{"title":"Critical Infrastructure Risk Analysis and Management","authors":"Ryan K. Baggett, Autumn L. Stout","doi":"10.1007/978-3-319-51761-2_1-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_1-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"44 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
John G. Comiskey, M. Larrañaga, Cameron D. Carlson
{"title":"Climate Security: Challenges and Opportunities for Homeland Security","authors":"John G. Comiskey, M. Larrañaga, Cameron D. Carlson","doi":"10.1007/978-3-319-51761-2_55-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_55-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114183765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Civic Homeland Security Culture: A Poll Study Approach and the Example of Pennsylvania","authors":"Alexander Siedschlag","doi":"10.1007/978-3-319-51761-2_39-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_39-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121149925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CSBMs for the Cyber Realm","authors":"J. Altmann, G. Siroli","doi":"10.1007/978-3-319-51761-2_59-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_59-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chemical, Biological, Radiological, Nuclear, and Explosive Threats: An Introduction","authors":"Augustus W. Fountain","doi":"10.1007/978-3-319-51761-2_14-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_14-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121147088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Domestic Terrorism","authors":"Jennifer C. Gibbs","doi":"10.1007/978-3-319-51761-2_6-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_6-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132710949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ethical, Legal, and Social Issues (ELSI)","authors":"Andrea Jerković, Alexander Siedschlag","doi":"10.1007/978-3-319-51761-2_37-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_37-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127327920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critical Thinking and Effective Communication in Security Domains","authors":"Cihan Aydiner","doi":"10.1007/978-3-319-51761-2_2-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_2-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123001670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}