Knowledgebase

Number of results: 159

Agreement on Cooperation in Science and Technology for Homeland Security Matters

Document type: 
Policy document
Publisher / Publication: 
Department of Homeland Security
Abstract: 

Signed by US Secretary of Homeland Security, Michael Chertoff, and Swedish Minister of Defence, Mikael Odenberg.

 The "Designated Security Authorities" are DHS in the US, and KBM (later MSB) in Sweden. The objective of this Agreement is to establish a framework to encourage, develop and facilitate bilateral Cooperative Activity in science and technology that contributes to the homeland security capabilities of both Parties in: a) the prevention and detection of, response to, and forensics and attribution applied to, terrorist or other homeland security threats andlor indicators; b) the protection of Critical  infrastructure; and c) crisis response and consequence management and mitigation for high-consequence events. The agreement recognises a "common desire" to: - expand the homeland security technology capabilities of each Party; - minimise unnecessary duplication of work; - obtain more efficient and cost-effective results;  - and adapt more flexibly to the dynamic threat environment

Homeland Security 3.0: Building a National Enterprise To Keep America Free, Safe, and Prosperous

Document type: 
Report
Authors / Institution: 
Publisher / Publication: 
Heritage Foundation
Abstract: 

Think-tank report on the future strategies and developments for homeland security in the US and abroad. Jesper Grönvall (KBM) participated in the policy task force.

Global Flow Security: A new security agenda for the transatlantic community in 2030

Document type: 
Report
Authors / Institution: 
Publisher / Publication: 
MSB
Abstract: 

The Swedish Institute of Foreign Affairs (UI), MSB, and the Center for Transatlantic Relations have collaborated in researching long-term trends that may affect critical global flows in different a

reas. The report recommends that EU and the US should cooperate further on such critical flows in the future.

SOFF Business Plan 2015

Document type: 
Policy document
Authors / Institution: 
Publisher / Publication: 
SOFF
Abstract: 

Original title: "Verksamhetsplan 2015".

In our 2015 business plan we describe SOFF’s overarching purpose and objectives, as well as what we intend to do during the year ahead in order to meet these challenges and opportunities.

Knowledge to safeguard security: Proposals for a national strategy for security research

Document type: 
Policy document
Authors / Institution: 
Publisher / Publication: 
VINNOVA
Abstract: 

VINNOVA is the Swedish Innovation and Growth Agency. This report is coauthored by KBM, The Swedish Armed Forces, FMV, FOI, The Defence College, and Svenskt Näringsliv.

Ordered by the Ministry of Economy. Informed the negotiations of the MSB-DHS 2007 agreement.

Societal security in the nordic countries

Document type: 
Report
Authors / Institution: 
Publisher / Publication: 
Nordforsk
Abstract: 

Policy Paper on Nordic Societal Security.

Governing Critical ICT: Elements that Require Attention

Document type: 
Scientific publication
Authors / Institution: 
Publisher / Publication: 
European Journal of Risk Regulation (Special Issue on Symposium on Critical Infrastructures: Risk, Responsibility and Liability), 263-270
Abstract: 

With respect to critical information and communication technologies (ICT), nations most often declare their national critical infrastructure to include telecommunication services and in some cases

critical services offered by key Internet Service Providers (ISP). This paper debates whether nations, their policy-makers, legislation and regulation largely overlook and fail to properly govern the full set of ICT elements and services critical to the functioning of their nation. The related societal and economical risk, however, needs to be closely mitigated, managed and governed. Legal and regulatory obligations to increase the ICT resilience may sometimes encourage this process.

Supertargets : Verkenning naar voorspellende en verklarende factoren voor slachtofferschap van cybercriminaliteit

Document type: 
Report
Publisher / Publication: 
TNO Soesterberg
Abstract: 

This report describers a literature into predictive and causal factors of cyber victimisation.

Results will be integrated to gain insight into generic behavioral and personality characteristics of individuals who have become victims of cyber criminality. This knowledge should form the basis for technical of behavioral interventions aimed to counter victimization. [Deze rapportage beschrijft een literatuuronderzoek naar voorspellende en verklarende factoren van slachtofferschap van cybercriminaliteit. De resultaten zullen worden geïntegreerd om inzicht te verkrijgen in generieke gedrags- en persoonlijkheidskenmerken van mensen die slachtoffer zijn van (cyber) criminaliteit. Dit inzicht in generieke gedrags- en persoonlijkheidskenmerken vormt de basis voor effectieve technische of gedragsinterventies om slachtofferschap tegen te gaan.]

Video content analysis on body-worn cameras for retrospective investigation

Document type: 
Scientific publication
Publisher / Publication: 
Proc. SPIE, vol. 9652.
Abstract: 

In the security domain, cameras are important to assess critical situations.

Apart from fixed surveillance cameras we observe an increasing number of sensors on mobile platforms, such as drones, vehicles and persons. Mobile cameras allow rapid and local deployment, enabling many novel applications and effects, such as the reduction of violence between police and citizens. However, the increased use of bodycams also creates potential challenges. For example: how can end-users extract information from the abundance of video, how can the information be presented, and how can an officer retrieve information efficiently? Nevertheless, such video gives the opportunity to stimulate the professionals’ memory, and support complete and accurate reporting. In this paper, we show how video content analysis (VCA) can address these challenges and seize these opportunities. To this end, we focus on methods for creating a complete summary of the video, which allows quick retrieval of relevant fragments. The content analysis for summarization consists of several components, such as stabilization, scene selection, motion estimation, localization, pedestrian tracking and action recognition in the video from a bodycam. The different components and visual representations of summaries are presented for retrospective investigation.

Disentangling Wicked Problems: A Reflexive Approach Towards Resilience Governance

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Applications of Systems Thinking and Soft Operations Research in Managing Complexity – From Problem Framing to Problem Solving. A.J. Masys (Ed.), 91-105. Springer, Switserland.
Abstract: 

This chapter discusses the complex challenge of dealing with diverging threats in our contemporary hyper-connected society.

In recent decades, resilience has become a key notion that has been adopted by policy-makers and academia to embrace the changing risk our society faces. Yet the traditional, modernist rational logic that dominates approaches to resilience management, does not fit with the problem at hand. In this chapter we argue that societal challenges in the current era require a paradigm shift: we need novel perspectives on how to approach the governance of risks and the societal implementation of resolutions. We will argue that the recent focus shift from risk assessment to resilience enhancement in many disaster management communities is an important aspect of this paradigm shift, but that it is by itself not enough to deal with the ‘wickedness’ of today’s complexity.

Pages

Go to top