The European Council announced a ban on the Russian media outlets RT and Sputnik in March 2022, just weeks after Russia’s full-scale invasion of Ukraine. The invasion has cost many thousands of lives, created millions of Ukrainian refugees, and caused enormous material damage, but also increased the disinformation activities of Russia in Ukraine and the rest of Europe. The two Russi…
This Open-Access-book questions the relationship between institutionalized images and understandings of policing – the monolithic ideas common to most, if not all, Western law enforcement agencies – and contextual, situative, and local interactions where the human representatives of policing – street-level officers – come into contact with residents. The political and theoretical associ…
Experts discuss the risks global environmental change poses for the human security, including disaster and disease, violence, and increasing inequity.OCLC-licensed vendor bibliographic record.
Investigations of how the global Cold War shaped national scientific and technological practices in fields from biomedicine to rocket science.OCLC-licensed vendor bibliographic record.
Sequel to: The health of nations / Andrew T. Price-Smith. c2002.An analysis of infectious disease as a threat to national security that examines the destabilizing effects of the 1918 Spanish Flu pandemic, HIV/AIDS in sub-Saharan Africa, SARS, and Mad Cow Disease.OCLC-licensed vendor bibliographic record.
Making the case that we can use nuclear power to combat climate change even as we reduce the risks of nuclear terror. Humanity faces two existential threats: nuclear annihilation and catastrophic climate change. Both have human origins, and both are linked to the use of nuclear energy. Inherent in the use of atomic fission is the risk that the technology and materials can be diverted to terrori…
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are gro…
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Su…
This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidential…
This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigati…