![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
It is widely acknowledged that the size of the security industry has increased in virtually every country around the world, often eclipsing conventional police forces in personnel numbers and expenditures. Security providers differ from law enforcement officers in many ways, yet the nature of their crime reduction activities brings them into frequent contact with citizens, drawing to the forefront issues of training, professionalism and accountability. Unlike police officers, whose training and licensing standards are well established, regulations for security providers are often minimalist or entirely absent. This volume brings together research on regulatory regimes and strategies from around the globe, covering both the large private security sector and the expanding area of public sector 'non-police' protective security. It examines the nature and extent of licensing and monitoring, and the minimum standards imposed on the industry by governments across the world. The chapters in this book were originally published in the International Journal of Comparative and Applied Criminal Justice.
The service sector occupies a dominant position in the Japanese economy, yet few studies have looked at the way the industry developed. This book, first published in 1992, focuses on the growth and development of a major world security and communications corporation, SECOM. The success of the company has been rooted in the management strategies of Makoto Iida, who has shaped the company from a small localized business to an international industry at the forefront of innovation. The book first looks at the background of Makoto Iida, offering an insight into the nature of an entrepreneur and the issues this raises within the context of Japanese management styles. It then follows the company development stage by stage, assessing the importance of individual creativity in adapting and implementing traditional management techniques. It shows how strategies for human resources, service quality, new technology, globalization and corporate restructuring evolve within the context of a growing organization, and includes an analysis of the innovative marketing techniques and product development processes needed to sell security services to one of the world's safest countries.
This book shows how surveillance society shapes and interacts with journalistic practices and discourses. It illustrates not only how surveillance debates play out in and through mediated discourses, but also how practices of surveillance inform the stories, everyday work and the ethics of journalists. The increasing entrenchment of data collection and surveillance in all kinds of social processes raises important questions around new threats to journalistic freedom and political dissent; the responsibilities of media organizations and state actors; the nature of journalists' relationship to the state; journalists' ability to protect their sources and data; and the ways in which media coverage shape public perceptions of surveillance, to mention just a few areas of concern. Against this backdrop, the contributions gathered in this book examine areas including media coverage of surveillance, encryption and privacy; journalists' views on surveillance and security; public debate around the power of intelligence agencies, and the strategies of privacy rights activists. The book raises fundamental questions around the role of journalism in creating the conditions for digital citizenship. The chapters in this book were originally published in a special issue of the journal, Digital Journalism.
Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. Surveillance, Privacy, and Public Space problematizes our traditional understanding of 'public space'. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology.
One day in the spring of 2013, a box appeared outside a fourth-floor apartment door in Brooklyn, New York. The recipient, who didn't know the sender, only knew she was supposed to bring this box to a friend, who would ferry it to another friend. This was Edward Snowden's box-printouts of documents proving that the US government had built a massive surveillance apparatus and used it to spy on its own people-and the friend on the end of this chain was filmmaker Laura Poitras. Thus the biggest national security leak of the digital era was launched via a remarkably analog network, the US Postal Service. This is just one of the odd, ironic details that emerges from the story of how Jessica Bruder and Dale Maharidge, two experienced journalists but security novices (and the friends who received and ferried the box) got drawn into the Snowden story as behind-the-scenes players. Their initially stumbling, increasingly paranoid, and sometimes comic efforts to help bring Snowden's leaks to light, and ultimately, to understand their significance, unfold in an engrossing narrative that includes emails and diary entries from Poitras. This is an illuminating essay on the status of transparency, privacy, and trust in the age of surveillance.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.
"Analyzes health and hazard risk assessment in commercial, industrial, and refining industries. Emphasizes legal requirements, emergency planning and response, safety equipment, process implementation, and occupational and environmental protection exposure guidelines. Presents applicatoins and calculations for risk analysis of real systems, as well as numerous end-of-chapter examples and references."
Few people are better able to describe how to survive in a war zone than those who have seen, experienced, and lived it first-hand. Comprised of a collection of original stories from international contributors, Surviving the International War Zone: Security Lessons Learned and Stories from Police and Military Peacekeeping Forces contains true accounts of unimaginable scenarios that could only occur in war-torn and conflict-ridden areas. Presenting accounts written by military and police officers who lived in different dangerous regions across the world, the book offers an inside look at the lives of the officers and the local people living in the war zone environment. Covering many facets of daily life, the book helps readers understand how to survive in deadly terrain. With contributions from soldiers and law enforcement personnel from 13 different countries who have lived and served in Iraq, Afghanistan, Sudan, Bosnia, Kosovo, East Timor, Cambodia, Haiti, and Liberia, the book includes practical tips for day-to-day life in a war zone. It examines topics such as: Surviving extreme temperatures and staying healthy Interacting with the indigenous population and cultural awareness Adjusting to the challenges of limited technology and resources Protecting oneself from the imminent threat of violence that is present in all war-torn regions Enhanced with photographs from the war zone, the stories in this volume range from accounts of unspeakable torture, to descriptions of deplorable living conditions, to moments of humor. Some of the stories will make you laugh; others may make you cry. Ultimately, the book provides an unparalleled insight into the full range of deep-seated and sometimes conflicting emotions of the people who have lived and served in war zones and have come home to tell about it.
Contemporary Security Management, Fourth Edition, identifies and condenses into clear language the principal functions and responsibilities for security professionals in supervisory and managerial positions. Managers will learn to understand the mission of the corporate security department and how the mission intersects with the missions of other departments. The book assists managers with the critical interactions they will have with decision makers at all levels of an organization, keeping them aware of the many corporate rules, business laws, and protocols of the industry in which the corporation operates. Coverage includes the latest trends in ethics, interviewing, liability, and security-related standards. The book provides concise information on understanding budgeting, acquisition of capital equipment, employee performance rating, delegated authority, project management, counseling, and hiring. Productivity, protection of corporate assets, and monitoring of contract services and guard force operations are also detailed, as well as how to build quality relationships with leaders of external organizations, such as police, fire and emergency response agencies, and the Department of Homeland Security.
Headlines of public service corruption scandals are painful reminders of the need for continuing education in the subjects of ethics and integrity. Public service professionals employed as government officials, forensic scientists, investigators, first responders, and those within the legal and justice systems, face daily decisions that can mean the difference between life or death and freedom or imprisonment. Sometimes, such decisions can present ethical dilemmas even to the most seasoned of professionals. Building on the success of the first edition, Ethics for the Public Service Professional, Second Edition serves as a single-source resource for the topic of ethics and ethical decision making as it relates to government service. While incorporating an examination of the history of ethics, codes and legislation, the book exposes the reader to the challenges faced by today's public service professionals and administrators in incorporating ethics within daily decisions, procedures, and duties. Key features include: Current controversies in police, forensic, and other public service sectors including: racial profiling, evidence tampering, disaster response, and audits Important new mechanisms of accountability, including use-of-force reporting, citizen complaint procedures, and open government Contemporary news stories throughout the book introduce the reader to a broad range of ethical issues facing leaders within the public service workplace Chapter pedagogy including key terms, learning objectives, end-of-chapter questions, a variety of boxed ethical case examples, and references Ripped from the Headlines current event examples demonstrate actual scenarios involving the issues discussed within each chapter This in-depth text will be essential for the foundational development and explanation of protocols used within a successful organization. As such, Ethics for the Public Service Professional, Second Edition will help introduce ethics and ethical decision-making to both those new to the realm of forensic science, criminal justice, and emergency services and those already working in the field.
Investigations: 150 Things You Should Know, Second Edition, explores the essential tips and techniques for security investigations, providing a useful reference for those at any stage of their security career. This practical guide covers the legal guidelines that all investigators must follow. Through anecdotes, case studies and documented procedures, the authors present the most complete collection of investigative information available. Readers in the security and law enforcement fields will find this book easy to use and understand when seeking explanations about a wide variety of investigative topics, including constitutional law, documentary evidence, surveillance equipment, interviewing, interrogating and reporting.
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.
The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.
As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.
The first book dedicated to the sociology of privatized security, this collection studies the important global trend of shifting security from public to private hands and the associated rise of Private Military and Security Companies (PMSCs) and their contractors. The volume first explores the trend itself, making important historical and theoretical revisions to the existing social science of private security. These chapters discuss why rulers buy, rent and create private militaries, why mercenaries have become private patriots, and why the legitimacy of military missions is undermined by the use of contractors. The next section challenges the idea that states have a monopoly on legitimate violence and questions our legal and economic assumptions about private security. The collection concludes with a discussion of the contractors themselves, focusing on gender, race, ethnicity, and other demographic factors. Featuring a mix of qualitative and quantitative methods and a range of theoretical and methodological innovations, this book will inspire sociologists to examine, with fresh eyes, the behind-the-scenes tension between the high drama of war and conflict and the mundane realities of privatized security contractors and their everyday lives.
Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC. It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company's SOC is providing value. This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.
In Challenges to US and Mexican Police and Tourism Stability, author Peter Tarlow examines the US-Mexico border crisis and its impact on tourism, along with tourism security in both the United States and Mexico. He also examines the impact of police corruption and cartels on the tourism industry. Presenting detailed case studies of the U.S. cities of Chicago, New York, San Francisco, and Washington D.C, the collection concludes with comparisons on the issues facing tourism policing in the US and Mexico, exploring the dangers, hopes and recommendations for the future. The way a state's police force operates generates a range of complex and interconnected issues, including law enforcement's role in tourism. Recent debates have arisen around the media and law enforcement such as the incidents leading to the George Floyd protests and the Defund-the-Police movement. Challenges to US and Mexican Police and Tourism Stability examines the impacts that historical, political, and social campaigns targeting police practices have had on law enforcement in general and on the tourism industry in particular, specifically focusing on recent developments in both the USA and Mexico. The Tourism Security-Safety and Post Conflict Destinations series provides an insightful guide for policy makers, specialists and social scientists interested in the future of tourism in a society where uncertainness, anxiety and fear prevail.
This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.
The East German Ministry of State Security, popularly known as the Stasi, was one of the largest and most intrusive secret police systems in world history. So extensive was the system of surveillance and control that in any given year throughout the 1970s and 1980s, about one in fifty of the 13 million East German adults were working for the Stasi either as an officer or as an informer. Drawing on original sources from the Stasi archives and the recollections of contemporary witnesses, The Stasi: Myth and Reality reveals the intricacies of the relationship between the Stasi enforcers, its agents and its targets/victims, and demonstrates how far the Stasi octopus extended its tentacles into people's lives and all spheres of society. The origins and developments of this vast system of repression are examined, as well as the motivation of the informers and the ways in which they penetrated the niches of East German society. The final chapters assess the ministry's failure to help overcome the GDR's inherent structural defects and demonstrate how the Stasi's bureaucratic procedures contributed to the implosion of the Communist system at the end of the 1980's.
Securitising Russia shows the impact of twenty-first-century security concerns on the way Russia is ruled. It demonstrates how President Putin has wrestled with terrorism, immigration, media freedom, religious pluralism, and economic globalism, and argues that fears of a return to old-style authoritarianism oversimplify the complex context of contemporary Russia. The book focuses on the internal security issues common to many states in the early twenty-first-century, and places them in the particular context of Russia. Detailed analysis of the place of security in Russia's political discourse and policy-making reveals nuances often missing from overarching assessments of Russia today. To characterise the Putin regime as the 'KGB-resurgent' is to miss vital continuities, contexts, and on-going political conflicts which make up the contemporary Russian scene. Securitising Russia draws together current debates about whether Russia is a 'normal' country developing its own democratic and market structures, or a nascent authoritarian regime returning to the past. -- .
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.
Former police and military personnel possess attractive skill sets for the private security industry; however, the transition to the corporate arena is not without challenges. Competition for these jobs is fierce. Many candidates possess degrees in security management-some having spent their entire professional careers in private security. From Police to Security Professional: A Guide to a Successful Career Transition provides tips on overcoming the inherent obstacles law enforcement professionals face in making the switch and supplies a practical roadmap for entry into the private security world. The foundation of the book comes from the author's own journey and the many hurdles he encountered transitioning to private sector security. With his help, you'll learn: The unique skills, experience, and mentality required to enter into the private security industry from a law enforcement background The opportunities available and the different areas within the industry-including benefits and income potential How to properly evaluate your training portfolio How to tailor your resume to garner the attention of hiring executives The many professional associations and certifications that could be helpful in your career Vital to your ability to succeed is understanding that security management has evolved into a distinct profession in its own right-one that brings with it different education, experience, and skill sets that clearly differentiate it from law enforcement. This book will help you better understand and be prepared for the policies, processes, and a corporate environment that operates in a very different way than the police structure to which you are accustomed. With the author's help, you'll give yourself every advantage to get the job and succeed in your new career.
Suicides, excessive overtime, hostility and violence on the factory floor in China. Drawing on vivid testimonies from rural migrant workers, student interns, managers and trade union staff, Dying for an iPhone is a devastating expose of two of the world's most powerful companies: Foxconn and Apple. As the leading manufacturer of iPhones, iPads and Kindles, and employing one million workers in China alone, Taiwanese-invested Foxconn's drive to dominate global electronics manufacturing has aligned perfectly with China's goal of becoming the world leader in technology. This book reveals the human cost of that ambition and what our demands for the newest and best technology mean for workers. Foxconn workers have repeatedly demonstrated their power to strike at key nodes of transnational production, challenge management and the Chinese state, and confront global tech behemoths. Dying for an iPhone allows us to assess the impact of global capitalism's deepening crisis on workers. |
You may like...
|