0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (39)
  • R500+ (395)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

We Have Been Harmonized - Life in China's Surveillance State (Paperback): Kai Strittmatter We Have Been Harmonized - Life in China's Surveillance State (Paperback)
Kai Strittmatter
R464 R403 Discovery Miles 4 030 Save R61 (13%) Ships in 18 - 22 working days
Security Surveillance Centers - Design, Implementation, and Operation (Hardcover): Anthony V. DiSalvatore Security Surveillance Centers - Design, Implementation, and Operation (Hardcover)
Anthony V. DiSalvatore
R4,470 Discovery Miles 44 700 Ships in 12 - 19 working days

Unlike current books on the market that focus primarily on the technical aspects of surveillance and protection, Security Surveillance Centers: Design, Implementation, and Operation focuses on the operation of a security surveillance center. This text explains in detail the role of security surveillance, as well as the critical aspects of the design, implementation, and operation of security surveillance centers of all sizes. Step-by-step coverage of policy and procedures, as well as the inclusion of industry-specific operational forms, guarantee a practical, user-friendly text for all levels of readers. Intended for any individuals or organizations currently employing security surveillance systems, this book is an asset for all users, from trainees to supervisors, seeking to create a more secure environment for themselves and for others.

Arctic Assessments - U.S. Plans for Future Presence (Hardcover): Jason M. Wilson, Santiago M Rodriguez Arctic Assessments - U.S. Plans for Future Presence (Hardcover)
Jason M. Wilson, Santiago M Rodriguez
R2,848 Discovery Miles 28 480 Ships in 12 - 19 working days

The gradual retreat of polar sea ice in the Arctic region, combined with an expected increase in human activity - shipping traffic, oil and gas exploration, and tourism - could eventually increase the need for a U.S. military and homeland security presence in the Arctic. In recognition of increasing strategic interest in the Arctic, the United States has developed national level policies that guide the actions of the Department of Defense (DOD), the U.S. Coast Guard, and other stakeholders in the region. This book provides an overview of the policies that indicate that the United States has an enduring interest in working collaboratively with other nations to address the emerging challenges arising from the impacts of climate change and globalization in the Arctic. Also discussed, are Arctic national security needs including protecting the environment, managing resources, and supporting scientific research.

Shareveillance - The Dangers of Openly Sharing and Covertly Collecting Data (Paperback): Clare Birchall Shareveillance - The Dangers of Openly Sharing and Covertly Collecting Data (Paperback)
Clare Birchall
R285 Discovery Miles 2 850 Ships in 12 - 19 working days

Cracking open the politics of transparency and secrecy In an era of open data and ubiquitous dataveillance, what does it mean to "share"? This book argues that we are all "shareveillant" subjects, called upon to be transparent and render data open at the same time as the security state invests in practices to keep data closed. Drawing on Jacques Ranciere's "distribution of the sensible," Clare Birchall reimagines sharing in terms of a collective political relationality beyond the veillant expectations of the state.

Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Hardcover, New): John Mueller,... Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Hardcover, New)
John Mueller, Mark Stewart
R4,369 R3,351 Discovery Miles 33 510 Save R1,018 (23%) Ships in 12 - 19 working days

In seeking to evaluate the efficacy of post-9/11 homeland security expenses--which have risen by more than a trillion dollars, not including war costs--the common query has been, "Are we safer?" This, however, is the wrong question. Of course we are "safer"--the posting of a single security guard at one building's entrance enhances safety. The correct question is, "Are any gains in security worth the funds expended?"
In this engaging, readable book, John Mueller and Mark Stewart apply risk and cost-benefit evaluation techniques to answer this very question. This analytical approach has been used throughout the world for decades by regulators, academics, and businesses--but, as a recent National Academy of Science study suggests, it has never been capably applied by the people administering homeland security funds. Given the limited risk terrorism presents, expenses meant to lower it have for the most part simply not been worth it. For example, to be considered cost-effective, increased American homeland security expenditures would have had each year to have foiled up to 1,667 attacks roughly like the one intended on Times Square in 2010--more than four a day. Cataloging the mistakes that the US has made--and continues to make--in managing homeland security programs, Terror, Security, andMoney has the potential to redirect our efforts toward a more productive and far more cost-effective course.

Weak Links - Fragile States, Global Threats, and International Security (Hardcover): Stewart Patrick Weak Links - Fragile States, Global Threats, and International Security (Hardcover)
Stewart Patrick
R2,197 Discovery Miles 21 970 Ships in 12 - 19 working days

Conventional wisdom holds that weak and failing states are the source of the world's most pressing security threats. After all, the 9/11 attacks originated in an impoverished, war-ravaged country, and transnational crime appears to flourish in weakly governed states. However, our assumptions about the threats posed by failing states are based on anecdotal arguments, not on a systematic analysis of the connections between state failure and transnational security threats. Analyzing terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity, Stewart Patrick shows that while some global threats do emerge in fragile states, most of their weaknesses create misery only for their own citizenry. Moreover, many threats originate farther up the chain, in wealthier and more stable countries like Russia and Venezuela. Weak Links will force policymakers to rethink what they assume about state failure and transnational insecurity.

Rebuilding the Security Sector in Post-Conflict Societies - Perceptions from Urban Liberia and Sierra Leone (Paperback): Judy... Rebuilding the Security Sector in Post-Conflict Societies - Perceptions from Urban Liberia and Sierra Leone (Paperback)
Judy Smith-Hohn
R917 Discovery Miles 9 170 Ships in 12 - 19 working days

In Liberia and Sierra Leone, strategies to reform and reconstruct the security sector are focused on re-establishing the state's monopoly of force. However, little attention is given to the array of non-state actors that often play a major role in how individuals and communities experience security. This volume addresses this gap by applying a human security approach to security provision across these two contexts.

Local Ownership and Security Sector Reform (Paperback, Aufl ed.): Timothy Donais Local Ownership and Security Sector Reform (Paperback, Aufl ed.)
Timothy Donais
R921 Discovery Miles 9 210 Ships in 12 - 19 working days

The notion of "local ownership" has emerged in recent years as part of the contemporary common sense of security sector reform (SSR). While the argument that externally driven reform processes are unsustainable is now widely accepted, the principle of local ownership has proven difficult to both define and operate. With contributions by leading practitioners, "Local Ownership and Security Sector Reform" subjects the broader issue of local ownership to critical scrutiny, furthers the debate on what local ownership is and why it matters, and explores how ownership issues have played out in the context of specific SSR case studies.

Transforming Security - A New Balance-of-Power Doctrine (Paperback, 1st ed. 2022): Ursula Werther-Pietsch Transforming Security - A New Balance-of-Power Doctrine (Paperback, 1st ed. 2022)
Ursula Werther-Pietsch
R3,093 Discovery Miles 30 930 Ships in 10 - 15 working days

This book analyses the collective security system as it now stands, focusing on strategic and normative frameworks. The old system of international collective security is based on assumptions that are inadequate in relation to current challenges. Against the backdrop of changed geopolitical constellations, democracies under siege and the challenges posed by new types of warfare, critical analysts hold that not a single multilateral institution today is fully up to the task it was created for. The UN, from its founding to the Sustained Peace Approach, represents a fascinating global process of vision-building and adaptation to reality. Based on this understanding, the dynamics of the UN peace and security architecture are examined along with major agendas, from peacebuilding to development. In turn, reform proposals in the post-COVID-19 era are discussed. The book examines whether a regionalization of security structures within the UN framework may offer a way out of global fragility and growing instability factors, a question of utmost importance for conflict prevention and crisis management in the next few decades. In turn, the author discusses a normative positioning of a new intervention logic as the lowest common denominator between collaborative regional orders. Reinvented multilateralism will return as a "must." Given its scope, the book will appeal to students and scholars of international relations and international security studies, as well as to policymakers in governments and international organizations.

Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover): Douglas J Landoll Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover)
Douglas J Landoll
R4,025 Discovery Miles 40 250 Ships in 12 - 19 working days

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

Technology Development for Security Practitioners (Paperback, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Paperback, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R2,194 Discovery Miles 21 940 Ships in 10 - 15 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

The Morality of Security - A Theory of Just Securitization (Paperback): Rita Floyd The Morality of Security - A Theory of Just Securitization (Paperback)
Rita Floyd
R1,027 Discovery Miles 10 270 Ships in 12 - 19 working days

When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.

General Aviation Security - Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports (Hardcover): Ph.D, Daniel J.... General Aviation Security - Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports (Hardcover)
Ph.D, Daniel J. Benny
R4,496 Discovery Miles 44 960 Ships in 12 - 19 working days

After 9/11, the initial focus from the U.S. government, media, and the public was on security at commercial airports and aboard commercial airlines. Soon, investigation revealed the hijackers had trained at flight schools operating out of general aviation airports, leading to a huge outcry by the media and within the government to mandate security regulations for this flight sector. General Aviation Security: Aircraft, Hangars, Fixed-Base Operations, Flight Schools, and Airports examines the threats against general aviation (GA) and presents resources for security professionals and GA airport owners and operators to develop an impenetrable airport and aircraft security plan. Following an overview of general aviation and its inherent security threats, the book explores: Physical security for the aviation environment, including intrusion detection systems, cameras, locks, lighting, and window security The security force, including recruitment and training Security of general aviation aircraft and airports, including runway security and fuel storage Airport safety regulations such as the Workers Protection Act and the Bloodborne Pathogens Act Emergency response to a range of scenarios, including medical emergencies, fires, gas leaks, and bomb threats The security of hangars, fixed-base operations, and flight schools Corporate aviation security departments The book concludes with a study involving the Aircraft Owners and Pilots Association (AOPA) Airport Watch Program and the Transportation Security Administration (TSA) security requirements and recommendations for general aviation. General aviation supports public safety, business, agriculture, commercial airports, aeronautical education, and many aspects of the aviation industry. The book is the first to explore the unique security concerns relevant to general aviation operations. Dr. Daniel J. Benny was interviewed on video by General Aviation Security Magazine about his article concerning the effects of the Airport Watch Program.

EU-US Cooperation on Internal Security - Building a Transatlantic Regime (Hardcover): Dimitrios Anagnostakis EU-US Cooperation on Internal Security - Building a Transatlantic Regime (Hardcover)
Dimitrios Anagnostakis
R4,772 Discovery Miles 47 720 Ships in 12 - 19 working days

This book analyses the cooperation between the European Union and the United States on internal security and counter-terrorism since the 9/11 terrorist attacks. In particular, four areas of cooperation are examined: customs and supply chain security; judicial cooperation (the mutual legal assistance and extradition agreements); law enforcement cooperation (the Europol-US agreements); and the EU-US agreements for the sharing of air passengers' data (PNR agreements). These cases are analysed through a conceptual framework based on the theories of international regimes, with the data being drawn from an extensive documentary analysis of media sources collected through the 'Nexis' database, official documents, and from 13 semi-structured elite interviews with US and EU officials. The book argues that the EU and the US have established a transatlantic internal security regime based on shared principles, norms, rules, and interests. While at the beginning of this process the EU had a more reactive and passive stance at the later stages both the EU and the US were active in shaping the transatlantic political agenda and negotiations. The book demonstrates how the EU has had a much more proactive role in its relations with the US than has often been assumed in the current literature. This book will be of much interest to students of EU policy, foreign policy, international security and IR in general.

Public, Private, Secret - On Photography & the Configuration of Self (Paperback): Charlotte Cotton Public, Private, Secret - On Photography & the Configuration of Self (Paperback)
Charlotte Cotton; Marina Chao, Pauline Vermare
R771 R687 Discovery Miles 6 870 Save R84 (11%) Ships in 10 - 15 working days

Public, Private, Secret explores the roles that photography and video play in the crafting of identity, and the reconfiguration of social conventions that define our public and private selves. Consciously framed by our present era, this collection of essays, interviews, and reflections assesses how our image-making and consumption patterns are embedded and implicated in a wider matrix of online behavior and social codes, which in turn give images a life of their own. Within this context, our visual creations and online activities blur and remove conventional delineations between public and private (and sometimes secret) expression; in fact, they multiply and expand the number of potential selves in the contemporary image-centric world. The writings address the various disruptions, resistances, and subversions that artists propose to the limited versions of race, gender, sexuality, and autonomy that populate mainstream popular culture. In so doing, they anticipate a future for our image-world rich with diversity and alterity, one that can be shaped and influenced by the agency of self- representation.

The Political Economy of Defence (Hardcover): Ron Matthews The Political Economy of Defence (Hardcover)
Ron Matthews
R3,136 Discovery Miles 31 360 Ships in 12 - 19 working days

Defence is the ultimate public good, and it thus falls to government to determine the appropriate amount of public revenue to commit to the defence of the realm. This will depend on history, strategic threat, international security obligations, entreaties from allies and, of course, the threat faced. The Political Economy of Defence is structured to identify, explain and analyse the policy, process and problems that government faces from the starting point of national security through to the ultimate objective of securing a peaceful world. Accordingly, it provides insights into how defence budgets are determined and managed, offering relevant and refreshingly practical policy perspectives on defence finance, defence and development trade-offs, sovereignty vs globalisation debates, and many other pertinent issues. It will appeal to policymakers, analysts, graduate students and academics interested in defence economics, political economy, public economics and public policy.

Intelligence Analysis Fundamentals (Hardcover): Patrick McGlynn, Godfrey Garner Intelligence Analysis Fundamentals (Hardcover)
Patrick McGlynn, Godfrey Garner
R3,730 Discovery Miles 37 300 Ships in 12 - 19 working days

There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as 'target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.

Casino Security and Gaming Surveillance (Hardcover): Derk J. Boss, Alan W. Zajic Casino Security and Gaming Surveillance (Hardcover)
Derk J. Boss, Alan W. Zajic
R4,493 Discovery Miles 44 930 Ships in 12 - 19 working days

Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.

Drawing on the authors? six decades of combined experience in the industry, Casino Security and Gaming Surveillance identifies the most common threats to casino security and provides specific solutions for addressing these threats. From physical security and security management to table and gaming surveillance, it details numerous best practice techniques, strategies, and tactics, in addition to the metrics required to effectively monitor operations.

The authors highlight valuable investigation tools, including interview techniques and evidence gathering. They also cover IOU patrol, tri-shot coverage, surveillance audits, threat analysis, card counting, game protection techniques, players? club theft and fraud, surveillance standard operating procedures, nightclub and bar security, as well as surveillance training.

Complete with a glossary of gaming terms and a resource-rich appendix that includes helpful forms, this book covers everything surveillance and security professionals need to know to avoid high-profile incidents, costly compliance violations and damage to property and revenue.

It's professionals like Al and Derk who personify the professionalism that is crucial when establishing and operating modern casino security and surveillance departments. This book will quickly become the Bible for any security and surveillance officer.
?Roger Gros, Publisher, Global Gaming Business Magazine

The Age of Surveillance Capitalism - The Fight for a Human Future at the New Frontier of Power (Paperback): Shoshana Zuboff The Age of Surveillance Capitalism - The Fight for a Human Future at the New Frontier of Power (Paperback)
Shoshana Zuboff
R685 R596 Discovery Miles 5 960 Save R89 (13%) Ships in 18 - 22 working days

The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.

The Terror Factory: The Isis Edition (Paperback): Trevor Aaronson The Terror Factory: The Isis Edition (Paperback)
Trevor Aaronson
R512 R463 Discovery Miles 4 630 Save R49 (10%) Ships in 9 - 17 working days
Coercion - The Power to Hurt in International Politics (Paperback): Kelly M. Greenhill, Peter Krause Coercion - The Power to Hurt in International Politics (Paperback)
Kelly M. Greenhill, Peter Krause
R1,917 Discovery Miles 19 170 Ships in 12 - 19 working days

From the rising significance of non-state actors to the increasing influence of regional powers, the nature and conduct of international politics has arguably changed dramatically since the height of the Cold War. Yet much of the literature on deterrence and compellence continues to draw (whether implicitly or explicitly) upon assumptions and precepts formulated in-and predicated upon-politics in a state-centric, bipolar world. Coercion moves beyond these somewhat hidebound premises and examines the critical issue of coercion in the 21st century, with a particular focus on new actors, strategies and objectives in this very old bargaining game. The chapters in this volume examine intra-state, inter-state, and transnational coercion and deterrence as well as both military and non-military instruments of persuasion, thus expanding our understanding of coercion for conflict in the 21st century. ? Scholars have analyzed the causes, dynamics, and effects of coercion for decades, but previous works have principally focused on a single state employing conventional military means to pressure another state to alter its behavior. In contrast, this volume captures fresh developments, both theoretical and policy relevant. This chapters in this volume focus on tools (terrorism, sanctions, drones, cyber warfare, intelligence, and forced migration), actors (insurgents, social movements, and NGOs) and mechanisms (trilateral coercion, diplomatic and economic isolation, foreign-imposed regime change, coercion of nuclear proliferators, and two-level games) that have become more prominent in recent years, but which have yet to be extensively or systematically addressed in either academic or policy literatures.

Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R359 R339 Discovery Miles 3 390 Save R20 (6%) Ships in 10 - 15 working days
Gender and Private Security in Global Politics (Paperback): Maya Eichler Gender and Private Security in Global Politics (Paperback)
Maya Eichler
R1,071 Discovery Miles 10 710 Ships in 12 - 19 working days

For two hundred years the provision of military security has been a central and defining function of the modern nation-state. The increasing reliance on private military and security companies in contemporary conflict marks a fundamental transformation in the organization of military violence, and it raises issues of accountability and ethics that are of particular concern to feminists. This privatization of force not only enables states to circumvent citizens' democratic control over questions of war and peace, but also undermines women's and minority groups' claims for greater inclusion in the military sphere. Gender and Private Security in Global Politics brings together key scholars from the fields of international relations, security studies, and gender studies to argue that privatization of military security is a deeply gendered process. The chapters employ a variety of feminist perspectives, including critical, postcolonial, poststructuralist, and queer feminist perspectives, as well as a wide range of methodological approaches including ethnography, participant-observation, genealogy, and discourse analysis. This is the first book to develop an extended feminist analysis of private militaries and to draw on feminist concerns regarding power, justice and equality to consider how to reform and regulate private forces.

The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives... The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives (Paperback)
Larry Bell
R389 R368 Discovery Miles 3 680 Save R21 (5%) Ships in 10 - 15 working days
Globalization and the National Security State (Paperback): T. V. Paul, Norrin Ripsman Globalization and the National Security State (Paperback)
T. V. Paul, Norrin Ripsman
R1,025 Discovery Miles 10 250 Ships in 12 - 19 working days

In the past two decades, many have posited a correlation between the spread of globalization and the decline of the nation-state. In the realm of national security, advocates of the globalization thesis have argued that states' power has diminished relative to transnational governmental institutions, NGOs, and transnational capitalism. Initially, they pointed to declines in both global military spending (which has risen dramatically in recent years) and interstate war. But are these trends really indicative of the decline of nation-state's role as a guarantor of national security? In Globalization and the National Security State, T.V. Paul and Norrin M. Ripsman test the proposition against the available evidence and find that the globalization school has largely gotten it wrong. The decline in interstate warfare can largely be attributed to the end of the Cold War, not globalization. Moreover, great powers (the US, China, and Russia) continue to pursue traditional nation-state strategies. Regional security arrangements like the EU and ASEAN have not achieved much, and weak states--the ones most impacted by the turmoil generated by globalization--are far more traditional in their approaches to national security, preferring to rely on their own resources rather than those of regional and transnational institutions. This is a bold argument, and Paul and Ripsman amass a considerable amount of evidence for their claims. It cuts against a major movement in international relations scholarship, and is sure to generate controversy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Supervision and Management…
Ifpo Paperback R1,612 Discovery Miles 16 120
Tell Me Everything - The Story of a…
Erika Krouse Paperback R481 Discovery Miles 4 810
Biometrics - Concepts, Methodologies…
Information Reso Management Association Hardcover R10,238 Discovery Miles 102 380
Machine See, Machine Do - How Technology…
Patrick K Lin Hardcover R741 R657 Discovery Miles 6 570
Risk Management for Security…
Carl Roper Hardcover R2,832 R1,962 Discovery Miles 19 620
Silent Weapons for Quiet Wars - An…
Anonymous Hardcover R643 R575 Discovery Miles 5 750
Multllinguallsm, the Judicial Authority…
Kas Deprez, Theo du Plessis, … Paperback R623 Discovery Miles 6 230
The Professional Protection Officer…
Sandi J. Davies, Lawrence Fennelly Paperback R1,456 Discovery Miles 14 560
The Enforcers - Inside Cape Town's…
Caryn Dolley Paperback  (1)
R295 R264 Discovery Miles 2 640
Patriotic Information Systems
Todd Loendorf, G.David Garson Hardcover R2,810 Discovery Miles 28 100

 

Partners