TY - BOOK AU - Akhgar,Babak AU - Yates,Simeon TI - Strategic intelligence management: national security imperatives and information and communications technologies SN - 9780124071919 AV - UA 10.5 . A34 2013 U1 - 353.1/7234 23 PY - 2013///] CY - Waltham, MA PB - Elsevier/Butterworth-Heinmann KW - Telecommunication KW - Security measures KW - National security KW - Tecnological innovations KW - Government policy KW - Emergency management KW - Technological innovations KW - Cyberterrorism KW - Prevention KW - Information technology KW - Management KW - Strategic aspects KW - Knowledge management N1 - Includes bibliographical references (pages 273-295) and index; Introduction : strategy formation in the a globalised and networked age : a review of the concept and its definition -- National security strategies and issues -- Securing the state : strategic responses for an interdependent world -- We have met the enemy and they are us : insider threat and its challenge to national security -- An age of asymmetric challenges--4th generation warfare at sea -- Port and border security - the first and last line of national security defence -- The public, communication, risk and national security -- Risk communication, risk perception and behaviour as foundations of effective national security practices -- Promoting public resilience against CBRN terrorism -- From local to global : policing and national security -- The role of social media in crisis : a European holistic approach to the adoption of online and mobile communications in crisis response and search and rescue efforts -- Emerging technologies and the human rights challenge of rapidly expanding -- State surveillance capacities -- Technologies, information and knowledge for national security -- User requirements and training needs within security applications : methods for capture and communication -- Exploring the crisis management/knowledge management nexus -- A semantic approach to security policy reasoning -- The Athena project : using formal concept analysis to facilitate the actions of responders in a crisis situation -- Exploiting intelligence for national security -- Re-thinking standardization for interagency information sharing -- Future threats and cyber security -- Securing cyberspace : strategic responses for a digital age -- National cyber defense strategy -- From cyber terrorism to state actors : covert cyber operations -- Cybersecurity countermeasures to combat cyberterrorism -- Developing a model to reduce and/or prevent cyber crime victimization among the user individuals -- Conclusion ER -