![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Headlines of public service corruption scandals are painful reminders of the need for continuing education in the subjects of ethics and integrity. Public service professionals employed as government officials, forensic scientists, investigators, first responders, and those within the legal and justice systems, face daily decisions that can mean the difference between life or death and freedom or imprisonment. Sometimes, such decisions can present ethical dilemmas even to the most seasoned of professionals. Building on the success of the first edition, Ethics for the Public Service Professional, Second Edition serves as a single-source resource for the topic of ethics and ethical decision making as it relates to government service. While incorporating an examination of the history of ethics, codes and legislation, the book exposes the reader to the challenges faced by today's public service professionals and administrators in incorporating ethics within daily decisions, procedures, and duties. Key features include: Current controversies in police, forensic, and other public service sectors including: racial profiling, evidence tampering, disaster response, and audits Important new mechanisms of accountability, including use-of-force reporting, citizen complaint procedures, and open government Contemporary news stories throughout the book introduce the reader to a broad range of ethical issues facing leaders within the public service workplace Chapter pedagogy including key terms, learning objectives, end-of-chapter questions, a variety of boxed ethical case examples, and references Ripped from the Headlines current event examples demonstrate actual scenarios involving the issues discussed within each chapter This in-depth text will be essential for the foundational development and explanation of protocols used within a successful organization. As such, Ethics for the Public Service Professional, Second Edition will help introduce ethics and ethical decision-making to both those new to the realm of forensic science, criminal justice, and emergency services and those already working in the field.
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
Since Pakistan was founded in 1947, its army has dominated the state. The military establishment has locked the country in an enduring rivalry with India, with the primary aim of wresting Kashmir from it. To that end, Pakistan initiated three wars over Kashmir-in 1947, 1965, and 1999-and failed to win any of them. Today, the army continues to prosecute this dangerous policy by employing non-state actors under the security of its ever-expanding nuclear umbrella. It has sustained a proxy war in Kashmir since 1989 using Islamist militants, as well as supporting non-Islamist insurgencies throughout India and a country-wide Islamist terror campaign that have brought the two countries to the brink of war on several occasions. In addition to these territorial revisionist goals, the Pakistani army has committed itself to resisting India's slow but inevitable rise on the global stage. Despite Pakistan's efforts to coerce India, it has achieved only modest successes at best. Even though India vivisected Pakistan in 1971, Pakistan continues to see itself as India's equal and demands the world do the same. The dangerous methods that the army uses to enforce this self-perception have brought international opprobrium upon Pakistan and its army. And in recent years, their erstwhile proxies have turned their guns on the Pakistani state itself. Why does the army persist in pursuing these revisionist policies that have come to imperil the very viability of the state itself, from which the army feeds? In Fighting to the End, C. Christine Fair argues that the answer lies, at least partially, in the strategic culture of the army. Through an unprecedented analysis of decades' worth of the army's own defense publications, she concludes that from the army's distorted view of history, it is victorious as long as it can resist India's purported drive for regional hegemony as well as the territorial status quo. Simply put, acquiescence means defeat. Fighting to the End convincingly shows that because the army is unlikely to abandon these preferences, Pakistan will remain a destabilizing force in world politics for the foreseeable future.
#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021! 2020 Cybersecurity CANON Hall of Fame Winner! Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.
Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security surveillance, as well as the critical aspects of the design, implementation, and operation of security surveillance centers of all sizes. Step-by-step coverage of policy and procedures, as well as the inclusion of industry-specific operational forms, guarantee a practical, user-friendly text for all levels of readers. Intended for any individuals or organizations currently employing security surveillance systems, this book is an asset for all users, from trainees to supervisors, seeking to create a more secure environment for themselves and for others.
Clear, comprehensive approach to crime prevention introduces undergraduates to the breadth of this field, showing students how to assess tactics and their impact in reducing crime or fear of victimization The market leader in a course taught in Criminal Justice, Criminology, and Sociology programs world-wide Foundational principles of crime prevention with global examples plus a curated collection of online resources for instructors and students makes this book the best choice for Crime Prevention and Crime Control courses
The gradual retreat of polar sea ice in the Arctic region, combined with an expected increase in human activity - shipping traffic, oil and gas exploration, and tourism - could eventually increase the need for a U.S. military and homeland security presence in the Arctic. In recognition of increasing strategic interest in the Arctic, the United States has developed national level policies that guide the actions of the Department of Defense (DOD), the U.S. Coast Guard, and other stakeholders in the region. This book provides an overview of the policies that indicate that the United States has an enduring interest in working collaboratively with other nations to address the emerging challenges arising from the impacts of climate change and globalization in the Arctic. Also discussed, are Arctic national security needs including protecting the environment, managing resources, and supporting scientific research.
Conventional wisdom holds that weak and failing states are the source of the world's most pressing security threats. After all, the 9/11 attacks originated in an impoverished, war-ravaged country, and transnational crime appears to flourish in weakly governed states. However, our assumptions about the threats posed by failing states are based on anecdotal arguments, not on a systematic analysis of the connections between state failure and transnational security threats. Analyzing terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity, Stewart Patrick shows that while some global threats do emerge in fragile states, most of their weaknesses create misery only for their own citizenry. Moreover, many threats originate farther up the chain, in wealthier and more stable countries like Russia and Venezuela. Weak Links will force policymakers to rethink what they assume about state failure and transnational insecurity.
This book analyses the cooperation between the European Union and the United States on internal security and counter-terrorism since the 9/11 terrorist attacks. In particular, four areas of cooperation are examined: customs and supply chain security; judicial cooperation (the mutual legal assistance and extradition agreements); law enforcement cooperation (the Europol-US agreements); and the EU-US agreements for the sharing of air passengers' data (PNR agreements). These cases are analysed through a conceptual framework based on the theories of international regimes, with the data being drawn from an extensive documentary analysis of media sources collected through the 'Nexis' database, official documents, and from 13 semi-structured elite interviews with US and EU officials. The book argues that the EU and the US have established a transatlantic internal security regime based on shared principles, norms, rules, and interests. While at the beginning of this process the EU had a more reactive and passive stance at the later stages both the EU and the US were active in shaping the transatlantic political agenda and negotiations. The book demonstrates how the EU has had a much more proactive role in its relations with the US than has often been assumed in the current literature. This book will be of much interest to students of EU policy, foreign policy, international security and IR in general.
Managing the ever-changing nature and cross-disciplinary challenges of the maritime sector demands a complete understanding of the special characteristics of the maritime space. The complexity of the operations of ships, ports, shipping companies, and naval and coast guard maritime security operations-as well as the economic significance and the inherent security vulnerabilities of global maritime trade-requires a thorough, holistic and adaptable understanding of commercial, law enforcement and naval maritime security phenomena. Written by a team of expert contributors, this book identifies and assesses the issues inherent in developing and implementing maritime security measures. It examines the new maritime security environment, including the different but complementary interests of the shipping industry and national regulatory agencies. The coverage includes analyses of the different threats to maritime security and how they are perceived by different actors in the maritime domain. The editors evaluate the international and national legal frameworks developed for specific sectors and the responses that different nations have given to these initiatives. Comprehensive in scope, the volume addresses security concerns that pertain to a wide spectrum of commercial shipping and maritime security situations, regulatory frameworks, sector-specific vulnerabilities, regional nuances, and port facilities.
Change Management for Risk Professionals addresses a need in the marketplace for risk professionals to learn about change management. Organizations exist within a complex and changing environment. The changes within the organizational context (e.g., societal, technological, and customer preferences) place pressure upon the organization to remain relevant and competitive. Change is not inherently wrong; our perceptions of the change make it negative or positive. A perceived negative change can become a real opportunity for improvement if desired. Systemic degradation and irrelevancy are the results of an organization that fails to acknowledge the reality of change. The book focuses on the dynamics of change management with an eye toward the risk professional. There is a real need for an uncomplicated resource that helps educate non-change management professionals involved in risk-oriented change initiatives. Examples of risk disciplines are organizational resilience, business continuity, risk management, crisis management, and security management, but any discipline or function within an organization focuses on risk. Any organizational project is an initiative requiring dynamic change management skills. The author brings his extensive experience to offer risk practitioners advice, industry examples, and best practices to the change management process. Change Management for Risk Professionals will be a welcome addition to enterprise-wide business continuity, crisis management, disaster recovery, security management, and homeland security professionals wanting to learn the secrets to becoming successful in initiating organizational change.
For fans of Darkest Hour and Dunkirk, discover the story of Walter H. Thompson, the man who saved Winston Churchill's life more than once. Walter H. Thompson was Churchill's bodyguard from 1921 until 1945, brought back from retirement at the outbreak of war. Tom Hickman's authorised biography draws heavily on extracts from a manuscript recently discovered by his great-niece, in which Thompson gives a unique insider's account of a number of occasions on which Churchill's life was put seriously at risk and his intervention was needed. After the war, Thompson married one of Churchill's secretaries, and her recollections, as well as those of surviving family members, are interwoven to tell the revelatory inside story of life beside the Greatest Briton.
The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.
This book analyses the collective security system as it now stands, focusing on strategic and normative frameworks. The old system of international collective security is based on assumptions that are inadequate in relation to current challenges. Against the backdrop of changed geopolitical constellations, democracies under siege and the challenges posed by new types of warfare, critical analysts hold that not a single multilateral institution today is fully up to the task it was created for. The UN, from its founding to the Sustained Peace Approach, represents a fascinating global process of vision-building and adaptation to reality. Based on this understanding, the dynamics of the UN peace and security architecture are examined along with major agendas, from peacebuilding to development. In turn, reform proposals in the post-COVID-19 era are discussed. The book examines whether a regionalization of security structures within the UN framework may offer a way out of global fragility and growing instability factors, a question of utmost importance for conflict prevention and crisis management in the next few decades. In turn, the author discusses a normative positioning of a new intervention logic as the lowest common denominator between collaborative regional orders. Reinvented multilateralism will return as a "must." Given its scope, the book will appeal to students and scholars of international relations and international security studies, as well as to policymakers in governments and international organizations.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
After 9/11, the initial focus from the U.S. government, media, and the public was on security at commercial airports and aboard commercial airlines. Soon, investigation revealed the hijackers had trained at flight schools operating out of general aviation airports, leading to a huge outcry by the media and within the government to mandate security regulations for this flight sector. General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports examines the threats against general aviation (GA) and presents resources for security professionals and GA airport owners and operators to develop an impenetrable airport and aircraft security plan. Following an overview of general aviation and its inherent security threats, the book explores: Physical security for the aviation environment, including intrusion detection systems, cameras, locks, lighting, and window security The security force, including recruitment and training Security of general aviation aircraft and airports, including runway security and fuel storage Airport safety regulations such as the Workers Protection Act and the Bloodborne Pathogens Act Emergency response to a range of scenarios, including medical emergencies, fires, gas leaks, and bomb threats The security of hangars, fixed-base operations, and flight schools Corporate aviation security departments The book concludes with a study involving the Aircraft Owners and Pilots Association (AOPA) Airport Watch Program and the Transportation Security Administration (TSA) security requirements and recommendations for general aviation. General aviation supports public safety, business, agriculture, commercial airports, aeronautical education, and many aspects of the aviation industry. The book is the first to explore the unique security concerns relevant to general aviation operations. Dr. Daniel J. Benny was interviewed on video by General Aviation Security Magazine about his article concerning the effects of the Airport Watch Program.
National security has been at the forefront of the Israeli experience for seven decades, with threats ranging from terrorism, to vast rocket and missile arsenals, and even existential nuclear dangers. Yet, despite its overwhelming preoccupation with foreign and defense affairs, Israel does not have a formal national security strategy. In Israeli National Security, Chuck Freilich presents an authoritative analysis of the military, diplomatic, demographic, and societal challenges Israel faces today, to propose a comprehensive and long-term Israeli national security strategy. The heart of the new strategy places greater emphasis on restraint, defense, and diplomacy as means of addressing the challenges Israel faces, along with the military capacity to deter and, if necessary, defeat Israel's adversaries, while also maintaining the resolve of its society. By bringing Israel's most critical debates about the Palestinians, demography, Iran, Hezbollah, Hamas, US relations and nuclear strategy into sharp focus, the strategy Freilich proposes addresses the primary challenges Israel must address in order to chart its national course. The most comprehensive study of Israel's national security to date, this book presents the first public proposal for a comprehensive Israeli national security strategy and prescribes an actionable course forward.
Democracy Declassified tackles an enduring question of particular current importance: How do democratic governments balance the need for foreign policy secrecy with accountability to the public? Democracies keep secrets both from potential enemies and their publics. This simple fact challenges the surprisingly prevalent assumption that foreign policy successes and failures can be attributed to public transparency and accountability. In fact, the ability to keep secrets has aided democratic victories from the European and Pacific theatres in World War II to the global competition of the Cold War. At the same time, executive discretion over the capacity to classify information created the opportunity for abuse that contributed to Watergate, as well as domestic spying and repression in France, Norway and Canada over the last 40 years. Therefore, democracies face a secrecy dilemma. Secrecy is useful, but once a group or person has the ability to decide what information is concealed from an international competitor, citizens can no longer monitor that information. How then can the public be assured that national security policies are not promoting hidden corruption or incompetence? As Democracy Declassified shows, it is indeed possible for democracies to keep secrets while also maintaining national security oversight institutions that can deter abuse and reassure the public, including freedom of information laws, legislative committee powers, and press freedom. Understanding secrecy and oversight in democracies helps us explain not only why the Maginot Line rose and the French Republic fell, or how the US stumbled but eventually won the Cold War, but more generally how democracies can benefit from both public consent and necessary national security secrets. At a time when the issue of institutional accountability and transparency has reached fever pitch, Democracy Declassified provides a grounded and important view on the connection between the role of secrecy in democratic governance and foreign policy-making.
In the past two decades, many have posited a correlation between the spread of globalization and the decline of the nation-state. In the realm of national security, advocates of the globalization thesis have argued that states' power has diminished relative to transnational governmental institutions, NGOs, and transnational capitalism. Initially, they pointed to declines in both global military spending (which has risen dramatically in recent years) and interstate war. But are these trends really indicative of the decline of nation-state's role as a guarantor of national security? In Globalization and the National Security State, T.V. Paul and Norrin M. Ripsman test the proposition against the available evidence and find that the globalization school has largely gotten it wrong. The decline in interstate warfare can largely be attributed to the end of the Cold War, not globalization. Moreover, great powers (the US, China, and Russia) continue to pursue traditional nation-state strategies. Regional security arrangements like the EU and ASEAN have not achieved much, and weak states--the ones most impacted by the turmoil generated by globalization--are far more traditional in their approaches to national security, preferring to rely on their own resources rather than those of regional and transnational institutions. This is a bold argument, and Paul and Ripsman amass a considerable amount of evidence for their claims. It cuts against a major movement in international relations scholarship, and is sure to generate controversy.
In the past two decades, many have posited a correlation between the spread of globalization and the decline of the nation-state. In the realm of national security, advocates of the globalization thesis have argued that states' power has diminished relative to transnational governmental institutions, NGOs, and transnational capitalism. Initially, they pointed to declines in both global military spending (which has risen dramatically in recent years) and interstate war. But are these trends really indicative of the decline of nation-state's role as a guarantor of national security? In Globalization and the National Security State, T.V. Paul and Norrin M. Ripsman test the proposition against the available evidence and find that the globalization school has largely gotten it wrong. The decline in interstate warfare can largely be attributed to the end of the Cold War, not globalization. Moreover, great powers (the US, China, and Russia) continue to pursue traditional nation-state strategies. Regional security arrangements like the EU and ASEAN have not achieved much, and weak states--the ones most impacted by the turmoil generated by globalization--are far more traditional in their approaches to national security, preferring to rely on their own resources rather than those of regional and transnational institutions. This is a bold argument, and Paul and Ripsman amass a considerable amount of evidence for their claims. It cuts against a major movement in international relations scholarship, and is sure to generate controversy.
Frequently characterized as either mercenaries in modern guise or the market's response to a security vaccuum, private military companies are commercial firms offering military services ranging from combat and military training and advice to logistical support, and which play an increasingly important role in armed conflicts, UN peace operations, and providing security in unstable states. Executive Outcomes turned around an orphaned conflict in Sierra Leone in the mid-1990s; Military Professional Resources Incorporated (MPRI) was instrumental in shifting the balance of power in the Balkans, enabling the Croatian military to defeat Serb forces and clear the way for the Dayton negotiations; in Iraq, estimates of the number of private contractors on the ground are in the tens of thousands. As they assume more responsibilities in conflict and post-conflict settings, their growing significance raises fundamental questions about their nature, their role in different regions and contexts, and their regulation. This volume examines these issues with a focus on governance, in particular the interaction between regulation and market forces. It analyzes the current legal framework and the needs and possibilities for regulation in the years ahead. The book as a whole is organized around four sets of questions, which are reflected in the four parts of the book. First, why and how is regulation of PMCs now a challenging issue? Secondly, how have problems leading to a call for regulation manifested in different regions and contexts? Third, what regulatory norms and institutions currently exist and how effective are they? And, fourth, what role has the market to play in regulation?
The response of the U.S. federal government to the events of September 11, 2001 has reflected the challenge of striking a balance between implementing security measures to deter terrorist attacks while at the same time limiting disruption to air commerce. Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism is a comprehensive reference that examines the persistent threats to aviation security that led up to the terrorist attacks of September 11th, describes subsequent terror plots against aviation assets, and explores U.S. efforts to counter and mitigate these threats. Addressing the homeland security challenges facing the U.S. in the age of terrorism, this text explores: Security protocol prior to 9/11 Precursors to 9/11 The rising threat of Al Qaeda Tactical and congressional response to 9/11, including new legislation The broader context of risk assessment Intelligence gathering Airport security, including passenger, baggage, and employee screening Airline in-flight security measures Airport perimeter security The threat of shoulder-fired missiles Security for GA (general aviation) operations and airports Beginning with a historical backdrop describing the dawn of the age of global terrorism in the 1960s and continuing up until the present time, the book demonstrates the broad social and political context underlying recent changes in the aviation security system as a direct result of the 9/11 attacks. Coverage examines ongoing threats and vulnerabilities to the aviation infrastructure, including an exploration of how past terrorist incidents have come to shape U.S. policy and strategy.
Frequently characterized as either mercenaries in modern guise or the market's response to a security vacuum, private military companies are commercial firms offering military services ranging from combat and military training and advice to logistical support, and which play an increasingly important role in armed conflicts, UN peace operations, and providing security in unstable states. Executive Outcomes turned around an orphaned conflict in Sierra Leone in the mid-1990s; Military Professional Resources Incorporated (MPRI) was instrumental in shifting the balance of power in the Balkans, enabling the Croatian military to defeat Serb forces and clear the way for the Dayton negotiations; in Iraq, estimates of the number of private contractors on the ground are in the tens of thousands. As they assume more responsibilities in conflict and post-conflict settings, their growing significance raises fundamental questions about their nature, their role in different regions and contexts, and their regulation. This volume examines these issues with a focus on governance, in particular the interaction between regulation and market forces. It analyzes the current legal framework and the needs and possibilities for regulation in the years ahead. The book as a whole is organized around four sets of questions, which are reflected in the four parts of the book. First, why and how is regulation of PMCs now a challenging issue? Secondly, how have problems leading to a call for regulation manifested in different regions and contexts? Third, what regulatory norms and institutions currently exist and how effective are they? And, fourth, what role has the market to play in regulation?
This book is the first attempt to understand Britain's night-time economy, the violence that pervades it, and the bouncers whose job it is to prevent it. Walk down any high street after dark and the shadows of bouncers will loom large, for they are the most visible form of control available in the youth-orientated zones of our cities after dark. Britain's rapidly expanding night-life is one of the country's most vibrant economic spheres, but it has created huge problems of violence and disorder. Using ethnography, participant observation, and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain. |
You may like...
Probability Collectives - A Distributed…
Anand Jayant Kulkarni, Kang Tai, …
Hardcover
R2,653
Discovery Miles 26 530
Measurement of Quarkonium Polarization…
Valentin Knunz
Hardcover
|