Cargando…

Networks and Network Analysis for Defence and Security

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, nat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Masys, Anthony J. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Colección:Lecture Notes in Social Networks,
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-04147-6
003 DE-He213
005 20220114101701.0
007 cr nn 008mamaa
008 140210s2014 sz | s |||| 0|eng d
020 |a 9783319041476  |9 978-3-319-04147-6 
024 7 |a 10.1007/978-3-319-04147-6  |2 doi 
050 4 |a QA166-166.247 
072 7 |a PBV  |2 bicssc 
072 7 |a SCI064000  |2 bisacsh 
072 7 |a PBV  |2 thema 
082 0 4 |a 511.5  |2 23 
245 1 0 |a Networks and Network Analysis for Defence and Security  |h [electronic resource] /  |c edited by Anthony J. Masys. 
250 |a 1st ed. 2014. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a XVIII, 287 p. 55 illus., 39 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Social Networks,  |x 2190-5436 
505 0 |a Network Analysis in Criminal Intelligence -- Identifying mafia Bosses from Meeting Attendance -- Macrosocial Network Analysis: the Case of Transnational Drug Trafficking -- Policing the Hackers by Hacking them: Studying Online Deviants in IRC Chat Rooms -- Why Terror Networks are Dissimilar: How Structure Relates to Functions -- Social Network Analysis Applied to Criminal Networks: Recent Developments in Dutch Law Enforcement -- The Networked Mind- Collective Identities and the Cognitive-Affective Nature of Conflict -- Conflict Cessation and the Emergence of Weapons Supermarkets -- A Conspiracy of Bastards? -- Decision Support through Strongest Path Method Risk Analysis -- Critical Infrastructure and Vulnerability- a Relational Analysis through Actor Network Theory -- Dealing with Complexity: Thinking about Networks and the Comprehensive Approach. 
520 |a Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of 'big data' and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches. 
650 0 |a Graph theory. 
650 0 |a Social sciences-Data processing. 
650 0 |a Criminology. 
650 0 |a Game theory. 
650 0 |a Security systems. 
650 1 4 |a Graph Theory. 
650 2 4 |a Computer Application in Social and Behavioral Sciences. 
650 2 4 |a Criminology. 
650 2 4 |a Game Theory. 
650 2 4 |a Security Science and Technology. 
700 1 |a Masys, Anthony J.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319041483 
776 0 8 |i Printed edition:  |z 9783319041469 
776 0 8 |i Printed edition:  |z 9783319342917 
830 0 |a Lecture Notes in Social Networks,  |x 2190-5436 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-04147-6  |z Texto Completo 
912 |a ZDB-2-PHA 
912 |a ZDB-2-SXP 
950 |a Physics and Astronomy (SpringerNature-11651) 
950 |a Physics and Astronomy (R0) (SpringerNature-43715)