![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
This provocative book offers a probing account of the erosion of privacy in American society, that shows that we are often unwitting, if willing, accomplices, providing personal data in exchange for security or convenience. The author reveals that in today's "information society," the personal data that we make available to virtually any organization for virtually any purpose is apt to surface elsewhere, applied to utterly different purposes. The mass collection and processing of personal information produces such tremendous efficiencies that both the public and private sector feel justified in pushing as far as they can into our private lives. And there is no easy cure. Indeed, there are many cases where privacy invasion is both hurtful to the individual and indispensable to an organization's quest for efficiency. And as long as we willingly accept the pursuit of profit, or the reduction of crime, or cutting government costs as sufficient reason for intensified scrutiny over our lives, then privacy will remain endangered.
The Handbook of Communication and Security provides a comprehensive collection and synthesis of communication scholarship that engages security at multiple levels, including theoretical vs. practical, international vs. domestic, and public vs. private. The handbook includes chapters that leverage communication-based concepts and theories to illuminate and influence contemporary security conditions. Collectively, these chapters foreground and analyze the role of communication in shaping the economic, technological, and cultural contexts of security in the 21st century. This book is ideal for advanced undergraduate and postgraduate students and scholars in the numerous subfields of communication and security studies.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
The US government spends billions of dollars to secure strategic and tactical assets at home and abroad against enemy attack. However, as "hard targets" such as military installations and government buildings are further strengthened, vulnerable soft targets are increasingly in the crosshairs of terrorists and violent criminals. Attacks on crowded spaces such as churches, schools, malls, transportation hubs, and recreational venues result in more casualties and have a powerful effect on the psyche of the populace. Soft Target Hardening: Protecting People from Attack, Second Edition, continues the national dialogue started by the first edition by providing case studies, best practices, and methodologies for identifying soft target vulnerabilities and reducing risk in the United States and beyond. Soft target attacks steadily climbed in number and scale of violence since the first edition of this book. New tactics emerged, as terrorists continually hit the "reset button" with each attack. In this volatile, ever-changing security environment, plans to protect people and property must be fluid and adaptable. Along with new hardening tactics, such as the use of tactical deception to disguise, conceal, and divert, the author has updated the text with new case studies to reflect and respond to the fast-moving transformation in methods from more complex and organized forms of terror to simpler, yet still-devastating approaches. This book is a must-read for those who secure, own, and operate soft target facilities, and for citizens who want to protect themselves and their families from attack. Soft Target Hardening, Second Edition, was named the ASIS International Security Industry Book of the Year in 2019.
This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.
This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.
Public, Private, Secret explores the roles that photography and video play in the crafting of identity, and the reconfiguration of social conventions that define our public and private selves. Consciously framed by our present era, this collection of essays, interviews, and reflections assesses how our image-making and consumption patterns are embedded and implicated in a wider matrix of online behavior and social codes, which in turn give images a life of their own. Within this context, our visual creations and online activities blur and remove conventional delineations between public and private (and sometimes secret) expression; in fact, they multiply and expand the number of potential selves in the contemporary image-centric world. The writings address the various disruptions, resistances, and subversions that artists propose to the limited versions of race, gender, sexuality, and autonomy that populate mainstream popular culture. In so doing, they anticipate a future for our image-world rich with diversity and alterity, one that can be shaped and influenced by the agency of self- representation.
In recent years, the expansion of night-time leisure has emerged as a key indicator of post-industrial urban prosperity, attracting investment, creating employment and re-generating the built environment. These leisure economies are youth-dominated, focusing upon the sale and consumption of alcohol. Unprecedented numbers of young people now flock to town centres that are crammed with bars, pubs and clubs, and the resulting violent disorder has over run police resources that remain geared to the drinking patterns and alcohol cultures of previous generations. Post-industrial re-structuring has spawned an increasingly complex mass of night-time leisure options through which numerous licit and illicit commercial opportunities flow. Yet, regardless of the fashionable and romantic notions of many contemporary urban theorists, it is alcohol, mass intoxication and profit rather than 'cultural regeneration,' which lies at the heart of this rapidly expanding dimension of post-industrial urbanism. Private security in the bulky form of bouncers fills the void left by the public police. These men (only 7% are women), whose activities are barely regulated by the State, are dominated by a powerful subculture rooted in routine violence and intimidation. Using ethnography, participant observation and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.
This is a volume of original contributions from scholars in eight different humanities and social science disciplines. The aim of the book is to present a range of surveillance technologies used in everyday life and investigate the politics of their use. It is truly an interdisciplinary project that will find purchase in courses on security studies and the sociology of culture and the sociology of science. Courses on security studies and its impact on culture can be found in a variety of academic departments including STS, criminology, sociology, women's studies, anthropology, political science and justice studies.
The private business sector suffered both directly and indirectly from the terrorist strikes of 11 September 2001. Many business workers perished in the New York World Trade Center, and the insurance, transport, and tourism industries were hard hit by the aftermath. Restrictions imposed in the name of security made business travel and the movement of goods more complicated. The private sector was called upon to support the fight against terrorism actively with tougher controls on money transfers and on the export of dangerous materials and technologies. These events offered a striking case of the growing interdependence of the private and public sectors in tackling present-day security challenges. The impact of the private sector, for good or ill, in areas of conflict has long been recognized. Private business is at the centre of the latest concerns over the vulnerability of crucial infrastructures, including energy supply. Systematic public-private sector consultation and partnership are needed to tackle these problems, but neither the principles nor comprehensive mechanisms for such cooperation have yet been identified. This book brings together reflections on general and specific aspects of public-private sector interaction, from a variety of experts in business, government, international organizations, and the academic world. For completeness and balance, it also enquires into the costs of security and includes perspectives from Africa and the Arab world. It offers new reference material to help in the further exploration of this important subject.
Privatising Justice takes a broad historical view of the role of the private sector in the British state, from private policing and mercenaries in the eighteenth century to the modern rise of the private security industry in armed conflict, policing and the penal system. The development of the welfare state is seen as central to the decline of what the authors call 'old privatisation'. Its succession by neoliberalism has created the ground for the resurgence of the private sector. The growth of private military, policing and penal systems is located within the broader global changes brought about by neoliberalism and the dystopian future that it portends. The book is a powerful petition for the reversal of the increasing privatisation of the state and the neoliberalism that underlies it.
'Fascinating and powerful.' Sunday Times What do you do with a hundred thousand idle spies? By 1990 the Berlin Wall had fallen and the East German state security service folded. For forty years, they had amassed more than a billion pages in manila files detailing the lives of their citizens. Almost a hundred thousand Stasi employees, many of them experienced officers with access to highly personal information, found themselves unemployed overnight. This is the story of what they did next. Former FBI agent Ralph Hope uses present-day sources and access to Stasi records to track and expose ex-officers working everywhere from the Russian energy sector to the police and even the government department tasked with prosecuting Stasi crimes. He examines why the key players have never been called to account and, in doing so, asks if we have really learned from the past at all. He highlights a man who continued to fight the Stasi for thirty years after the Wall fell, and reveals a truth that many today don't want spoken. The Grey Men comes as an urgent warning from the past at a time when governments the world over are building an unprecedented network of surveillance over their citizens. Ultimately, this is a book about the present.
Private security is now a multi-billion pound industry employing more personnel than the police. The authors provide incisive insights into the security world, scanning its weaknesses and exploring its potential. Based upon original research, supported by years of experience, they suggest that new ways of looking at the modern security world are long overdue. Private Security is a highly innovative book containing a wealth of up-to-date material. It is the definitive guide to the security world.
Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.
Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue. As such, the book's objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach. The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager. While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization's system of management and all its activities and functions. The "Introduction" section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization's overall business management strategy. The "Framework" section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The "Tactics and Control Measures" section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events. For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach. Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization's day-to-day activities-as an integral part of these activities-rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.
Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the cyber world, social media, unsolicited e-mails, poor hiring practices, dishonest associates, and weak operating procedures. With a focus on prevention measures, A Comprehensive Look at Fraud Identification and Prevention presents proven tips, advice, and recommendations for fraud awareness, protection, and prevention. The book supplies a detailed examination of the wide range of threats that exist to provide you with a plan to protect the assets of your organization, and even your own assets, against the many faces of fraud in today's technologically advanced environment. The many types of fraud covered include: Employee theft and fraud Organizational fraud Identity theft and fraud Fraud against the elderly Internet, computer, and e-mail fraud Ponzi and pyramid schemes The methods of prevention presented in the book are based on what is referred to as the path of least resistance. With fraud and other types of criminal activity, criminals take the path with the fewest barriers in their way. By implementing the methods presented in this book, you will be able to deter would-be criminals and send them on their way to search for easier targets with fewer barriers. Discussion categories include identification and prevention aspects for organizational and individual frauds along with the many avenues used to facilitate the attacks. Explaining how some fraud typologies can overlap and co-mingle, the book provides the methods you need to protect your organization, and yourself, from becoming a target and victim of fraud.
Outlines risk assessments in which threats and vulnerabilities are calculated with probabilities to determine risk Presents how to establish a security plan, and, in this, how to determine the best deployment of various layers of control to mitigate risks Offers an overview of budgeting-determining, advocating for, and implementing the security program based on allotted funding Details how to document policies into a security manual, training manual, emergency procedures manual, and incident action plan Provides the ins and outs of staffing including scheduling, wages, deployment, and contract security Examines training best practices including physical security, emergency response and procedures, as well as specialized topics such as use of force and patrol procedures Explains prostitution and human trafficking, presenting sections with a focus on awareness and prevention
The protection and security of cultural properties is of primary concern to the thousands of federal, state, county, city, and private institutions entrusted with housing and displaying our national heritage and history of our society. Cultural property security is of global importance as well, with tens of thousands of institutions internationally tasked with protecting and maintaining relics and artifacts of social, cultural, and historical significance. Cultural Property Security offers powerful protection guidelines to security departments tasked with safeguarding popular historical sites, museums, and libraries and the historical artifacts they house. Presenting practical, ready-to-implement solutions in a clear writing style, the book: Provides a working definition of cultural properties Identifies the threats against cultural properties from crime and terrorism, particularly in regions with political or civil unrest Offers guidance in threat assessment Identifies the physical security measures and technology that can be used to protect such institutions Presents guidelines for establishing a protective service department for cultural properties Describes proper arrest and post-arrest protocols Includes a list of online resources for further information related to the protection of cultural properties Complete with dozens of photos, the book establishes leading industry best practices to identify the various threats to cultural properties and protect them. Dr. Daniel J. Benny has more than 35 years of security management experience and has served as a Director of Protective Services for the state of Pennsylvania's Historic and Museum Commission. His insight is invaluable to those responsible for securing these institutions from internal and external threats.
For fans of Darkest Hour and Dunkirk, discover the story of Walter H. Thompson, the man who saved Winston Churchill's life more than once. Walter H. Thompson was Churchill's bodyguard from 1921 until 1945, brought back from retirement at the outbreak of war. Tom Hickman's authorised biography draws heavily on extracts from a manuscript recently discovered by his great-niece, in which Thompson gives a unique insider's account of a number of occasions on which Churchill's life was put seriously at risk and his intervention was needed. After the war, Thompson married one of Churchill's secretaries, and her recollections, as well as those of surviving family members, are interwoven to tell the revelatory inside story of life beside the Greatest Briton.
Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.
A critical look at how the US military is weaponizing technology and data for new kinds of warfare-and why we must resist. War Virtually is the story of how scientists, programmers, and engineers are racing to develop data-driven technologies for fighting virtual wars, both at home and abroad. In this landmark book, Roberto J. Gonzalez gives us a lucid and gripping account of what lies behind the autonomous weapons, robotic systems, predictive modeling software, advanced surveillance programs, and psyops techniques that are transforming the nature of military conflict. Gonzalez, a cultural anthropologist, takes a critical approach to the techno-utopian view of these advancements and their dubious promise of a less deadly and more efficient warfare. With clear, accessible prose, this book exposes the high-tech underpinnings of contemporary military operations-and the cultural assumptions they're built on. Chapters cover automated battlefield robotics; social scientists' involvement in experimental defense research; the blurred line between political consulting and propaganda in the internet era; and the military's use of big data to craft new counterinsurgency methods based on predicting conflict. Gonzalez also lays bare the processes by which the Pentagon and US intelligence agencies have quietly joined forces with Big Tech, raising an alarming prospect: that someday Google, Amazon, and other Silicon Valley firms might merge with some of the world's biggest defense contractors. War Virtually takes an unflinching look at an algorithmic future-where new military technologies threaten democratic governance and human survival.
Boko Haram analyzes the activities and atrocities of Nigeria's Jihadi terrorist group, Boko Haram, in the context of global religious fundamentalism and extremism. The book traces the early beginnings of the religious sect, the conversion of its leader to radical Islam in 2002, and the group's campaign of violence beginning in 2009 and continuing to the present. The group's attacks against a variety of targets are examined in detail as are their general tactics and strategies. The Nigerian government response is also examined in order to provide critical lessons to counterterrorism planners, policy and government officials, and scholars. The initial military response was hampered by capability and legislative constraints including a lack of arms and ammunition, a lack of modern counterterrorism equipment, training gaps, leadership issues, intelligence gaps, politicization of the conflict, and limited support to the Nigerian military by the international community. Boko Haram looks at the work that has been done thus far, and what work needs to continue, to make gains to combat, marginalize, and ultimately defeat Boko Haram and resolve the conflict facing Nigeria. Key features: Outlines the history of Boko Haram and its emergence in Nigeria Provides the latest developments on fundamentalism in Nigeria, the growth of Boko Haram and the government response Focuses on the attacks, attack methodology and targeting of Boko Haram, addressing best-practice countermeasures Examines Boko Haram's ties to other Islamist groups including ISIL/ISIS and others Details the importance for international cooperation in responding to Boko Haram's activities and threats. About the Author: Dr. Ona Ekhomu, CFE, CPP, CSP, PCI, CPOI was born in Irrua, Nigeria. He holds the PhD from University of Pittsburgh. A policy analyst and security expert, Ekhomu is Chairman Trans-World Security Systems Ltd. and Chairman School of Management and Security (Lagos, Nigeria). President of Trans-World Security Systems Inc. of Chicago, Illinois, USA, Ekhomu is also a lecturer in the Sociology Department of the University of Lagos, Nigeria. He is President of the Association of Industrial Security and Safety Operators of Nigeria; Africa Representative of the International Foundation for Protection Officers; and former Regional Vice-President (West and Central Africa) of ASIS International. Ekhomu is author of Kidnap: Face to Face with Death (2014) and Effective Personal & Corporate Security (2009). |
You may like...
Bioinspired Computation in Combinatorial…
Frank Neumann, Carsten Witt
Hardcover
R1,426
Discovery Miles 14 260
Handbook of Research on Modeling…
Sujata Dash, B. K. Tripathy, …
Hardcover
R6,518
Discovery Miles 65 180
Applied Artificial Intelligence - A…
Swati V. Shinde, Varsha Bendre, …
Hardcover
R3,369
Discovery Miles 33 690
Glowworm Swarm Optimization - Theory…
Krishnanand N. Kaipa, Debasish Ghose
Hardcover
Genetic Programming Theory and Practice…
Rick Riolo, Trent McConaghy, …
Hardcover
R2,797
Discovery Miles 27 970
Genetic Programming Theory and Practice…
Rick Riolo, Una-May O'Reilly, …
Hardcover
R2,781
Discovery Miles 27 810
|