Revisiting National Security: Prospecting Governance For Human Well-Being

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book examines the evolving concept of national security and how human systems could be governed in an ever turbulent and dynamic world. It takes a revised look at the concept of national security, previously researched and identified by the author, based on the present context but with a futuristic appreciation of governance, primarily national but extended to global perspectives, in the modern and dynamically shifting world. The book emphasises the need for governments to maximise national security for the well-being of their people. The concept of national security is taken as the key subject of national governance which is extendable to global governance wherein national security is not only the physical or military security alone but also the overall well-being of the people of a nation. This book explores how national security can be achieved by balancing its various elements in different terrains where the game of governance is played in national as well as global perspective. It also presents additional findings and observations to show that the approach is transformative, redefining the key knowledge paradigms. This book is relevant for policy makers, students, researchers and academics who wish to explore and rethink their approach towards governing the human systems, whose well-being is the responsibility of governments.

Author(s): Prabhakaran Paleri
Edition: 1
Publisher: Springer
Year: 2022

Language: English
Commentary: TruePDF
Pages: 1407
Tags: National Security; National Security: Social Aspects; Well-being; Biotechnology; Governance And Government; Quality Of Life Research

Preface
Acknowledgements
Contents
About the Author
Abbreviations
List of Figures
List of Tables
Part I: In Quest of National Security: World of Sapiens
Chapter 1: Humans and Human Systems: Shifting Centroid of National Security
1.1 Introduction
1.2 Studying Sapiens by Sapiens
1.2.1 Rationale for Governing Sapiens
1.3 Singularity and Differentiality in Human Context
1.3.1 Humans Are Disparate
1.4 Human Systems
1.5 Human Systems and National Security
1.6 Geopolitical Entities
1.6.1 Identifying Geopolitical Entities
1.6.1.1 UN Member Entities (193)
1.6.1.2 UN Non-member Entities (2)
1.6.1.3 UN Unrecognised Entities (8)
1.6.1.4 Territories Claimed by and Accepted by UN Members (58)
1.6.1.5 Global Land Commons (1)
1.6.1.6 Supranational Entities (1)
1.7 Human Systems: Regressing into Time
1.8 Invariance of Human System
1.9 Centroid and Human System
1.10 Summation
Chapter 2: National Security: Concept, Evolution and Descriptive Stasis
2.1 Introduction
2.1.1 Needs, Wants and Governance
2.2 Studying National Security
2.2.1 Limiting and Supporting Factors
2.3 Concept of National Security
2.3.1 Approaching National Security Concept
2.3.1.1 Needs-Based Approach
2.3.1.2 Psychological Approach
2.3.1.3 Security vs. Happiness Approach
2.3.1.4 Philosophical Approach
2.3.1.5 Historical Approach
2.3.1.6 Political Science Approach
2.3.1.7 Legendary and Mythological Approach
2.3.1.8 Constitutional Approach
2.3.1.9 Planners´ Approach
2.3.1.10 Military Approach
2.3.1.11 Polar Approach
2.4 Recipe for Security
2.4.1 Organised Groups and Prelude to Nationalism
2.4.1.1 Treaties of Westphalia and Sovereignty of States
2.4.1.2 State in Political Philosophy
2.5 Security Under Change and Acculturation
2.6 Evolution of National Security
2.6.1 Role of State in National Security
2.7 Descriptive Stasis of National Security
2.8 Summation
Chapter 3: National Security: Definitions and Manifestations
3.1 Introduction
3.2 Limitations in Defining National Security
3.2.1 Law of Limitations
3.3 National Security
3.3.1 Defining National Security
3.3.2 Timelining Definitions
3.3.2.1 Pre-1790. Physical Security
3.3.2.2 1790. Yale University on Fostering Industries
3.3.2.3 1914-1918-1939-1945. Global Wars and Interfacial Period-Fixation on War and Collapse of Governance
3.3.2.4 1943. Walter Lippmann
3.3.2.5 1945. US Senate Hearing-Looking Beyond Defence
3.3.2.6 1947. National Security Act and National Security Council, USA-War and Military Still Holds the Chunk of National Secu...
3.3.2.7 1948. George Kennan´s Idea of National Security-Sustainable Internal Continuum of Development without External Interfe...
3.3.2.8 1950. Harold D. Lasswell-Political Scientist and Communications Theorist
3.3.2.9 1952. National Security Agency-Intelligence and National Security
3.3.2.10 1962. Arnold Wolfers, Political Scientist-the Ambiguity Model
3.3.2.11 1965. Institute of Defence Studies and Analyses-Defence and National Security
3.3.2.12 1968. International Encyclopaedia of Social Sciences-Protecting Internal Values from External Threats
3.3.2.13 1972. William D. Blair, Jr.-Natural Environment and Energy
3.3.2.14 1973. John E. Moss. Member, US House of Representatives-Ill-Defined Phrase
3.3.2.15 1974. Maxwell Taylor-Non-military Threats to the United States
3.3.2.16 1976. Yale Review-Ambiguity Recognised by Courts
3.3.2.17 1977. Lester Brown-Non-military Threats to Global Community
3.3.2.18 1981. Jordan and Taylor-More Extensive Meaning
3.3.2.19 1983. Barry Buzan-Ill-Defined but Politically Powerful
3.3.2.20 1983. Richard H. Ullman-Concern for Quality of Life of People of a State and Governance
3.3.2.21 Jessica Tuchman Mathews-Broadening the Definition of National Security
3.3.2.22 1990. Charles Maier-Power to Control
3.3.2.23 1991. Theodore Moran-Geostrategic Security Issues for the United States
3.3.2.24 1992. End of Cold War-Ushering a New World Order?
3.3.2.25 1995. ECSA Conference, US-Reconfiguration of European Strategy into Enhanced Security Concept
3.3.2.26 1996. National Defence College, India-Seminar on Maritime Strategy. Beyond Military
3.3.2.27 1996. Battle Scene 2020-Seminar at the Defence Institute of Psychological Research, India
3.3.2.28 1998-1999. Changes in Perception of National Security in India-Beyond Military
3.3.2.29 1999. Jaswant Singh in ``Defending India´´-National Security on a Larger Canvas
3.3.2.30 1999. Vinod Saighal-National Security Includes Concern for Global Equipoise
3.3.2.31 2000. Kargil Review Committee Report-Importance of Intelligence
3.3.2.32 2000. Anuradha M. Chinoy-Changing the Traditional Notion of National Security
3.3.2.33 2001. Group of Ministers, India-External Environment and Internal Situation
3.3.2.34 2001. Indian Navy. International Fleet Review Seminar-National Security is not Just War Fighting
3.3.2.35 2007. Prabhakaran Paleri (author)-All Compassing National Well-Being as the Goal of Governance
3.3.2.36 2011. Framework Document (05/2011), Instituto Español De Estudios Estrategicos, Madrid-National Security as an Evolvi...
3.3.2.37 2017-2018. Reviews in India-National Security Thinking as a Continuing Process
3.3.3 Conceptual Ambiguity
3.4 Changing Times and Landscapes: Search for a Model
3.4.1 Characteristics, Contents and Objectives of National Security
3.4.2 Other Parameters
3.5 Global Security-Hesitant Pragmatism
3.6 Calling Finals-Defining National Security
3.7 Manifestation of National Security in National Governance
3.7.1 Indexing National Security
3.8 Summation
Chapter 4: Threat, Risk and Uncertainty: Triad of Chaotic Balance in a Chancy, Chancy World
4.1 Introduction
4.2 Threat and National Security
4.2.1 Threat Matrix Cube
4.2.2 Typology of Threats
4.2.2.1 Direct-Covert-External (DCE) Threats
4.2.2.2 Direct-Covert-Internal (DCI)
4.2.2.3 Direct-Overt-External (DOE)
4.2.2.4 Direct-Overt-Internal (DOI)
4.2.2.5 Indirect-Covert-External (ICE)
4.2.2.6 Indirect-Covert-Internal (ICI)
4.2.2.7 Indirect-Overt-External (IOE)
4.2.2.8 Indirect-Overt-Internal (IOI)
4.2.3 Threat in a Cube: Flybox Analysis
4.2.4 Converting Threat into Opportunity
4.2.5 Threat Attraction
4.2.6 Threat-to-Target Analysis
4.2.7 Techniques of Pre-emption
4.3 Risk and Uncertainty
4.4 Then, What Is Chance?
4.5 Counterpoint: Threat, Risk and Uncertainty
4.6 Knowing the Unknown: Data, Information and Intelligence
4.7 Sapiens Forte: Seeing Through Time
4.8 Summation
Chapter 5: Terrains and Terrain Specificity
5.1 Introduction
5.2 Concept of Terrain in National Security
5.3 Meaning of Terrain
5.4 Characteristics and Definition of Terrain
5.5 Classification of Terrains
5.5.1 Land: Terrain #1
5.5.2 Ocean: Terrain #2
5.5.3 Air Space: Terrain #3
5.5.4 Contiguous Space: Terrain #4
5.5.5 Deep Space: Terrain #5
5.5.6 Cyberspace: Terrain #6
5.5.7 Genome: Terrain #7
5.5.8 Microbiome: Terrain #8
5.6 Terrain Hierarchy and Future
5.7 Terrain Specificity and Application
5.8 Terrain Maxima and Terrain Advantage
5.9 Summation
Chapter 6: Elements of National Security: Gravity Centres
6.1 Introduction
6.2 Elements of National Security
6.2.1 Qualifying Characteristics of Elements of National Security
6.2.2 Charting Elements of National Security
6.2.2.1 #1 Military Security (Milsec) (ms1)
6.2.2.2 #2 Economic Security (Econosec) (es1)
6.2.2.3 #3 Resource Security (Resourcesec) (rs)
6.2.2.4 #4 Border Security (Bordersec) (bs1)
6.2.2.5 #5 Demographic Security (Demosec) (ds1)
6.2.2.6 #6 Disaster Security (Disastersec) (ds2)
6.2.2.7 #7 Energy Security (Energysec) (es2)
6.2.2.8 #8 Geostrategic Security (Geosec) (gs2)
6.2.2.9 #9 Informational Security (Infosec) (is)
6.2.2.10 #10 Food Security (Foodsec) (fs)
6.2.2.11 #11 Health Security (Healthsec) (hs)
6.2.2.12 #12 Ethnic Security (Ethnicsec) (es3)
6.2.2.13 #13 Environmental Security (Envirosec) (es4)
6.2.2.14 #14 Cyber Security (Cybersec) (cs)
6.2.2.15 #15 Genomic Security (Genomicsec) (gs2)
6.2.2.16 #16 Microbiomic Security (Microbiomicsec) (ms2)
6.2.3 Factors Examined for Elements but Excepted
6.2.3.1 #1 System of Government
6.2.3.2 #2 Political Stability
6.2.3.3 #3 Rule of Law
6.2.3.4 #4 Welfare Doles
6.2.3.5 #5 Violence
6.2.3.6 #6 Weapons of Mass Destruction
6.2.3.7 #7 Literacy and Education
6.2.3.8 #8 Spirituality
6.2.3.9 #9 Militancy and Terrorism
6.2.3.10 #10 Homeland Security
6.2.3.11 #11 Internal Security
6.2.3.12 #12 Judicial Security
6.2.3.13 #13 Happiness
6.3 Hierarchy and Interdependency of Elements
6.4 Summation
Chapter 7: Convolution of Apparent Security and Perceived Security in Governance
7.1 Introduction
7.2 Governing Human Systems
7.3 National Governance
7.3.1 Authority, Responsibility and Accountability in National Governance
7.3.2 Governments and Shifting ARandA
7.4 Idealistic, Realistic and Naturalistic: Outlining Governance
7.5 Apparent Security and Perceived Security: Limitations of Governments
7.5.1 Retracing Role of Government
7.6 Nation, People and Government: Triad of Governance
7.7 Convolution Under International Inadvertences
7.8 ARandA Mismatch: Universal Dilemma and Gita Paradox
7.9 Summation
Chapter 8: Rule of Law and Role of Government: Law Making, Enforcing and National Security
8.1 Introduction
8.2 Why Humans Need to Be Governed?
8.3 Paradigm and Disconnect of Law
8.4 Resistance to Law and Law Making: Demoslip
8.5 What Is Unlawful?
8.6 So, What Is Law?
8.7 Rule of Law
8.7.1 Sovereignty, Citizens, and International Relations
8.8 Due Process of Law
8.9 Law Enforcement
8.10 Crime, Punishment and National Security
8.10.1 Universal Crimes
8.10.2 Capital Crimes
8.10.3 Punishment and Rule of Law
8.10.4 Is Rule of Law Possible?
8.11 Summation
Part II: Elements of National Security
Chapter 9: #1 Military Security (Milsec) (ms)
9.1 Introduction
9.1.1 Conflicts: Sapien vs. Non-sapien
9.2 Military Security: Setting
9.3 About Military Security
9.4 About War
9.5 War in a ``Peaceless´´ World
9.5.1 Prehistoric and Protohistoric Period Wars
9.5.2 Wars between Prehistoric and Protohistoric Period and Pre-nation State
9.5.3 Inter-period: 1648-1919
9.5.4 Inter-period: 1919-1945
9.5.5 Cold War: 1945-1991
9.5.6 Post Cold War
9.5.7 Reforms and Interventional Changes in UN
9.5.7.1 High Level Panel on Threats, Challenges and Change (2003-2004)
9.5.7.2 Transforming Our World: Agenda 2030 for Sustainable Development
9.5.8 2021: So, Is War Over?
9.6 UN and War
9.7 Anatomy of War
9.8 War and Despise: Counter Theory
9.9 War in the Future
9.10 Cost of Military
9.11 Value Engineering Military
9.12 So, What Is Military Security?
9.12.1 Definition: Military Security
9.13 Summation
Chapter 10: #2 Economic Security (Econosec) (es1)
10.1 Introduction
10.2 Economic Security: Setting
10.3 Transboundary Nature of Economics
10.4 Globalisation and Economic Security
10.5 Money Trail in Economic Security
10.6 Economic Advancement
10.7 Government and Good Economics
10.8 Optimising Economic Security
10.9 Economic Security Indicators
10.10 Economics as Happiness Index
10.11 Mountebanking in Economic Security
10.12 Economic Warfare and Economic Security
10.13 Velocity of Flow of Money: Critical Factor
10.14 Eenampeechies of Money: Illuminati Paradox and Outgrown Lazy Money
10.15 Psychonomics: Thematic Inconsistency
10.16 Colour of Money
10.17 So, What Is Economic Security?
10.17.1 Definition: Economic Security
10.18 Summation
Chapter 11: #3 Resource Security (Resourcesec) (rs)
11.1 Introduction
11.2 Resource Security: Setting
11.2.1 Commons: National and Global
11.2.2 Classification of Resources
11.2.3 Politics, Culture and Resources
11.2.4 Resource Security and Threat Attraction
11.3 Critical Resources and Resource Security
11.3.1 Land
11.3.2 Air
11.3.3 Water
11.3.4 Food Resources
11.3.5 Metals and Minerals
11.3.6 Energy Resources
11.3.7 Strategic Resources
11.4 Resource Overshoot
11.5 Allocation of Resources
11.6 Mobilisation of Resources
11.7 Anticipated Resource Constraints
11.8 Worldwide Resource Web
11.9 Resource Ethics
11.10 Strategic Resource Access and Denial
11.11 So, What Is Resource Security?
11.11.1 Definition: Resource Security
11.12 Summation
Chapter 12: #4 Border Security (Bordersec) (bs1)
12.1 Introduction
12.2 Border Security: Setting
12.3 Border Security Policy
12.4 Types of Borders
12.4.1 Land Borders
12.4.2 Maritime Borders
12.4.3 Air Space Borders
12.4.4 Outer Space Borders
12.5 Border Security Intervention
12.6 Border Disputes and Confidence Building
12.7 So, What Is Border Security?
12.7.1 Definition: Border Security
12.8 Summation
Chapter 13: Demographic Security (Demosec) (ds1)
13.1 Introduction
13.2 Demographic Security: Setting
13.3 Human Population
13.4 Demography and Economic Growth
13.4.1 Human Investment Management: An Overture
13.5 Human Migration
13.6 Human Smuggling and Human Trafficking: Other Side of Migration
13.7 Population Trends
13.8 So, What Is Demographic Security?
13.8.1 Definition: Demographic Security
13.9 Summation
Chapter 14: Disaster Security (Disastersec) (ds2)
14.1 Introduction
14.2 Disaster Security: Setting
14.3 Anatomy of a Disaster
14.4 Classifying Disasters
14.4.1 Nature-Induced Disasters
14.4.1.1 Earthquake
14.4.1.2 Volcanic Eruption
14.4.1.3 Tsunami
14.4.1.4 Flood
14.4.1.5 Drought
14.4.1.6 Cyclone
14.4.1.7 Tornadoes
14.4.1.8 Avalanche
14.4.1.9 Landslide
14.4.1.10 Heat Wave
14.4.1.11 Cold Wave
14.4.1.12 Hailstorm
14.4.1.13 Glacier Burst
14.4.1.14 Threat from Extraterrestrial Objects
14.4.2 Human-Induced Disasters
14.4.2.1 Military Conflicts
14.4.2.2 Riots
14.4.2.3 Ethnic Conflicts
14.4.2.4 Refugee Situations
14.4.2.5 Policy-Activated Disasters
14.4.3 Chance-Induced Disasters
14.4.3.1 Epidemics and Pandemics
14.4.3.2 Industrial Disasters
14.4.3.3 Fire
14.4.3.4 Accidents
14.4.3.5 Resource-Activated Disaster
14.5 Disaster Statistics
14.6 Disaster Cycle
14.7 Disaster Prevention, Pre-emption, Preparedness and Response
14.8 Cost-Benefit Analysis in Disaster Security
14.9 Disasters Through History
14.10 Climate Change Attribution
14.11 So, What Is Disaster Security?
14.11.1 Definition: Disaster Security
14.12 Summation
Chapter 15: Energy Security (Energysec) (es2)
15.1 Introduction
15.1.1 Enter the Blaze
15.2 Energy Security: Setting
15.3 Energy and Human Progress
15.4 About Energy
15.4.1 Renewable Energy
15.4.1.1 Sun
15.4.1.2 Wind
15.4.1.3 Water
15.4.1.4 Biomass
15.4.1.5 Geothermal Heat
15.4.1.6 Ocean
15.4.1.7 Hydrogen
15.4.1.8 Nuclear
15.4.2 Non-renewable Energy
15.4.2.1 Coal
15.4.2.2 Oil
15.4.2.3 Oil Shale
15.4.2.4 Natural Gas
15.5 Expressing Energy Consumption
15.6 Energy: Status and Trends
15.7 Challenges of Energy Security
15.8 Energy Security and Law of Conservation of Energy
15.9 Is Energy Regeneration from Spent Energy Feasible?
15.10 Governing Energy
15.11 So, What Is Energy Security?
15.11.1 Definition: Energy Security
15.12 Summation
Chapter 16: Geostrategic Security (Geosec) (gs1)
16.1 Introduction
16.2 Geostrategic Security: Setting
16.3 Examining Geostrategic Attempts in Statecraft
16.4 Diplomacy and Geostrategy
16.5 Is There a Hierarchy of Nations?
16.5.1 Hierarchy and Polarity of Nations
16.6 International Systems
16.7 Ideologies and International Relationships
16.8 Geostrategy and Natives: Hyphenated or Otherwise
16.9 United Nations: Controlled Collectivism in an Uncertain World
16.10 So, What Is Geostrategic Security?
16.10.1 Definition: Geostrategic Security
16.11 Summation
Chapter 17: Informational Security (Infosec) (is)
17.1 Introduction
17.2 Informational Security: Setting
17.3 Securing Information
17.4 History: Information That Was and Would Have Been
17.5 Information and Intelligence
17.6 Rumours and Informational Security
17.7 Information Flow
17.8 Informational Security in Military Strategy and Information Warfare
17.9 Protecting Information
17.10 Information Trafficking
17.11 Psychological Operations and Information
17.12 Mediated Communication and Information
17.13 Paradoxes in Informational Security
17.14 So, What Is Informational Security?
17.14.1 Definition: Informational Security
17.15 Summation
Chapter 18: Food Security (Foodsec) (fs)
18.1 Introduction
18.2 Food Security: Setting
18.3 Food: Basic Need
18.3.1 Right to Food
18.3.2 Governing Right to Food
18.4 Food Insecurity: Curse of the Affluent World
18.5 Food Insecurity and Coping Behaviour
18.6 Food Production: Trends and Perspectives
18.7 Combating Food Insecurity
18.8 So, What Is Food Security?
18.8.1 Definition: Food Security
18.9 Summation
Chapter 19: Health Security (Healthsec) (hs)
19.1 Introduction
19.1.1 Life, Death and Health in Between
19.1.1.1 Physical Health
19.1.1.2 Mental Health
19.1.1.3 Emotional Health
19.2 Health Security: Setting
19.3 Concerns of Health Security Governance
19.4 Public Health
19.5 Health of the World
19.6 Caring for Health
19.7 Crimes and Health
19.8 Extraterrestrial Threats
19.9 Health and the Art of Dying
19.10 Kill Bill and Other Ways of Dying
19.11 So, What Is Health Security?
19.11.1 Definition: Health Security
19.12 Summation
Chapter 20: Ethnic Security (Ethnicsec) (es3)
20.1 Introduction
20.2 Ethnic Security-Setting
20.2.1 Examining Macro Ethnicity
20.2.1.1 Culture
20.2.1.2 Religion
20.2.1.3 Race
20.2.1.4 Caste
20.2.1.5 Tribe
20.2.1.6 Sect
20.2.1.7 Politics
20.2.1.8 Language
20.2.1.9 Nativity
20.2.1.10 Lineage
20.2.1.11 Age
20.2.1.12 Gender
20.2.1.13 Sexitude
20.2.1.14 Education
20.2.1.15 Money and Wealth
20.2.1.16 Status and Position
20.2.1.17 Role
20.2.1.18 Deceased
20.2.1.19 Occupation
20.2.1.20 Others
20.3 Divided Human
20.4 Divided System-Isolated Human
20.5 Ethnic Riots-Violence in Primordial Form
20.6 Psychology of Hate
20.7 Surviving Jealousy and Envy in an Ethnic Society
20.8 Clash of Cultures
20.9 Ethnic Security-Positive Signals
20.10 Ethnic Security-Negative Signals
20.11 So, What Is Ethnic Security?
20.11.1 Definition-Ethnic Security
20.12 Summation
Chapter 21: Environmental Security (Envirosec) (es4)
21.1 Introduction
21.2 Environmental Security-Setting
21.3 Challenges to Environmental Security
21.3.1 Population Growth and Environment
21.3.2 Developmental Projects
21.3.3 Resource Usage
21.3.4 Terrain Abuse
21.3.5 Incidents of Disaster
21.3.6 War and Military Preparations
21.3.7 Militant Activities
21.3.8 Unlawful Activities
21.3.9 Hazardous and Toxic Materials
21.3.10 Legislation and Enforcement
21.3.11 Global Warming
21.3.12 Climate Change
21.3.13 Genetic Modification
21.3.14 Waste Management
21.3.15 Biodiversity Depletion
21.4 State of the World Environment
21.5 World Environmental Initiatives
21.6 Levels of Environmental Law
21.7 Select International Activities
21.8 Environment-Global Paradigm
21.9 Agenda 2030-Possible Impact
21.10 People´s Participation-The Role of the Government
21.11 So What Is Environmental Security?
21.11.1 Definition-Environmental Security
21.12 Summation
Chapter 22: Cyber Security (Cybersec) (cs)
22.1 Introduction
22.2 Cyber Security-Setting
22.3 Vulnerability and Threat Attraction
22.4 Vulnerability Analysis
22.4.1 Types of Vulnerabilities
22.4.2 Vulnerability Evaluation
22.4.3 Attacks on Systems
22.4.4 System Targets
22.4.5 Spams and Spammers
22.4.6 Phishing and Phishers
22.5 Cyber Security System Providers
22.5.1 Network Topology
22.5.2 Open Systems Interconnection Model and Network Protocols
22.5.3 Transmission Media Options
22.5.4 Networks
22.5.5 Network Management
22.5.6 Network Administration
22.5.7 Integration of Sensitive Networks
22.5.8 IEEE Models
22.5.9 Security of Cyber Information
22.5.10 Standards for IT Products
22.6 Cyber Laws and Jurisdiction
22.7 Crime, Espionage and Warfare-Cyberspace
22.8 Cyber Terror
22.9 Artificial Intelligence
22.10 Cyber Policy
22.11 Cyber Advancement and Transformation
22.12 So, What Is Cyber Security?
22.12.1 Definition-Cyber Security
22.13 Summation
Chapter 23: Genomic Security (Genomesec) (gs2)
23.1 Introduction
23.2 Genomic Security: Setting
23.3 Genome
23.3.1 Gene and Genome
23.4 Coming to Sapiens: Human Genome Project
23.5 Universal Genetic Code
23.6 Genetics and Human Health
23.6.1 Gene Testing
23.6.2 Pharmacogenomics
23.6.3 Gene Therapy
23.6.4 Stem Cell Research
23.7 Genome and Travelling Human
23.8 Knowledge Revolution and Genomic Security
23.8.1 Cancer Prognosis
23.8.2 Cloning
23.8.3 Genome and Plants
23.8.4 Genetically Modified Consumer Products
23.9 Periodic Table of Life
23.10 Society and Genomic Security
23.11 Challenges to Genomic Findings: Beyond DNA?
23.12 What Is a Human in Genomic Appreciation?
23.13 Bioethics and Genomic Justice
23.14 What if There Is More Than DNA to Life?
23.15 So, What Is Genomic Security?
23.15.1 Definition: Genomic Security
23.16 Summation
Chapter 24: Microbiomic Security (Microbiomicsec) (ms2)
24.1 Introduction
24.2 Microbiomic Security: Setting
24.3 World of Human Microbiome
24.4 Players and Stakeholders
24.5 Role and Script: Microbiota
24.6 Microbiome as Health Guard
24.7 Human Microbiome Project
24.8 Yuck Factor
24.9 Maintaining Human Microbiome
24.10 Managing Dysbiosis
24.11 Counting Human Microbiome
24.12 Terrain Relativeness: Microbiome
24.13 Host Relativeness: Other Life Forms
24.14 Microbiomic Ethics
24.15 So, What Is Microbiomic Security?
24.15.1 Microbiomic Security: Definition
24.16 Summation
Part III: Strategising National Security
Chapter 25: Trendlines in National Security
25.1 Introduction
25.2 About Trendline
25.3 Contrasting Perspectives
25.4 Change and Adaptability: Chance Theory Paradigm
25.5 Dilemma of National Security Concept
25.6 Evolution and Changes
25.7 Governance and Organs
25.8 Elements: Changes and Interplay
25.9 Elements and Terrain Specificity
25.10 Changes in National Security Environs
25.11 Global System and Globalisation
25.12 Hierarchy of Nations
25.13 Power of Superpower
25.14 Nation-Centric Application of National Security
25.15 Premising Nations Under Continuum Principle
25.16 Premising Nations vs. People
25.17 Twenty-First-Century Paradigm of National Security
25.18 Summation
Chapter 26: Strategic National Security and National Security Strategy
26.1 Introduction
26.2 Strategy
26.2.1 Origin and Appreciation of Strategy as a Term
26.2.2 Tactics
26.2.3 Strategy and Tactics: Difference
26.3 Strategic National Security: Continuum Approach
26.3.1 Vision, Mission and Intervention
26.4 National Security Strategy
26.5 Steps in Strategy
26.6 Measuring Strategic Yield
26.7 Strategic Role of Government
26.8 Strategic Integration of Elements
26.9 Strategic Integration of Terrains
26.10 Strategic Integration of Elements and Terrains
26.11 Why Strategies Fail?
26.12 Summation
Chapter 27: Tradeoffs in National Security
27.1 Introduction
27.2 Governance and Tradeoffs
27.2.1 Well-Being
27.2.2 Checks and Balances
27.2.3 Rule of Law
27.2.4 Human Rights
27.2.5 Patriotism and Treason
27.2.6 Equality and Efficiency
27.2.7 Individual Privacy
27.2.8 Safety and Security
27.3 Factors that Affect Tradeoffs in National Security
27.4 Balancing Tradeoffs
27.5 Cost of National Security
27.5.1 Welfare State and Free Dolling
27.5.2 Tax and Taxpayers´ Money Argument
27.6 Reality of Tradeoffs
27.7 Summation
Part IV: Examining National Security
Chapter 28: Researching National Security
28.1 Introduction
28.2 Purpose of Research in National Security Governance
28.3 Anatomy of Destinations
28.4 Modelling National Security
28.5 National Security-Moving Destination
28.6 Interactive Matrix of Elements
28.7 Interactive Matrix of Terrains and Elements
28.8 Modelling Elements and Terrains
28.9 Doctrinal Approach-National Security
28.10 Strategic Mapping for National Security
28.11 Follow on Organograph
28.12 Models and Modelling
28.13 About Biomodel
28.14 About Inkblot Model
28.15 Models and Community
28.16 Decision Making and Analysis
28.17 Vitals of National Security
28.17.1 Chance
28.17.2 Chaos-Entropy Mix
28.17.3 Intuition
28.18 Summation
Chapter 29: Research Factors and Questions: National Security Governance
29.1 Introduction
29.2 Questions in Research Process
29.3 Research Factors
29.3.1 Human System Specificity (Factor #1)
29.3.1.1 How was Life Formed Originally on Earth?
29.3.1.2 When and Where was the First Human (Homo sapien) Born?
29.3.1.3 When did Humans Become Humans?
29.3.1.4 Are Humans an Exclusive Species?
29.3.1.5 Is it Appropriate to Call the Present-Day Humans as Sapiens?
29.3.2 Concept of National Security (Factor #2)
29.3.2.1 What is Human Well-Being?
29.3.2.2 What All Factors Contribute to Human well-being?
29.3.2.3 How Should Governments Handle Perceived Security-The Mental Factor in National Security?
29.3.2.4 What Are the Metrics for Measuring National Security?
29.3.2.5 What Are the Factors That Will Go in the Calculation of NSI?
29.3.2.6 Is NSI a Better Method of Indexing the Human System Well-Being?
29.3.2.7 What Are the Changes Expected to Take Place in the Evolution of the Concept of National Security in the Immediate Fut...
29.3.2.8 Does the Term Spiritual Security Need a Makeover as the Concept of Spirituality Can be Mistaken for Spiritual Securit...
29.3.3 Threat Perception and Analysis (Factor #3)
29.3.3.1 Is the Threat Matrix Cube a Practical Model for Analysis?
29.3.3.2 What Are the Requirements for a Threat to Become a threat?
29.3.3.3 Can a Threat be Turned to the Benefit of Governance?
29.3.3.4 What Are the Factors of Threat Intensity?
29.3.3.5 Is the Value of a Target Based on the Threat it Attracts?
29.3.4 Elements of National Security (Factor #4)
29.3.5 Conditions of National Security (Factor #5)
29.3.6 Terrain Specificity (Factor #6)
29.3.7 External Rudiments (Factor #7)
29.3.8 National Governance (Factor #8)
29.3.9 Modelling National Security (Factor #9)
29.3.10 Assessing National Security (Factor #10)
29.3.11 Indexing National Security (Factor #11)
29.3.12 Auditing National Security Governance (Factor #12)
29.3.13 Futuristic Impact Assessments (Factor #13)
29.3.14 Global Systems (Factor #14)
29.4 Government and Governance
29.5 Summation
Chapter 30: Assessing and Indexing National Security
30.1 Introduction
30.2 Reality of Abstraction in National Security
30.3 Puzzle of Well-Being
30.4 Signs of Well-Being
30.5 Mathematics of National Security
30.6 Identifying Assessment Metrics
30.7 Then Comes Ockham´s Razor
30.8 Deadender Factors of Assessment
30.9 Indexing National Security
30.10 Summation
Part V: Future of Governance and Human Well-Being
Chapter 31: Beyond National Security: Global Perspective
31.1 Introduction
31.2 Fantasising Reality-``Vasudhaiva Kutumbakam´´ and Others Similar
31.3 Ideating Global Security
31.4 Unifying World
31.5 Twenty-first Century UN
31.6 UN and Ambivalent World
31.7 Global Security-Concept and Demand
31.8 Summation
Chapter 32: Will Sapiens End? Premising Governance
32.1 Introduction
32.2 Premising Destination-Critical Question in Planning
32.3 Sapien Identity
32.4 Sapien World
32.5 Story of Life Extinction
32.6 End of World
32.7 End of Sapiens-Random Prophecies
32.7.1 Terrorism
32.7.2 Viral Pandemic
32.7.3 Super Volcanoes
32.7.4 Climate Change
32.7.5 Robots Taking Over
32.7.6 Meteorite Impact
32.7.7 Nuclear War
32.7.8 Telomere Erosion
32.7.9 Cosmic Ray Blast
32.7.10 Black Hole
32.8 But Then, Will Sapiens End?
32.9 Reversing Natural Humans: Damaging Experiments
32.10 Finally-Premising Governance
32.11 Summation
Chapter 33: Human Well-Being
33.1 Introduction
33.2 Riding Hellfire and Highwater-Well-Being Ahoy!
33.3 So, What is Well-Being?
33.4 Form of Governance and Well-Being
33.5 Mismatches in Democracy
33.6 Sustainability and Well-Being
33.7 Relooking Future-Human Odyssey
33.8 Future of Governance
33.9 Human Well-Being in National Security Perspective
33.10 Summation
Part VI: Conclusions
Chapter 34: Present Imperfect: Future Perfect
34.1 Introduction
34.2 Imperfection
34.3 C-19 in 2020 Avatar
34.4 Hanging Indents of Imperfection
34.5 Carrying Legacies Forward
34.6 And, Hence Global Governance
Chapter 35: Capsuling National Security
35.1 Introduction
35.2 Sapien World and National Security
35.2.1 Unitary Civilization
35.2.2 Laws of Nature
35.2.2.1 Law of Invariance
35.2.2.2 Law of Limitations
35.2.3 Ultimately Nations-For Now
35.2.4 System Spin and Axes
35.2.4.1 Axis 1-Politics
35.2.4.2 Axis 2-Belief System
35.2.4.3 Axes Synchronization-Possibility
35.2.4.4 Centrifugal Governing
35.2.5 Concept of National Security
35.2.6 Elements of National Security
35.2.7 Terrains of Governance
35.2.7.1 Land
35.2.7.2 Ocean
35.2.7.3 Air Space
35.2.7.4 Contiguous Space
35.2.7.5 Deep Space
35.2.7.6 Cyberspace
35.2.7.7 Genome
35.2.7.8 Microbiome
35.2.8 Balancing Chaos-Threats, Risks, Uncertainties, and Chance
35.2.8.1 Threats
35.2.8.2 Risks
35.2.8.3 Uncertainty
35.2.8.4 Chance
35.3 Rule of Law
35.4 Prospecting National Security
35.5 Prospecting National Governance
Glossary
Bibliography
Index