National Security: Breakthroughs in Research and Practice

Editor/Author Information Resources Management Association
Publication Year: 2019
Publisher: IGI Global

Single-User Purchase Price: $495.00
Unlimited-User Purchase Price: $742.50
ISBN: 978-1-52-257912-0
Category: Social Sciences - Criminology & Law
Image Count: 91
Book Status: Available
Table of Contents

National Security: Breakthroughs in Research and Practice is an authoritative resource for the latest research on the multiple dimensions of national security, including the political, physical, economic, ecological, and computational dimensions.

Share this

Table of Contents

  • Preface
  • Cyber Security and Defense
  • — Formulating the Building Blocks for National Cyberpower
  • — The Role of State Actors in Cybersecurity: Can State Actors Find Their Role in Cyberspace?
  • — Thinking Systemically About Security and Resilience in an Era of Cybered Conflict
  • — Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity
  • — Improving Cyber Defense Education Through National Standard Alignment: Case Studies
  • — Adaptation of the JDL Model for Multi-Sensor National Cyber Security Data Fusion
  • — A Comparative Analysis of the Cyberattacks Against Estonia, the United States, and Ukraine: Exemplifying the Evolution of Internet-Supported Warfare
  • — Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia
  • — Developing Confidence Building Measures (CBMs) in Cyberspace Between Pakistan and India
  • Cyber Warfare and Terrorism
  • — Cyberterrorism: Using the Internet as a Weapon of Destruction
  • — Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol
  • — Cyberspace as a Complex Adaptive System and the Policy and Operational Implications for Cyberwarfare
  • — OSNs as Cyberterrorist Weapons Against the General Public
  • — Attribution
  • — Changing the Approach to Deterrence in Cyberspace While Protecting Civilians From Cyber Conflict
  • — Cyber-Attacks, Retaliation and Risk: Legal and Technical Implications for Nation-States and Private Entities
  • — A Strategic Framework for a Secure Cyberspace in Developing Countries with Special Emphasis on the Risk of Cyber Warfare
  • — Comparing the Socio-Political Ethics of Fighting Terrorism With Extreme Self-Defense in USA: An Exploratory Insight
  • — Russian Cyberwarfare Taxonomy and Cybersecurity Contradictions Between Russia and EU: An Analysis of Management, Strategies, Standards, and Legal Aspects
  • — PKK-Related Asylum Applications from Turkey: Counter-Terrorism Measures vs. Refugee Status
  • Digital Intelligence
  • — Intelligence Studies, Theory, and Intergroup Conflict and Resolution: Theory and Beyond
  • — Quantitative Approaches to Representing the Value of Information Within the Intelligence Cycle
  • — Teaching New Dogs Old Tricks: The Basics of Espionage Transcend Time
  • — The World is Polluted With Leaked Cyber Data
  • — Social Media Analytics for Intelligence and Countering Violent Extremism
  • — Keyframe-Based Vehicle Surveillance Video Retrieval
  • — New Swarm Intelligence Technique of Artificial Social Cockroaches for Suspicious Person Detection Using N-Gram Pixel With Visual Result Mining
  • — US-China Relations: Cyber Espionage and Cultural Bias
  • — Understanding Digital Intelligence: A British View
  • Information Access and Infrastructure Security
  • — Cyber Threats to Critical Infrastructure Protection: Public Private Aspects of Resilience
  • — Public-Private Partnerships in Support of Critical Infrastructure and Key Resources
  • — Energy Infrastructure Security in the Digital Age
  • — The USA Electrical Grid: Public Perception, Cyber Attacks, and Inclement Weather
  • — Critical Raw Materials and UK Defence Acquisition: The Case of Rare Earth Elements
  • — Environmental Security Threats and Policy Response in the Niger Delta, Nigeria 1990-2016
  • — Access to Information in the Republic of Macedonia: Between Transparency and Secrecy
  • Media Influence and Relations
  • — Print Media’s Role in Securitization: National Security and Diplomacy Discourses in Nepal
  • — Fourth Generation Warfare and the Challenges in Military-News Media Relations in India
  • Military Expenditure and Defense Acquisition
  • — Defense Acquisition, Public Administration, and Pragmatism
  • — Trend and Impact of Military Expenditure on Economic Growth in South Asia
  • — Military Expenditure and Economic Growth Relationship Revisited in Some South Asian Countries: With Special Reference to India
  • — Military Expenditure, Economic Growth, and Foreign Policy Implications: The Case of Ghana and Nigeria Within the ECOWAS, 1986-2016
  • Transnational Crime and Trafficking
  • — Security in Transnational Interoperable PPDR Communications: Threats, Requirements and Architecture Solution
  • — Combating Human Trafficking: Recommendations for Police Leadership in Establishing Transnational Collaboration
  • — Border Security and Cooperative Initiatives to Counter Illicit Drug Trafficking: The Case of Jamaica and the USA