• Corpus ID: 16076987

Using Social Science Technology to Understand and Counter the 21st-century Strategic Threat Ieee Intelligent Systems Challenges of 21st-century Warfare How Social Science Technology Can Help Population Resources Technology Master Variables Violent Conflict Lateral Pressure Internal Pressure External

@inproceedings{PoppUsingSS,
  title={Using Social Science Technology to Understand and Counter the 21st-century Strategic Threat Ieee Intelligent Systems Challenges of 21st-century Warfare How Social Science Technology Can Help Population Resources Technology Master Variables Violent Conflict Lateral Pressure Internal Pressure External},
  author={Robert L. Popp}
}
During the Cold War era, the strategic threat against the US was clear. The country responded clearly with a policy toward the Soviet threat that centered on deterrence, containment , and mutually assured destruction. To enforce this policy, the US created a strategic triad composed of nuclear intercontinental ballistic missiles, Trident nuclear submarines, and long-range strategic bombers. Today, however, our security environment is profoundly different. The strategic threat is far more… 
1 Citations

Figures from this paper

Managing Implementation Risks through Time-Behavior Analysis

  • N. H. Wasserman
  • Computer Science
    2007 IEEE Conference on Technologies for Homeland Security
  • 2007
TLDR
The paper presents a model and architectural approach for categorizing behaviors, which takes into account the effects of incremental growth and propagation of behaviors across networks, and is applied to considerations of business architecture and implementation risks for security and other technologies.

References

SHOWING 1-9 OF 9 REFERENCES

Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd

TLDR
Civil liberties can best be protected by employing value sensitive technology development strategies in conjunction with policy implementations, not by opposing technological developments or seeking to control the use of particular technologies or techniques after the fact through law alone.

Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data

TLDR
It is argued that security with privacy can be achieved by employing value-sensitive technology development strategies that take privacy concerns into account during development, in particular, by building in rule-based processing, selective revelation, and strong credential and audit features.

Discipline and Punish: The Birth of the Prison

This writer who has warned us of the “ideological” function of both the oeuvre and the author as unquestioned forms of discursive organization has gone quite far in constituting for both these

Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties

This chapter contains sections titled: Introduction Changing Base Conditions Systems Architecture This chapter contains sections titled: Summary ]]>

Your Papers, Please

  • World Net Daily
  • 2003

3. Rest

  • 3. Rest

Privacy-Preserving Bio-terrorism Surveillance

  • Proc. AAAI Spring Symp. AI Technologies for Homeland Security
  • 2005

C. Beccaria, On Crimes and Punishment

  • C. Beccaria, On Crimes and Punishment
  • 1764

Information Explosion Confidentiality , Disclosure, and Data Access

  • Information Explosion Confidentiality , Disclosure, and Data Access
  • 2001