This publication presents a concise introduction to threat and risk analysis, the use and construction of scenarios, the role of intelligence and early warning, and political forecasting and state decay--Publisher's description.
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk. - Presents case studies and actual data to demonstrate threat data visualization techniques and threat simulation tools - Explores the usage of kill chain modelling to inform actionable security intelligence - Demonstrates a methodology that can be used to create a full threat forecast analysis for enterprise networks of any size
An original and insightful book, this work focuses on domestic and overseas firms operating in those Central Asian and Eastern European countries considered to be the transitional economic periphery. Chapters shed light on their distinct forms of capitalism, and how it influences and adapts the firms located there. The eminent authors show how, in a post-state socialist world, there are several implications for both domestic and overseas firms functioning successfully in the transitional periphery. With the complex mix of political and market mediation and informal personal ties, chapters explore the delicate balance of liberalisation in transitional economies. Detailed examples from specific countries in Eurasia and Central Asia such as Belarus, Turkey, Azerbaijan, Mongolia, Uzbekistan, Armenia and Georgia are discussed alongside broader thematic issues of economic and social change, labour relations and human resource management. Most importantly, it is shown that liberalisation has little connection to short-term business growth. To succeed in such contexts, international firms need to be both pragmatic and creative, in coping with malleable yet durable forms of institutional mediation. Providing a unique perspective on the transitional economic periphery and much-needed insights from international business, this book is essential reading for researchers and graduate students studying transitional economies, non-traditional business models, institutional persistence and change, political and economic development and management in economically transitioning countries.
This book inquires into the use of prediction at the intersection of politics and academia, and reflects upon the implications of future-oriented policy-making across different fields. The volume focuses on the key intricacies and fallacies of prevision in a time of complexity, uncertainty, and unpredictability. The first part of the book discusses different academic perspectives and contributions to future-oriented policy-making. The second part discusses the role of future knowledge in decision-making across different empirical issues such as climate, health, finance, bio- and nuclear weapons, civil war, and crime. It analyses how prediction is integrated into public policy and governance, and how in return governance structures influence the making of knowledge about the future. Contributors integrate two analytical dimensions in their chapters: the epistemology of prevision and the political and ethical implications of prevision. In this way, the volume contributes to a better understanding of the complex interaction and feedback loops between the processes of creating knowledge about the future and the application of this future knowledge in public policy and governance. This book will be of much interest to students of security studies, political science, sociology, technology studies, and International Relations. The Open Access version of this book, available at https://www.routledge.com/The-Politics-and-Science-of-Prevision-Governing-and-Probing/Wenger-Jasper-Cavelty/p/book/9780367900748, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
The events of September 11, 2001 changed perceptions, rearranged national priorities, and produced significant new government entities, including the U.S. Department of Homeland Security (DHS) created in 2003. While the principal mission of DHS is to lead efforts to secure the nation against those forces that wish to do harm, the department also has responsibilities in regard to preparation for and response to other hazards and disasters, such as floods, earthquakes, and other "natural" disasters. Whether in the context of preparedness, response or recovery from terrorism, illegal entry to the country, or natural disasters, DHS is committed to processes and methods that feature risk assessment as a critical component for making better-informed decisions. Review of the Department of Homeland Security's Approach to Risk Analysis explores how DHS is building its capabilities in risk analysis to inform decision making. The department uses risk analysis to inform decisions ranging from high-level policy choices to fine-scale protocols that guide the minute-by-minute actions of DHS employees. Although DHS is responsible for mitigating a range of threats, natural disasters, and pandemics, its risk analysis efforts are weighted heavily toward terrorism. In addition to assessing the capability of DHS risk analysis methods to support decision-making, the book evaluates the quality of the current approach to estimating risk and discusses how to improve current risk analysis procedures. Review of the Department of Homeland Security's Approach to Risk Analysis recommends that DHS continue to build its integrated risk management framework. It also suggests that the department improve the way models are developed and used and follow time-tested scientific practices, among other recommendations.
Threats in Context: Identify, Analyze, Anticipate begins with the premise that a risk assessment is relevant primarily—and hinges upon—the correct evaluation of the threat. According to the author, all the other stages of the risk evaluation are, in fact, dependent on getting the understanding and measurement of the threat right. Despite this truism, many risk assessment methods (i.e., the process of determining the threat) tend to rush through a vague typology, offer minimal classifications, utilize an often-outdated list of potential malevolent actions—all of which are based on precedent occurrences. There should be a way to improve on this: a way to provide security practitioners and analysts better tools to deal with the task of analyzing threats and risk and to prepare for such contingencies appropriately. The book begins with a retrospective on the threats from the 1960s through to the present. The list is long and includes hijackings and airport attacks, piracy, drug smuggling, attacks on trains, pipelines, city-wide multi-site attacks, road attacks, workplace shootings, lone wolf attacks, drone attacks, bombings, IEDs, sniper attacks, random stabbings, and more. Terrorism, workplace violence, and active shooter scenarios all present asymmetric problems and unique challenges that require new ways of thinking, operationally, of risk to properly prevent, mitigate, and respond to such threats. The author demonstrates how to develop an appropriate methodology to define both current and emerging threats, providing a five-step process to self-evaluate—to determine an organization’s, a location’s, or a facility’s threats and to plan risk mitigation strategies to accurately identify, minimize, and neutralize such threats. Coverage progressively builds from correctly identifying the root threats—both global and local—to a subsequent understanding of the corollary relationship between threat, vulnerability, and risk, with the threat serving as the fundamental cornerstone of the risk evaluation. As such, Threats in Context will serve as a pivotal resource to security professionals from all backgrounds serving in a variety of fields and industries.
Risk management is especially important for military forces deployed in hostile and/or chemically contaminated environments, and on-line or rapid turn-around capabilities for assessing exposures can create viable options for preventing or minimizing incapaciting exposures or latent disease or disability in the years after the deployment. With military support for the development, testing, and validation of state-of-the-art personal and area sensors, telecommunications, and data management resources, the DOD can enhance its capabilities for meeting its novel and challenging tasks and create technologies that will find widespread civilian uses. Strategies to Protect the Health of Deployed U.S. Forces assesses currently available options and technologies for productive pre-deployment environmental surveillance, exposure surveillance during deployments, and retrospective exposure surveillance post-deployment. This report also considers some opportunities for technological and operational advancements in technology for more effective exposure surveillance and effects management options for force deployments in future years.
This book narrates the unravelling of Zimbabwe, a country that was once considered an inspiration on the continent of Africa in terms of socioeconomic development. Recognising that many factors contributed to the collapse of the nation, and that this collapse was a process that occurred over a long period, it looks at historical events and processes like the colonisation of the country and dispossession of the indigenous people, and the misrule, politically-motivated violence and economic mismanagement that followed under Robert Mugabe, as the pivotal moments that precipitated the subsequent fall of Zimbabwe. The book also examines the role that the regional intergovernmental organisation, the Southern African Development Community (SADC), played in trying to help Zimbabwe overcome its security, political and economic challenges.