Scientific Support for the Decision Making in the Security Sector


Book Description

Security environment is characterized by deep uncertainty. Threats are being posed not only by adversary (political) forces but may also come from natural challenges. This title reflects the initial state of a dialogue between specialists in security and specialists in mathematics, computer and information sciences on security topics.




Security Science


Book Description

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspective based on robust underlying theories, principles, models or frameworks. Demonstrating the relationships and underlying concepts, they present an approach to each core security function within the context of both organizational security and homeland security. The book is unique in its application of the scientific method to the increasingly challenging tasks of preventing crime and foiling terrorist attacks. Incorporating the latest security theories and principles, it considers security from both a national and corporate perspective, applied at a strategic and tactical level. It provides a rational basis for complex decisions and begins the process of defining the emerging discipline of security science. - A fresh and provocative approach to the key facets of security - Presentation of theories and models for a reasoned approach to decision making - Strategic and tactical support for corporate leaders handling security challenges - Methodologies for protecting national assets in government and private sectors - Exploration of security's emerging body of knowledge across domains




The Fight Against Terrorism and Crisis Management in the Western Balkans


Book Description

Terrorism is not the only threat that causes the emergence of crises. The so-called ‘crisification’ of our security environment also seems to be rising due to many other factors. Such an environment is generating many crises related to politico-military conflicts, natural disasters, infectious diseases, information disruptions, ethnic or religious violence and others. Many of these crises are completely or nearly completely unexpected and have a strong effect on the security of individual people, states and the international community. ‘Crisis’ has become the key word instead of ‘war’. The awareness of this is partially driven by the growing role of electronic media, bringing negative news and reports to nearly all homes, and partially by objective technical factors that allow the fast escalation of local crises to the international level. Globalization therefore has a strong subjective and objective impact on the understanding of security.




Neuroscience perspectives on Security: Technology, Detection, and Decision Making


Book Description

In security science, efficient operation depends typically on the interaction between technology, human and machine detection and human and machine decision making. A perfect example of this interplay is ‘gatekeeping’, which is aimed to prevent the passage of people and objects that represent known threats from one end to the other end of an access point. Gatekeeping is most often achieved via visual inspections, mass screening, random sample probing and/or more targeted controls on attempted passages at points of entry. Points of entry may be physical (e.g. national borders) or virtual (e.g. connection log-ons). Who and what are defined as security threats and the resources available to gatekeepers determine the type of checks and technologies that are put in place to ensure appropriate access control. More often than not, the net performance of technology-aided screening and authentication systems ultimately depends on the characteristics of human operators. Assessing cognitive, affective, behavioural, perceptual and brain processes that may affect gatekeepers while undertaking this task is fundamental. On the other hand, assessing the same processes in those individuals who try to breach access to secure systems (e.g. hackers), and try to cheat controls (e.g. smugglers) is equally fundamental and challenging. From a security standpoint it is vital to be able to anticipate, focus on and correctly interpret the signals connected with such attempts to breach access and/or elude controls, in order to be proactive and to enact appropriate responses. Knowing cognitive, behavioral, social and neural constraints that may affect the security enterprise will undoubtedly result in a more effective deployment of existing human and technological resources. Studying how inter-observer variability, human factors and biology may affect the security agenda, and the usability of existing security technologies, is of great economic and policy interest. In addition, brain sciences may suggest the possibility of novel methods of surveillance and intelligence gathering. This is just one example of a typical security issue that may be fruitfully tackled from a neuroscientific and interdisciplinary perspective. The objective of our Research Topic was to document across relevant disciplines some of the most recent developments, ideas, methods and empirical findings that have the potential to expand our knowledge of the human factors involved in the security process. To this end we welcomed empirical contributions using different methodologies such as those applied in human cognitive neuroscience, biometrics and ethology. We also accepted original theoretical contributions, in the form of review articles, perspectives or opinion papers on this topic. The submissions brought together researchers from different backgrounds to discuss topics which have scientific, applicative and social relevance.




Political Decision-Making and Security Intelligence


Book Description

""This book examines the main techniques of intelligence analysis to prevent terrorism and political attacks conducted by state/non-state actors. It also explores the use of new technologies as investigative tools and training"--Provided by publisher"--




Bulgarian Integration Into Europe and NATO


Book Description

Of Paper for NATO Advanced Research Workshop: Assessing Research and Innovation Policies and Their ImpactDevelopment and State of the Art of Evaluation in Germany with Special Reference to Higher Education and Research; Models of Evaluation Systems in Greece; Out of Success, Success: How Ireland Refuses to Grow Complacent; The eFORSEE Malta Project: Spotlight on Science-Society Interactions and Learning; COS = The Netherlands Consultative Committee of Sector Councils for Research and Develop.




Research in Computer Science in the Bulgarian Academy of Sciences


Book Description

This book is a collection of papers devoted to the emergence and development in Bulgarian Academy of Sciences of some of the areas of informatics, including artificial intelligence. The papers are prepared by specialists from the Academy, some of whom are among the founders of these scientific and application areas in Bulgaria and in some cases – in the world. The book is interesting for specialists in informatics and computer science and researchers in history of sciences.





Book Description




Energy Security


Book Description

In terms of energy security the Black Sea region is important to Europe. Inevitably and for very good reasons, a lot of attention has been given to the existing and planned pipeline routes going around or across the Black Sea. Much less attention has been given to the development of the Black Sea energy market in its own right and to the potential advantages of coping with some current and future energy issues in a multilateral regional format rather than through individual action at national level. The present book addresses, in a comprehensive manner, the current problematic of energy security and goes beyond pipeline politics, without playing down their continued significance; it addresses some topical questions related to the sustainability and resilience of energy systems as applicable to the Black Sea region.




Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism Operations


Book Description

Terrorism is not a new phenomenon, but almost all communities, regardless of ethnicity, religion, social status or location, are now increasingly facing the challenge of terrorist threat. What makes a terrorist organization attractive to some citizens? A better understanding of the reasons why individuals choose to join terror groups may well enhance efforts to disrupt the recruitment process of terrorist organizations and thereby support current and future counter-terrorism initiatives. This book presents the proceedings of the NATO Advanced Research Workshop, 'Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism Operations', held in Antalya, Turkey, in May 2015. The goal of the workshop was to share existing ideas and develop new ones to tackle terrorist recruitment. The book contains 18 articles covering topics which include: the role of NATO and other international entities in counter-terrorism; understanding recruitment methods and socialization techniques of terror networks by comparing them to gangs; social media in terrorist recruitment; drug money links with terrorist financing; and counter-terrorism and human rights. The book will be of interest to all those involved in developing, planning and executing prevention programs and policies in relation to both armed and non-armed counter-terrorism operations.