Security by design: innovative perspectives on complex problems
This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk a...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
[2018]
Cham Springer |
Schriftenreihe: | Advanced sciences and technologies for security applications
|
Schlagworte: | |
Online-Zugang: | URL des Erstveröffentlichers |
Zusammenfassung: | This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects |
Beschreibung: | 1 Online-Ressource (VI, 401 p. 115 illus., 93 illus. in color) |
ISBN: | 9783319780214 |
ISSN: | 1613-5113 |
DOI: | 10.1007/978-3-319-78021-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045913069 | ||
003 | DE-604 | ||
005 | 20211102 | ||
007 | cr|uuu---uuuuu | ||
008 | 190606s2018 |||| o||u| ||||||eng d | ||
020 | |a 9783319780214 |c Online |9 978-3-319-78021-4 | ||
024 | 7 | |a 10.1007/978-3-319-78021-4 |2 doi | |
035 | |a (ZDB-2-LCR)9783319780214 | ||
035 | |a (OCoLC)1187446096 | ||
035 | |a (DE-599)BVBBV045913069 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-188 |a DE-634 | ||
082 | 0 | |a 364.168 |2 23 | |
245 | 1 | 0 | |a Security by design |b innovative perspectives on complex problems |c Anthony J. Masys, editor |
264 | 1 | |a Cham |b Springer International Publishing |c [2018] | |
264 | 1 | |a Cham |b Springer | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (VI, 401 p. 115 illus., 93 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advanced sciences and technologies for security applications |x 1613-5113 | |
520 | 3 | |a This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects | |
650 | 4 | |a Cybercrime | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Computational Intelligence | |
650 | 4 | |a Software Management | |
650 | 4 | |a Simulation and Modeling | |
650 | 4 | |a Engineering | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer simulation | |
650 | 4 | |a System safety | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Computer crimes | |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Planung |0 (DE-588)4046235-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | 1 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 3 | |a Planung |0 (DE-588)4046235-3 |D s |
689 | 0 | |5 DE-188 | |
700 | 1 | |a Masys, Anthony J. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-78020-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-319-78022-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-08602-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-78021-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-LCR | ||
940 | 1 | |q ZDB-2-LCR_2018 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031295605 |
Datensatz im Suchindex
_version_ | 1804180085965586432 |
---|---|
any_adam_object | |
author2 | Masys, Anthony J. |
author2_role | edt |
author2_variant | a j m aj ajm |
author_facet | Masys, Anthony J. |
building | Verbundindex |
bvnumber | BV045913069 |
collection | ZDB-2-LCR |
ctrlnum | (ZDB-2-LCR)9783319780214 (OCoLC)1187446096 (DE-599)BVBBV045913069 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
doi_str_mv | 10.1007/978-3-319-78021-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03783nmm a2200661zc 4500</leader><controlfield tag="001">BV045913069</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211102 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190606s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319780214</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-78021-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-78021-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LCR)9783319780214</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1187446096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045913069</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security by design</subfield><subfield code="b">innovative perspectives on complex problems</subfield><subfield code="c">Anthony J. Masys, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VI, 401 p. 115 illus., 93 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advanced sciences and technologies for security applications</subfield><subfield code="x">1613-5113</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cybercrime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Simulation and Modeling</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer simulation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Planung</subfield><subfield code="0">(DE-588)4046235-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Planung</subfield><subfield code="0">(DE-588)4046235-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Masys, Anthony J.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-78020-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-78022-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-08602-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-78021-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LCR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LCR_2018</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031295605</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV045913069 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:30:10Z |
institution | BVB |
isbn | 9783319780214 |
issn | 1613-5113 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031295605 |
oclc_num | 1187446096 |
open_access_boolean | |
owner | DE-188 DE-634 |
owner_facet | DE-188 DE-634 |
physical | 1 Online-Ressource (VI, 401 p. 115 illus., 93 illus. in color) |
psigel | ZDB-2-LCR ZDB-2-LCR_2018 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Springer International Publishing Springer |
record_format | marc |
series2 | Advanced sciences and technologies for security applications |
spelling | Security by design innovative perspectives on complex problems Anthony J. Masys, editor Cham Springer International Publishing [2018] Cham Springer © 2018 1 Online-Ressource (VI, 401 p. 115 illus., 93 illus. in color) txt rdacontent c rdamedia cr rdacarrier Advanced sciences and technologies for security applications 1613-5113 This edited book captures salient global security challenges and presents ‘design’ solutions in dealing with wicked problems. Through case studies and applied research this book reveals the many perspectives, tools and approaches to support security design. Security design thereby can support risk and threat analysis, risk communication, problem framing and development of interventions strategies. From the refugee crisis to economic slowdowns in emerging markets, from ever-rising numbers of terrorist and cyberattacks to global water shortages, to the proliferation of the Internet of Things and its impact on the security of our homes, cities and critical infrastructure, the current security landscape is diverse and complex. These global risks have been in the headlines in the last year (Global Risks Report) and pose significant security challenges both nationally and globally. In fact, national security is no longer just national. Non-state actors, cyber NGO, rising powers, and hybrid wars and crimes in strategic areas pose complex challenges to global security. In the words of Horst Rittel (1968):"Design is an activity, which aims at the production of a plan, which plan -if implemented- is intended to bring about a situation with specific desired characteristics without creating unforeseen and undesired side and after effects Cybercrime Security Science and Technology Computational Intelligence Software Management Simulation and Modeling Engineering Management information systems Computer simulation System safety Computational intelligence Computer crimes Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Planung (DE-588)4046235-3 gnd rswk-swf Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Innere Sicherheit (DE-588)4127888-4 s Sicherheitspolitik (DE-588)4116489-1 s Sicherheit (DE-588)4054790-5 s Planung (DE-588)4046235-3 s DE-188 Masys, Anthony J. edt Erscheint auch als Druck-Ausgabe 978-3-319-78020-7 Erscheint auch als Druck-Ausgabe 978-3-319-78022-1 Erscheint auch als Druck-Ausgabe 978-3-030-08602-2 https://doi.org/10.1007/978-3-319-78021-4 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security by design innovative perspectives on complex problems Cybercrime Security Science and Technology Computational Intelligence Software Management Simulation and Modeling Engineering Management information systems Computer simulation System safety Computational intelligence Computer crimes Sicherheitspolitik (DE-588)4116489-1 gnd Sicherheit (DE-588)4054790-5 gnd Planung (DE-588)4046235-3 gnd Innere Sicherheit (DE-588)4127888-4 gnd |
subject_GND | (DE-588)4116489-1 (DE-588)4054790-5 (DE-588)4046235-3 (DE-588)4127888-4 (DE-588)4143413-4 |
title | Security by design innovative perspectives on complex problems |
title_auth | Security by design innovative perspectives on complex problems |
title_exact_search | Security by design innovative perspectives on complex problems |
title_full | Security by design innovative perspectives on complex problems Anthony J. Masys, editor |
title_fullStr | Security by design innovative perspectives on complex problems Anthony J. Masys, editor |
title_full_unstemmed | Security by design innovative perspectives on complex problems Anthony J. Masys, editor |
title_short | Security by design |
title_sort | security by design innovative perspectives on complex problems |
title_sub | innovative perspectives on complex problems |
topic | Cybercrime Security Science and Technology Computational Intelligence Software Management Simulation and Modeling Engineering Management information systems Computer simulation System safety Computational intelligence Computer crimes Sicherheitspolitik (DE-588)4116489-1 gnd Sicherheit (DE-588)4054790-5 gnd Planung (DE-588)4046235-3 gnd Innere Sicherheit (DE-588)4127888-4 gnd |
topic_facet | Cybercrime Security Science and Technology Computational Intelligence Software Management Simulation and Modeling Engineering Management information systems Computer simulation System safety Computational intelligence Computer crimes Sicherheitspolitik Sicherheit Planung Innere Sicherheit Aufsatzsammlung |
url | https://doi.org/10.1007/978-3-319-78021-4 |
work_keys_str_mv | AT masysanthonyj securitybydesigninnovativeperspectivesoncomplexproblems |