Crisis of 2022 -- 2.1 The Situation Pre-War -- 2.2 Invasion of Ukraine: Supply Shock and Food Crisis -- 2.3 Global Response -- 2.4 Where Things Stand Now -- 3 Part II The Food Shock Model and the Role of the Military.
3.1 Food Insecurity: A Pricing Perspective.
Record Nr. UNINA-9910747593603321
Cham, : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of Security Science [[electronic resource] /] / edited by Anthony J. Masys
Handbook of Security Science [[electronic resource] /] / edited by Anthony J. Masys
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Disciplina 621.389
Soggetto topico System safety
Terrorism
Computer crimes
Politics and war
Sustainable development
Security, International
Security Science and Technology
Cybercrime
Military and Defence Studies
Sustainable Development
International Security Studies
ISBN 3-319-51761-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A: Concepts in Security Studies -- B: National Defence (Military) -- C: Transnational Crime and Terrorism -- D: Physical Security and Critical Infrastructure.
Record Nr. UNISA-996418444003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Handbook of Security Science [[electronic resource] /] / edited by Anthony J. Masys
Handbook of Security Science [[electronic resource] /] / edited by Anthony J. Masys
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Disciplina 621.389
Soggetto topico System safety
Terrorism
Computer crimes
Politics and war
Sustainable development
Security, International
Security Science and Technology
Cybercrime
Military and Defence Studies
Sustainable Development
International Security Studies
ISBN 3-319-51761-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A: Concepts in Security Studies -- B: National Defence (Military) -- C: Transnational Crime and Terrorism -- D: Physical Security and Critical Infrastructure.
Record Nr. UNINA-9910337877103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Networks and Network Analysis for Defence and Security [[electronic resource] /] / edited by Anthony J. Masys
Networks and Network Analysis for Defence and Security [[electronic resource] /] / edited by Anthony J. Masys
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (298 p.)
Disciplina 005.8
Collana Lecture Notes in Social Networks
Soggetto topico Physics
Application software
Criminology
Game theory
System safety
Applications of Graph Theory and Complex Networks
Computer Appl. in Social and Behavioral Sciences
Criminology and Criminal Justice, general
Game Theory, Economics, Social and Behav. Sciences
Security Science and Technology
ISBN 3-319-04147-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Analysis in Criminal Intelligence -- Identifying mafia Bosses from Meeting Attendance -- Macrosocial Network Analysis: the Case of Transnational Drug Trafficking -- Policing the Hackers by Hacking them: Studying Online Deviants in IRC Chat Rooms -- Why Terror Networks are Dissimilar: How Structure Relates to Functions -- Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement -- The Networked Mind- Collective Identities and the Cognitive-Affective Nature of Conflict -- Conflict Cessation and the Emergence of Weapons Supermarkets -- A Conspiracy of Bastards? -- Decision Support through Strongest Path Method Risk Analysis -- Critical Infrastructure and Vulnerability- a Relational Analysis through Actor Network Theory -- Dealing with Complexity: Thinking about Networks and the Comprehensive Approach.
Record Nr. UNINA-9910300371003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Science Informed Policing [[electronic resource] /] / edited by Bryanna Fox, Joan A. Reid, Anthony J. Masys
Science Informed Policing [[electronic resource] /] / edited by Bryanna Fox, Joan A. Reid, Anthony J. Masys
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (262 pages)
Disciplina 363.2
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Police
Security, International
Public safety
Computational intelligence
Sociophysics
Econophysics
System safety
Policing
International Security Studies
Crime Control and Security
Computational Intelligence
Data-driven Science, Modeling and Theory Building
Security Science and Technology
ISBN 3-030-41287-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1: Policing and Crime Prevention -- Chapter 1: How Offender Decision-Making Can Inform Policing: A Focus on the Perceived Certainty of Apprehension -- Chapter 2: An Epidemiological Framework for Investigating Organized Crime and Terrorist Networks -- Chapter 3: Sex Offenders’ Forensic Awareness Strategies to Avoid Police Detection -- Chapter 4: Tracking Terrorism: The Role of Technology in Risk Assessment and Monitoring of Terrorist Offenders -- Chapter 5: Human Trafficking and the Darknet -- Section 2: Policing Tools & Strategies -- Chapter 6: Scientific and Technological Advances in Law Enforcement Intelligence Analysis -- Chapter 7: Improving Criminal Investigations With Structured Analytic Techniques -- Chapter 8: Front-end Forensics: An Integrated Forensic Intelligence Model.-Chapter 9: Missing Persons and Runaway Youth: The Role of Social Media as an Alert System and Crime Control Tool -- Chapter 10: Police Engagement in Multidisciplinary Team Approaches to Commercial Sexual Exploitation of Children -- Chapter 11: The lived-reality of police helicopter operations – frank and revealing interviews with National Police Air Service personnel -- Chapter 12: Science Informed Major Event Security Planning: From vulnerability analysis to security design.
Record Nr. UNINA-9910410023903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui