Normal view MARC view ISBD view

Threatcasting [electronic resource] / by Brian David Johnson, Cyndi Coon, Natalie Vanatta.

By: David Johnson, Brian [author.].
Contributor(s): Coon, Cyndi [author.] | Vanatta, Natalie [author.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Synthesis Lectures on Threatcasting: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2021Edition: 1st ed. 2021.Description: XXV, 285 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031025754.Subject(s): Mathematics | Information visualization | Politics and war | Financial risk management | Mathematics | Data and Information Visualization | Military and Defence Studies | Risk ManagementAdditional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification: 510 Online resources: Click here to access online
Contents:
Foreword by Andy Hines -- Preface -- How To Get the Most From This Book -- Part 1: Threatcasting: Method, Framework, and Process -- Threatcasting -- Phase 0 -- Phase 1 -- Phase 2 -- Phase 3 -- Phase 4 -- Phase 5 -- Conclusion -- Part 2: The Threatcasting Method Applied -- Introduction to Applied Threatcasting -- Large Group Threatcasting Workshop -- Small Group Threatcasting Workshop -- Individual Threatcasting -- Conclusions -- List of Acronyms -- References -- Authors' Biographies.
In: Springer Nature eBookSummary: Impending technological advances will widen an adversary's attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding anundesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader's understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of "the next biological public health crisis." The second half of the book is designed as a practitioner's handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.
    average rating: 0.0 (0 votes)
No physical items for this record

Foreword by Andy Hines -- Preface -- How To Get the Most From This Book -- Part 1: Threatcasting: Method, Framework, and Process -- Threatcasting -- Phase 0 -- Phase 1 -- Phase 2 -- Phase 3 -- Phase 4 -- Phase 5 -- Conclusion -- Part 2: The Threatcasting Method Applied -- Introduction to Applied Threatcasting -- Large Group Threatcasting Workshop -- Small Group Threatcasting Workshop -- Individual Threatcasting -- Conclusions -- List of Acronyms -- References -- Authors' Biographies.

Impending technological advances will widen an adversary's attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding anundesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader's understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of "the next biological public health crisis." The second half of the book is designed as a practitioner's handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.

There are no comments for this item.

Log in to your account to post a comment.