Information & Security: An International Journal最新文献

筛选
英文 中文
The Obama Administration and Incident Response: A Report 奥巴马政府和事件反应:一份报告
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.3408
Raymond Collier
{"title":"The Obama Administration and Incident Response: A Report","authors":"Raymond Collier","doi":"10.11610/ISIJ.3408","DOIUrl":"https://doi.org/10.11610/ISIJ.3408","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The EU Civil Protection Upgrading Needs 欧盟民防升级需求
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2907
D. Procházková
{"title":"The EU Civil Protection Upgrading Needs","authors":"D. Procházková","doi":"10.11610/ISIJ.2907","DOIUrl":"https://doi.org/10.11610/ISIJ.2907","url":null,"abstract":"Civil protection has two pillars. The first one supports the humans daily lives and the other ensures the protection of humans at emergency and critical situations. Both consist of systems aiming to provide human security, welfare and critical infrastructure protection. This paper describes the three types of civil protection systems existing in the EU Member States and summarizes the results of original research. The results demonstrate a need for individual public assets’ protection. The paper includes suggestions on domains for future research to fulfil identified requirements.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"24 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120942570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introduction to the Fusion of Quantitative and Qualitative Beliefs 定量信念与定性信念融合导论
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2001
J. Dezert, F. Smarandache
{"title":"Introduction to the Fusion of Quantitative and Qualitative Beliefs","authors":"J. Dezert, F. Smarandache","doi":"10.11610/ISIJ.2001","DOIUrl":"https://doi.org/10.11610/ISIJ.2001","url":null,"abstract":"The efficient management and combination of uncertain and conflict- ing sources of information remain of primal importance for the development of re- liable information fusion systems. Advanced fusion systems must deal both with quantitative and qualitative aspects of beliefs expressed by the differen t sources of information (sensors, expert systems, human reports, etc). This paper intro- duces the theory of plausible and paradoxical reasoning, known as DSmT (Dezert- Smarandache Theory) in literature, developed originally for dealing with impre- cise, uncertain and potentially highly conflicting sources of information pro viding quantitative beliefs on a given set of possible solutions of a given proble m. We also propose in this paper new ideas on a possible extension of DSmT for the combination of uncertain and conflicting qualitative information in order to de al directly with beliefs expressed with linguistic labels instead of numerical value s to be closer to the nature of information expressed in natural languages and available directly from human experts.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development 乌克兰武装力量转型的挑战:科学如何支持武装力量的发展
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.2303
Leonid I. Polyakov
{"title":"The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development","authors":"Leonid I. Polyakov","doi":"10.11610/isij.2303","DOIUrl":"https://doi.org/10.11610/isij.2303","url":null,"abstract":"The First Deputy Minister of Defence of Ukraine examines the challenges of transformation at three levels—conceptual, planning/programming, and implementation of force development programmes—and the main challenges that require scientific support from research organisations in the Ukrainian defence establishment.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116551958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN EXPERIMENTAL APPLICATION OF A TRAIT-BASED PERSONALITY MODEL TO THE SIMULATION OF MILITARY DECISION-MAKING 基于特质的人格模型在军事决策模拟中的实验应用
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1204
F. McKenzie, Mikel D. Petty, Jean M. Catanzaro
{"title":"AN EXPERIMENTAL APPLICATION OF A TRAIT-BASED PERSONALITY MODEL TO THE SIMULATION OF MILITARY DECISION-MAKING","authors":"F. McKenzie, Mikel D. Petty, Jean M. Catanzaro","doi":"10.11610/ISIJ.1204","DOIUrl":"https://doi.org/10.11610/ISIJ.1204","url":null,"abstract":"Due to the uncertainties inherent in military operations and the variations in human personalities, military command and control behavior rarely conforms strictly to doctrine. (Of course, the degree of conformity to doctrine may vary.) In a military simulation with automated commanders, models of command behavior and decisionmaking that follow doctrine precisely and exhibit no variations are therefore unrealistic. Automated commanders that exhibit doctrinal behavior are essential for training, especially at the introductory levels, but are not sufficient for the full range of purposes the simulation may be applied to, such as advanced training and mission rehearsal. Simulation users may seek an automated commander that realistically models the effects of the fog of war and the difficulty of making doctrinal decisions under stressful conditions. Such realism in simulation could better prepare trainees for expected encounters on the battlefield.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cilvil-military Interoperability in Support of NATO Emerging Security Challenges 支持北约新兴安全挑战的军民互操作性
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.2703
J. Shea
{"title":"Cilvil-military Interoperability in Support of NATO Emerging Security Challenges","authors":"J. Shea","doi":"10.11610/isij.2703","DOIUrl":"https://doi.org/10.11610/isij.2703","url":null,"abstract":"A speech by the Deputy Assistant Secretary General, Emerging Security Challenges Division, NATO International Staff, to the Second Workshop on Multinational Cooperation in Civil-Military Interoperability in Sofia, underlining the importance of civil-military interaction and multinational approaches in various frameworks, as well as their important contribution to allied and national capabilities to deal with new threats and challenges.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122749651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interoperability between Agencies and Nations 机构和国家之间的互操作性
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1601
Magnus Wallmark
{"title":"Interoperability between Agencies and Nations","authors":"Magnus Wallmark","doi":"10.11610/ISIJ.1601","DOIUrl":"https://doi.org/10.11610/ISIJ.1601","url":null,"abstract":"This article describes how secure and robust communications and information solutions, adapted for the National Security and Public Safety (NSPS) segment, can be obtained using commercial technology and existing infrastructure. Application areas include, for instance, emergency dispatch and command centres, agency communication and collaboration, and coast and border surveillance. The communication and information solutions follow the principles of a service-oriented architecture. The proposed approach to communications and information services for National Security and Public Safety facilitates improved operational capabilities and efficiency by providing access to much more advanced and timely information, by supporting efficient management of operations and by enabling cooperation and sharing of resources and information.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization 遗传程序:文明范式的技术官僚假说
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0903
T. Semerdjiev
{"title":"The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization","authors":"T. Semerdjiev","doi":"10.11610/ISIJ.0903","DOIUrl":"https://doi.org/10.11610/ISIJ.0903","url":null,"abstract":"The Hypothesis Billions of years before the new era, while the third planet in the Solar system covered in dense clouds was still in its sleep, in the dark depths of the endless ocean of organoids, the last module of the Genetic Program began. It was part of the perfect algorithm for evolution of life on Earth. Also, it was the beginning of the second of the three qualitative transitions unexplained by the human beings, which mark the separate parts of the Creation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"90 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine 界定“混合战争”概念——基于对俄罗斯侵略乌克兰的分析
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.4107
O. Manko, Y. Mikhieiev
{"title":"Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine","authors":"O. Manko, Y. Mikhieiev","doi":"10.11610/isij.4107","DOIUrl":"https://doi.org/10.11610/isij.4107","url":null,"abstract":"There is no generally accepted definition of ‘Hybrid Warfare.’ Often, authors use the term depending on the particular context and the issue at stake. This article reviews the variety of views on the definition of the concept of ‘hybrid warfare,’ suggests an up-to-date interpretation of the concept, and identifies key characteristics of conflicts involving this type of warfare. It has been found that an information-psychological element forms the basis of ‘hybrid warfare’ with the aim to influence primarily public consciousness, rather than the armed forces or the State’s infrastructure. Moreover, it has been identified that the indicated threats are of ambiguous nature, and thus it is difficult to single out, detect and identify them in order to organize an appropriate response. The authors note that the concept of ‘hybrid warfare’ has originated in the realm of special forces’ operations in geopolitical terms by integrating the experience of severe confrontations threatening international security, combating terrorism and extremism of state and non-state actors. Along with the features of ‘hybrid warfare,’ the authors elaborate on its components and types, i.e. information warfare, cyber warfare, asymmetric warfare, task force hostilities, terrorist activities, urban guerrilla warfare, signs of humanitarian war, signs of ethnic conflict, trade war, etc. It has been proved that information operations’ planning is a significant component of the interagency approach to the decision-making under conditions of a new type of war – the ‘hybrid’ war.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131577915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Profiling Human Roles in Cybercrime 分析网络犯罪中的人类角色
Information & Security: An International Journal Pub Date : 1900-01-01 DOI: 10.11610/isij.4313
Venelin Georgiev
{"title":"Profiling Human Roles in Cybercrime","authors":"Venelin Georgiev","doi":"10.11610/isij.4313","DOIUrl":"https://doi.org/10.11610/isij.4313","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131102040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信