![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.
Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.
Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security surveillance, as well as the critical aspects of the design, implementation, and operation of security surveillance centers of all sizes. Step-by-step coverage of policy and procedures, as well as the inclusion of industry-specific operational forms, guarantee a practical, user-friendly text for all levels of readers. Intended for any individuals or organizations currently employing security surveillance systems, this book is an asset for all users, from trainees to supervisors, seeking to create a more secure environment for themselves and for others.
Privatising Justice takes a broad historical view of the role of the private sector in the British state, from private policing and mercenaries in the eighteenth century to the modern rise of the private security industry in armed conflict, policing and the penal system. The development of the welfare state is seen as central to the decline of what the authors call 'old privatisation'. Its succession by neoliberalism has created the ground for the resurgence of the private sector. The growth of private military, policing and penal systems is located within the broader global changes brought about by neoliberalism and the dystopian future that it portends. The book is a powerful petition for the reversal of the increasing privatisation of the state and the neoliberalism that underlies it.
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system. The book provides a mechanism that enables readers to think clearly and critically about the process of security management, emphasizing the ability to articulate the differing aspects of business and security management by reasoning through complex problems in the changing organizational landscape. The authors elucidate the core security management competencies of planning, organizing, staffing, and leading while providing a process to critically analyze those functions. They specifically address information security, cyber security, energy-sector security, chemical security, and general security management utilizing a critical thinking framework. Going farther than other books available regarding security management, this volume not only provides fundamental concepts in security, but it also creates informed, critical, and creative security managers who communicate effectively in their environment. It helps create a practitioner who will completely examine the environment and make informed well-thought-out judgments to tailor a security program to fit a specific organization.
Strategic Security will help security managers, and those aspiring to the position, to think strategically about their job, the culture of their workplace, and the nature of security planning and implementation. Security professionals tend to focus on the immediate (the urgent) rather than the important and essential-too often serving as "firefighters" rather than strategists. This book will help professionals consider their roles, and structure their tasks through a strategic approach without neglecting their career objectives. Few security management books for professionals in the field focus on corporate or industrial security from a strategic perspective. Books on the market normally provide "recipes," methods or guidelines to develop, plans, policies or procedures. However, many do so without taking into account the personal element that is supposed to apply these methods. In this book, the authors helps readers to consider their own career development in parallel with establishing their organisation security programme. This is fundamental to becoming, and serving as, a quality, effective manager. The element of considering career objectives as part-and-parcel to this is both unique to only this book and vital for long-term career success. The author delineates what makes strategic thinking different in a corporate and security environment. While strategy is crucial in the running of a company, the traditional attitude towards security is that it has to fix issues quickly and at low cost. This is an attitude that no other department would tolerate, but because of its image, security departments sometimes have major issues with buy-in and from top-management. The book covers the necessary level of strategic thinking to put their ideas into practice. Once this is achieved, the strategic process is explained, including the need to build the different steps into this process-and into the overarching business goals of the organisation-will be demonstrated. The book provides numerous hand-on examples of how to formulate and execute the strategic master plan for the organization. The authors draws on his extensive experience and successes to serve as a valuable resource to all security professionals looking to advance their careers in the field.
There is a Russian saying that "police mirror society." The gist of this is that every society is policed to the extent that it allows itself to be policed. Centralized in control but decentralized in their reach, the police are remarkably similar in structure, chain of command, and their relationships with the political elite across post-Soviet nations-they also remain one of the least reformed post-communist institutions. As a powerful state organ, the Soviet-style militarized police have resisted change despite democratic transformations in the overall political context, including rounds of competitive elections and growing civil society. While consensus between citizens and the state about reform may be possible in democratic nations, it is considerably more difficult to achieve in authoritarian states. Across post-Soviet countries, such discussions most often occur between political elites and powerful non-state actors, such as criminal syndicates and nationalistic ethnic groups, rather than the wider citizenry. Even in countries where one or more rounds of democratic elections have taken place since 1991, empowered citizens and politicians have not renegotiated the way states police and coerce society. On the contrary, in many post-Soviet countries, police functions have expanded to serve the interests of the ruling political elites. What does it take to reform a post-Soviet police force? This book explores the conditions in which a meaningful transformation of the police is likely to succeed and when it will fail. Departing from the conventional interpretation of the police as merely an institution of coercion, this book defines it as a medium for state-society consensus on the limits of the state's legitimate use of violence. It thus considers policing not as a way to measure the state's capacity to coerce society, but rather as a reflection of a complex society bound together by a web of casual interactions and political structures. The book compares reform efforts in Ukraine, Georgia, Kyrgyzstan, Kazakhstan, and Tajikistan, finding that bottom-up public mobilization is likely to emerge in the aftermath of transformative violence-an incident when the usual patterns of policing are interrupted with unprecedented brutality against vulnerable individuals. Ultimately, The Politics of Police Reform examines the various pathways to transforming how the state relates to society through policing.
Private Security and the Investigative Process, Fourth Edition is fully updated and continues to provide complete coverage of the investigative process for private investigations by both individuals and in corporate security environments. This edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law-with over three decades of experience-the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. The book reflects best practices and includes tips for ensuring accurate and reliable private sector security investigations. This new edition includes: A new section on career opportunities in paths in the investigative field A rundown of the leading security Industry associations and professional standards being published Added discussion of observational interviews include current protocols analyzing data Details of the current legal implications for security surveillance and practices Advances in technology to thwart crime and fraud in retail and other business settings An entirely new section on e-records from criminal and civil judgments Authoritative, yet accessible, this book is one of the only textbooks dedicated to the subject. It also serves as an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.
Clear, comprehensive approach to crime prevention introduces undergraduates to the breadth of this field, showing students how to assess tactics and their impact in reducing crime or fear of victimization The market leader in a course taught in Criminal Justice, Criminology, and Sociology programs world-wide Foundational principles of crime prevention with global examples plus a curated collection of online resources for instructors and students makes this book the best choice for Crime Prevention and Crime Control courses
The Art of Investigation examines the qualities required to be a professional, thorough, and effective investigator. As the title suggests, it delves into more than the steps and procedures involved in managing an investigation, it also covers the "soft skills" necessary to effectively direct investigations and intuit along the way. The editors and contributing authors are the best in their field, and bring a wealth of real-world knowledge and experience to the subject. There are several publications available on the nuts-and-bolts of the process and stages of an investigation. That ground has been covered. However, little has been published on the investigative skills required, the traits necessary, and the qualities endemic to an inquisitive mind that can be cultivated to improve an investigator's professional skill-set. Each chapter discusses the applicability of the traits to the contributor's own work and experience as an investigator. In doing so, the contributors provide a story-or set of stories-from their personal experience, which demonstrates a given trait and its importance in the course of their investigative work and career. This will be first-hand experience that will serve to help any investigative professional in the course of their work. The case examples included throughout are sometimes surprising, but always engaging and insightful. An investigator must keep an open mind above all else, and this book will "lift the veil" on the inner workings of an investigation, in addition to the thought processes and inner monologues of an investigator as part of that process. Key Features * Chapters highlight the qualities and traits-the "soft skills"-that are required, and which can be improved over time, to be a thorough investigator. * A veritable "Who's Who" of renowned investigative experts lend their personal expertise and experience to this how-to manual for investigators. * A unique approach is applied and provides self-help advice for both new and experienced investigative and security professionals. * The book focuses on the learned, acquired, and intuitive skills of investigation-a nuanced but essential aspect of the investigative skill-set. The Art of Investigation will be a welcome addition to any investigator's toolkit and will also be of interest to students in criminal justice, security, and Homeland Security programs, security consultants, corporate and private security professionals, and the legal community.
The increasing reliance on private security services raises questions about the effects of privatization on the quality of public police forces, particularly in high-crime, low-income areas. In an effective pro-and-con format, two experts on policing offer two strikingly different perspectives on this trend towards privatization. In the process, they provide an unusually thoughtful discussion of the origins of both the public police and the private security sectors, the forces behind the recent growth of private security operations, and the risks to public safety posed by privatization. In his critique of privatization, Peter K. Manning focuses on issues of free market theory and management practices such as Total Quality Management that he believes are harmful to the traditional police mandate to control crime. He questions the appropriateness of strategies that emphasize service to consumers. For Brian Forst, the free market paradigm and economic incentives do not carry the same stigma. He argues that neither public nor private policing should have a monopoly on law enforcement activities, and he predicts an even more varied mix of public and private police activities than are currently available. Following the two main sections of the book, each author assesses the other's contribution, reflecting on not just their points of departure but also on the areas in which they agree. The breadth and depth of the discussion makes this book essential for both scholars and practitioners interested in policing generally and privatization in particular.
In spite of Edward Snowden's disclosures about government abuses of dragnet communication surveillance, the surveillance industry continues to expand around the world. Many people have become resigned to a world where they cannot have a reasonable expectation of privacy. The author looks at what can be done to rein in these powers and restructure how they are used beyond the limited and often ineffective reforms that have been attempted. Using southern Africa as a backdrop, and its liberation history, Jane Duncan examines what an anti-capitalist perspective on intelligence and security powers could look like. Are the police and intelligence agencies even needed, and if so, what should they do and why? What lessons can be learnt from how security was organised during the struggles for liberation in the region? Southern Africa is seeing thousands of people in the region taking to the streets in protests. In response, governments are scrambling to acquire surveillance technologies to monitor these new protest movements. Southern Africa faces no major terrorism threats at the moment, which should make it easier to develop clearer anti-surveillance campaigns than in Europe or the US. Yet, because of tactical and strategic ambivalence about security powers, movements often engage in limited calls for intelligence and policing reforms, and fail to provide an alternative vision for policing and intelligence. Surveillance and Intelligence in Southern Africa examines what that vision could look like.
There has now been more than a decade of conceptual work, policy development, and operational activity in the field of security sector reform (SSR). To what extent has its original aim, to support and facilitate development, been met? The various contributions to this book address this question, offering a range of insights on the theoretical and practical relevance of the security-development nexus in SSR. They examine claims of how and whether SSR effectively contributes to achieving both security and development objectives. In particular, the analyses presented in the book provide a salutary lesson that development and security communities need to take each other's concerns into account when planning, implementing, and evaluating their activities. The book offers academics, policy-makers, and practitioners within the development and security communities relevant lessons, suggestions, and practical advice for approaching SSR as an instrument that serves both security and development objectives. (Series: Geneva Centre for the Democratic Control of Armed Forces DCAF])
This volume examines the relationship between privacy, surveillance and security, and the alleged privacy-security trade-off, focusing on the citizen's perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen's perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies, critical security studies, intelligence studies, EU politics and IR in general. A PDF version of this book is available for free in open access via www.tandfebooks.com. It has been made available under a Creative Commons Attribution-Non Commercial 3.0 license.
Sports Team Security examines the security needs for sports teams and events of all sizes. This groundbreaking book provides a fundamental model for sports team security that can be applied almost universally, from youth sports to the Super Bowl and World Cup. The book develops, compares, and contrasts current methodologies in sports security, for both amateur and professional athletes, examining which paradigms work best and under which circumstances. This valuable information is applicable to nearly anyone involved in the safety of athletes, including event managers, law enforcement, parents, school administrators and coaches, security practitioners, tourism industry professionals, and legal professionals. It explores areas rarely investigated, providing key advice for creating best practices and guidelines in sports team security.
It's a basic human right to feel and be safe in your community-where you live, work and play. But, few people know or understand everything it takes to make this possible. Safe City details the concerted effort and integration of new technology it takes to make communities safer for everyone. From fire departments detecting fires within seconds with thermal imaging to police departments detecting gunfire immediately through gunshot detection sensors, technology continues to evolve daily. Even surveillance cameras have taken great strides from the grainy images of years past, and just one camera can make a difference (read about how police identified the Boston Marathon bombers through a department store's video camera inside!). Safe City teaches the public how to harden targets and protect their homes, businesses, communities, themselves, and their loved ones. It takes a community effort to help reduce and prevent crime, and Safe City answers the questions people have along with pointing out many more that should be asked.
A single breakthrough could change the world forever.Having just completed a complex recovery assignment, covert salvage specialist Korso is in no mood to take on another job so soon, but he has little choice when he's contacted by Cole Ashcroft, an ex-colleague who's calling in a debt. An official at the US Embassy in Bulgaria has approached Cole with a well-paying salvage job, but only if he can persuade Korso to plan the whole operation. A chemist for a pharmaceutical company has secretly developed a revolutionary glaucoma pill, one with an unexpected side effect that could make it the discovery of the century. But the chemist has since been found dead, and the prototypes are missing... Aware that ownership of these pills could shift the balance of military power overnight, the embassy man offers to pay Korso handsomely to locate and recover them using any means necessary. But with a job this big Korso also knows he'll have to assemble a team to help him, and that brings its own set of problems. Because with potential profits in the billions, can he really trust anyone...? A full-throttle thriller that will keep you guessing to the very end, perfect for fans of Mark Greaney, Ben Coes and Adam Hamdy.
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.
For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.
This Scholastic Classics edition of George Orwell's classic dystopian novel is perfect for students and Orwell enthusiasts alike. Who controls the past controls the future. Who controls the present controls the past. Winston Smith has always been a dutiful citizen of Oceania, rewriting history to meet the demands of the Ministry of Truth. But with each lie that he writes, Winston starts to resent the totalitarian party that seeks power for its own sake and punishes those that desire individuality. When Winston begins a secret relationship with his colleague Julia, he soon realises it's virtually impossible to escape the watchful eye of Big Brother... Totalitarianism, identity and independence, repression, power, language, rebellion, technology and modernisation are some of the themes that run throughout this novel.
What limits, if any, should be placed on a government's efforts to spy on its citizens in the interests of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance or CCTV; the coming years will see debates over data-mining and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But they will all be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. The point of this book is to shift focus away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.
From the rising significance of non-state actors to the increasing influence of regional powers, the nature and conduct of international politics has arguably changed dramatically since the height of the Cold War. Yet much of the literature on deterrence and compellence continues to draw (whether implicitly or explicitly) upon assumptions and precepts formulated in-and predicated upon-politics in a state-centric, bipolar world. Coercion moves beyond these somewhat hidebound premises and examines the critical issue of coercion in the 21st century, with a particular focus on new actors, strategies and objectives in this very old bargaining game. The chapters in this volume examine intra-state, inter-state, and transnational coercion and deterrence as well as both military and non-military instruments of persuasion, thus expanding our understanding of coercion for conflict in the 21st century. ? Scholars have analyzed the causes, dynamics, and effects of coercion for decades, but previous works have principally focused on a single state employing conventional military means to pressure another state to alter its behavior. In contrast, this volume captures fresh developments, both theoretical and policy relevant. This chapters in this volume focus on tools (terrorism, sanctions, drones, cyber warfare, intelligence, and forced migration), actors (insurgents, social movements, and NGOs) and mechanisms (trilateral coercion, diplomatic and economic isolation, foreign-imposed regime change, coercion of nuclear proliferators, and two-level games) that have become more prominent in recent years, but which have yet to be extensively or systematically addressed in either academic or policy literatures.
Workplace Violence: Issues in Threat Management defines what workplace violence is, delves into the myths and realities surrounding the topic and provides readers with the latest statistics, thinking, and strategies in the prevention of workplace violence. The authors, who themselves have implemented successful workplace violence protection programs, guide novice and experienced practitioners alike in the development of their own programs. |
![]() ![]() You may like...
The Professional Protection Officer…
Sandi J. Davies, Lawrence Fennelly
Paperback
R1,456
Discovery Miles 14 560
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, …
Paperback
R623
Discovery Miles 6 230
Dying for an iPhone - Apple, Foxconn and…
Jenny Chan, Mark Selden, …
Hardcover
R2,698
Discovery Miles 26 980
|