![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.
Here is the Cape Town underworld laid bare, explored through the characters who control the protection industry, the bouncers and security at nightclubs and strip clubs. At the centre of this turf war is Nafiz Modack, the latest kingpin to have seized control of the industry, a man often in court on various charges, including extortion. Investigative journalist Caryn Dolley has followed Modack and his predecessors for six years as power has shifted in the nightclub security industry, and she focuses on how closely connected the criminal underworld is with the police services. In this suspenseful page turner of an investigation, she writes about the overlapping of the state with the underworld, the underworld with the upperworld, and how the associated violence is not confined to specific areas of Cape Town, but is happening inside hospitals, airports, clubs and restaurants and putting residents at risk. A book that lays bare the myth that violence and gangsterism in Cape Town is confined to the ganglands of the Cape Flats, wherever you find yourself, you’re only a hair’s breadth away from the enforcers.
This work deals with international principles regarding the use of language in the administration of justice, and looks at the way in which multilingual countries such as Belgium and Switzerland approach this complex problem. The title then compares language practice in the judiciary and security services in South Africa and some countries of the Southern African Development Community against the background of evolving language policy in the region. This title discusses the use of official languages in a specific domain of government from the point of view that a language cannot be regarded as official simplu because a constitution prescribes it. Important conclusions are drawn regarding the role of the multilingual state.
Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.
This text provides critical information to help organizations improve their emergency communications, including the tools, automation technology, and processes of crisis notification. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time—facilitating the right response. Emergency Notification explains how. This book offers must-know information for business security, senior management, human resources staff, government policymakers, and emergency planners, examining what, when, how, why, and with whom to communicate during crises. This text also covers risk communication, message mapping, information loading, audience comprehension, and practical issues like testing emergency notification systems.
Database technology can be used for various ends, ranging from promotion of democracy to strengthening of nationalism to shoring up authoritarian regimes through misinformation. Its use affects every layer of society: from individuals to households to local governments, and is a consuming issue in the United States Governments stance on privacy, security, and technology.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.
Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse - all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability. ""Surveillance in the Time of Insecurity"" fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show ""24"", Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.
Today the private security industry employs approximately 1.5 million people and spends over USD52 billion annually. In contrast, public police forces employ approximately 600,000 people and spend USD30 billion annually. Private policing promises to be a big part of the response to today's increased security concerns, as citizens realize that security is much more than the presence of guards and the perception of safety. This book addresses the impact and implications of private policing on public streets, and begins with a look at private policing from conceptual, historical, economic, legal and functional perspectives. These approaches provide the background for the text, which focuses on a private policing patrol program in a community on the south side of Chicago. The text also demonstrates a number of substantive legal and public policy issues which directly or indirectly relate to the provision of security services; some people see the need for a ""dual system"" of policing - one for the wealthy and one for the poor - and others see the provision of private security as the primary protective resource in contemporary America. The author also examines how private policing is different from and similar to public policing.
Suicides, excessive overtime, hostility and violence on the factory floor in China. Drawing on vivid testimonies from rural migrant workers, student interns, managers and trade union staff, Dying for an iPhone is a devastating expose of two of the world's most powerful companies: Foxconn and Apple. As the leading manufacturer of iPhones, iPads and Kindles, and employing one million workers in China alone, Taiwanese-invested Foxconn's drive to dominate global electronics manufacturing has aligned perfectly with China's goal of becoming the world leader in technology. This book reveals the human cost of that ambition and what our demands for the newest and best technology mean for workers. Foxconn workers have repeatedly demonstrated their power to strike at key nodes of transnational production, challenge management and the Chinese state, and confront global tech behemoths. Dying for an iPhone allows us to assess the impact of global capitalism's deepening crisis on workers.
What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.
The September 11, 2001, attacks on the World Trade Center and the Pentagon raised numerous questions about American and international aviation security. Former Director of Security of the International Air Transport Association Rodney Wallis suggests that the failure to maximize U.S. domestic air security, which left air travelers vulnerable to attack, lay largely with the carriers themselves. He contends that future policies should parallel the standards of the International Civil Aviation Organization. Wallis considers the Aviation and Transportation Security Act adopted by the U.S. Congress in the wake of September 11 and offers a modus operandi to the FAA that would enable them to maximize the benefits this legislation provides to air travelers. This important work reviews past government reactions to the threat posed by air terrorism and questions whether these were effective responses or merely window dressing. It also includes practical advice for air travelers on how to maximize their own security when flying on international routes by monitoring airport and airline security for themselves.
In seeking to evaluate the efficacy of post-9/11 homeland security
expenses--which have risen by more than a trillion dollars, not
including war costs--the common query has been, "Are we safer?"
This, however, is the wrong question. Of course we are "safer"--the
posting of a single security guard at one building's entrance
enhances safety. The correct question is, "Are any gains in
security worth the funds expended?"
"The Handbook of Security "is essential reading for all those
engaged with the security world. This in-depth book collates the
best research available for the security academic and professional.
The book is divided into five parts. It begins with the study of
security as a discipline, assessing the contribution made by
different subject areas to the study of security. The second part
looks as crime in organizations. The third part analyzes the
various sub-sectors of security. A section on management issues
precedes the final section looking at a mage of issues that impact
on security. |
![]() ![]() You may like...
Handbook of Vascular Biometrics
Andreas Uhl, Christoph Busch, …
Hardcover
R1,733
Discovery Miles 17 330
Management Of Information Security
Michael Whitman, Herbert Mattord
Paperback
Graphs and Discrete Dirichlet Spaces
Matthias Keller, Daniel Lenz, …
Hardcover
R4,374
Discovery Miles 43 740
Heritage Preservation - A Computational…
Bhabatosh Chanda, Subhasis Chaudhuri, …
Hardcover
R4,336
Discovery Miles 43 360
Research Anthology on Blockchain…
Information Reso Management Association
Hardcover
R11,175
Discovery Miles 111 750
Bonferroni-type Inequalities with…
Janos Galambos, Italo Simonelli
Hardcover
R3,189
Discovery Miles 31 890
|