![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
Since 9/11, the terms homeland security and terrorism have become firmly entrenched in our lexicon. The days of walking through a simple metal detector at the airport are over, and our security landscape is forever changed. Terrorism and Homeland Security: Perspectives, Thoughts, and Opinions brings together the work of academic researchers and law enforcement and intelligence personnel to present a sober appraisal of the issues surrounding the current state of our security infrastructure. Topics highlighted in this thought-provoking volume include:
An examination of the causes and effects of terrorism and the complicated issues surrounding homeland security, this thought-provoking anthology provides a broad perspective for understanding the threat we face and how we can best meet the challenges of 21st century homeland security.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:
Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization. Praise for: The first edition was outstanding. The new second edition is
even better ... the definitive and indispensable guide for
information security and privacy awareness and training
professionals, worth every cent. As with the first edition, we
recommend it unreservedly..
First published in 1986. Routledge is an imprint of Taylor & Francis, an informa company.
This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings.
Drawn from case examples of incidents from around the world, Targeted Violence A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations, contract killings, and kidnappings that have occurred from 1950 to the present. Leaving no stone unturned, the book breaks down the various incidents of targeted violence by region, country, month, day of the week, and time of day. It reports on likely locations for each type of attack, success rates, who is likely to initiate the attacks, and who they are most likely to target. The book s easy-to-follow format allows readers, experienced or not in personal protective work, to determine the types of attacks known to have occurred in any region. This complete reference includes 35 case studies that examine attacks on motorcades and pedestrians dating back to 1973 highlighting the lessons to be learned from each example. It analyzes the modus operandi of individual assailants and groups in order to determine commonalities between targeted victims and why certain groups tend to target a specific type of individual. The text concludes with a chapter on victimology. Just like anyone, assassins and hit men fall into routines and can become creatures of habit. By studying and understanding the collection of historical information contained in these pages, security, military, and law enforcement professionals responsible for providing protection will be better prepared to identify potential threats and develop the tactics needed to thwart such attacks.
Why do governments choose to negotiate indigenous land claims
rather than resolve claims through some other means? In this book
Scholtz explores why a government would choose to implement a
negotiation policy, where it commits itself to a long-run strategy
of negotiation over a number of claims and over a significant
course of time. Through an examination strongly grounded in archival research of post-World War Two government decision-making in four established democracies - Australia, Canada, New Zealand, and the United States - Scholtz argues that negotiation policies emerge when indigenous people mobilize politically prior to significant judicial determinations on land rights, and not after judicial change alone. Negotiating Claims links collective action and judicial change to explain the emergence of new policy institutions.
This book examines the emergence of new international norms to
govern the spread of small arms, and the extent to which these
norms have been established in the policies and practices of
states, regions and international organizations. It also attempts
to establish criteria for assessing norm emergence, and to assess
the process of norm development by comparing what actually happens
at the multilateral level.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
The private business sector suffered both directly and indirectly from the terrorist strikes of 11 September 2001. Many business workers perished in the New York World Trade Center, and the insurance, transport, and tourism industries were hard hit by the aftermath. Restrictions imposed in the name of security made business travel and the movement of goods more complicated. The private sector was called upon to support the fight against terrorism actively with tougher controls on money transfers and on the export of dangerous materials and technologies. These events offered a striking case of the growing interdependence of the private and public sectors in tackling present-day security challenges. The impact of the private sector, for good or ill, in areas of conflict has long been recognized. Private business is at the centre of the latest concerns over the vulnerability of crucial infrastructures, including energy supply. Systematic public-private sector consultation and partnership are needed to tackle these problems, but neither the principles nor comprehensive mechanisms for such cooperation have yet been identified. This book brings together reflections on general and specific aspects of public-private sector interaction, from a variety of experts in business, government, international organizations, and the academic world. For completeness and balance, it also enquires into the costs of security and includes perspectives from Africa and the Arab world. It offers new reference material to help in the further exploration of this important subject.
This new volume explores the crisis in transatlantic relations and analyses the role of NATO following the collapse of the Soviet Union. The book offers a unified theory of cooperation in the new security paradigm to explain the current state of transatlantic relations and NATO's failure to adequately transform itself into a security institution for the 21st century. It argues that a new preoccupation with risk filled the vacuum left by the collapse of the Soviet Union, and uses the literature of the Risk Society to analyse the strained politics of the North Atlantic community. Using case studies to show how the West has pursued a strategy of risk management, and the effect this has had on NATO's politics, the book argues that a better understanding of how risk affects Western political cohesion will allow policy makers a way of adapting the structure of NATO to make it more effective as a tool for security. Having analysed NATO's recent failings, the book offers a theory for the way in which it can become an active risk manager, through the replacement of its established structure by smaller, ad hoc groupings.
This book examines the emergence of new international norms to govern the spread of small arms, and the extent to which these norms have been established in the policies and practices of states, regions and international organizations. It also attempts to establish criteria for assessing norm emergence, and to assess the process of norm development by comparing what actually happens at the multilateral level. If norm-making on small arms and related multilateral negotiations have mostly dealt with 'illicit arms', and most of the norms examined here fall on the arms supplier side of the arms equation, the author argues that the creation of international norms and the setting of widely agreed standards amongst states on all aspects of the demand for, availability, and spread of both legal and illegal small arms and light weapons must become central to the multilateral coordination of policy responses in order to tackle the growing violence associated with small arms availability. Small Arms and Security will be of interest to researchers and professionals in the fields of peace and conflict studies, global governance, international security and disarmament.
This book is about explaining surveillance processes and practices in contemporary society. Surveillance studies is a relatively new multi-disciplinary enterprise that aims to understand who watches who, how the watched participate in and sometimes question their surveillance, why surveillance occurs, and with what effects. This book brings together some of the world's leading surveillance scholars to discuss the why question. The field has been dominated, since the groundbreaking work of Michel Foucault, by the idea of the panopticon and this book explores why this metaphor has been central to discussions of surveillance, what is fruitful in the panoptic approach, and what other possible approaches can throw better light on the phenomena in question. Since the advent of networked computer databases, and especially since 9/11, questions of surveillance have come increasingly to the forefront of democratic, political and policy debates in the global north (and to an extent in the global south). Civil liberties, democratic participation and privacy are some of the issues that are raised by these developments. adequate understanding of how, how well and whether or not surveillance works. This book explores the theoretical questions in a way that is grounded in and attuned to empirical realities.
Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.
Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.
A compelling firsthand investigation of how social media and big data have amplified the close relationship between privacy and inequality  Online privacy is under constant attack by social media and big data technologies. But we cannot rely on individual actions to remedy this—it is a matter of social justice. Alice E. Marwick offers a new way of understanding how privacy is jeopardized, particularly for marginalized and disadvantaged communities—including immigrants, the poor, people of color, LGBTQ+ populations, and victims of online harassment.  Marwick shows that few resources or regulations for preventing personal information from spreading on the internet. Through a new theory of “networked privacy,†she reveals how current legal and technological frameworks are woefully inadequate in addressing issues of privacy—often by design. Drawing from interviews and focus groups encompassing a diverse group of Americans, Marwick shows that even heavy social media users care deeply about privacy and engage in extensive “privacy work†to protect it. But people are up against the violation machine of the modern internet. Safeguarding privacy must happen at the collective level.
This book represents the manifestation of a new presentation of old perspectives within the discipline of criminal justice. It contains practical considerations of rendering such decisions, it is expected to be an appropriate reference among practitioner personnel.
Private companies are increasingly involved with the security of domestic violence victims. This has manifested in a number of ways, including private security companies working in partnership with domestic violence services, the proliferation of security-technology companies that seek a market within the domestic violence sector, and governments contracting private companies to provide security provision for victims. Private Security and Domestic Violence offers a world-first analysis of the risks and benefits of for-profit businesses engaging with a vulnerable and underprotected section of society. Based on original data gathered in Australia, this book provides internationally relevant insights on the dangers but also the potential benefits of increasing private sector involvement with victims of domestic abuse. It offers a unique crossover of the literature on private security, crime prevention and domestic violence. Aimed at scholars, policymakers, and frontline workers within the domestic violence sector, Private Security and Domestic Violence documents experimental new collaborations and partnerships between the private, community and governmental spheres and makes a case for the suitable regulatory solutions to be put in place to successfully manage private security involvement with domestic violence victims. By outlining the risks and the benefits of this new form of security provision and detailing a potential model of regulation, this book offers a pathway for improving how we provide for a chronically underprotected population. It will be of interest to criminology and criminal justice students and researchers engaged in studies of abuse, domestic violence, violent crime, victims and victimology, crime prevention, and security.
A study of the powerful and much-feared East German Ministry of State Security from its establishment in 1950 to its fall in 1990. The Stasi was a central institution of the GDR, and this book illuminates the nature and operation of the entire East German regime, addressing one of the most important topics in modern German history. The emphasis is primarily on the key years under Erich Honecker, who was Head of State from 1976 and ousted in 1989. The book looks at all aspects of the control, operation and impact of the security police, their methods, targets, structure, accountability, and in particular the crucial question of how far they were an arm of the ruling communist party or were themselves a virtually autonomous political actor.
Casino and Gaming Resort Investigations addresses the continued and growing need for gaming security professionals to properly and successfully investigate the increasing and unique types of crime they will face in their careers. As the gaming industry has grown, so has the need for competent and highly skilled investigators who must be prepared to manage a case of employee theft one day to a sophisticated sports book scam the next. This book provides the reader with the fundamental knowledge needed to understand how each gaming and non-gaming department functions and interacts within the overall gaming resort, allowing the investigator to determine and focus on the important elements of any investigation in any area. Each chapter delivers a background of a department or type of crime normally seen in the gaming environment, and then discusses what should be considered important or even critical for the investigator to know or determine in the course of the investigation. Likely scenarios, case histories, and tips, as well as cautions for investigators to be aware of, are used throughout the book. This book was written for and directed at gaming security and surveillance professionals, including gaming regulators, and tribal gaming authorities, who are almost daily confronted by the ingenious and the most common scams, theft, and frauds that are perpetrated in the gaming world.
The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.
Organizational communication impacts service efficiency and productivity. An increase in federal funding to strengthen communication within the airport stakeholders has failed to deliver expected results. The purpose of this qualitative case study is to explore whether miscommunication among the TSA agents and airport employees relates to effective implementation of airport security policies. The central research question focuses on the degree to which miscommunication between the TSA and airlines regarding prohibited items at security checkpoints impeded the effective execution of federal law regarding carry on luggage on commercial aircraft. Using Weick's organizational information theory, this study examines the implementation of airport security policy focusing on communication between government and industry organizations. A sample of 13 private airline employees and 7 airport employees at a large U.S. commercial airport participated in the study. Data was collected via semi structured interview questions. Data was coded and analyzed following an inductive coding strategy. According to study results, there is very little evidence of miscommunications between government and airline stakeholders regarding policy changes and expectations related to security procedures. However, miscommunication about the same policy changes to consumers confuses travelers, which may explain incidences of prohibited items at the security checkpoints. Implications for positive social change related to this study may assist policy makers in clarifying language to better inform travelers about security changes and prohibited items, the objective of which will promote safer flying experiences, reduce the potential for harm, and result in more expedient traveling.
From fires, floods, and power outages to hackers and software problems, companies need to protect against a variety of threats. Business Continuity Planning takes a best practices approach to provide a comprehensive continuity solution. It details how to build a plan to handle disruptions in business, keep vital operations up and running, and prevent losses that occur when productivity is crippled or security is compromised. The book explains how to evaluate a current plan for completeness and how to monitor and maintain it to ensure it remains up-to-date.
As corporations and governments become more litigious and risk averse, international risk management becomes more complex. Corporate Security in the Asia-Pacific Region: Crisis, Crime, Fraud, and Misconduct examines real cases of corporate crisis, crime, fraud, and other misconduct that corporate security professionals need to be aware of to effectively protect people, operations, and assets within the region. Current security threats and risks are addressed to help readers conduct an informed risk assessment and analysis of operational risk. Providing detailed guidance on how to address the unique threats and risks in this dynamic and growing business environment, the book: Presents an overview of the region, with relevant historical background Offers recent case examples of crime and common issues facing a given region or country Highlights the range and frequency of corporate security-related breaches and crimes specific to countries in the region Provides detailed write-ups of every country in the region including the major players-Japan, China, India, Indonesia, Singapore, Malaysia, Thailand, and the Philippines Outlines security best practices for navigating the political and law enforcement challenges involved with operating in the region This book provides readers with the regional snapshot and geo-political background needed to understand the cultural differences, challenges, and the state of affairs for any country in the region. Filled with detailed cases of crime, theft of trade secrets, risk factors, and best practices, this book provides the real-world understanding you'll need to conduct better-informed security management that will lead to improved decisions on how to protect your people and assets in the Asia-Pacific region.
The service sector occupies a dominant position in the Japanese economy, yet few studies have looked at the way the industry developed. This book, first published in 1992, focuses on the growth and development of a major world security and communications corporation, SECOM. The success of the company has been rooted in the management strategies of Makoto Iida, who has shaped the company from a small localized business to an international industry at the forefront of innovation. The book first looks at the background of Makoto Iida, offering an insight into the nature of an entrepreneur and the issues this raises within the context of Japanese management styles. It then follows the company development stage by stage, assessing the importance of individual creativity in adapting and implementing traditional management techniques. It shows how strategies for human resources, service quality, new technology, globalization and corporate restructuring evolve within the context of a growing organization, and includes an analysis of the innovative marketing techniques and product development processes needed to sell security services to one of the world's safest countries.
Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. Surveillance, Privacy, and Public Space problematizes our traditional understanding of 'public space'. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology. |
![]() ![]() You may like...
Causal Mapping for Research in…
V.K. Narayanan, Deborah J. Armstrong
Hardcover
R2,531
Discovery Miles 25 310
Advances in the Theory and Applications…
Wojciech Mitkowski, Janusz Kacprzyk, …
Hardcover
Data Envelopment Analysis with R
Farhad Hosseinzadeh Lotfi, Ali Ebrahimnejad, …
Hardcover
R4,323
Discovery Miles 43 230
Radar and Radionavigation…
Anatoly Ivanovich Kozlov, Yuri Grigoryevich Shatrakov, …
Hardcover
R3,004
Discovery Miles 30 040
Congestion Control in Data Transmission…
Przemyslaw Ignaciuk, Andrzej Bartoszewicz
Hardcover
R3,095
Discovery Miles 30 950
|