عرض عادي

Homeland security and private sector business : corporations' role in critical infrastructure protection / Elsa Lee.

بواسطة:نوع المادة : نصنصالناشر:Boca Raton : CRC Press, [2009]تاريخ حقوق النشر: copyright 2009وصف:xviii, 281 pages : illustrations, maps ; 25 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781420070781 (hbk)
  • 1420070789 (hbk)
عنوان آخر:
  • Corporations' role in critical infrastructure protection
الموضوع:تصنيف مكتبة الكونجرس:
  • HC110.C3 L44 2009
موارد على الانترنت:
المحتويات:
1 Introduction: Homeland Security Vision 1 -- The Desired State of Homeland Security 1 -- The Current State of Homeland Security 4 -- Homeland Security Issues and Challenges 9 -- Everyone Has a Role in Homeland Security 11 -- History of Terrorism 12 -- The Direct Impact of Modern-Day Terrorism 14 -- What's at Stake with Today's Terrorist Attacks 15 -- Countering Terrorism with DHS Help 20 -- DHS Help Is Not Enough 23 -- 2 Essential Threat Factors 25 -- The Problem We Face with Threats 25 -- General Threats to Security Hierarchy Components 27 -- General Threat Effect on Homeland Security 29 -- Threat Management Through Intelligence 30 -- Terrorists' Operational Methodology 33 -- Limitations of Early Warnings 37 -- Creating Your Own Threat-Warning Capabilities 40 -- Painful Lesson: The USS Cole Attack 41 -- Implications of Not Understanding Threats 43 -- Lesson Learned: First World Trade Center Attack, 1993 45 -- Lesson Learned: First American Hijacking, 1961 45 -- Homeland Security Roles and Misconceptions 46 -- Sharing Information 48 -- Threat Trends 49 -- 3 Threat, Vulnerability, and Risk Components 53 -- DHS Risk Model and National Infrastructure Protection Plan (NIPP) 57 -- Responsibility and Accountability per DHS 60 -- How to Perform Your Own Threat Assessment 60 -- NIPP as a Template 62 -- A Framework for Taking the NIPP Approach 64 -- A Framework for Assessing Threat 65 -- What the Results Suggest 70 -- Terrorist Activity Indicators 71 -- Espionage or Insider Threats 71 -- Information and Technical Threats 71 -- How to Handle Discoveries of Threat and Vulnerabilities 72 -- Determining Vulnerability 73 -- Countermeasure 76 -- Reporting Information 77 -- Cost versus Investment 78 -- Penalties 80 -- Mini Case Study 81 -- 4 Risk Mitigation, Transference, and Elimination 83 -- Risk Decision Principles 84 -- Lessons Not Easily Learned 89 -- 5 Readiness Plans: Develop, Validate, and Update 95 -- How Terrorists Plan 98 -- Collaboration with External Organizations 99 -- Beginning the Development Process 102 -- Plan Development 105 -- Overlooked Plan Items 107 -- Internal Communications Considerations 108 -- External Communications 109 -- Crisis and Media Communications 109 -- Plan Response for Bomb Threats 111 -- Addressing Loading Docks and Mailrooms 112 -- Plan Validation 113 -- Plan Updates 114 -- Plan to Share Information 114 -- What DHS Says about Protected Critical Infrastructure Information (PCII) 117 -- 6 Prevention, Detection, and Response Factors across Sectors 119 -- Innovative Prevention Approaches 124 -- Innovative Detection Technology 127 -- Investing in Response Capabilities through Partnership 128 -- Other Contributors to Homeland Security 132 -- Response Considerations 133 -- Preparedness Snapshot 135 -- 7 Human Factors and Team Dynamics 141 -- The Human Factor 141 -- Humanity in Crisis and Hero Mode 142 -- Female Terrorists: THE Human Factor Gone Wrong 143 -- Humans in Conflict 144 -- Human Overconfidence 146 -- Human Technology 149 -- SuperDiversity 151 -- Diversity as a Problem Solver 152 -- The "Human Factor" as a Tool 153 -- Dysfunctional Group Dynamics 156 -- Discussion versus Dialogue 158 -- How to Get your Team to Dialogue 159 -- Leadership versus Management 160 -- Roadblocks to Effective TeamWork 162 -- Roadblock 1 Lack of Proper Foundation 164 -- Roadblock 2 Linguistic Differences 165 -- Roadblock 3 Conflicts 166 -- Chapter Exercise 167 -- 8 Toolkits and Innovative Ideas for Change 169 -- Organizational Leadership 170 -- Fundamental Management Knowledge 171 -- Stephen Covey 171 -- Problem-Solving Exercises 173 -- Appreciation Exercises: Extracting Maximum Information from Facts 173 -- How to Use the Tool 174 -- Key Points 174 -- 5 Whys: Quickly Getting to the Root of a Problem 174 -- Why Use the Tool? 174 -- How to Use the Tool 175 -- Key Points 175 -- Fundamental Terrorism Knowledge 176 -- Gary Berntsen 176 -- Peter L. Bergen 177 -- Michael Scheuer 177 -- Steven Emerson 178 -- Brian Jenkins 178 -- Jessica Stern 179 -- Wafa Sultan 180 -- Why Workforce Breakdown Is Critical (by personality type, leadership style, and team role) 182 -- Theory X and Theory Y 182 -- Myers-Briggs Type Indicator 183 -- Group Roles and Team Roles 186 -- Low-Context and High-Context Communications 188 -- Reactive versus Proactive Language 189 -- Active Listening 190 -- What to Avoid 190 -- What We Achieve by Listening 190 -- How to Listen 190 -- What to Do 190 -- The Forming, Storming, Norming, Performing Model 191 -- Chapter Exercise 194 -- 9 Training and Exercises: Touch It, Feel It, Live It, Breathe It! 197 -- Benefits of Training 198 -- Adult Learning 199 -- Training Methods 200 -- Crawl Walk Run Methodology 203 -- Video Example for Training 205 -- Another Show Solving a Problem 205 -- Building an Exercise 211 -- Other Key Factors 211 -- How Often Should You Exercise? 212 -- Training Evaluation 213 -- Training Failures 215 -- A Subjective Method for Calculating Return on Investment (ROI) 216 -- 10 You Can Deter But You Can't Interdict: Don't Cross the Line! 219 -- Know Thy Limits 219 -- Distinctions between Collecting information and Collecting Intelligence 220 -- How to Avoid Botching Up an Investigation 221 -- Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies 223 -- Appendix A National Infrastructure Protection Plan -- Table of Contents 225 -- Appendix B ASCE Report on Critical Infrastructure 231 -- Appendix C Bomb Threat Checklist 239 -- Appendix D Best Practices for Mail Center Security 241 -- General Mail Operation Preventive Recommendation 241 -- Employee Security Procedures 242 -- General Safety and Security Procedures for Incoming-Outgoing Mail Areas 243 -- Access to Information: Education and Communications 244 -- Guidelines for Mail Center Theft Prevention 245 -- Appendix E FY07 National Incident Management System (NIMS) Training Guidelines 247 -- Appendix F Fact Sheet on Dirty Bombs 249 -- Impact of a Dirty Bomb 249 -- Protective Actions 250 -- Sources of Radioactive Material 250 -- Control of Radioactive Material 251 -- Risk of Cancer 251 -- Other Contact information 252 -- Appendix G Arab American Psychiatrist Wafa Sultan 253 -- There Is No Clash of Civilizations But a Clash between the Mentality of the Middle Ages and That of the 21st Century 253 -- Appendix H Homeland Security Exercise and Evaluation Program 257.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة HC110.C3 L44 2009 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010011312185
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة HC110.C3 L44 2009 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010011312184

Includes bibliographical references and index.

1 Introduction: Homeland Security Vision 1 -- The Desired State of Homeland Security 1 -- The Current State of Homeland Security 4 -- Homeland Security Issues and Challenges 9 -- Everyone Has a Role in Homeland Security 11 -- History of Terrorism 12 -- The Direct Impact of Modern-Day Terrorism 14 -- What's at Stake with Today's Terrorist Attacks 15 -- Countering Terrorism with DHS Help 20 -- DHS Help Is Not Enough 23 -- 2 Essential Threat Factors 25 -- The Problem We Face with Threats 25 -- General Threats to Security Hierarchy Components 27 -- General Threat Effect on Homeland Security 29 -- Threat Management Through Intelligence 30 -- Terrorists' Operational Methodology 33 -- Limitations of Early Warnings 37 -- Creating Your Own Threat-Warning Capabilities 40 -- Painful Lesson: The USS Cole Attack 41 -- Implications of Not Understanding Threats 43 -- Lesson Learned: First World Trade Center Attack, 1993 45 -- Lesson Learned: First American Hijacking, 1961 45 -- Homeland Security Roles and Misconceptions 46 -- Sharing Information 48 -- Threat Trends 49 -- 3 Threat, Vulnerability, and Risk Components 53 -- DHS Risk Model and National Infrastructure Protection Plan (NIPP) 57 -- Responsibility and Accountability per DHS 60 -- How to Perform Your Own Threat Assessment 60 -- NIPP as a Template 62 -- A Framework for Taking the NIPP Approach 64 -- A Framework for Assessing Threat 65 -- What the Results Suggest 70 -- Terrorist Activity Indicators 71 -- Espionage or Insider Threats 71 -- Information and Technical Threats 71 -- How to Handle Discoveries of Threat and Vulnerabilities 72 -- Determining Vulnerability 73 -- Countermeasure 76 -- Reporting Information 77 -- Cost versus Investment 78 -- Penalties 80 -- Mini Case Study 81 -- 4 Risk Mitigation, Transference, and Elimination 83 -- Risk Decision Principles 84 -- Lessons Not Easily Learned 89 -- 5 Readiness Plans: Develop, Validate, and Update 95 -- How Terrorists Plan 98 -- Collaboration with External Organizations 99 -- Beginning the Development Process 102 -- Plan Development 105 -- Overlooked Plan Items 107 -- Internal Communications Considerations 108 -- External Communications 109 -- Crisis and Media Communications 109 -- Plan Response for Bomb Threats 111 -- Addressing Loading Docks and Mailrooms 112 -- Plan Validation 113 -- Plan Updates 114 -- Plan to Share Information 114 -- What DHS Says about Protected Critical Infrastructure Information (PCII) 117 -- 6 Prevention, Detection, and Response Factors across Sectors 119 -- Innovative Prevention Approaches 124 -- Innovative Detection Technology 127 -- Investing in Response Capabilities through Partnership 128 -- Other Contributors to Homeland Security 132 -- Response Considerations 133 -- Preparedness Snapshot 135 -- 7 Human Factors and Team Dynamics 141 -- The Human Factor 141 -- Humanity in Crisis and Hero Mode 142 -- Female Terrorists: THE Human Factor Gone Wrong 143 -- Humans in Conflict 144 -- Human Overconfidence 146 -- Human Technology 149 -- SuperDiversity 151 -- Diversity as a Problem Solver 152 -- The "Human Factor" as a Tool 153 -- Dysfunctional Group Dynamics 156 -- Discussion versus Dialogue 158 -- How to Get your Team to Dialogue 159 -- Leadership versus Management 160 -- Roadblocks to Effective TeamWork 162 -- Roadblock 1 Lack of Proper Foundation 164 -- Roadblock 2 Linguistic Differences 165 -- Roadblock 3 Conflicts 166 -- Chapter Exercise 167 -- 8 Toolkits and Innovative Ideas for Change 169 -- Organizational Leadership 170 -- Fundamental Management Knowledge 171 -- Stephen Covey 171 -- Problem-Solving Exercises 173 -- Appreciation Exercises: Extracting Maximum Information from Facts 173 -- How to Use the Tool 174 -- Key Points 174 -- 5 Whys: Quickly Getting to the Root of a Problem 174 -- Why Use the Tool? 174 -- How to Use the Tool 175 -- Key Points 175 -- Fundamental Terrorism Knowledge 176 -- Gary Berntsen 176 -- Peter L. Bergen 177 -- Michael Scheuer 177 -- Steven Emerson 178 -- Brian Jenkins 178 -- Jessica Stern 179 -- Wafa Sultan 180 -- Why Workforce Breakdown Is Critical (by personality type, leadership style, and team role) 182 -- Theory X and Theory Y 182 -- Myers-Briggs Type Indicator 183 -- Group Roles and Team Roles 186 -- Low-Context and High-Context Communications 188 -- Reactive versus Proactive Language 189 -- Active Listening 190 -- What to Avoid 190 -- What We Achieve by Listening 190 -- How to Listen 190 -- What to Do 190 -- The Forming, Storming, Norming, Performing Model 191 -- Chapter Exercise 194 -- 9 Training and Exercises: Touch It, Feel It, Live It, Breathe It! 197 -- Benefits of Training 198 -- Adult Learning 199 -- Training Methods 200 -- Crawl Walk Run Methodology 203 -- Video Example for Training 205 -- Another Show Solving a Problem 205 -- Building an Exercise 211 -- Other Key Factors 211 -- How Often Should You Exercise? 212 -- Training Evaluation 213 -- Training Failures 215 -- A Subjective Method for Calculating Return on Investment (ROI) 216 -- 10 You Can Deter But You Can't Interdict: Don't Cross the Line! 219 -- Know Thy Limits 219 -- Distinctions between Collecting information and Collecting Intelligence 220 -- How to Avoid Botching Up an Investigation 221 -- Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies 223 -- Appendix A National Infrastructure Protection Plan -- Table of Contents 225 -- Appendix B ASCE Report on Critical Infrastructure 231 -- Appendix C Bomb Threat Checklist 239 -- Appendix D Best Practices for Mail Center Security 241 -- General Mail Operation Preventive Recommendation 241 -- Employee Security Procedures 242 -- General Safety and Security Procedures for Incoming-Outgoing Mail Areas 243 -- Access to Information: Education and Communications 244 -- Guidelines for Mail Center Theft Prevention 245 -- Appendix E FY07 National Incident Management System (NIMS) Training Guidelines 247 -- Appendix F Fact Sheet on Dirty Bombs 249 -- Impact of a Dirty Bomb 249 -- Protective Actions 250 -- Sources of Radioactive Material 250 -- Control of Radioactive Material 251 -- Risk of Cancer 251 -- Other Contact information 252 -- Appendix G Arab American Psychiatrist Wafa Sultan 253 -- There Is No Clash of Civilizations But a Clash between the Mentality of the Middle Ages and That of the 21st Century 253 -- Appendix H Homeland Security Exercise and Evaluation Program 257.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة