![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
This book analyses the collective security system as it now stands, focusing on strategic and normative frameworks. The old system of international collective security is based on assumptions that are inadequate in relation to current challenges. Against the backdrop of changed geopolitical constellations, democracies under siege and the challenges posed by new types of warfare, critical analysts hold that not a single multilateral institution today is fully up to the task it was created for. The UN, from its founding to the Sustained Peace Approach, represents a fascinating global process of vision-building and adaptation to reality. Based on this understanding, the dynamics of the UN peace and security architecture are examined along with major agendas, from peacebuilding to development. In turn, reform proposals in the post-COVID-19 era are discussed. The book examines whether a regionalization of security structures within the UN framework may offer a way out of global fragility and growing instability factors, a question of utmost importance for conflict prevention and crisis management in the next few decades. In turn, the author discusses a normative positioning of a new intervention logic as the lowest common denominator between collaborative regional orders. Reinvented multilateralism will return as a "must." Given its scope, the book will appeal to students and scholars of international relations and international security studies, as well as to policymakers in governments and international organizations.
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.
Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees. Drawing on the authors? six decades of combined experience in the industry, Casino Security and Gaming Surveillance identifies the most common threats to casino security and provides specific solutions for addressing these threats. From physical security and security management to table and gaming surveillance, it details numerous best practice techniques, strategies, and tactics, in addition to the metrics required to effectively monitor operations. The authors highlight valuable investigation tools, including interview techniques and evidence gathering. They also cover IOU patrol, tri-shot coverage, surveillance audits, threat analysis, card counting, game protection techniques, players? club theft and fraud, surveillance standard operating procedures, nightclub and bar security, as well as surveillance training. Complete with a glossary of gaming terms and a resource-rich appendix that includes helpful forms, this book covers everything surveillance and security professionals need to know to avoid high-profile incidents, costly compliance violations and damage to property and revenue. It's professionals like Al and Derk who personify the
professionalism that is crucial when establishing and operating
modern casino security and surveillance departments. This book will
quickly become the Bible for any security and surveillance
officer.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
'Fascinating and powerful.' Sunday Times What do you do with a hundred thousand idle spies? By 1990 the Berlin Wall had fallen and the East German state security service folded. For forty years, they had amassed more than a billion pages in manila files detailing the lives of their citizens. Almost a hundred thousand Stasi employees, many of them experienced officers with access to highly personal information, found themselves unemployed overnight. This is the story of what they did next. Former FBI agent Ralph Hope uses present-day sources and access to Stasi records to track and expose ex-officers working everywhere from the Russian energy sector to the police and even the government department tasked with prosecuting Stasi crimes. He examines why the key players have never been called to account and, in doing so, asks if we have really learned from the past at all. He highlights a man who continued to fight the Stasi for thirty years after the Wall fell, and reveals a truth that many today don't want spoken. The Grey Men comes as an urgent warning from the past at a time when governments the world over are building an unprecedented network of surveillance over their citizens. Ultimately, this is a book about the present.
After 9/11, the initial focus from the U.S. government, media, and the public was on security at commercial airports and aboard commercial airlines. Soon, investigation revealed the hijackers had trained at flight schools operating out of general aviation airports, leading to a huge outcry by the media and within the government to mandate security regulations for this flight sector. General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports examines the threats against general aviation (GA) and presents resources for security professionals and GA airport owners and operators to develop an impenetrable airport and aircraft security plan. Following an overview of general aviation and its inherent security threats, the book explores: Physical security for the aviation environment, including intrusion detection systems, cameras, locks, lighting, and window security The security force, including recruitment and training Security of general aviation aircraft and airports, including runway security and fuel storage Airport safety regulations such as the Workers Protection Act and the Bloodborne Pathogens Act Emergency response to a range of scenarios, including medical emergencies, fires, gas leaks, and bomb threats The security of hangars, fixed-base operations, and flight schools Corporate aviation security departments The book concludes with a study involving the Aircraft Owners and Pilots Association (AOPA) Airport Watch Program and the Transportation Security Administration (TSA) security requirements and recommendations for general aviation. General aviation supports public safety, business, agriculture, commercial airports, aeronautical education, and many aspects of the aviation industry. The book is the first to explore the unique security concerns relevant to general aviation operations. Dr. Daniel J. Benny was interviewed on video by General Aviation Security Magazine about his article concerning the effects of the Airport Watch Program.
This book analyses the cooperation between the European Union and the United States on internal security and counter-terrorism since the 9/11 terrorist attacks. In particular, four areas of cooperation are examined: customs and supply chain security; judicial cooperation (the mutual legal assistance and extradition agreements); law enforcement cooperation (the Europol-US agreements); and the EU-US agreements for the sharing of air passengers' data (PNR agreements). These cases are analysed through a conceptual framework based on the theories of international regimes, with the data being drawn from an extensive documentary analysis of media sources collected through the 'Nexis' database, official documents, and from 13 semi-structured elite interviews with US and EU officials. The book argues that the EU and the US have established a transatlantic internal security regime based on shared principles, norms, rules, and interests. While at the beginning of this process the EU had a more reactive and passive stance at the later stages both the EU and the US were active in shaping the transatlantic political agenda and negotiations. The book demonstrates how the EU has had a much more proactive role in its relations with the US than has often been assumed in the current literature. This book will be of much interest to students of EU policy, foreign policy, international security and IR in general.
Public, Private, Secret explores the roles that photography and video play in the crafting of identity, and the reconfiguration of social conventions that define our public and private selves. Consciously framed by our present era, this collection of essays, interviews, and reflections assesses how our image-making and consumption patterns are embedded and implicated in a wider matrix of online behavior and social codes, which in turn give images a life of their own. Within this context, our visual creations and online activities blur and remove conventional delineations between public and private (and sometimes secret) expression; in fact, they multiply and expand the number of potential selves in the contemporary image-centric world. The writings address the various disruptions, resistances, and subversions that artists propose to the limited versions of race, gender, sexuality, and autonomy that populate mainstream popular culture. In so doing, they anticipate a future for our image-world rich with diversity and alterity, one that can be shaped and influenced by the agency of self- representation.
We live in times of increasing inscrutability. Our news feeds are filled with unverified, unverifiable speculation, much of it automatically generated by anonymous software. As a result, we no longer understand what is happening around us. Underlying all of these trends is a single idea: the belief that quantitative data can provide a coherent model of the world, and the efficacy of computable information to provide us with ways of acting within it. Yet the sheer volume of information available to us today reveals less than we hope. Rather, it heralds a new Dark Age: a world of ever-increasing incomprehension. In his brilliant new work, leading artist and writer James Bridle offers us a warning against the future in which the contemporary promise of a new technologically assisted Enlightenment may just deliver its opposite: an age of complex uncertainty, predictive algorithms, surveillance, and the hollowing out of empathy. Surveying the history of art, technology and information systems he reveals the dark clouds that gather over discussions of the digital sublime.
The response of the U.S. federal government to the events of September 11, 2001 has reflected the challenge of striking a balance between implementing security measures to deter terrorist attacks while at the same time limiting disruption to air commerce. Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism is a comprehensive reference that examines the persistent threats to aviation security that led up to the terrorist attacks of September 11th, describes subsequent terror plots against aviation assets, and explores U.S. efforts to counter and mitigate these threats. Addressing the homeland security challenges facing the U.S. in the age of terrorism, this text explores: Security protocol prior to 9/11 Precursors to 9/11 The rising threat of Al Qaeda Tactical and congressional response to 9/11, including new legislation The broader context of risk assessment Intelligence gathering Airport security, including passenger, baggage, and employee screening Airline in-flight security measures Airport perimeter security The threat of shoulder-fired missiles Security for GA (general aviation) operations and airports Beginning with a historical backdrop describing the dawn of the age of global terrorism in the 1960s and continuing up until the present time, the book demonstrates the broad social and political context underlying recent changes in the aviation security system as a direct result of the 9/11 attacks. Coverage examines ongoing threats and vulnerabilities to the aviation infrastructure, including an exploration of how past terrorist incidents have come to shape U.S. policy and strategy.
For fans of Darkest Hour and Dunkirk, discover the story of Walter H. Thompson, the man who saved Winston Churchill's life more than once. Walter H. Thompson was Churchill's bodyguard from 1921 until 1945, brought back from retirement at the outbreak of war. Tom Hickman's authorised biography draws heavily on extracts from a manuscript recently discovered by his great-niece, in which Thompson gives a unique insider's account of a number of occasions on which Churchill's life was put seriously at risk and his intervention was needed. After the war, Thompson married one of Churchill's secretaries, and her recollections, as well as those of surviving family members, are interwoven to tell the revelatory inside story of life beside the Greatest Briton.
Recognising the potential harm that a large, sudden release of hazardous chemicals poses to nearby people, state and federal governments have long regulated safety practices at chemical facilities. Historically, chemical facilities have engaged in security activities on a voluntary basis. Even before the terrorist attacks of 2001, congressional policymakers expressed concern over the security vulnerabilities of these facilities. After the 2001 attacks and the decision by several states to begin regulating security at chemical facilities, Congress again considered requiring federal security regulations to mitigate these risks. This book provides an overview of the existing statutory authority and implementing regulation concerning security issues at chemical facilities, with a focus on policy options and congressional considerations.
The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
The need for security sector transformation (SST) is prominent in the work of scholars, policy makers, and practitioners who focus on the security sector and its governance in Africa. At the heart of this approach is the requirement for comprehensive change to the structure and management of security on the African continent. In this volume, the contributors clarify the relationship between security sector transformation and security sector reform, and provide insight on the challenges and opportunities for an operational security sector transformation agenda in Africa.
This collection of articles discusses the challenges confronting journalists when reporting on the safety, security, and justice needs of society, and the related issues of public interest regarding state efforts to serve and manage those needs. The articles reflect on the experiences of journalists who have worked in a variety of conflict-affected or transitional environments around the world. Their insights highlight the critical roles played by journalists when informing and educating citizens, holding governments and those in power accountable, and helping to rebuild communities shattered by conflict.
It is widely acknowledged that the size of the security industry has increased in virtually every country around the world, often eclipsing conventional police forces in personnel numbers and expenditures. Security providers differ from law enforcement officers in many ways, yet the nature of their crime reduction activities brings them into frequent contact with citizens, drawing to the forefront issues of training, professionalism and accountability. Unlike police officers, whose training and licensing standards are well established, regulations for security providers are often minimalist or entirely absent. This volume brings together research on regulatory regimes and strategies from around the globe, covering both the large private security sector and the expanding area of public sector 'non-police' protective security. It examines the nature and extent of licensing and monitoring, and the minimum standards imposed on the industry by governments across the world. The chapters in this book were originally published in the International Journal of Comparative and Applied Criminal Justice.
New digital technologies and wireless services have altered the character of electronic surveillance. This book deals with some of the laws and technologies that are being utilised to cope with the rapid advances in digital technologies as it relates to crime and homeland security.
The U.S. Department of Homeland Security (DHS) became the nation's 15th Cabinet department in January 2003. Twenty-two agencies with different missions, operations and cultures were consolidated and realigned into one organisation with its primary mission being that of prevention, preparation for and response to catastrophes affecting our homeland, while facilitating legitimate travel and trade (Appendix C). DHS now employs over 208,000 individuals who are located in every state and many foreign countries making it the third largest cabinet agency.
"It will be very important, building on the goodwill which the Turkish military possess in society, to develop an informed security community consisting of members of parliament, academicians, journalists underpinning of security policy. I trust that this reference book will provide them with most useful support"-Dr. W. F. van Eekelen, former minister of defence, the Netherlands.
Data Borders investigates entrenched and emerging borderland technology that ensnares all people in an intimate web of surveillance where data resides and defines citizenship. Detailing the new trend of biologically mapping undocumented people through biotechnologies, Melissa Villa-Nicholas shows how surreptitious monitoring of Latinx immigrants is the focus of and driving force behind Silicon Valley's growing industry within defense technology manufacturing. Villa-Nicholas reveals a murky network that gathers data on marginalized communities for purposes of exploitation and control that implicates law enforcement, border patrol, and ICE, but that also pulls in public workers and the general public, often without their knowledge or consent. Enriched by interviews of Latinx immigrants living in the borderlands who describe their daily use of technology and their caution around surveillance, this book argues that in order to move beyond a heavily surveilled state that dehumanizes both immigrants and citizens, we must first understand how our data is being collected, aggregated, correlated, and weaponized with artificial intelligence and then push for immigrant and citizen information privacy rights along the border and throughout the United States. |
![]() ![]() You may like...
Lockdown Made Me Do It - 60 Quarantine…
Amy Zavatto, Jassy Davis, …
Hardcover
R272
Discovery Miles 2 720
|