000 04572nam a22005655i 4500
001 978-3-031-02575-4
003 DE-He213
005 20240730164001.0
007 cr nn 008mamaa
008 220601s2021 sz | s |||| 0|eng d
020 _a9783031025754
_9978-3-031-02575-4
024 7 _a10.1007/978-3-031-02575-4
_2doi
050 4 _aQA1-939
072 7 _aPB
_2bicssc
072 7 _aMAT000000
_2bisacsh
072 7 _aPB
_2thema
082 0 4 _a510
_223
100 1 _aDavid Johnson, Brian.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_981491
245 1 0 _aThreatcasting
_h[electronic resource] /
_cby Brian David Johnson, Cyndi Coon, Natalie Vanatta.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXXV, 285 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Threatcasting,
_x2771-1579
505 0 _aForeword by Andy Hines -- Preface -- How To Get the Most From This Book -- Part 1: Threatcasting: Method, Framework, and Process -- Threatcasting -- Phase 0 -- Phase 1 -- Phase 2 -- Phase 3 -- Phase 4 -- Phase 5 -- Conclusion -- Part 2: The Threatcasting Method Applied -- Introduction to Applied Threatcasting -- Large Group Threatcasting Workshop -- Small Group Threatcasting Workshop -- Individual Threatcasting -- Conclusions -- List of Acronyms -- References -- Authors' Biographies.
520 _aImpending technological advances will widen an adversary's attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding anundesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader's understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of "the next biological public health crisis." The second half of the book is designed as a practitioner's handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.
650 0 _aMathematics.
_911584
650 0 _aInformation visualization.
_914255
650 0 _aPolitics and war.
_935942
650 0 _aFinancial risk management.
_941918
650 1 4 _aMathematics.
_911584
650 2 4 _aData and Information Visualization.
_933848
650 2 4 _aMilitary and Defence Studies.
_935943
650 2 4 _aRisk Management.
_94713
700 1 _aCoon, Cyndi.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_981492
700 1 _aVanatta, Natalie.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_981493
710 2 _aSpringerLink (Online service)
_981494
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031003455
776 0 8 _iPrinted edition:
_z9783031014475
776 0 8 _iPrinted edition:
_z9783031037030
830 0 _aSynthesis Lectures on Threatcasting,
_x2771-1579
_981495
856 4 0 _uhttps://doi.org/10.1007/978-3-031-02575-4
912 _aZDB-2-SXSC
942 _cEBK
999 _c85185
_d85185