Transdisciplinary Perspectives on Risk Management and Cyber Intelligence - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

14
(FIVE YEARS 14)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799843399, 9781799843405

Author(s):  
Maria Luisa Nardi

International politics is faced with new and vital issues, linked to aspects such as individual rights, the holding of democracy, the effects of worldwide policies, as well as the geopolitics of technology. The intertwining of technology and international relations is now a fact. Exploring the new and different political challenges posed by new technologies is a factor of transformation of the global society that influence on its actors. Today, an application of technological innovation, digital technology, and artificial intelligence is a steady political field. The focus of this work is to describe over time the notion of information warfare, which has matured and manifested into a form that has a colossal impact on how the contemporary wars are fought, but this has also resulted in the downgrading of strategic side of information warfare or cyber warfare to a decisive tactical force multiplier capable of turning the tides in war.


Author(s):  
Aldo Montanari

This work focused on the method of analysis, to be understood in general terms and following the intelligence cycle as developed by various international realities, with possible variations. This method was exposed, also graphically, before going further into the details of the different phases or the acquisition, processing of data, and news for subsequent dissemination. These procedures have been described in practical terms and from a distinctly private perspective, also providing the necessary connections with the figures responsible for their development up to the description and requirements that the information product must satisfy, also in this case from a customer's perspective.


Author(s):  
Luisa Dall'Acqua

Intelligence analysts are a task force of experts in the field of politics, economics, technology, military, and terrorism analysis. They possess the knowledge, sufficient capacity for imagination, and creativity to relate data predict events. The intelligence approach (basically) tries to reduce the uncertainty of this analysis to forecast the future without being privy to alternatives in the minds of policy decision makers. This chapter intends to describe a new interpretative socio-cognitive paradigm, Orientism, to understand and manage the fluid nature of knowledge, but at the same time to seize and manage the unpredictability and risks of dynamics of risk decision management in relationships complex environment. The new elements are five key factors and criteria to direct and motivate people in the choosing process and following 10 different and key relationships between them.


Author(s):  
Jirapun Daengdej

According to various surveys conducted, regardless of how many studies in software development projects have been done, the chance that software development projects may fail remains very high. A relatively new approach to the problem of failure is using the concept of artificial intelligence (AI) to help automate a certain part(s) of the projects in order to minimize the issue. Unfortunately, most of the works proposed to date use AI as a standalone system, which leads to limiting the degree of automation that the overall system can benefit from the technology. This chapter discusses a preliminary work on a novel risk monitoring, which utilizes a number of agent-based systems that cooperate with each other in minimizing risks for the projects. The proposed model not only leads to a high degree of automation in risk management, but this extensible model also allows additional tasks in risk monitoring to be easily added and automated if required.


Author(s):  
Luisa Dall'Acqua

Cognitive bias among workers can undermine security work and lead to critical misinterpretations of data. Understanding cognitive biases can improve understanding of how employees make decisions. This work analyzes key factors to better understand, predict, and obviate the detrimental bias symptoms, focusing on groupthink and polythink phenomena occurring in security and business decisions. It intends to provide support for the strategic versus tactical hypothesis in a strategic group decision-making, confirming how even in a clear-cut decision, following a groupthink or polythink dynamic, implementation becomes difficult due to a group dynamics at the other end of the decision-making continuum.


Author(s):  
Amitabh Anand ◽  
Giulia Mantovani

To tackle the phenomenon of terrorism, especially the attacks carried out by homegrown terrorists, since 2005 all the EU's member states have adopted the Global Strategy to Combat Terrorism. Focusing on four pillars (prevention, protection, persecution, and response), the strategy provides for security measures to protect against terrorism as a criminal act. What if, instead, we consider terrorism as a social phenomenon, strictly connected to radicalization and resulting from discriminatory experiences and discomfort young second generation immigrants suffer within the European society? Moving in this direction, through the application of the PESTLE analysis to the specific context of Belgium, this study elaborates a counterterrorism policy which takes into account the root and activating factors of radicalization by filling Belgium's gaps in terms of integration policies and which could help reducing the likelihood of occurring radicalization and terrorist attacks episodes.


Author(s):  
Idahosa Igbinakhase ◽  
Vannie Naidoo ◽  
Thea van der Westhuizen

The need to unravel the organizational capabilities of youth-serving NGOs that may influence the replication of successful programmes designed to empower poor youths in order to make these programmes accessible to more youths and more geographical locations has motivated this study. This chapter will highlight the crucial role lobbying plays for NGOs in their efforts to obtain funding for poverty alleviation programs in Nigeria. Lobbying challenges experienced by youth-serving NGOs and factors that influence lobbying capabilities will be also be unpacked and discussed. A quantitative study was conducted on 196 youth-serving NGOs in Nigeria. Simple random sampling was used to collect data. This chapter will highlight the crucial role lobbying plays for NGOs in efforts to obtain funding for poverty alleviation programs. The results of the study indicated that lobbying is an important organizational capability for youth-serving NGOs in their bid to alleviate youth poverty in Nigeria.


Author(s):  
John Thomas Riley

The story of General Patton at the Battle of the Bulge is an excellent example of a story with a message that can be applied to our climate crisis. Our climate crisis is the defining problem for human society in the 21st century. Although the current situation is chaotic, as in this story, several positive paths are now clear enough to allow useful plans for a worldwide effort. One alternative to fear is to build a vision of a viable future through stories. Stories have a long history of being a common tool for building unified societal efforts. The stories that society now needs require both a science-based background and believable characters in effective action on our climate crisis. The elements used to build stories, first the background and then the plot, are called beats. The background beats developed here include sea level rise, no-till farming, population peaking, and technology innovation for the period 2020 to 2100. These beats should enable fiction writers to place stories and characters in a world of action on our climate crisis.


Author(s):  
Irene Maria Gironacci

Over the past years, extended reality (XR) technologies, such as virtual, augmented, and mixed reality, have become more popular in business. Through immersive extended reality experiences, businesses of all shapes and sizes are waking up to the possibilities of using this emerging technology to create new opportunities and support their digital transformation. The aim of this chapter is to present the state of the art of extended reality devices, tools, and applications currently available.


Author(s):  
Aldo Montanari

The private information analysis is strictly inherent to the protection of corporate interests. This generally means protecting the company from fraud, theft of industrial secrets, and intellectual capital as well as protecting its cyber architecture. The tasks are delicate and suited to the various corporate interests. This information work would usefully be placed in the national intelligence context by providing a precious link between the national security services and the company itself, to which such an adhesion would be difficult to guarantee in any other way.


Sign in / Sign up

Export Citation Format

Share Document