![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
We live in times of increasing inscrutability. Our news feeds are filled with unverified, unverifiable speculation, much of it automatically generated by anonymous software. As a result, we no longer understand what is happening around us. Underlying all of these trends is a single idea: the belief that quantitative data can provide a coherent model of the world, and the efficacy of computable information to provide us with ways of acting within it. Yet the sheer volume of information available to us today reveals less than we hope. Rather, it heralds a new Dark Age: a world of ever-increasing incomprehension. In his brilliant new work, leading artist and writer James Bridle offers us a warning against the future in which the contemporary promise of a new technologically assisted Enlightenment may just deliver its opposite: an age of complex uncertainty, predictive algorithms, surveillance, and the hollowing out of empathy. Surveying the history of art, technology and information systems he reveals the dark clouds that gather over discussions of the digital sublime.
The response of the U.S. federal government to the events of September 11, 2001 has reflected the challenge of striking a balance between implementing security measures to deter terrorist attacks while at the same time limiting disruption to air commerce. Airport and Aviation Security: U.S. Policy and Strategy in the Age of Global Terrorism is a comprehensive reference that examines the persistent threats to aviation security that led up to the terrorist attacks of September 11th, describes subsequent terror plots against aviation assets, and explores U.S. efforts to counter and mitigate these threats. Addressing the homeland security challenges facing the U.S. in the age of terrorism, this text explores: Security protocol prior to 9/11 Precursors to 9/11 The rising threat of Al Qaeda Tactical and congressional response to 9/11, including new legislation The broader context of risk assessment Intelligence gathering Airport security, including passenger, baggage, and employee screening Airline in-flight security measures Airport perimeter security The threat of shoulder-fired missiles Security for GA (general aviation) operations and airports Beginning with a historical backdrop describing the dawn of the age of global terrorism in the 1960s and continuing up until the present time, the book demonstrates the broad social and political context underlying recent changes in the aviation security system as a direct result of the 9/11 attacks. Coverage examines ongoing threats and vulnerabilities to the aviation infrastructure, including an exploration of how past terrorist incidents have come to shape U.S. policy and strategy.
The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
The need for security sector transformation (SST) is prominent in the work of scholars, policy makers, and practitioners who focus on the security sector and its governance in Africa. At the heart of this approach is the requirement for comprehensive change to the structure and management of security on the African continent. In this volume, the contributors clarify the relationship between security sector transformation and security sector reform, and provide insight on the challenges and opportunities for an operational security sector transformation agenda in Africa.
This collection of articles discusses the challenges confronting journalists when reporting on the safety, security, and justice needs of society, and the related issues of public interest regarding state efforts to serve and manage those needs. The articles reflect on the experiences of journalists who have worked in a variety of conflict-affected or transitional environments around the world. Their insights highlight the critical roles played by journalists when informing and educating citizens, holding governments and those in power accountable, and helping to rebuild communities shattered by conflict.
It is widely acknowledged that the size of the security industry has increased in virtually every country around the world, often eclipsing conventional police forces in personnel numbers and expenditures. Security providers differ from law enforcement officers in many ways, yet the nature of their crime reduction activities brings them into frequent contact with citizens, drawing to the forefront issues of training, professionalism and accountability. Unlike police officers, whose training and licensing standards are well established, regulations for security providers are often minimalist or entirely absent. This volume brings together research on regulatory regimes and strategies from around the globe, covering both the large private security sector and the expanding area of public sector 'non-police' protective security. It examines the nature and extent of licensing and monitoring, and the minimum standards imposed on the industry by governments across the world. The chapters in this book were originally published in the International Journal of Comparative and Applied Criminal Justice.
"It will be very important, building on the goodwill which the Turkish military possess in society, to develop an informed security community consisting of members of parliament, academicians, journalists underpinning of security policy. I trust that this reference book will provide them with most useful support"-Dr. W. F. van Eekelen, former minister of defence, the Netherlands.
Defence is the ultimate public good, and it thus falls to government to determine the appropriate amount of public revenue to commit to the defence of the realm. This will depend on history, strategic threat, international security obligations, entreaties from allies and, of course, the threat faced. The Political Economy of Defence is structured to identify, explain and analyse the policy, process and problems that government faces from the starting point of national security through to the ultimate objective of securing a peaceful world. Accordingly, it provides insights into how defence budgets are determined and managed, offering relevant and refreshingly practical policy perspectives on defence finance, defence and development trade-offs, sovereignty vs globalisation debates, and many other pertinent issues. It will appeal to policymakers, analysts, graduate students and academics interested in defence economics, political economy, public economics and public policy.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
Data Borders investigates entrenched and emerging borderland technology that ensnares all people in an intimate web of surveillance where data resides and defines citizenship. Detailing the new trend of biologically mapping undocumented people through biotechnologies, Melissa Villa-Nicholas shows how surreptitious monitoring of Latinx immigrants is the focus of and driving force behind Silicon Valley's growing industry within defense technology manufacturing. Villa-Nicholas reveals a murky network that gathers data on marginalized communities for purposes of exploitation and control that implicates law enforcement, border patrol, and ICE, but that also pulls in public workers and the general public, often without their knowledge or consent. Enriched by interviews of Latinx immigrants living in the borderlands who describe their daily use of technology and their caution around surveillance, this book argues that in order to move beyond a heavily surveilled state that dehumanizes both immigrants and citizens, we must first understand how our data is being collected, aggregated, correlated, and weaponized with artificial intelligence and then push for immigrant and citizen information privacy rights along the border and throughout the United States.
One of the most serious crises since the end of the Cold War began with Russia's seizure and annexation of Crimea in March 2014 and subsequent 'secret' war in Eastern Ukraine. As more territory was taken from Eastern Ukraine, Western countries countered with economic sanctions directed against Russia. While the conflict did not escalate to the levels originally feared, over time, it became apparent that President Putin had failed to affect the regime change intended in Ukraine, and Russia's economy had been damaged. In Ukraine and the Art of Strategy, Sir Lawrence Freedman provides an account of the origins and course of the Russia-Ukraine conflict through the lens of the theory and practice of strategy. That is, he explores Putin's near, medium, and long-term strategies when he decided to initiate the conflict. How successful has he been? In contrast to many who see Putin as a master operator who has resuscitated a supine Russia against all odds, Freedman is less impressed with his strategic acumen in terms of the long-term fallout. By exploring concepts such as coercive diplomacy, limited war, escalation and information operations, Freedman brings the story up to the present, where a low-level conflict between Ukrainian and breakaway rebel forces in the east grinds on, and illuminates the external challenges faced by the governments' involved. Freedman's application of his unique strategic perspective to this supremely important conflict has the potential to reshape our understanding of it, and his analysis of the likely outcomes will force readers to reconsider the idea that Vladimir Putin is unmatched as a strategic mastermind.
Securitising Russia shows the impact of twenty-first-century security concerns on the way Russia is ruled. It demonstrates how President Putin has wrestled with terrorism, immigration, media freedom, religious pluralism, and economic globalism, and argues that fears of a return to old-style authoritarianism oversimplify the complex context of contemporary Russia. The book focuses on the internal security issues common to many states in the early twenty-first-century, and places them in the particular context of Russia. Detailed analysis of the place of security in Russia's political discourse and policy-making reveals nuances often missing from overarching assessments of Russia today. To characterise the Putin regime as the 'KGB-resurgent' is to miss vital continuities, contexts, and on-going political conflicts which make up the contemporary Russian scene. Securitising Russia draws together current debates about whether Russia is a 'normal' country developing its own democratic and market structures, or a nascent authoritarian regime returning to the past. -- .
Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues—blockchain, cybersecurity, AI, and more—each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas—and prepare you and your company for the future.
We live in an age saturated with surveillance. Our personal and public lives are increasingly on display for governments, merchants, employers, hackers-and the merely curious-to see. In Windows into the Soul, Gary T. Marx, a central figure in the rapidly expanding field of surveillance studies, argues that surveillance itself is neither good nor bad, but that context and comportment make it so. In this landmark book, Marx sums up a lifetime of work on issues of surveillance and social control by disentangling and parsing the empirical richness of watching and being watched. Using fictional narratives as well as the findings of social science, Marx draws on decades of studies of covert policing, computer profiling, location and work monitoring, drug testing, caller identification, and much more, Marx gives us a conceptual language to understand the new realities and his work clearly emphasizes the paradoxes, trade-offs, and confusion enveloping the field. Windows into the Soul shows how surveillance can penetrate our social and personal lives in profound, and sometimes harrowing, ways. Ultimately, Marx argues, recognizing complexity and asking the right questions is essential to bringing light and accountability to the darker, more iniquitous corners of our emerging surveillance society.
For fans of Darkest Hour and Dunkirk, discover the story of Walter H. Thompson, the man who saved Winston Churchill's life more than once. Walter H. Thompson was Churchill's bodyguard from 1921 until 1945, brought back from retirement at the outbreak of war. Tom Hickman's authorised biography draws heavily on extracts from a manuscript recently discovered by his great-niece, in which Thompson gives a unique insider's account of a number of occasions on which Churchill's life was put seriously at risk and his intervention was needed. After the war, Thompson married one of Churchill's secretaries, and her recollections, as well as those of surviving family members, are interwoven to tell the revelatory inside story of life beside the Greatest Briton.
The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.
Across Africa, growing economic inequality, instability and urbanization have led to the rapid spread of private security providers. While these PSPs have already had a significant impact on African societies, their impact has so far received little in the way of comprehensive analysis. Drawing on a wide range of disciplinary approaches, and encompassing anthropology, sociology and political science, Private Security in Africa offers unique insight into the lives and experiences of security providers and those affected by them, as well as into the fragile state context which has allowed them to thrive. Featuring original empirical research and case studies ranging from private policing in South Africa to the recruitment of Sierra Leoneans for private security work in Iraq, the book considers the full implications of PSPs for security and the state, not only for Africa but for the world as a whole.
How has India's foreign policy evolved in the seventy years since Independence? For that matter, what is the country's foreign policy? And what are the aspects that determine and shape it? If you've had questions such as these, Rajendra Abhyankar's Indian Diplomacy is the foreign policy primer you've been looking for. Charting the country's interactions with other countries from the early days of independence to now, Indian Diplomacy reviews the changes in stance. Lucidly written and well argued, the book covers these and other questions comprehensively, without fuss or bombast. A much-needed book in light of the sweeping changes on the global stage-and India's increasing role in them.
Video surveillance, public records, fingerprints, hidden microphones, RFID chips: in contemporary societies the intrusive techniques of surveillance used in daily life have increased dramatically. The "war against terror" has only exacerbated this trend, creating a world that is closer than one might have imagined to that envisaged by George Orwell in 1984.How have we reached this situation? Why have democratic societies accepted that their rights and freedoms should be taken away, a little at a time, by increasingly sophisticated mechanisms of surveillance?From the anthropometry of the 19th Century to the Patriot Act, through an analysis of military theory and the Echelon Project, Armand Mattelart constructs a genealogy of this new power of control and examines its globalising dynamic. This book provides an essential wake-up call at a time when democratic societies are becoming less and less vigilant against the dangers of proliferating systems of surveillance.
In 1960, President Kennedy warned of a dangerous future, rife with nuclear-armed states and a widespread penchant for conflict by the end of the century. Thankfully, his prediction failed to pass; in fact, roughly three times as many countries have since opted to give up their nuclear pursuit or relinquish existing weapons than have maintained their arsenals. Nevertheless, clandestine acquisition of nuclear materials and technology by states such as Iraq, Syria, and Iran, and a nuclear North Korea, has reaffirmed the need for United States' commitment to pursuing aggressive counterproliferation strategies, particularly with rogue states. This book looks at the experiences of countries that ventured down the path of nuclear proliferation but were stopped short, and examines how the international community bargains with proliferators to encourage nuclear reversal. It asks why so many states have relented to pressure to abandon their nuclear weapons programs, and which counterproliferation policies have been successful. Rupal N. Mehta argues that the international community can persuade countries to reverse their weapons programs with rewards and sanctions especially when the threat to use military force remains "on the table". Specifically, nuclear reversal is most likely when states are threatened with sanctions and offered face-saving rewards that help them withstand domestic political opposition. Historically, the United States has relied on a variety of policy levers-including economic and civilian nuclear assistance and, sometimes, security guarantees, as well as economic sanctions-to achieve nuclear reversal. Underlying these negotiations is the possibility of military intervention, which incentivizes states to accept the agreement (often spearheaded by the United States) and end their nuclear pursuit. The book draws on interviews with current and former policymakers, as well as in-depth case studies of India, Iran, and North Korea, to provide policy recommendations on how best to manage nuclear proliferation challenges from rogue states. It also outlines the proliferation horizon, or the set of state and non-state actors that are likely to have interest in acquiring nuclear technology for civilian, military, or unknown purposes. The book concludes with implications and recommendations for U.S. and global nuclear counterproliferation policy.
It's a basic human right to feel and be safe in your community-where you live, work and play. But, few people know or understand everything it takes to make this possible. Safe City details the concerted effort and integration of new technology it takes to make communities safer for everyone. From fire departments detecting fires within seconds with thermal imaging to police departments detecting gunfire immediately through gunshot detection sensors, technology continues to evolve daily. Even surveillance cameras have taken great strides from the grainy images of years past, and just one camera can make a difference (read about how police identified the Boston Marathon bombers through a department store's video camera inside!). Safe City teaches the public how to harden targets and protect their homes, businesses, communities, themselves, and their loved ones. It takes a community effort to help reduce and prevent crime, and Safe City answers the questions people have along with pointing out many more that should be asked.
'Unique and engaging characters woven into the fabric of a fantastic plot. Jason Dean is one to watch' Marc Cameron, New York Times bestselling author of Tom Clancy Code of Honor What is a death sentence to a dead man?He was a man with many names. Moving from country to country, changing his face constantly so as to remain in the shadows, he was nothing more than a ghost. For now, he is known simply as Korso. A covert salvage operative, he recovers lost artefacts and items, often stolen, for rich benefactors unable to operate through normal channels. But his shadowy existence is shattered upon the arrival at his Bermuda home of the man he had hoped never to see again... Tasked with recovering a missing, one-of-a-kind shipment in only four days, his elite skill set will be tested to its limits. Failure will result in his identity being revealed to his former boss, the ruthless Nikolic, who would stop at nothing to eliminate the one man who walked away from his organisation. An exceptional, white-knuckle thriller full of intrigue and suspense, perfect for fans of Rob Sinclair, Mark Dawson and Adam Hamdy. Praise for Tracer 'Tracer, Korso's first outing, is everything you could want in a thriller; fast-pace, suspense, mystery, just the right amount of wickedness, but above all else a protagonist who the reader will want to read more and more of. A real page turner' Rob Sinclair, million copy bestselling author of The Red Cobra 'Meet Korso, a mysterious and unique character you won't be able to get enough of. In a thriller novel I want tension, pace and ample action, and in Tracer, Jason Dean has delivered by the bucketful' Matt Hilton, author of the Joe Hunter thrillers 'A relentless round of fast and furious set pieces, out-pacing Reacher for tension and with non-stop violence and intrigue to satisfy any thriller fans' Adrian Magson, author of The Watchman 'A thrilling, race-against-time ride ... a great start to what I'm sure will be a hugely successful thriller series' A. A. Chaudhuri, author of The Scribe 'The most explosive book I've read in ages' D. L. Marshall, author of Anthrax Island 'A superb, fast-paced thriller which literally ticks like a time-bomb' Nick Oldham, author of the Henry Christie series
This book deals with the evolution, current status and potential of U.S.-India strategic cooperation. From very modest beginnings, the U.S.-India strategic partnership has developed significantly over the last decade. In considerable part, this growth has stemmed from overlapping concerns about the rise and assertiveness of the People's Republic of China, as well as the instability of Pakistan. Despite the emergence of this partnership, significant differences remain, some of which stem from Cold War legacies, others from divergent global strategic interests and institutional design. In spite of these areas of discord, the overall trajectory of the relationship appears promising. Increased cooperation and closer policy coordination underscore a deepening of the relationship, while fundamental differences in national approaches to strategic challenges demand flexibility and compromise in the future. -- . |
![]() ![]() You may like...
Dynamics in Logistics - Proceedings of…
Michael Freitag, Hans-Dietrich Haasis, …
Hardcover
R7,862
Discovery Miles 78 620
Handbook of Methods in Leadership…
Birgit Schyns, Rosalie J. Hall, …
Hardcover
R5,875
Discovery Miles 58 750
Statistical Methods in Social Science…
S. P Mukherjee, Bikas K. Sinha, …
Hardcover
R3,279
Discovery Miles 32 790
Advances in Computer Science and…
James J. Park, Doo-Soon Park, …
Hardcover
R6,013
Discovery Miles 60 130
Tools and Techniques for Economic…
Jelena Stankovi, Pavlos Delias, …
Hardcover
R5,893
Discovery Miles 58 930
Multisensor Fusion Estimation Theory and…
Liping Yan, Lu Jiang, …
Hardcover
R4,323
Discovery Miles 43 230
|