Research Anthology on Artificial Intelligence Applications in Security

Research Anthology on Artificial Intelligence Applications in Security

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2020-11-27

Total Pages: 2253

ISBN-13: 1799877485

DOWNLOAD EBOOK

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.


Build a Security Culture

Build a Security Culture

Author: Kai Roer

Publisher: IT Governance Ltd

Published: 2015-03-12

Total Pages: 122

ISBN-13: 1849287171

DOWNLOAD EBOOK

Understand how to create a culture that promotes cyber security within the workplace. Using his own experiences, the author highlights the underlying cause for many successful and easily preventable attacks.


External Governance as Security Community Building

External Governance as Security Community Building

Author: Pernille Rieker

Publisher: Springer

Published: 2016-04-26

Total Pages: 232

ISBN-13: 1137561696

DOWNLOAD EBOOK

The European Neighbourhood Policy (ENP) was initially intended to create ‘a ring of friends surrounding the Union, from Morocco to Russia and the Black Sea’ (Prodi, 2002). Today, however, the ever-worsening security situation in the region clearly shows that the aim has not been achieved. With wars in Ukraine, Syria and Libya, the Union’s neighbourhood can therefore better be described as ‘a ring of fire’. Does this means that the policy has failed and that an alternative policy towards the EU’s neighbours is needed? Or should these developments be seen as temporary setbacks caused by external factors beyond EU control? By comparing the EU’s approach to its eastern and southern neighbours, this volume seeks to answer such overarching questions. The authors find that the EU still has a potential role to play in providing regional security, but that this role also risks being increasingly undermined if it does not increasingly take into account the broader geostrategic realities in both regions.


Negotiating Governance on Non-Traditional Security in Southeast Asia and Beyond

Negotiating Governance on Non-Traditional Security in Southeast Asia and Beyond

Author: Mely Caballero-Anthony

Publisher: Columbia University Press

Published: 2018-12-18

Total Pages: 216

ISBN-13: 0231544499

DOWNLOAD EBOOK

The threats the world currently faces extend beyond traditional problems such as major power competition, interstate conflict, and nuclear proliferation. Non-traditional security challenges such as climate change, migration, and natural disasters surpass states’ capacity to address them. These limitations have led to the proliferation of other actors—regional and international organizations, transnational networks, local and international nongovernmental organizations—that fill the gaps when states’ responses are lacking and provide security in places where there is none. In this book, Mely Caballero-Anthony examines how non-traditional security challenges have changed state behavior and security practices in Southeast Asia and the wider East Asia region. Referencing the wide range of transborder security threats confronting Asia today, she analyzes how non-state actors are taking on the roles of “security governors,” engaging with states, regional organizations, and institutional frameworks to address multifaceted problems. From controlling the spread of pandemics and transboundary pollution, to managing irregular migration and providing relief and assistance during humanitarian crises, Caballero-Anthony explains how and why non-state actors have become crucial across multiple levels—local, national, and regional—and how they are challenging regional norms and reshaping security governance. Combining theoretical discussions on securitization and governance with a detailed and policy-oriented analysis of important recent developments, Negotiating Governance on Non-Traditional Security in Southeast Asia and Beyond points us toward “state-plus” governance, where a multiplicity of actors form the building blocks for multilateral cooperative security processes to meet future global challenges.


The Oxford Handbook of Comparative Regionalism

The Oxford Handbook of Comparative Regionalism

Author: Tanja A. Börzel

Publisher: Oxford University Press

Published: 2016

Total Pages: 705

ISBN-13: 0199682305

DOWNLOAD EBOOK

The Oxford Handbook of Comparative Regionalism - the first of its kind - offers a systematic and wide-ranging survey of the scholarship on regionalism, regionalization, and regional governance. Unpacking the major debates, leading authors of the field synthesize the state of the art, provide a guide to the comparative study of regionalism, and identify future avenues of research. Twenty-seven chapters review the theoretical and empirical scholarship with regard to the emergence of regionalism, the institutional design of regional organizations and issue-specific governance, as well as the effects of regionalism and its relationship with processes of regionalization. The authors explore theories of cooperation, integration, and diffusion explaining the rise and the different forms of regionalism. The handbook also discusses the state of the art on the world regions: North America, Latin America, Europe, Eurasia, Asia, North Africa and the Middle East, and Sub-Saharan Africa. Various chapters survey the literature on regional governance in major issue areas such as security and peace, trade and finance, environment, migration, social and gender policies, as well as democracy and human rights. Finally, the handbook engages in cross-regional comparisons with regard to institutional design, dispute settlement, identities and communities, legitimacy and democracy, as well as inter- and transregionalism.


Information Security Governance Simplified

Information Security Governance Simplified

Author: Todd Fitzgerald

Publisher:

Published: 2012

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK

"Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure.Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. "--


European 'Security' Governance

European 'Security' Governance

Author: George Christou

Publisher: Routledge

Published: 2014-06-11

Total Pages: 206

ISBN-13: 1317977939

DOWNLOAD EBOOK

This book argues that we can understand and explain the EU as a security and peace actor through a framework of an updated and deepened concept of security governance. It elaborates and develops on the current literature on security governance in order to provide a more theoretically driven analysis of the EU in security. Whilst the current literature on security governance in Europe is conceptually rich, there still remains a gap between those that do 'security governance' and those that focus on 'security' per se. A theoretical framework is constructed with the objective of creating a conversation between these two literatures and the utility of such a framework is demonstrated through its application to the geospatial dimensions of EU security as well as specific cases studies in varied fields of EU security. This book was originally published as a special issue of European Security.


Information Security Governance

Information Security Governance

Author: S.H. Solms

Publisher: Springer Science & Business Media

Published: 2008-12-16

Total Pages: 141

ISBN-13: 0387799842

DOWNLOAD EBOOK

IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book will be of use to those studying information security, as well as those in industry.