![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
The increasing reliance on private security services raises questions about the effects of privatization on the quality of public police forces, particularly in high-crime, low-income areas. In an effective pro-and-con format, two experts on policing offer two strikingly different perspectives on this trend towards privatization. In the process, they provide an unusually thoughtful discussion of the origins of both the public police and the private security sectors, the forces behind the recent growth of private security operations, and the risks to public safety posed by privatization. In his critique of privatization, Peter K. Manning focuses on issues of free market theory and management practices such as Total Quality Management that he believes are harmful to the traditional police mandate to control crime. He questions the appropriateness of strategies that emphasize service to consumers. For Brian Forst, the free market paradigm and economic incentives do not carry the same stigma. He argues that neither public nor private policing should have a monopoly on law enforcement activities, and he predicts an even more varied mix of public and private police activities than are currently available. Following the two main sections of the book, each author assesses the other's contribution, reflecting on not just their points of departure but also on the areas in which they agree. The breadth and depth of the discussion makes this book essential for both scholars and practitioners interested in policing generally and privatization in particular.
A single breakthrough could change the world forever.Having just completed a complex recovery assignment, covert salvage specialist Korso is in no mood to take on another job so soon, but he has little choice when he's contacted by Cole Ashcroft, an ex-colleague who's calling in a debt. An official at the US Embassy in Bulgaria has approached Cole with a well-paying salvage job, but only if he can persuade Korso to plan the whole operation. A chemist for a pharmaceutical company has secretly developed a revolutionary glaucoma pill, one with an unexpected side effect that could make it the discovery of the century. But the chemist has since been found dead, and the prototypes are missing... Aware that ownership of these pills could shift the balance of military power overnight, the embassy man offers to pay Korso handsomely to locate and recover them using any means necessary. But with a job this big Korso also knows he'll have to assemble a team to help him, and that brings its own set of problems. Because with potential profits in the billions, can he really trust anyone...? A full-throttle thriller that will keep you guessing to the very end, perfect for fans of Mark Greaney, Ben Coes and Adam Hamdy.
There has now been more than a decade of conceptual work, policy development, and operational activity in the field of security sector reform (SSR). To what extent has its original aim, to support and facilitate development, been met? The various contributions to this book address this question, offering a range of insights on the theoretical and practical relevance of the security-development nexus in SSR. They examine claims of how and whether SSR effectively contributes to achieving both security and development objectives. In particular, the analyses presented in the book provide a salutary lesson that development and security communities need to take each other's concerns into account when planning, implementing, and evaluating their activities. The book offers academics, policy-makers, and practitioners within the development and security communities relevant lessons, suggestions, and practical advice for approaching SSR as an instrument that serves both security and development objectives. (Series: Geneva Centre for the Democratic Control of Armed Forces DCAF])
In September 2017, North Korea shocked the world by exploding the most powerful nuclear device tested anywhere in 25 years. Months earlier, it had conducted the first test flight of a missile capable of ranging much of the United States. By the end of that year, Kim Jong Un, the reclusive state's ruler, declared that his nuclear deterrent was complete. Today, North Korea's nuclear weapons stockpile and ballistic missile arsenal continues to grow, presenting one of the most serious challenges to international security to date. Internal regime propaganda has called North Korea's nuclear forces the country's "treasured sword," underscoring the cherished place of these weapons in national strategy. Fiercely committed to self-reliance, Kim remains determined to avoid unilateral disarmament. Kim Jong Un and the Bomb tells the story of how North Korea-once derided in the 1970s as a "fourth-rate pipsqueak" of a country by President Richard Nixon-came to credibly threaten the American homeland by November 2017. Ankit Panda explores the contours of North Korea's nuclear capabilities, the developmental history of its weapons programs, and the prospects for disarming or constraining Kim's arsenal. With no signs that North Korea's total disarmament is imminent over the next years or even decade, Panda explores the consequences of a nuclear-armed North Korea for the United States, South Korea, and the world.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
From the rising significance of non-state actors to the increasing influence of regional powers, the nature and conduct of international politics has arguably changed dramatically since the height of the Cold War. Yet much of the literature on deterrence and compellence continues to draw (whether implicitly or explicitly) upon assumptions and precepts formulated in-and predicated upon-politics in a state-centric, bipolar world. Coercion moves beyond these somewhat hidebound premises and examines the critical issue of coercion in the 21st century, with a particular focus on new actors, strategies and objectives in this very old bargaining game. The chapters in this volume examine intra-state, inter-state, and transnational coercion and deterrence as well as both military and non-military instruments of persuasion, thus expanding our understanding of coercion for conflict in the 21st century. ? Scholars have analyzed the causes, dynamics, and effects of coercion for decades, but previous works have principally focused on a single state employing conventional military means to pressure another state to alter its behavior. In contrast, this volume captures fresh developments, both theoretical and policy relevant. This chapters in this volume focus on tools (terrorism, sanctions, drones, cyber warfare, intelligence, and forced migration), actors (insurgents, social movements, and NGOs) and mechanisms (trilateral coercion, diplomatic and economic isolation, foreign-imposed regime change, coercion of nuclear proliferators, and two-level games) that have become more prominent in recent years, but which have yet to be extensively or systematically addressed in either academic or policy literatures.
Workplace Violence: Issues in Threat Management defines what workplace violence is, delves into the myths and realities surrounding the topic and provides readers with the latest statistics, thinking, and strategies in the prevention of workplace violence. The authors, who themselves have implemented successful workplace violence protection programs, guide novice and experienced practitioners alike in the development of their own programs.
As evidenced by the anthrax attacks in 2001, the SARS outbreak in 2003, and the H1N1 influenza pandemic in 2009, a pathogen does not recognize geographic or national boundaries, often leading to devastating consequences. Automated biosurveillance systems have emerged as key solutions for mitigating current and future health-related events. Focusing on this promising public health innovation, Biosurveillance: Methods and Case Studies discusses how these systems churn through vast amounts of health-related data to support epidemiologists and public health officials in the early identification, situation awareness, and response management of natural and man-made health-related events. The book follows a natural sequence from theory to application. The initial chapters build a foundation while subsequent chapters present more applied case studies from around the world, including China, the United States, Denmark, and the Asia-Pacific region. The contributors share candid, first-hand insights on lessons learned and unresolved issues that will help chart the future of biosurveillance. As this book illustrates, biosurveillance operates in a complex, multidimensional problem space that incorporates varied data. Capturing the progress of modern-day pioneers who are walking in John Snow's footsteps, this volume shows how contemporary information technology can be applied to the age-old challenge of combating the spread of disease and illness.
Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about change management. Organizations exist within a complex and changing environment. The changes within the organizational context (e.g., societal, technological, and customer preferences) place pressure upon the organization to remain relevant and competitive. Change is not inherently wrong; our perceptions of the change make it negative or positive. A perceived negative change can become a real opportunity for improvement if desired. Systemic degradation and irrelevancy are the results of an organization that fails to acknowledge the reality of change. The book focuses on the dynamics of change management with an eye toward the risk professional. There is a real need for an uncomplicated resource that helps educate non-change management professionals involved in risk-oriented change initiatives. Examples of risk disciplines are organizational resilience, business continuity, risk management, crisis management, and security management, but any discipline or function within an organization focuses on risk. Any organizational project is an initiative requiring dynamic change management skills. The author brings his extensive experience to offer risk practitioners advice, industry examples, and best practices to the change management process. Change Management for Risk Professionals will be a welcome addition to enterprise-wide business continuity, crisis management, disaster recovery, security management, and homeland security professionals wanting to learn the secrets to becoming successful in initiating organizational change.
The Handbook of Communication and Security provides a comprehensive collection and synthesis of communication scholarship that engages security at multiple levels, including theoretical vs. practical, international vs. domestic, and public vs. private. The handbook includes chapters that leverage communication-based concepts and theories to illuminate and influence contemporary security conditions. Collectively, these chapters foreground and analyze the role of communication in shaping the economic, technological, and cultural contexts of security in the 21st century. This book is ideal for advanced undergraduate and postgraduate students and scholars in the numerous subfields of communication and security studies.
Frequently characterized as either mercenaries in modern guise or the market's response to a security vacuum, private military companies are commercial firms offering military services ranging from combat and military training and advice to logistical support, and which play an increasingly important role in armed conflicts, UN peace operations, and providing security in unstable states. Executive Outcomes turned around an orphaned conflict in Sierra Leone in the mid-1990s; Military Professional Resources Incorporated (MPRI) was instrumental in shifting the balance of power in the Balkans, enabling the Croatian military to defeat Serb forces and clear the way for the Dayton negotiations; in Iraq, estimates of the number of private contractors on the ground are in the tens of thousands. As they assume more responsibilities in conflict and post-conflict settings, their growing significance raises fundamental questions about their nature, their role in different regions and contexts, and their regulation. This volume examines these issues with a focus on governance, in particular the interaction between regulation and market forces. It analyzes the current legal framework and the needs and possibilities for regulation in the years ahead. The book as a whole is organized around four sets of questions, which are reflected in the four parts of the book. First, why and how is regulation of PMCs now a challenging issue? Secondly, how have problems leading to a call for regulation manifested in different regions and contexts? Third, what regulatory norms and institutions currently exist and how effective are they? And, fourth, what role has the market to play in regulation?
This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.
Managing the ever-changing nature and cross-disciplinary challenges of the maritime sector demands a complete understanding of the special characteristics of the maritime space. The complexity of the operations of ships, ports, shipping companies, and naval and coast guard maritime security operations-as well as the economic significance and the inherent security vulnerabilities of global maritime trade-requires a thorough, holistic and adaptable understanding of commercial, law enforcement and naval maritime security phenomena. Written by a team of expert contributors, this book identifies and assesses the issues inherent in developing and implementing maritime security measures. It examines the new maritime security environment, including the different but complementary interests of the shipping industry and national regulatory agencies. The coverage includes analyses of the different threats to maritime security and how they are perceived by different actors in the maritime domain. The editors evaluate the international and national legal frameworks developed for specific sectors and the responses that different nations have given to these initiatives. Comprehensive in scope, the volume addresses security concerns that pertain to a wide spectrum of commercial shipping and maritime security situations, regulatory frameworks, sector-specific vulnerabilities, regional nuances, and port facilities.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.
The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft targets are increasingly in the crosshairs of terrorists and violent criminals. Attacks on crowded spaces such as churches, schools, malls, transportation hubs, and recreational venues result in more casualties and have a powerful effect on the psyche of the populace. Soft Target Hardening: Protecting People from Attack, Second Edition, continues the national dialogue started by the first edition by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States and beyond. Soft target attacks steadily climbed in number and scale of violence since the first edition of this book. New tactics emerged, as terrorists continually hit the "reset button" with each attack. In this volatile, ever-changing security environment, plans to protect people and property must be fluid and adaptable. Along with new hardening tactics, such as the use of tactical deception to disguise, conceal, and divert, the author has updated the text with new case studies to reflect and respond to the fast-moving transformation in methods from more complex and organized forms of terror to simpler, yet still-devastating approaches. This book is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack. Soft Target Hardening, Second Edition, was named the ASIS International Security Industry Book of the Year in 2019.
Privatising Justice takes a broad historical view of the role of the private sector in the British state, from private policing and mercenaries in the eighteenth century to the modern rise of the private security industry in armed conflict, policing and the penal system. The development of the welfare state is seen as central to the decline of what the authors call 'old privatisation'. Its succession by neoliberalism has created the ground for the resurgence of the private sector. The growth of private military, policing and penal systems is located within the broader global changes brought about by neoliberalism and the dystopian future that it portends. The book is a powerful petition for the reversal of the increasing privatisation of the state and the neoliberalism that underlies it.
Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.
Private security is now a multi-billion pound industry employing more personnel than the police. The authors provide incisive insights into the security world, scanning its weaknesses and exploring its potential. Based upon original research, supported by years of experience, they suggest that new ways of looking at the modern security world are long overdue. Private Security is a highly innovative book containing a wealth of up-to-date material. It is the definitive guide to the security world.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.
Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.
National security has been at the forefront of the Israeli experience for seven decades, with threats ranging from terrorism, to vast rocket and missile arsenals, and even existential nuclear dangers. Yet, despite its overwhelming preoccupation with foreign and defense affairs, Israel does not have a formal national security strategy. In Israeli National Security, Chuck Freilich presents an authoritative analysis of the military, diplomatic, demographic, and societal challenges Israel faces today, to propose a comprehensive and long-term Israeli national security strategy. The heart of the new strategy places greater emphasis on restraint, defense, and diplomacy as means of addressing the challenges Israel faces, along with the military capacity to deter and, if necessary, defeat Israel's adversaries, while also maintaining the resolve of its society. By bringing Israel's most critical debates about the Palestinians, demography, Iran, Hezbollah, Hamas, US relations and nuclear strategy into sharp focus, the strategy Freilich proposes addresses the primary challenges Israel must address in order to chart its national course. The most comprehensive study of Israel's national security to date, this book presents the first public proposal for a comprehensive Israeli national security strategy and prescribes an actionable course forward.
For all those who read the pages of this important study, they will undoubtedly appreciate the important responsibility the security sector has towards children. It will enable them to think through how child protection strategies can become an integral part of efforts to create a more secure and better world. What is particularly impressive is that the reflection and arguments presented here bring together and combine a common vision of the priorities that influence the security sector and civil society, and this fact alone is full of promise for it envisages investments in children today that will benefit the young people who will become the leaders of tomorrow. The book offers an excellent opportunity to broaden the debate on conflict and children away from just child soldiers, but to focus also on young people in general and the active contribution that they have to make to peacebuilding and social development. From a security governance perspective there is a clear responsibility on the part of multiple actors at multiple layers to formulate the collaborative approaches required to provide a secure environment for all children everywhere.
Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security. |
![]() ![]() You may like...
New Developments in Unsupervised Outlier…
Xiaochun Wang, Xiali Wang, …
Hardcover
R5,029
Discovery Miles 50 290
Design, Modeling and Characterization of…
Mustapha Hamdi, Antoine Ferreira
Hardcover
R3,129
Discovery Miles 31 290
Wireless Power Transfer - Between…
Wenxing Zhong, Dehong Xu, …
Hardcover
R4,316
Discovery Miles 43 160
Renewable Power for Sustainable Growth…
Atif Iqbal, Hasmat Malik, …
Hardcover
R4,741
Discovery Miles 47 410
Fundamentals of Fuzzy Sets
Didier Dubois, Henri Prade
Hardcover
Handbook of Research on Web Log Analysis
Bernard J Jansen, Amanda Spink, …
Hardcover
R7,637
Discovery Miles 76 370
Advances in Digital Forensics XVI - 16th…
Gilbert Peterson, Sujeet Shenoi
Hardcover
R3,062
Discovery Miles 30 620
Modern Trends in Pseudo-Differential…
Joachim Toft, M.W. Wong, …
Hardcover
R3,091
Discovery Miles 30 910
|