Browse Results

Showing 47,926 through 47,950 of 56,875 results

Security and Crime Prevention in Libraries (Routledge Revivals)

by Michael Chaney Alan F. MacDougall

First published in 1992, the purpose of this book is to identify and describe the most important factors that must be considered in making decisions about the optimal ways to provide access to information – in short the best way to use the humans, the machines, and the intangible resources known as information, particularly at the organizational level. In recent years executives have begun to outsource computing and telecommunications functions primarily to control costs. Traditional libraries and information centres have been disbanded in favour of service contracts or outright leasing of staff. Both the private and public sector are examining their information service operations from the point of view of cost effectiveness. Decisions about owning versus leasing of information are being made daily. Decision makers are finding that they must deal differently with funding and budgeting of information systems and libraries than they have in the past. New paradigms for these service functions already exist. Not only have corporations and governments begun to contract out entire information service operations, but libraries themselves have begun to consider the costs, effectiveness, and implications of outsourcing some of their operations and services. This book provides a framework for decision-makers to view and review information services within their organizations. Entire units, components of libraries and information centres are defined and untangled so that the widest variety of organizations can analyse their own environments. Although there is a minimal use of library and computing jargon, a short glossary at the end explains terms for which there is no simple English language substitute. Each chapter is accompanied by comments from a broad range of experts in the information field.

Security and Crime Prevention in Libraries (Routledge Revivals)

by Michael Chaney Alan F. MacDougall

First published in 1992, the purpose of this book is to identify and describe the most important factors that must be considered in making decisions about the optimal ways to provide access to information – in short the best way to use the humans, the machines, and the intangible resources known as information, particularly at the organizational level. In recent years executives have begun to outsource computing and telecommunications functions primarily to control costs. Traditional libraries and information centres have been disbanded in favour of service contracts or outright leasing of staff. Both the private and public sector are examining their information service operations from the point of view of cost effectiveness. Decisions about owning versus leasing of information are being made daily. Decision makers are finding that they must deal differently with funding and budgeting of information systems and libraries than they have in the past. New paradigms for these service functions already exist. Not only have corporations and governments begun to contract out entire information service operations, but libraries themselves have begun to consider the costs, effectiveness, and implications of outsourcing some of their operations and services. This book provides a framework for decision-makers to view and review information services within their organizations. Entire units, components of libraries and information centres are defined and untangled so that the widest variety of organizations can analyse their own environments. Although there is a minimal use of library and computing jargon, a short glossary at the end explains terms for which there is no simple English language substitute. Each chapter is accompanied by comments from a broad range of experts in the information field.

Security and Defence: Ethical and Legal Challenges in the Face of Current Conflicts (Advanced Sciences and Technologies for Security Applications)

by Juan Cayón Peña

This book aspires to face the challenge of analyzing with due academic rigor, always in the paradigm of security and advanced sciences, but without forgetting the ethical questions that our world raises every day. The work is divided into two main sections: the first section is focused on the cyber world, with not only technical but also legal derivations given the expansion of vulnerabilities and our technological dependence. The second section, with a more interdisciplinary nature, runs through undeniably topical issues such as territorial problems and the potential decline of the traditional States, the communicational impact of information management and false news, or the commitment to essential freedoms for the West. This book connects advanced technologies and ethical issues and includes discussions on recent crises such as COVID-19. It also provides an interdisciplinary view on the ethical issues for security technologies.

Security and Environment in the Mediterranean: Conceptualising Security and Environmental Conflicts (Hexagon Series on Human and Environmental Security and Peace #1)

by K.S.A Jaber C. Tickell J. Dean E. S. Yassin

In this volume security specialists, peace researchers, environmental scholars, demographers as well as climate, desertification, water, food and urbanisation specialists from the Middle East and North Africa, Europe and North America review security and conflict prevention in the Mediterranean. They also analyse NATO’s Mediterranean security dialogue and offer conceptualisations on security and perceptions of security challenges as seen in North and South. The latter half of the book analyses environmental security and conflicts in the Mediterranean and environmental consequences of World War II, the Gulf War, the Balkan wars and the Middle East conflict. It also examines factors of global environmental change: population growth, climate change, desertification, water scarcity, food and urbanisation issues as well as natural disasters. Furthermore, it draws conceptual conclusions for a fourth phase of research on human and environmental security and peace as well as policy conclusions for cooperation and partnership in the Mediterranean in the 21st century.

Security and Human Right to Water in Central Asia (Security, Development and Human Rights in East Asia)

by Miguel Ángel Pérez Martín

This book examines the impact and implications of the declaration of human right to water and sanitation access for human security in Central Asia. It analyzes the current risks and threats arising from mismanagement of water resources in Central Asia through the different dimensions of human security: environmental, economic, social, and political. Identifying the main actors involved in water conflict in the region, the author pays particular attention to the multilateral security organizations operating in the region, OSCE, NATO, SCO, and CSTO, and discusses whether their security policies have been effective in addressing these conflicts.

Security and Human Rights

by Ben Goold Liora Lazarus

In the wake of the events of September 11th, the task of reconciling issues of security with a respect for fundamental human rights has emerged as one of the key challenges facing governments throughout the world. Although the issues raised by the rise of security have been the subject of considerable academic interest, to date much of the debate surrounding the impact of security on human rights has taken place within particular disciplinary confines. In contrast, this collection of essays from leading academics and practitioners in the fields of criminal justice, public law, international law, international relations and legal philosophy offers a genuinely multidisciplinary perspective on the relationship between security and human rights. In addition to exploring how the demands of security might be reconciled with the desire to protect established rights, Security and Human Rights offers a fresh perspective on the broader legal and political challenges that lie ahead as states attempt to control crime, prevent terrorism and protect their citizens.

Security and Human Rights (Hart Studies in Security and Justice)

by Benjamin J. Goold Liora Lazarus

This is the second edition of the acclaimed Security and Human Rights, first published in 2007. Reconciling issues of security with a respect for fundamental human rights has become one of the key challenges facing governments throughout the world. The first edition broke the disciplinary confines in which security was often analysed before and after the events of 11 September 2001. The second edition continues in this tradition, presenting a collection of essays from leading academics and practitioners in the fields of criminal justice, public law, privacy law, international law, and critical social theory. The collection offers genuinely multidisciplinary perspectives on the relationship between security and human rights. In addition to exploring how the demands of security might be reconciled with the protection of established rights, Security and Human Rights provides fresh insight into the broader legal and political challenges that lie ahead as states attempt to control crime, prevent terrorism, and protect their citizens. The volume features a set of new essays that engage with the most pressing questions facing security and human rights in the twenty-first century and is essential reading for all those working in the area.

Security and Human Rights (Hart Studies in Security and Justice)

by Benjamin J Goold Liora Lazarus

This is the second edition of the acclaimed Security and Human Rights, first published in 2007. Reconciling issues of security with a respect for fundamental human rights has become one of the key challenges facing governments throughout the world. The first edition broke the disciplinary confines in which security was often analysed before and after the events of 11 September 2001. The second edition continues in this tradition, presenting a collection of essays from leading academics and practitioners in the fields of criminal justice, public law, privacy law, international law, and critical social theory. The collection offers genuinely multidisciplinary perspectives on the relationship between security and human rights. In addition to exploring how the demands of security might be reconciled with the protection of established rights, Security and Human Rights provides fresh insight into the broader legal and political challenges that lie ahead as states attempt to control crime, prevent terrorism, and protect their citizens. The volume features a set of new essays that engage with the most pressing questions facing security and human rights in the twenty-first century and is essential reading for all those working in the area.

Security and Human Rights (Hart Studies In Security And Justice Ser.)

by Benjamin J Goold Liora Lazarus

In the wake of the events of September 11th, the task of reconciling issues of security with a respect for fundamental human rights has emerged as one of the key challenges facing governments throughout the world. Although the issues raised by the rise of security have been the subject of considerable academic interest, to date much of the debate surrounding the impact of security on human rights has taken place within particular disciplinary confines. In contrast, this collection of essays from leading academics and practitioners in the fields of criminal justice, public law, international law, international relations and legal philosophy offers a genuinely multidisciplinary perspective on the relationship between security and human rights. In addition to exploring how the demands of security might be reconciled with the desire to protect established rights, Security and Human Rights offers a fresh perspective on the broader legal and political challenges that lie ahead as states attempt to control crime, prevent terrorism and protect their citizens.

Security and International Law (Studies in International Law)

by Mary E Footer Julia Schmidt Nigel D White Lydia Davies-Bright

Of the many challenges that society faces today, possibly none is more acute than the security of ordinary citizens when faced with a variety of natural or man-made disasters arising from climate and geological catastrophes, including the depletion of natural resources, environmental degradation, food shortages, terrorism, breaches of personal security and human security, or even the global economic crisis. States continue to be faced with a range of security issues arising from contested territorial spaces, military and maritime security and security threats relating to energy, infrastructure and the delivery of essential services. The theme of the book encompasses issues of human, political, military, socio-economic, environmental and energy security and raises two main questions. To what extent can international law address the types of natural and man-made security risks and challenges that threaten our livelihood, or very existence, in the twenty-first century? Where does international law fall short in meeting the problems that arise in different situations of insecurity and how should such shortcomings be addressed?

Security and International Law: Essays In Memory Of Hilaire Mccoubrey (Studies in International Law)

by Mary E Footer Julia Schmidt Nigel D White Lydia Davies-Bright

Of the many challenges that society faces today, possibly none is more acute than the security of ordinary citizens when faced with a variety of natural or man-made disasters arising from climate and geological catastrophes, including the depletion of natural resources, environmental degradation, food shortages, terrorism, breaches of personal security and human security, or even the global economic crisis. States continue to be faced with a range of security issues arising from contested territorial spaces, military and maritime security and security threats relating to energy, infrastructure and the delivery of essential services. The theme of the book encompasses issues of human, political, military, socio-economic, environmental and energy security and raises two main questions. To what extent can international law address the types of natural and man-made security risks and challenges that threaten our livelihood, or very existence, in the twenty-first century? Where does international law fall short in meeting the problems that arise in different situations of insecurity and how should such shortcomings be addressed?

Security and Privacy: Volume III (The Library of Essays on Law and Privacy)

by Joseph Savirimuthu

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly in a climate of growing public mistrust of State surveillance activities and business predisposition to monetize information relating to the online activities of users. This volume is informed by the range of discussions currently conducted at scholarly and policy levels. The essays illustrate the value of viewing privacy concerns not only in terms of the means by which information is communicated but also in terms of the political processes that are inevitably engaged and the institutional, regulatory and cultural contexts within which meanings regarding identity and security are constituted.

Security and Privacy: Volume III (The Library of Essays on Law and Privacy #3)

by Joseph Savirimuthu

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly in a climate of growing public mistrust of State surveillance activities and business predisposition to monetize information relating to the online activities of users. This volume is informed by the range of discussions currently conducted at scholarly and policy levels. The essays illustrate the value of viewing privacy concerns not only in terms of the means by which information is communicated but also in terms of the political processes that are inevitably engaged and the institutional, regulatory and cultural contexts within which meanings regarding identity and security are constituted.

Security and Privacy in Biometrics

by Patrizio Campisi

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardization; describes real-world applications, from face and fingerprint-based user recognition, to biometrics-based electronic documents, and biometric systems employing smart cards; reviews the ethical implications of the ubiquity of biometrics in everyday life, and its impact on human dignity; provides guidance on best practices for the processing of biometric data within a legal framework.

Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers (Lecture Notes in Computer Science #2320)

by Tomas Sander

The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.

Security and Privacy in User Modeling (Human–Computer Interaction Series #2)

by J. Schreck

User-adaptive (or "personalized") systems take individual character­ istics of their current users into account and adapt their behavior ac­ cordingly. Several empirical studies demonstrate their benefits in areas like education and training, online help for complex software, dynamic information delivery, provision of computer access to people with dis­ abilities, and to some extent information retrieval. Recently, personal­ ized systems have also started to appear on the World Wide Web where they are primarily used for customer relationship management. The aim hereby is to provide value to customers by serving them as individuals and by offering them a unique personal relationship with the business. Studies show that web visitors indeed spend considerably more time at personalized than at regular portals and view considerably more web pages. Personalized sites in general also draw more visitors and turn more visitors into buyers. Personalization therefore would look like a win-win technology for both consumers and online businesses. However, it has a major down­ side: in order to be able to exhibit personalized behavior, user-adaptive systems have to collect considerable amounts of personal data and "lay them in stock" for possible future usage. Moreover, the collection of information about the user is often performed in a relatively inconspic­ uous manner (such as by monitoring users' web navigation behavior), in order not to distract users from their tasks.

Security and Privacy Preserving in Social Networks (Lecture Notes in Social Networks)

by Richard Chbeir and Bechara Al Bouna

This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.

Security And Risk Technologies In Criminal Justice: Critical Perspectives (PDF)

by Aaron Doyle Christopher J. Schneider Stacey Hannem Carrie B. Sanders Tony Christensen

Security and Risk Technologies in Criminal Justice takes students through the evolution of risk technology devices, processes, and prevention. This seminal text unpacks technology's influence on our understanding of governance and social order in areas of criminal justice, policing, and security. With a foreword by leading criminologist, Kevin Haggerty, the collection consists of three sections that explore the impact of big data, traditional risk practices, and the increased reliance on technology in criminal justice. Eight chapters offer diverse examples that are linked by themes of preventative justice, calculability of risk, the theatre and reality of technology, and the costs of justice. With both national and international appeal, this vital resource is ideal for undergraduate and graduate students in criminology, police studies, or sociology.

Security Architect: Careers in information security (Bcs Guides To It Roles Ser.)

by Jon Collins

Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. This book gives practical career guidance to those interested in the security architect role. It covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks.

Security Architect: Careers in information security (Bcs Guides To It Roles Ser.)

by Jon Collins

Security architects are responsible for maintaining the security of an organisation's computer systems as well as designing, developing and reviewing security architectures that fit business requirements, mitigate risk and conform to security policies. This book gives practical career guidance to those interested in the security architect role. It covers areas such as required skills, responsibilities, dependencies and career progression as well as relevant tools, standards and frameworks.

Security Awareness: Neue Wege zur erfolgreichen Mitarbeiter-Sensibilisierung (Edition <kes>)

by Michael Helisch Dietmar Pokoyski

Security ist in aller Munde. Und unbestritten gilt heute nach Jahren der Konzentration auf stets neue technische Tools der Mensch als Schlüssel zum Erfolg der Unternehmenssicherheit. In diesem Zusammenhang ist viel von Security Awareness die Rede. Doch was bedeutet eigentlich Awareness? Reicht „Sensibilisierung“? Reichen didaktische Veranstaltungen oder E-Learning-Tools aus oder sind vielmehr ganzheitliche Kommunikationsstrategien der Schlüssel für die oftmals beschworenen Verhaltensänderungen? Erfahrene Berater, Kommunikationsexperten, Psychologen und Software-Architekten aus Deutschland, Österreich und der Schweiz beschreiben, welche Rolle Sicherheitskultur im Rahmen von Awareness spielt, sowie Methoden für Analysen und Konzeption bzw. Implementierung von Maßnahmen. Checklisten und Quellenangaben für Tools und Kampagnen-Bausteine vervollständigen das Buch und machen es zu einem unverzichtbaren Führer durch eine hier erstmals beschriebene methodische Awareness-Kommunikation.

Security Controls Evaluation, Testing, and Assessment Handbook

by Leighton Johnson

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts.Provides direction on how to use SP800-53A, SP800-115, DOD Knowledge Service, and the NIST Families assessment guides to implement thorough evaluation efforts Shows readers how to implement proper evaluation, testing, assessment procedures and methodologies, with step-by-step walkthroughs of all key conceptsPresents assessment techniques for each type of control, provides evidence of assessment, and includes proper reporting techniques

Security in an Interconnected World: A Strategic Vision for Defence Policy (Research for Policy)

by Huub Dijstelbloem Ernst Hirsch Ballin Peter De Goede

This open access book follows the idea that security policy must be based on strategic analysis. Defence policy and the role of the armed forces can subsequently be determined on the grounds of said analysis. More than ever, internal and external security, and developments both in the Netherlands and abroad are interconnected. The world order is shifting, the cooperation within NATO and the EU is under pressure and the Dutch armed forces are gasping for breath. What is the task of Dutch security and the defence policy? There have been growing calls in the last few years to end the devastating cuts in the defence budget and to invest more in security. The acute threats and conflicts in which the Netherlands are involved have served as a wake-up call. The shooting down of Flight MH17 over Ukraine, the streams of refugees from Syria and other countries, the conflict with Da’esh in Syria and Iraq, and terrorist threats reveal how events in many of the world’s flash-points have a direct or indirect impact on the Netherlands. Conflicts in other countries have a spill-over effect in The Netherlands. This is illustrated by tensions between population groups and the clashes over the Gülen schools after the failed putsch in Turkey on 15 July 2016 and over the constitutional referendum in that country. How do we ensure that any additional funds are not divided amongst the branches of the armed forces without any sense of strategic direction? What should a future-proof security policy that plots the course of defence policy entail? What strategic analyses should lie behind the political choices that are made? This book answers these questions and offers a comprehensive framework addressing among other things human security, national security and flow security.

Security in Computer and Information Sciences: Second International Symposium, EuroCybersec 2021, Nice, France, October 25–26, 2021, Revised Selected Papers (Communications in Computer and Information Science #1596)

by Erol Gelenbe Marija Jankovic Dionysios Kehagias Anna Marton Andras Vilmos

This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021.The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.This is an open access book.

Refine Search

Showing 47,926 through 47,950 of 56,875 results