logo for The Institution of Engineering and Technology
Access Control and Security Monitoring of Multimedia Information Processing and Transmission
Zhihan Lyu
The Institution of Engineering and Technology, 2024
In the era of big data and multi-connectivity via IoTs, protecting and securing multimedia data has become a real necessity and priority for organizations and businesses, but this can be a rather difficult task due to the heterogeneous nature of platforms and data sets. It is therefore essential to improve the security level of multimedia information by developing core technologies to prevent the loss and damage of information during processing and transmission.
[more]

logo for Pluto Press
The Anthropology of Security
Perspectives from the Frontline of Policing, Counter-terrorism and Border Control
Edited by Mark Maguire, Catarina Frois, and Nils Zurawski
Pluto Press, 2014

In a post-Cold War world of political unease and economic crisis, processes of securitisation are transforming nation-states, their citizens and non-citizens in profound ways.

The book shows how contemporary Europe is now home to a vast security industry which uses biometric identification systems, CCTV and quasi-military techniques to police migrants and disadvantaged neighbourhoods. This is the first collection of anthropological studies of security with a particular but not exclusive emphasis on Europe.

The Anthropology of Security draws together studies on the lived experiences of security and policing from the perspective of those most affected in their everyday lives. The anthropological perspectives in this volume stretch from the frontlines of policing and counter-terrorism to border control.

[more]

front cover of Artificial Intelligence for Biometrics and Cybersecurity
Artificial Intelligence for Biometrics and Cybersecurity
Technology and applications
Ahmed A. Abd El-Latif
The Institution of Engineering and Technology, 2023
The integration of new technologies is resulting in an increased demand for security and authentication in all types of data communications. Cybersecurity is the protection of networks and systems from theft. Biometric technologies use unique traits of particular parts of the body such facial recognition, iris, fingerprints and voice to identify individuals' physical and behavioural characteristics. Although there are many challenges associated with extracting, storing and processing such data, biometric and cybersecurity technologies along with artificial intelligence (AI) are offering new approaches to verification procedures and mitigating security risks.
[more]

front cover of Authentication Technologies for Cloud Computing, IoT and Big Data
Authentication Technologies for Cloud Computing, IoT and Big Data
Yasser M. Alginahi
The Institution of Engineering and Technology, 2019
Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data. Topics covered include authentication; cryptographic algorithms; digital watermarking; biometric authentication; block ciphers with applications in IoT; identification schemes for Cloud and IoT; authentication issues for Cloud applications; cryptography engines for Cloud based on FPGA; and data protection laws.
[more]

logo for American Library Association
The Black Belt Librarian
Real-World Safety & Security
Warren Graham
American Library Association, 2011

front cover of Blockchain and the Law
Blockchain and the Law
The Rule of Code
Primavera De Filippi and Aaron Wright
Harvard University Press, 2018

“Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how.”
—Lawrence Lessig


“Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace—explain how a new technology will upend the current legal and social order… Blockchain and the Law is not just a theoretical guide. It’s also a moral one.”
Fortune


Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you “mine” money from ones and zeros?

The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create “smart contracts,” to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities’ ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking.

“If you…don’t ‘get’ crypto, this is the book-length treatment for you.”
—Tyler Cowen, Marginal Revolution

“De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address.”
—James Ryerson, New York Times Book Review

[more]

front cover of Blockchain for 5G Healthcare Applications
Blockchain for 5G Healthcare Applications
Security and privacy solutions
Sudeep Tanwar
The Institution of Engineering and Technology, 2022
A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to achieve secure systems for Healthcare 4.0 using Blockchain, with emphasis on the key challenges of privacy and security.
[more]

logo for The Institution of Engineering and Technology
Blockchain Technology for Secure Social Media Computing
Robin Singh Bhadoria
The Institution of Engineering and Technology, 2023
Blockchain is a digital ledger of transactions duplicated and distributed across an entire network of computer systems on the blockchain which makes it more difficult to hack or tamper with. The popularity of blockchain has been increasing with the growth of social media and the internet of things (IoT). Social media are interactive digitally mediated technologies that facilitate the creation or sharing and exchange of information, ideas, opinions and interests via virtual communities and social network platforms. However, unmonitored social accounts can be the target of hackers who post fraudulent messages or virus-infected links that spread to contacts and followers, and "employee weakness" is responsible for 20% of cyberattacks in companies. So, it has become essential to secure both personal and professional social media networks, accounts and data.
[more]

front cover of Blockchains for Network Security
Blockchains for Network Security
Principles, technologies and applications
Haojun Huang
The Institution of Engineering and Technology, 2021
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms.
[more]

front cover of Bodies as Evidence
Bodies as Evidence
Security, Knowledge, and Power
Mark Maguire, Ursula Rao, and Nils Zurawski, editors
Duke University Press, 2018
From biometrics to predictive policing, contemporary security relies on sophisticated scientific evidence-gathering and knowledge-making focused on the human body. Bringing together new anthropological perspectives on the complexities of security in the present moment, the contributors to Bodies as Evidence reveal how bodies have become critical sources of evidence that is organized and deployed to classify, recognize, and manage human life. Through global case studies that explore biometric identification, border control, forensics, predictive policing, and counterterrorism, the contributors show how security discourses and practices that target the body contribute to new configurations of knowledge and power. At the same time, margins of error, unreliable technologies, and a growing suspicion of scientific evidence in a “post-truth” era contribute to growing insecurity, especially among marginalized populations.

Contributors. Carolina Alonso-Bejarano, Gregory Feldman, Francisco J. Ferrándiz, Daniel M. Goldstein, Ieva Jusionyte, Amade M’charek, Mark Maguire, Joseph P. Masco, Ursula Rao, Antonius C. G. M. Robben, Joseba Zulaika, Nils Zurawski
[more]

logo for University of Chicago Press
Code of Peace
Ethics and Security in the World of the Warlord States
Dorothy V. Jones
University of Chicago Press, 1991
Is it possible, in our world of differing beliefs and diverse cultures, to find an ethical framework that can guide actual international relations? In Code of Peace, Dorothy V. Jones sets forth her surprising answer to this perplexing question: Not only is a consensus on ethical principles possible, but it has already been achieved.

Jones focuses on the progressive development of international law to disclose an underlying code of ethics that enjoys broad support in the world community. Unlike studies that concentrate on what others think that states ought to do, Code of Peace analyzes what states themselves consider proper behavior. Using history as both narrative and argument, Jones shows how the existing ethical code has evolved cumulatively since World War I from a complex interplay between theory and practice. More than an abstract treatise or a merely technical analysis, Jones's study is grounded in the circumstances of war and peace in this century. Treaties and agreements, she argues, are forging a consensus on such principles as human rights, self-determination, and cooperation between states. Jones shows how leaders and representatives of nations, drawing on a rich heritage of philosophical thoughts as well as on their own experiences in a violent world of self-interested conflict, have shaped their thought to the taming of that world in the cause of peace. That is the striking thing about this code: states whose relations are marked by so frequent a recourse to war that they can fairly be called "warlords" have created and pledged themselves to a code of peace.

The implications of Code of Peace for establishing a normative foundation for peace are profound. Historically sound and timely, impeccably researched and elegantly written, the book will be of immediate and lasting value to anyone concerned with the stability of the modern world.
[more]

front cover of Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Lillian Ablon
RAND Corporation, 2016
Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events.
[more]

front cover of The Cultural Construction of Safety and Security
The Cultural Construction of Safety and Security
Imaginaries, Discourses and Philosophies that Shaped Modern Europe
Gemma Blok
Amsterdam University Press, 2024
This volume analyses cultural perceptions of safety and security that have shaped modern European societies. The articles present a wide range of topics, from feelings of unsafety generated by early modern fake news to safety issues related to twentieth-century drug use in public space. The volume demonstrates how ‘safety’ is not just a social or biological condition to pursue but also a historical and cultural construct. In philosophical terms, safety can be interpreted in different ways, referring to security, certainty or trust. What does feeling safe and thinking about a safe society mean to various groups of people over time? The articles in this volume are bound by their joint effort to take a constructionist approach to emotional expressions, artistic representations, literary narratives and political discourses of (un)safety and their impact on modern European society.
[more]

front cover of Cybersecurity in Emerging Healthcare Systems
Cybersecurity in Emerging Healthcare Systems
Agbotiname Lucky Imoize
The Institution of Engineering and Technology, 2024
Emerging healthcare networks are interconnected physical systems that use cyber technologies for interaction and functionality. The proliferation of massive internet-of-things (IoT) devices enables remote and distributed access to cutting-edge diagnostics and treatment options in modern healthcare systems. New security vulnerabilities are emerging due to the increasing complexity of the healthcare architecture, in particular, threats to medical devices and critical infrastructure pose significant concerns owing to their potential risks to patient health and safety. In recent times, patients have been exposed to high risks from attacks capable of disrupting critical medical infrastructure, communications facilities, and services, interfering with medical devices, or compromising sensitive user data.
[more]

front cover of Cyberwar and Revolution
Cyberwar and Revolution
Digital Subterfuge in Global Capitalism
Nick Dyer-Witheford
University of Minnesota Press, 2019

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet


Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. 

Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.

Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.

[more]

front cover of Data Power
Data Power
Radical Geographies of Control and Resistance
Jim E. Thatcher
Pluto Press, 2021

In recent years, popular media has inundated audiences with sensationalized headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives.

From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognizing the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies.

Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable circumstances, these technologies allow us to create new spaces of affinity, and a new politics of change.

[more]

front cover of Data Security in Cloud Computing
Data Security in Cloud Computing
Vimal Kumar
The Institution of Engineering and Technology, 2017
Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
[more]

front cover of The Defender’s Dilemma
The Defender’s Dilemma
Charting a Course Toward Cybersecurity
Martin C. Libicki
RAND Corporation, 2015
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
[more]

front cover of Demanding Justice and Security
Demanding Justice and Security
Indigenous Women and Legal Pluralities in Latin America
Sieder, Rachel
Rutgers University Press, 2017
Across Latin America, indigenous women are organizing to challenge racial, gender, and class discrimination through the courts. Collectively, by engaging with various forms of law, they are forging new definitions of what justice and security mean within their own contexts and struggles. They have challenged racism and the exclusion of indigenous people in national reforms, but also have challenged ‘bad customs’ and gender ideologies that exclude women within their own communities.
 
Featuring chapters on Bolivia, Colombia, Ecuador, Guatemala, and Mexico, the contributors to Demanding Justice and Security include both leading researchers and community activists. From Kichwa women in Ecuador lobbying for the inclusion of specific clauses in the national constitution that guarantee their rights to equality and protection within indigenous community law, to Me’phaa women from Guerrero, Mexico, battling to secure justice within the Inter-American Court of Human Rights for violations committed in the context of militarizing their home state, this book is a must-have for anyone who wants to understand the struggle of indigenous women in Latin America.
 
[more]

front cover of Edge Computing
Edge Computing
Models, technologies and applications
Javid Taheri
The Institution of Engineering and Technology, 2020
Cloud computing has evolved as a cost-effective, easy-to-use, elastic and scalable computing paradigm to transform today's business models. 5G, Industrial IoT, Industry 4.0 and China-2050 frameworks and technologies are introducing new challenges that cannot be solved efficiently using current cloud architectures. To handle the collected information from such a vast number of devices and actuators, and address these issues, novel concepts have been proposed to bring cloud-like resources closer to end users at the edge of the network, a technology called edge computing.
[more]

front cover of Endangered City
Endangered City
The Politics of Security and Risk in Bogotá
Austin Zeiderman
Duke University Press, 2016
Security and risk have become central to how cities are planned, built, governed, and inhabited in the twenty-first century. In Endangered City, Austin Zeiderman focuses on this new political imperative to govern the present in anticipation of future harm. Through ethnographic fieldwork and archival research in Bogotá, Colombia, he examines how state actors work to protect the lives of poor and vulnerable citizens from a range of threats, including environmental hazards and urban violence. By following both the governmental agencies charged with this mandate and the subjects governed by it, Endangered City reveals what happens when logics of endangerment shape the terrain of political engagement between citizens and the state. The self-built settlements of Bogotá’s urban periphery prove a critical site from which to examine the rising effect of security and risk on contemporary cities and urban life.
 
[more]

logo for The Institution of Engineering and Technology
Energy Optimization and Security in Federated Learning for IoT Environments
Balamurugan Balusamy
The Institution of Engineering and Technology, 2025
Smart environments such as smart homes and industrial automation have been transformed by the rapid developments in internet of things (IoT) devices and systems. However, the widespread use of these devices poses significant difficulties, particularly in settings with limited energy resources. Due to the significant energy consumption and communication overhead associated with delivering huge amounts of data, traditional machine learning algorithms which rely on centralized cloud servers for training are not always suitable.
[more]

logo for The Institution of Engineering and Technology
Federated Learning for Multimedia Data Processing and Security in Industry 5.0
Gautam Srivastava
The Institution of Engineering and Technology, 2025
Industry 5.0 is the upcoming industrial revolution where people will be working together with smart machines and robots, thereby bringing human touch and intelligence back to the decision-making process. Challenges include the security and privacy of sensitive multimedia data and near zero latency for mission critical applications.
[more]

logo for Georgetown University Press
Fixing American Cybersecurity
Creating a Strategic Public-Private Partnership
Larry Clinton
Georgetown University Press, 2023

Advocates a cybersecurity “social contract” between government and business in seven key economic sectors

Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.

A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.

Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.

[more]

front cover of Getting to Yes with China in Cyberspace
Getting to Yes with China in Cyberspace
Scott Warren Harold
RAND Corporation, 2016
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
[more]

front cover of The Hacker and the State
The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics
Ben Buchanan
Harvard University Press, 2020

“A must-read…It reveals important truths.”
—Vint Cerf, Internet pioneer

“One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.”
—Thomas Rid, author of Active Measures

Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists.

Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph.

“A helpful reminder…of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.”
—Jonathan Freedland, New York Review of Books

“The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.”
—General David Petraeus, former Director of the CIA

“Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’”
—Richard Harknett, former Scholar-in-Residence at United States Cyber Command

[more]

logo for The Institution of Engineering and Technology
Handbook of Cybersecurity for e-Health
Bill Buchanan
The Institution of Engineering and Technology, 2025
In this title, a team of top experts address cyber security for e-Health technologies and systems. It examines the need for better security and privacy infrastructure, outlining methods and policies for working with sensitive data. The authors focus on the latest methods and visionary work within health and social care for cyber security, making it vital reading for professionals and researchers in healthcare technologies and security, professionals in public health and law, healthcare policy developers and government decision makers.
[more]

front cover of High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection
High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection
Anirban Sengupta
The Institution of Engineering and Technology, 2024
High-Level Synthesis based Methodologies for Hardware Security, Trust and IP Protection presents state-of-the art high-level synthesis methodologies for hardware security and trust, including IP protection through synthesis-based watermarking and structural obfuscation.
[more]

front cover of India China
India China
Rethinking Borders and Security
L.H.M. Ling, Adriana Erthal Abdenur, Payal Banerjee, Nimmi Kurian, Mahendra P. Lama, and Li Bo
University of Michigan Press, 2016

Challenging the Westphalian view of international relations, which focuses on the sovereignty of states and the inevitable potential for conflict, the authors from the Borderlands Study Group reconceive borders as capillaries enabling the flow of material, cultural, and social benefits through local communities, nation-states, and entire regions. By emphasizing local agency and regional interdependencies, this metaphor reconfigures current narratives about the China India border and opens a new perspective on the long history of the Silk Roads, the modern BCIM Initiative, and dam construction along the Nu River in China and the Teesta River in India.

Together, the authors show that positive interaction among people on both sides of a border generates larger, cross-border communities, which can pressure for cooperation and development. India China offers the hope that people divided by arbitrary geo-political boundaries can circumvent race, gender, class, religion, and other social barriers, to form more inclusive institutions and forms of governance.
 

[more]

front cover of Industry of Anonymity
Industry of Anonymity
Inside the Business of Cybercrime
Jonathan Lusthaus
Harvard University Press, 2018

The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world’s technology-crime hotspots.

Cybercrime seems invisible. Attacks arrive out of nowhere, their origins hidden by layers of sophisticated technology. Only the victims are clear. But every crime has its perpetrator—specific individuals or groups sitting somewhere behind keyboards and screens. Jonathan Lusthaus lifts the veil on the world of these cybercriminals in the most extensive account yet of the lives they lead, and the vast international industry they have created.

We are long past the age of the lone adolescent hacker tapping away in his parents’ basement. Cybercrime now operates like a business. Its goods and services may be illicit, but it is highly organized, complex, driven by profit, and globally interconnected. Having traveled to cybercrime hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, Lusthaus takes us inside this murky underworld and reveals how this business works. He explains the strategies criminals use to build a thriving industry in a low-trust environment characterized by a precarious combination of anonymity and teamwork. Crime takes hold where there is more technical talent than legitimate opportunity, and where authorities turn a blind eye—perhaps for a price. In the fight against cybercrime, understanding what drives people into this industry is as important as advanced security.

Based on seven years of fieldwork from Eastern Europe to West Africa, Industry of Anonymity is a compelling and revealing study of a rational business model which, however much we might wish otherwise, has become a defining feature of the modern world.

[more]

front cover of The Infrastructures of Security
The Infrastructures of Security
Technologies of Risk Management in Johannesburg
Martin J. Murray
University of Michigan Press, 2022
Much of the South African government’s response to crime—especially in Johannesburg—has been to rely increasingly on technology. This includes the widespread use of video cameras, Artificial Intelligence, machine-learning, and automated systems, effectively replacing human watchers with machine watchers. The aggregate effect of such steps is to determine who is, and isn’t, allowed to be in public spaces—essentially another way to continue segregation.

In The Infrastructures of Security, author Martin J. Murray concentrates on not only the turn toward technological solutions to managing the risk of crime through digital (and software-based) surveillance and automated information systems, but also the introduction of somewhat bizarre and fly-by-night experimental “answers” to perceived risk and danger. Digitalized surveillance is significant for two reasons: first, it enables monitoring to take place across wide "geographical distances with little time delay"; and second, it allows for the active sorting, identification, and "tracking of bodies, behaviors, and characteristics of subject populations on a continuous, real-time basis." These new software-based surveillance technologies represent monitoring, tracking, and information gathering without walls, towers, or guards.
[more]

front cover of Insurance Era
Insurance Era
Risk, Governance, and the Privatization of Security in Postwar America
Caley Horan
University of Chicago Press, 2021
Charts the social and cultural life of private insurance in postwar America, showing how insurance institutions and actuarial practices played crucial roles in bringing social, political, and economic neoliberalism into everyday life.

Actuarial thinking is everywhere in contemporary America, an often unnoticed byproduct of the postwar insurance industry’s political and economic influence. Calculations of risk permeate our institutions, influencing how we understand and manage crime, education, medicine, finance, and other social issues. Caley Horan’s remarkable book charts the social and economic power of private insurers since 1945, arguing that these institutions’ actuarial practices played a crucial and unexplored role in insinuating the social, political, and economic frameworks of neoliberalism into everyday life.

Analyzing insurance marketing, consumption, investment, and regulation, Horan asserts that postwar America’s obsession with safety and security fueled the exponential expansion of the insurance industry and the growing importance of risk management in other fields. Horan shows that the rise and dissemination of neoliberal values did not happen on its own: they were the result of a project to unsocialize risk, shrinking the state’s commitment to providing support, and heaping burdens upon the people often least capable of bearing them. Insurance Era is a sharply researched and fiercely written account of how and why private insurance and its actuarial market logic came to be so deeply lodged in American visions of social welfare.
[more]

front cover of Insurgent Aesthetics
Insurgent Aesthetics
Security and the Queer Life of the Forever War
Ronak K. Kapadia
Duke University Press, 2019
In Insurgent Aesthetics Ronak K. Kapadia theorizes the world-making power of contemporary art responses to US militarism in the Greater Middle East. He traces how new forms of remote killing, torture, confinement, and surveillance have created a distinctive post-9/11 infrastructure of racialized state violence. Linking these new forms of violence to the history of American imperialism and conquest, Kapadia shows how Arab, Muslim, and South Asian diasporic multimedia artists force a reckoning with the US war on terror's violent destruction and its impacts on immigrant and refugee communities. Drawing on an eclectic range of visual, installation, and performance works, Kapadia reveals queer feminist decolonial critiques of the US security state that visualize subjugated histories of US militarism and make palpable what he terms “the sensorial life of empire.” In this way, these artists forge new aesthetic and social alliances that sustain critical opposition to the global war machine and create alternative ways of knowing and feeling beyond the forever war.
[more]

front cover of Intelligent Multimedia Technologies for Financial Risk Management
Intelligent Multimedia Technologies for Financial Risk Management
Trends, tools and applications
Simon Grima
The Institution of Engineering and Technology, 2023
Multimedia technologies have opened up a wide range of applications by combining a variety of information sources such as voice, graphics, animation, images, audio, and full-motion video which can be successfully implemented in banking, financial services and insurance (BFSI) industries to support their activities and strategic goals.
[more]

logo for Harvard University Press
International Equilibrium
A Theoretical Essay on the Politics and Organization of Security
George Liska
Harvard University Press

front cover of Internet and Wireless Security
Internet and Wireless Security
Robert Temple
The Institution of Engineering and Technology, 2002
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
[more]

front cover of Internet Freedom Software and Illicit Activity
Internet Freedom Software and Illicit Activity
Supporting Human Rights Without Enabling Criminals
Sasha Romanosky
RAND Corporation, 2015
This report examines the portfolio of tools funded by the State Department’s Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests (such as freedom of expression, freedom of the press, and the free flow of information) without enabling criminal activity.
[more]

front cover of Liberalism and the Culture of Security
Liberalism and the Culture of Security
The Nineteenth-Century Rhetoric of Reform
Katherine Henry
University of Alabama Press, 2011

Normal0falsefalsefalseMicrosoftInternetExplorer4

Figures of protection and security are everywhere in American public discourse, from the protection of privacy or civil liberties to the protection of marriage or the unborn, and from social security to homeland security. Liberalism and the Culture of Security traces a crucial paradox in historical and contemporary notions of citizenship: in a liberal democratic culture that imagines its citizens as self-reliant, autonomous, and inviolable, the truth is that claims for citizenship—particularly for marginalized groups such as women and slaves—have just as often been made in the name of vulnerability and helplessness.
 
Katherine Henry traces this turn back to the eighteenth-century opposition of liberty and tyranny, which imagined our liberties as being in danger of violation by the forces of tyranny and thus in need of protection. She examines four particular instances of this rhetorical pattern. The first chapters show how women’s rights and antislavery activists in the antebellum era exploited the contradictions that arose from the liberal promise of a protected citizenry: first by focusing primarily on arguments over slavery in the 1850s that invoke the Declaration of Independence, including Harriet Beecher Stowe’s fiction and Frederick Douglass’s “Fourth of July” speech; and next by examining Angelina Grimké’s brief but intense antislavery speaking career in the 1830s.
 
New conditions after the Civil War and Emancipation changed the way arguments about civic inclusion and exclusion could be advanced. Henry considers the issue of African American citizenship in the 1880s and 1890s, focusing on the mainstream white Southern debate over segregation and the specter of a tyrannical federal government, and then turning to Frances E. W. Harper’s fictional account of African American citizenship in Iola Leroy. Finally, Henry examines Henry James’s 1886 novel The Bostonians, in which arguments over the appropriate role of women and the proper place of the South in post–Civil War America are played out as a contest between Olive Chancellor and Basil ransom for control over the voice of the eloquent girl Verena Tarrant.
[more]

front cover of Managing Ethnic Diversity after 9/11
Managing Ethnic Diversity after 9/11
Integration, Security, and Civil Liberties in Transatlantic Perspective
Chebel d'Appollonia, Ariane
Rutgers University Press, 2010
America's approach to terrorism has focused on traditional national security methods, under the assumption that terrorism's roots are foreign and the solution to greater security lies in conventional practices. Europe offers a different model, with its response to internal terrorism relying on police procedures.

Managing Ethnic Diversity after 9/11 compares these two strategies and considers that both may have engendered greater radicalization--and a greater chance of home-grown terrorism. Essays address how transatlantic countries, including the United Kingdom, the United States, France, Germany, Spain, Italy, and the Netherlands have integrated ethnic minorities, especially Arabs and Muslims, since 9/11. Discussing the "securitization of integration," contributors argue that the neglect of civil integration has challenged the rights of these minorities and has made greater security more remote.
[more]

front cover of Managing Internet of Things Applications across Edge and Cloud Data Centres
Managing Internet of Things Applications across Edge and Cloud Data Centres
Rajiv Ranjan
The Institution of Engineering and Technology, 2024
Cloud computing has been a game changer for internet-based applications such as content delivery networks, social networking and multi-tier enterprise applications. However, the requirements for low-latency data access, security, bandwidth, mobility, and cost have challenged centralized data center-based cloud computing models, which is driving the need for the novel computing paradigms of edge and fog computing. The internet of things (IoT) focuses on discovery, aggregation, management, and acting on data originating from internet-connected devices via programmable sensors, actuators, mobile phones, surveillance cameras, routers, gateways and switches. But the aggregation of this data is expensive and can be time consuming.
[more]

front cover of Maras
Maras
Gang Violence and Security in Central America
Edited by Thomas C. Bruneau, Lucía Dammert, and Elizabeth Skinner
University of Texas Press, 2011

Sensational headlines have publicized the drug trafficking, brutal violence, and other organized crime elements associated with Central America's mara gangs, but there have been few clear-eyed analyses of the history, hierarchies, and future of the mara phenomenon. The first book to look specifically at the Central American gang problem by drawing on the perspectives of researchers from different disciplinary backgrounds, Maras: Gang Violence and Security in Central America provides much-needed insight.

These essays trace the development of the gangs, from Mara Salvatrucha to the 18th Street Gang, in Los Angeles and their spread to El Salvador, Honduras, Guatemala, and Nicaragua as the result of members' deportation to Central America; there, they account for high homicide rates and threaten the democratic stability of the region. With expertise in areas ranging from political science to law enforcement and human rights, the contributors also explore the spread of mara violence in the United States. Their findings comprise a complete documentation that spans sexualized violence, case studies of individual gangs, economic factors, varied responses to gang violence, the use of intelligence gathering, the limits of state power, and the role of policy makers.

Raising crucial questions for a wide readership, these essays are sure to spark productive international dialogues.

[more]

front cover of Markets for Cybercrime Tools and Stolen Data
Markets for Cybercrime Tools and Stolen Data
Hackers' Bazaar
Lillian Ablon
RAND Corporation, 2014
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
[more]

front cover of Medical Information Processing and Security
Medical Information Processing and Security
Techniques and applications
Amit Kumar Singh
The Institution of Engineering and Technology, 2022
Smart healthcare systems, made up of advanced wearable devices, internet of things (IoT) technologies and mobile internet connectivity, allow significant medical information to be easily and regularly transmitted over public networks. Personal patient information and clinical records are stored on hospitals and healthcare centres and can be accessed remotely by healthcare workers. Due to the widespread increase in the sheer volume of medical data being collected and created all the time, it has never been more important to ensure that such information is collected, stored and processed in a reliable and secure manner.
[more]

front cover of Microbial Resolution
Microbial Resolution
Visualization and Security in the War against Emerging Microbes
Gloria Chan-Sook Kim
University of Minnesota Press, 2024

An interdisciplinary study charting the war against microbial futures leads to a new theory of contemporary vision and visuality
 

In 1989, a group of U.S. government scientists met to discuss some surprising findings: new diseases were appearing around the world, and viruses that they thought long vanquished were resurfacing. Their appearance heralded a future perpetually threatened by unforeseeable biological risks, sparking a new concept of disease: the “emerging microbe.” With the Cold War nearing its end, American scientists and security experts turned to confront this new “enemy,” redirecting national security against its risky horizons. In order to be fought, emerging microbes first needed to be made perceptible; but how could something immaterial, unknowable, and ever mutating be coaxed into visibility, knowability, and operability?

 

Microbial Resolution charts the U.S.-led war on the emerging microbe to show how their uncertain futures were transformed into objects of global science and security. Moving beyond familiar accounts that link scientific knowledge production to optical practices of visualizing the invisible, Gloria Chan-Sook Kim develops a theory of “microbial resolution” to analyze the complex problematic that arises when dealing with these entities: what can be seen when there is nothing to see? Through a syncretic analysis of data mining, animal-tracking technologies, media networks, computer-modeled futures, and global ecologies and infrastructures, she shows how a visual impasse—the impossibility of seeing microbial futures—forms the basis for new modes of perceiving, knowing, and governing in the present.

 

Timely and thought provoking, Microbial Resolution opens up the rich paradoxes, irreconcilabilities, and failures inherent in this project and demonstrates how these tensions profoundly animate twenty-first-century epistemologies, aesthetics, affects, and ecologies.

[more]

front cover of Nature-Inspired Cyber Security and Resiliency
Nature-Inspired Cyber Security and Resiliency
Fundamentals, techniques and applications
El-Sayed M. El-Alfy
The Institution of Engineering and Technology, 2019
With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges.
[more]

front cover of Olympic-Caliber Cybersecurity
Olympic-Caliber Cybersecurity
Lessons for Safeguarding the 2020 Games and Other Major Events
Cynthia Dion-Schwarz
RAND Corporation, 2018
Understanding the cybersecurity threat landscape is critical to mitigating threats, apportioning limited resources, and hosting a resilient, safe, and secure Olympic Games. To support the security goals of Tokyo 2020, this report characterizes the cybersecurity threats that are likely to pose a risk to the games, visualizes a threat actor typology, and presents a series of policy options to guide cybersecurity planning.
[more]

front cover of The Other Quiet Professionals
The Other Quiet Professionals
Lessons for Future Cyber Forces from the Evolution of Special Forces
Christopher Paul
RAND Corporation, 2014
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
[more]

front cover of Owners of the Sidewalk
Owners of the Sidewalk
Security and Survival in the Informal City
Daniel M. Goldstein
Duke University Press, 2016
Many of Bolivia's poorest and most vulnerable citizens work as vendors in the Cancha mega-market in the city of Cochabamba, where they must navigate systems of informality and illegality in order to survive. In Owners of the Sidewalk Daniel M. Goldstein examines the ways these systems correlate in the marginal spaces of the Latin American city. Collaborating with the Cancha's legal and permanent stall vendors (fijos) and its illegal and itinerant street and sidewalk vendors (ambulantes), Goldstein shows how the state's deliberate neglect and criminalization of the Cancha's poor—a practice common to neoliberal modern cities—makes the poor exploitable, governable, and consigns them to an insecure existence. Goldstein's collaborative and engaged approach to ethnographic field research also opens up critical questions about what ethical scholarship entails.
 
 
[more]

front cover of Passwords
Passwords
Philology, Security, Authentication
Brian Lennon
Harvard University Press, 2018

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.

Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.

Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.

[more]

front cover of People on the Move
People on the Move
The Security, Social, and Economic Implications of Mass Migration, Volume 15
Nikolas A. Stavrou, ed.
Duke University Press
On an annual basis, approximately 100 million people either attempt to or actually do leave their place of birth, often not knowing their final destination. The flow of immigrants who arrive in neighboring countries in search of refuge and work raises social, political, and security concerns. This special issue of Mediterranean Quarterly takes a closer look at a pattern of history that is at the core of current global instability—the mass migration of peoples.

This collection gathers a unique group of contributors, including representatives from Congress, the United Nations, and Israel’s Ministry of Justice, as well as senior diplomats from Canada, Bulgaria, Portugal, Spain, and Turkey. Presenting their diverse perspectives, the contributors address regional and policy issues related to the mass migration of people, as well as questions concerning citizenship and national security, human trafficking in the form of prostitution, and cultural discrimination. The result is a multifaceted exploration of issues underlying many of the world’s economic, security, and social challenges. Other topics include the impact of state failure on migration, immigration in California, security measures and “preferred” immigrants in Canada after September 11, 2001, and Albanian migration into Greece.

Contributors. Alexandre Afonso, David Binder, Andrew C. Danopoulos, Constantine P. Danopoulos, Francis M. Deng, Mohamed A. El-Khawas, Omar G. Encarnación, Rochelle Gershuni, Larry L. Gerston, Ahmet Içduygu, Benjamin Kline, Bojan Korenic, Erin Kruger, Robert S. Leiken, Marlene Mulder, Elena Poptodorova, Tom Tancredo

[more]

logo for The Institution of Engineering and Technology
Phishing for Answers
Risk identification and mitigation strategies
Terry R. Merz
The Institution of Engineering and Technology, 2024
In the context of information security, social engineering is the manipulation of people into performing actions or divulging information for the purpose of gathering, defrauding, or gaining unauthorized system access. While some of the most common forms of social engineering involve telephone or social networks where criminals pose as employees of targeted organizations, phishing accounts for 96% of all successful cyber-attacks. Governments and private organizations have responded through various means such as training employees, executing internal vulnerability assessments, and ad campaigns. Despite all these efforts, phishing continues to provide the primary cyber-attack vector for nefarious entities.
[more]

front cover of Physical Layer Security for 6G Networks
Physical Layer Security for 6G Networks
Trung Q. Duong
The Institution of Engineering and Technology, 2024
6G networks are expected to provide one-microsecond latency communication with a billion devices competing for resources 1000 times faster than current standards. Increases in network speed, heterogeneity, virtualization, better radio requirements and adaptive communications will place new demands on physical layer security. Moreover, IoT, blockchain, and artificial intelligence are enabling technologies that require rapid data rates, raising a significant burden on the network's physical layer, requiring that security must be attained at a fast pace, and that the network must be resilient to accommodate sudden changes to the configurations or the load.
[more]

front cover of The Power to Coerce
The Power to Coerce
Countering Adversaries Without Going to War
David C. Gompert
RAND Corporation, 2016
Mounting costs, risks, and public misgivings of waging war are raising the importance of U.S. power to coerce (P2C). The best P2C options are financial sanctions, support for nonviolent political opposition to hostile regimes, and offensive cyber operations. The state against which coercion is most difficult and risky is China, which also happens to pose the strongest challenge to U.S. military options in a vital region.
[more]

front cover of Privacy by Design for the Internet of Things
Privacy by Design for the Internet of Things
Building accountability and security
Andrew Crabtree
The Institution of Engineering and Technology, 2021
Privacy by design is a proactive approach that promotes privacy and data protection compliance throughout project lifecycles when storing or accessing personal data. Privacy by design is essential for the Internet of Things (IoT) as privacy concerns and accountability are being raised in an increasingly connected world. What becomes of data generated, collected or processed by the IoT is clearly an important question for all involved in the development, manufacturing, applications and use of related technologies. But this IoT concept does not work well with the 'big data' trend of aggregating pools of data for new applications. Developers need to address privacy and security issues and legislative requirements at the design stage, and not as an afterthought.
[more]

front cover of Privacy’s Blueprint
Privacy’s Blueprint
The Battle to Control the Design of New Technologies
Woodrow Hartzog
Harvard University Press, 2018

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them.

In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information.

Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.

[more]

front cover of Proof-of-Stake for Blockchain Networks
Proof-of-Stake for Blockchain Networks
Fundamentals, challenges and approaches
Cong T. Nguyen
The Institution of Engineering and Technology, 2024
A consensus mechanism is the core component of a blockchain network, which ensures that every participant agrees on the state of the network in trustless environments. Until now, current blockchain networks have been using the proof-of-work (PoW) consensus mechanism, which has serious limitations such as huge energy consumption, low transaction processing capabilities, and centralization and scalability issues. To overcome these problems, a new consensus mechanism entitled proof-of-stake (PoS) has been developed. PoS has many advantages, including negligible energy consumption and very low consensus delay. Ethereum (the largest decentralized global software platform to create secured digital technology powered by blockchain technology and the blockchain of choice globally for all developers and enterprises) has just switched from PoW to PoS. As a result, this mechanism is expected to become a cutting-edge technology for future blockchain networks.
[more]

front cover of Provisional Authority
Provisional Authority
Police, Order, and Security in India
Beatrice Jauregui
University of Chicago Press, 2016
Policing as a global form is often fraught with excessive violence, corruption, and even criminalization. These sorts of problems are especially omnipresent in postcolonial nations such as India, where Beatrice Jauregui has spent several years studying the day-to-day lives of police officers in its most populous state, Uttar Pradesh. In this book, she offers an empirically rich and theoretically innovative look at the great puzzle of police authority in contemporary India and its relationship to social order, democratic governance, and security.
 
Jauregui explores the paradoxical demands placed on Indian police, who are at once routinely charged with abuses of authority at the same time that they are asked to extend that authority into any number of both official and unofficial tasks. Her ethnography of their everyday life and work demonstrates that police authority is provisional in several senses: shifting across time and space, subject to the availability and movement of resources, and dependent upon shared moral codes and relentless instrumental demands. In the end, she shows that police authority in India is not simply a vulgar manifestation of raw power or the violence of law but, rather, a contingent and volatile social resource relied upon in different ways to help realize human needs and desires in a pluralistic, postcolonial democracy.
 
Provocative and compelling, Provisional Authority provides a rare and disquieting look inside the world of police in India, and shines critical light on an institution fraught with moral, legal and political contradictions.
 
[more]

front cover of Secure Big-data Analytics for Emerging Healthcare in 5G and Beyond
Secure Big-data Analytics for Emerging Healthcare in 5G and Beyond
Concepts, paradigms, and solutions
Pronaya Bhattacharya
The Institution of Engineering and Technology, 2024
Healthcare systems today are increasingly reliant on data gathered from multiple hospital systems, patient records or IoT devices. As more information is gathered, there is a need to ensure the data is kept and used securely. This edited book looks at secure big data analytics for healthcare and how the wealth of information is disseminated through open wireless channels to provide seamless coverage so that people can access and analyse the results obtained and intelligently manage and respond to a patient's needs.
[more]

front cover of Security and Development in Global Politics
Security and Development in Global Politics
A Critical Comparison
Joanna Spear and Paul D. Williams, Editors
Georgetown University Press, 2012

Security and development matter: they often involve issues of life and death and they determine the allocation of truly staggering amounts of the world’s resources. Particularly since the start of the wars in Afghanistan and Iraq, there has been momentum in policy circles to merge the issues of security and development to attempt to end conflicts, create durable peace, strengthen failing states, and promote the conditions necessary for people to lead healthier and more prosperous lives.

In many ways this blending of security and development agendas seems admirable and designed to produce positive outcomes all around. However, it is often the case that the two concepts in combination do not receive equal weight, with security issues getting priority over development concerns. This is not desirable and actually undermines security in the longer term. Moreover, there are major challenges in practice when security practitioners and development practitioners are asked to agree on priorities and work together.

Security and Development in Global Politics illuminates the common points of interest but also the significant differences between security and development agendas and approaches to problem solving. With insightful chapter pairings—each written by a development expert and a security analyst—the book explores seven core international issues: aid, humanitarian assistance, governance, health, poverty, trade and resources, and demography. Using this comparative structure, the book effectively assesses the extent to which there really is a nexus between security and development and, most importantly, whether the link should be encouraged or resisted.

[more]

front cover of Security and Privacy for Big Data, Cloud Computing and Applications
Security and Privacy for Big Data, Cloud Computing and Applications
Wei Ren
The Institution of Engineering and Technology, 2019
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
[more]

front cover of Security and Privacy of Electronic Healthcare Records
Security and Privacy of Electronic Healthcare Records
Concepts, paradigms and solutions
Sudeep Tanwar
The Institution of Engineering and Technology, 2020
Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage.
[more]

logo for The Institution of Engineering and Technology
Security and Privacy Schemes for Dense 6G Wireless Communication Networks
Agbotiname Lucky Imoize
The Institution of Engineering and Technology, 2023
Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage.
[more]

logo for Harvard University Press
Security in Paraguay
Analysis and Responses in Comparative Perspective
James L. Cavallaro, Jacob Kopas, Yukyan Lam, Timothy Mayhle, and Soledad Villagra de Biedermann
Harvard University Press
The perception of rising insecurity has plagued Paraguay over the past decade as the country has continued its transition from authoritarian to democratic rule. At the same time, reforms of the penal code and the code of criminal procedure have been implemented, leading many to attribute the rising sense of insecurity to the new, rights-based approach to criminal justice. In Security in Paraguay: Analysis and Responses in Comparative Perspective, the International Human Rights Clinic at Harvard Law School assesses the disparity between the sensation of insecurity and actual levels of urban crime. The book further analyzes the impact of political actors and the media in heightening public fear of crime. Security in Paraguay draws upon comparative case studies and the latest research on criminal justice policy in Latin America to situate Paraguay’s experience in a broader regional context and to offer recommendations to guide future policymaking.
[more]

logo for The Institution of Engineering and Technology
Split Federated Learning for Secure IoT Applications
Concepts, frameworks, applications and case studies
Gururaj Harinahalli Lokesh
The Institution of Engineering and Technology, 2024
New approaches in federated learning and split learning have the potential to significantly improve ubiquitous intelligence in internet of things (IoT) applications. In split federated learning, the machine learning model is divided into smaller network segments, with each segment trained independently on a server using distributed local client data.
[more]

front cover of Strategic Choices for a Turbulent World
Strategic Choices for a Turbulent World
In Pursuit of Security and Opportunity
Andrew R. Hoehn
RAND Corporation, 2017
This report is the last of a six-volume series in which RAND explores the elements of a national strategy for the conduct of U.S. foreign policy. It analyzes U.S. strengths and weaknesses, and suggests adaptations for this new era of turbulence and uncertainty. The report offers three alternative strategic concepts and evaluates their underlying assumptions, costs, risks, and constraints.
[more]

front cover of Surprise, Security, and the American Experience
Surprise, Security, and the American Experience
John Lewis Gaddis
Harvard University Press, 2005

September 11, 2001, distinguished Cold War historian John Lewis Gaddis argues, was not the first time a surprise attack shattered American assumptions about national security and reshaped American grand strategy. We've been there before, and have responded each time by dramatically expanding our security responsibilities.

The pattern began in 1814, when the British attacked Washington, burning the White House and the Capitol. This early violation of homeland security gave rise to a strategy of unilateralism and preemption, best articulated by John Quincy Adams, aimed at maintaining strength beyond challenge throughout the North American continent. It remained in place for over a century. Only when the Japanese attacked Pearl Harbor in 1941 did the inadequacies of this strategy become evident: as a consequence, the administration of Franklin D. Roosevelt devised a new grand strategy of cooperation with allies on an intercontinental scale to defeat authoritarianism. That strategy defined the American approach throughout World War II and the Cold War.

The terrorist attacks of 9/11, Gaddis writes, made it clear that this strategy was now insufficient to ensure American security. The Bush administration has, therefore, devised a new grand strategy whose foundations lie in the nineteenth-century tradition of unilateralism, preemption, and hegemony, projected this time on a global scale. How successful it will be in the face of twenty-first-century challenges is the question that confronts us. This provocative book, informed by the experiences of the past but focused on the present and the future, is one of the first attempts by a major scholar of grand strategy and international relations to provide an answer.

[more]

front cover of Technological Turf Wars
Technological Turf Wars
A Case Study of the Computer Antivirus Industry
Jessica Johnston
Temple University Press, 2008

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.

Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives—does the industry release viruses to generate demand for antivirus software?—and considers the dynamics within companies by looking at facets such as gender bias and power politics. Technological Turf Wars is an informed, enlightened and entertaining view of how the production of computer security technology is fraught with social issues.

[more]

front cover of Terrorist Use of Cryptocurrencies
Terrorist Use of Cryptocurrencies
Technical and Organizational Barriers and Future Threats
Cynthia Dion-Schwarz
RAND Corporation, 2019
The success of counterterrorism finance strategies in reducing terrorist access to official currencies has raised concerns that terrorist organizations might increase their use of such digital cryptocurrencies as Bitcoin to support their activities. RAND researchers thus consider the needs of terrorist groups and the advantages and disadvantages of the cryptocurrency technologies available to them.
[more]

front cover of Transnational Marriage and Partner Migration
Transnational Marriage and Partner Migration
Constellations of Security, Citizenship, and Rights
Anne-Marie D'Aoust
Rutgers University Press, 2022
This multidisciplinary collection investigates the ways in which marriage and partner migration processes have become the object of state scrutiny, and the site of sustained political interventions in several states around the world. Covering cases as varied as the United States, Canada, Japan, Iran, France, Belgium or the Netherlands, among others, contributors reveal how marriage and partner migration have become battlegrounds for political participation, control, and exclusion. Which forms of attachments (towards the family, the nation, or specific individuals) have become framed as risks to be managed? How do such preoccupations translate into policies? With what consequences for those affected by them, in terms of rights and access to citizenship? The book answers these questions by analyzing the interplay between issues of security, citizenship and rights from the perspectives of migrants and policymakers, but also from actors who negotiate encounters with the state, such as lawyers, non-governmental organizations, and translators. 
[more]

front cover of Trusted Computing
Trusted Computing
Chris Mitchell
The Institution of Engineering and Technology, 2005
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
[more]

front cover of Trusted Platform Modules
Trusted Platform Modules
Why, when and how to use them
Ariel Segall
The Institution of Engineering and Technology, 2017
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.
[more]

front cover of User-Centric Privacy and Security in Biometrics
User-Centric Privacy and Security in Biometrics
Claus Vielhauer
The Institution of Engineering and Technology, 2018
The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy of biometric data in systems, communication and databases, soft biometric profiling, biometric recognition of persons across distributed systems and in nomadic scenarios, and the convergence between user convenience, usability and authentication reliability.
[more]

front cover of Zero Days, Thousands of Nights
Zero Days, Thousands of Nights
The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Lillian Ablon
RAND Corporation, 2017
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
[more]


Send via email Share on Facebook Share on Twitter