Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore…
The North American Arctic addresses the emergence of a new security relationship within the North American North. It focuses on current and emerging security issues that confront the North American Arctic and that shape relationships between and with neighbouring states (Alaska in the US; Yukon, Northwest Territories and Nunavut in Canada; Greenland and Russia).
This is open access volume of the NL ARMS offers an interdisciplinary view on the domain of Compliance and Integrity in International Military Trade (CIIMT), integrating defence economics, international law, arms export control frameworks and policies, information management, organizational sciences and ethics. Although, in academia, and from an interdisciplinary perspective, CIIMT constitutes …
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. This chapter is available open access under a CC BY license. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved sec…
The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, i…
Drawing on the ethnographic experience of the contributors, this volume explores the Cultural Models of Nature found in a range of food-producing communities located in climate-change affected areas. These Cultural Models represent specific organizations of the etic categories underlying the concept of Nature (i.e. plants, animals, the physical environment, the weather, humans, and the supernat…
This open access book features various studies on democratization, transformation, socio-economic development, and security issues in the Organization for Security and Cooperation in Europe (OSCE) geographical region and beyond. Written by experts and scholars working in the field of human dimension, security, transformation and development in Europe and Asia, particularly in post-soviet and co…
By definition scientists are an inquisitive lot. But what are the scientific curiosities and concerns on the minds of Australians? What worries them, baffles them, and sets their curiosity meter to 10 out of 10? To find out, the Office of the Chief Scientist (OCS) took the nation’s intellectual temperature, surveying 1186 Australians: men and women aged 18 to 65, from all education levels and…
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore…
This open access volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies. The use and utility of deterrence in today’s strategic environment is a topi…
This book is generally focused on food choice and which factors are associated with the decisions that define people’s eating behaviour. These factor are highly variable and include influences from the surrounding environment as well as the individual characteristics of each person. The book includes a number of chapters that address these issues from different points of view. Some explore th…
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and pri…
This open access book addresses several questions regarding the implementation of human and organisational factors (HOF) so that recent improvements in industrial safety can be built upon. It addresses sources of frustration in senior management with high expectations of operational recommendations and disquiet on the part of HOF specialists struggling to have an impact on high-level decision m…
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively. T…
The first book to look beyond cyber security measures that are merely aimed at prevention Highlights how the risk of digital disruption can never be eliminated completely Focuses on the manners to ensure preparedness and initiate mechanisms that can tell us when things are going wrong