|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
Here is the Cape Town underworld laid bare, explored through the characters who control the protection industry, the bouncers and security at nightclubs and strip clubs.
At the centre of this turf war is Nafiz Modack, the latest kingpin to have seized control of the industry, a man often in court on various charges, including extortion. Investigative journalist Caryn Dolley has followed Modack and his predecessors for six years as power has shifted in the nightclub security industry, and she focuses on how closely connected the criminal underworld is with the police services. In this suspenseful page turner of an investigation, she writes about the overlapping of the state with the underworld, the underworld with the upperworld, and how the associated violence is not confined to specific areas of Cape Town, but is happening inside hospitals, airports, clubs and restaurants and putting residents at risk.
A book that lays bare the myth that violence and gangsterism in Cape Town is confined to the ganglands of the Cape Flats, wherever you find yourself, you’re only a hair’s breadth away from the enforcers.
This work deals with international principles regarding the use of
language in the administration of justice, and looks at the way in
which multilingual countries such as Belgium and Switzerland
approach this complex problem. The title then compares language
practice in the judiciary and security services in South Africa and
some countries of the Southern African Development Community
against the background of evolving language policy in the region.
This title discusses the use of official languages in a specific
domain of government from the point of view that a language cannot
be regarded as official simplu because a constitution prescribes
it. Important conclusions are drawn regarding the role of the
multilingual state.
Edward Snowden's revelations about the mass surveillance
capabilities of the US National Security Agency (NSA) and other
security services triggered an ongoing debate about the
relationship between privacy and security in the digital world.
This discussion has been dispersed into a number of national
platforms, reflecting local political realities but also raising
questions that cut across national public spheres. What does this
debate tell us about the role of journalism in making sense of
global events? This book looks at discussions of these debates in
the mainstream media in the USA, United Kingdom, France, Germany,
Russia and China. The chapters focus on editorials, commentaries
and op-eds and look at how opinion-based journalism has negotiated
key questions on the legitimacy of surveillance and its
implications to security and privacy. The authors provide a
thoughtful analysis of the possibilities and limits of
'transnational journalism' at a crucial time of political and
digital change.
This text provides critical information to help organizations
improve their emergency communications, including the tools,
automation technology, and processes of crisis notification. To
grasp the importance of emergency notification, imagine this
scenario: A shooter is on the loose at a college campus. Chaos
reigns. To contain the situation, campus personnel need to
communicate immediately and efficiently, not only with the
students, faculty, and staff, but also the local police, federal
law enforcement, and media. Effective emergency notification makes
things "right," it allows the right message to reach the right
people at the right time—facilitating the right response.
Emergency Notification explains how. This book offers must-know
information for business security, senior management, human
resources staff, government policymakers, and emergency planners,
examining what, when, how, why, and with whom to communicate during
crises. This text also covers risk communication, message mapping,
information loading, audience comprehension, and practical issues
like testing emergency notification systems.
Database technology can be used for various ends, ranging from
promotion of democracy to strengthening of nationalism to shoring
up authoritarian regimes through misinformation. Its use affects
every layer of society: from individuals to households to local
governments, and is a consuming issue in the United States
Governments stance on privacy, security, and technology.
This volume is authored by a mix of global contributors from across
the landscape of academia, research institutions, police
organizations, and experts in security policy and private industry
to address some of the most contemporary challenges within the
global security domain. The latter includes protection of critical
infrastructures (CI), counter-terrorism, application of dark web,
and analysis of a large volume of artificial intelligence data,
cybercrime, serious and organised crime, border surveillance, and
management of disasters and crises. This title explores various
application scenarios of advanced ICT in the context of cybercrime,
border security and crisis management, serious and organised crime,
and protection of critical infrastructures. Readers will benefit
from lessons learned from more than 30 large R&D projects
within a security context. The book addresses not only theoretical
narratives pertinent to the subject but also identifies current
challenges and emerging security threats, provides analysis of
operational capability gaps, and includes real-world applied
solutions. Chapter 11 is available open access under a Creative
Commons Attribution 3.0 IGO License via link.springer.com and
Chapter 16 is available open access under a Creative Commons
Attribution 4.0 International License via link.springer.com
This detailed volume and accompanying CD-ROM focus on the set
electronic transaction (SET) system and review the fundamentals
through to practical instruction on how to develop and implement
the entire SET system. Topics addressed include: electronic
commerce and the various payment and security systems that have led
to online credit card commerce; cryptographic extensions utilized
by the SET system; and the technical details behind SET, from
purchase initiation, through certificate management, to data
transport protocols. Actual programming examples and computer code
to construct and roll out the SET system are also included. The
book should be of interest to business executives as well as
engineers.
Threats of terrorism, natural disaster, identity theft, job loss,
illegal immigration, and even biblical apocalypse - all are perils
that trigger alarm in people today. Although there may be a factual
basis for many of these fears, they do not simply represent
objective conditions. Feelings of insecurity are instilled by
politicians and the media, and sustained by urban fortification,
technological surveillance, and economic vulnerability.
""Surveillance in the Time of Insecurity"" fuses advanced
theoretical accounts of state power and neoliberalism with original
research from the social settings in which insecurity dynamics play
out in the new century. Torin Monahan explores the
counterterrorism-themed show ""24"", Rapture fiction, traffic
control centers, security conferences, public housing, and gated
communities, and examines how each manifests complex relationships
of inequality, insecurity, and surveillance. Alleviating insecurity
requires that we confront its mythic dimensions, the politics
inherent in new configurations of security provision, and the
structural obstacles to achieving equality in societies.
Today the private security industry employs approximately 1.5
million people and spends over USD52 billion annually. In contrast,
public police forces employ approximately 600,000 people and spend
USD30 billion annually. Private policing promises to be a big part
of the response to today's increased security concerns, as citizens
realize that security is much more than the presence of guards and
the perception of safety. This book addresses the impact and
implications of private policing on public streets, and begins with
a look at private policing from conceptual, historical, economic,
legal and functional perspectives. These approaches provide the
background for the text, which focuses on a private policing patrol
program in a community on the south side of Chicago. The text also
demonstrates a number of substantive legal and public policy issues
which directly or indirectly relate to the provision of security
services; some people see the need for a ""dual system"" of
policing - one for the wealthy and one for the poor - and others
see the provision of private security as the primary protective
resource in contemporary America. The author also examines how
private policing is different from and similar to public policing.
Security personnel are being asked to justify their existence in a
corporate environment. They must prove their worth in dollars and
cents by showing the return on investing in loss prevention. This
means security departments are being forced to contribute more to
the business as a whole. This book will show security managers and
personnel how to go about this, and how to achieve quality in their
departments.
Suggests security should be a valued resource within the
corporation that can contribute to bottom line performance.
Teaches security managers to approach their jobs as 'business
managers who specialize in security'.
Written by Security Magazine's 1987 Executive Achievement Award
recipient.
Suicides, excessive overtime, hostility and violence on the factory
floor in China. Drawing on vivid testimonies from rural migrant
workers, student interns, managers and trade union staff, Dying for
an iPhone is a devastating expose of two of the world's most
powerful companies: Foxconn and Apple. As the leading manufacturer
of iPhones, iPads and Kindles, and employing one million workers in
China alone, Taiwanese-invested Foxconn's drive to dominate global
electronics manufacturing has aligned perfectly with China's goal
of becoming the world leader in technology. This book reveals the
human cost of that ambition and what our demands for the newest and
best technology mean for workers. Foxconn workers have repeatedly
demonstrated their power to strike at key nodes of transnational
production, challenge management and the Chinese state, and
confront global tech behemoths. Dying for an iPhone allows us to
assess the impact of global capitalism's deepening crisis on
workers.
Office and Office Building Security, Second Edition, is the first
book of its type to address issues of violence in the workplace to
breaking and entering. As a working guide for administrators,
property managers and security personnel, this book is devoted
exclusively to total office security programs, detailing hundreds
of professional secrets for the safety of employees and the
complex. Office & Office Building Security, Second Edition,
provides the background to create a safe and secure workplace,
regardless of location, size and number of employees.
Provides updated and current information on every office security
issue or concern.
Trains the businessperson to be responsive to 'foreseeability'
issues alluded to in the court system.
Examines issues of violence and crime, as well as the dynamics
There have been a number of EU military operations in the last few
years, evidence of a growing European military confidence, which in
turn is a reflection of a developing competence in security
matters. The creation of the European Union and its Common Foreign
and Security Policy by the Maastricht Treaty of 1992 heralded this
development, though the idea of a common defense can be traced to
the beginnings of European integration. This book provides an
analysis of the EU's evolving legal framework and powers on such
matters, but it also recognizes that such a framework sits,
sometimes uneasily, within the wider body of EU and International
Law. The EU's security and defense policy also overlaps with those
of other organizations such as the Organization for Security and
Cooperation in Europe (OSCE), but more especially the North
Atlantic Treaty Organization (NATO). EU relations with NATO have,
in particular, caused some concern and are still evolving as both
organizations seek to play a wider security role in the post-Cold
War, and now post-9/11, era. With security now dominating political
agendas at the domestic, regional and international levels, it is
no surprise that the EU's concern for security has grown, and,
following the Union's respect for the rule of law, has been shaped
legally as well as politically. This book evaluates the progress of
the Union in this regard in its international context and in its
wider context of European integration generally. The analysis is in
the main a legal one, but is placed squarely within wider
historical and political perspectives.
 |
The Right to Privacy
(Hardcover)
Samuel D. Warren, Louis D. Brandeis; Foreword by Steven Alan Childress
|
R606
Discovery Miles 6 060
|
Ships in 10 - 15 working days
|
|
What limits, if any, should be placed on a government's efforts to
spy on its citizens in the name of national security? Spying on
foreigners has long been regarded as an unseemly but necessary
enterprise. Spying on one's own citizens in a democracy, by
contrast, has historically been subject to various forms of legal
and political restraint. For most of the twentieth century these
regimes were kept distinct. That position is no longer tenable.
Modern threats do not respect national borders. Changes in
technology make it impractical to distinguish between 'foreign' and
'local' communications. And our culture is progressively reducing
the sphere of activity that citizens can reasonably expect to be
kept from government eyes. The main casualty of this transformed
environment will be privacy. Recent battles over privacy have been
dominated by fights over warrantless electronic surveillance and
CCTV; the coming years will see debates over DNA databases, data
mining, and biometric identification. There will be protests and
lawsuits, editorials and elections resisting these attacks on
privacy. Those battles are worthy. But the war will be lost. Modern
threats increasingly require that governments collect such
information, governments are increasingly able to collect it, and
citizens increasingly accept that they will collect it. This book
proposes a move away from questions of whether governments should
collect information and onto more problematic and relevant
questions concerning its use. By reframing the relationship between
privacy and security in the language of a social contract, mediated
by a citizenry who are active participants rather than passive
targets, the book offers a framework to defend freedom without
sacrificing liberty.
The September 11, 2001, attacks on the World Trade Center and
the Pentagon raised numerous questions about American and
international aviation security. Former Director of Security of the
International Air Transport Association Rodney Wallis suggests that
the failure to maximize U.S. domestic air security, which left air
travelers vulnerable to attack, lay largely with the carriers
themselves. He contends that future policies should parallel the
standards of the International Civil Aviation Organization. Wallis
considers the Aviation and Transportation Security Act adopted by
the U.S. Congress in the wake of September 11 and offers a modus
operandi to the FAA that would enable them to maximize the benefits
this legislation provides to air travelers.
This important work reviews past government reactions to the
threat posed by air terrorism and questions whether these were
effective responses or merely window dressing. It also includes
practical advice for air travelers on how to maximize their own
security when flying on international routes by monitoring airport
and airline security for themselves.
|
You may like...
Tiger Woods
Jeff Benedict, Armen Keteyian
Paperback
(1)
R578
R537
Discovery Miles 5 370
|