0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R500 - R1,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Bio-Inspired Innovation and National Security (Paperback): Mark Drapeau, Cheryl Loeb, James Valdes Bio-Inspired Innovation and National Security (Paperback)
Mark Drapeau, Cheryl Loeb, James Valdes
R790 Discovery Miles 7 900 Ships in 10 - 15 working days

Ever since man took to the battlefield, biology has played a significant role-both unintentionally and intentionally-in conflict. Prior to the discovery of the germ theory of disease, most combat deaths were the result of infections. And even before that understanding, biology was used in an offensive role. An early example was the Tatars' hurling of plague victims' bodies over the wall of the Crimean city of Kaffa in 1346, which probably helped spread the Black Death. Despite various treaties and protocols, offensive biological weapons use has continued to this day, with the anthrax attacks of 2001 being the most recent incident. Such activity has led to a strong defensive program, with medical science developing numerous countermeasures that have benefited both civilian and military populations. But that is the "old" biological warfare. Covert programs for the development of novel weapons will advance; likewise, the development of countermeasures will also continue. The present volume, however, does not address these issues. Rather, it reviews and analyzes current research and likely future developments in the life sciences and how they will significantly influence the biological material available to warfighters-not as weapons systems, but as augmentation to currently available equipment. This is the "new" face of biological warfare. The editors of this volume have assembled experts in research, warfighting, and defense policy to describe biological applications from the smallest to the largest scale. In addition, they show how thinking in biological terms can improve our procurement cycle and enhance our development time and costs. Finally, no description of biotechnology would be complete without a consideration of ethical and legal issues related to such research and development. This edited book is an important contribution to the literature and nicely captures a number of ongoing military basic science research projects with long-term implications for the Department of Defense. It does not purport to be an exhaustive accounting, but it is an excellent introduction for policymakers to garner an understanding of where biology is going to fit into 21st-century readiness and preparedness for our fighting force.

Social Software and National Security - An Initial Net Assessment (Paperback): Linton Wells II, National Defense University,... Social Software and National Security - An Initial Net Assessment (Paperback)
Linton Wells II, National Defense University, Mark Drapeau
R362 Discovery Miles 3 620 Ships in 10 - 15 working days

Social software connects people and information via online, informal Internet networks. Social software can be used by governments for content creation, external collaboration, community building, and other applications. The proliferation of social software has ramifications for U.S. national security, spanning future operating challenges of a traditional, irregular, catastrophic, or disruptive nature. Failure to adopt these tools may reduce an organization's relative capabilities over time. Globally, social software is being used effectively by businesses, individuals, activists, criminals, and terrorists. Governments that harness its potential power can interact better with citizens and anticipate emerging issues. Security, accountability, privacy, and other concerns often drive national security institutions to limit the use of open tools such as social software, whether on the open web or behind government information system firewalls. Information security concerns are very serious and must be addressed, but to the extent that our adversaries make effective use of such innovations, our restrictions may diminish our national security. This analysis looks at both sides of what once might have been called a "blue-red" balance to investigate how social software is being used (or could be used) by not only the United States and its allies, but also by adversaries and other counterparties. We have considered how incorporation of social software into U.S. Government (USG) missions is likely to be affected by different agencies, layers of bureaucracy within agencies, and various laws, policies, rules, and regulations. Finally, we take a preliminary look at questions like: How should the Department of Defense (DOD) use social software in all aspects of day-to-day operations? How will the evolution of using social software by nations and other entities within the global political, social, cultural, and ideological ecosystem influence the use of it by DOD? How might DOD be affected if it does not adopt social software into operations? In the process, we describe four broad government functions of social software that contribute to the national security missions of defense, diplomacy, and development: Inward Sharing, or sharing information within agencies; Outward Sharing, or sharing internal agency information with entities beyond agency boundaries; Inbound Sharing, which allows government to obtain input from citizens and other persons outside the government more easily; and Outbound Sharing, whose purpose is to communicate with and/or empower people outside the government. Social software, if deployed, trained on, monitored, managed, and utilized properly, is expected to yield numerous advantages: improve understanding of how others use the software, unlock self-organizing capabilities within the government, promote networking and collaboration with groups outside the government, speed decision making, and increase agility and adaptability. Along with the accrual of positive benefits, incorporating social software into day-to-day work practices should also decrease the probability of being shocked, surprised, or outmaneuvered. Whether it is misinformation about U.S. actions overseas being spread through new media channels, or new forms of terrorist self-organization on emerging social networks, experimenting with and understanding social software will increase USG abilities to deal with complex, new challenges. Because social software can add significant value to many ongoing missions, and because citizens, allies, and opponents will use it regardless, this paper recommends that national security institutions, particularly DOD, embrace its responsible usage.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Payback In Death
J. D. Robb Paperback R280 R224 Discovery Miles 2 240
The Bourne Evolution
Brian Freeman Paperback  (1)
R479 R393 Discovery Miles 3 930
The Swift And The Harrier
Minette Walters Paperback R399 Discovery Miles 3 990
The Finish Line
Gail Schimmel Paperback R340 R240 Discovery Miles 2 400
Everyone Is Still Alive
Cathy Rentzenbrink Paperback R335 R265 Discovery Miles 2 650
Resurrection
Danielle Steel Paperback R365 R260 Discovery Miles 2 600
Southern Man
Greg Iles Paperback R420 R280 Discovery Miles 2 800
Desolation Road
Christine Feehan Paperback R285 R257 Discovery Miles 2 570
The Jealousy Man - Stories From The…
Jo Nesbo Paperback R429 Discovery Miles 4 290
Eruption
Michael Crichton, James Patterson Paperback R380 R270 Discovery Miles 2 700

 

Partners