![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
It is widely acknowledged that the size of the security industry has increased in virtually every country around the world, often eclipsing conventional police forces in personnel numbers and expenditures. Security providers differ from law enforcement officers in many ways, yet the nature of their crime reduction activities brings them into frequent contact with citizens, drawing to the forefront issues of training, professionalism and accountability. Unlike police officers, whose training and licensing standards are well established, regulations for security providers are often minimalist or entirely absent. This volume brings together research on regulatory regimes and strategies from around the globe, covering both the large private security sector and the expanding area of public sector 'non-police' protective security. It examines the nature and extent of licensing and monitoring, and the minimum standards imposed on the industry by governments across the world. The chapters in this book were originally published in the International Journal of Comparative and Applied Criminal Justice.
The need for security sector transformation (SST) is prominent in the work of scholars, policy makers, and practitioners who focus on the security sector and its governance in Africa. At the heart of this approach is the requirement for comprehensive change to the structure and management of security on the African continent. In this volume, the contributors clarify the relationship between security sector transformation and security sector reform, and provide insight on the challenges and opportunities for an operational security sector transformation agenda in Africa.
This collection of articles discusses the challenges confronting journalists when reporting on the safety, security, and justice needs of society, and the related issues of public interest regarding state efforts to serve and manage those needs. The articles reflect on the experiences of journalists who have worked in a variety of conflict-affected or transitional environments around the world. Their insights highlight the critical roles played by journalists when informing and educating citizens, holding governments and those in power accountable, and helping to rebuild communities shattered by conflict.
New digital technologies and wireless services have altered the character of electronic surveillance. This book deals with some of the laws and technologies that are being utilised to cope with the rapid advances in digital technologies as it relates to crime and homeland security.
Data Borders investigates entrenched and emerging borderland technology that ensnares all people in an intimate web of surveillance where data resides and defines citizenship. Detailing the new trend of biologically mapping undocumented people through biotechnologies, Melissa Villa-Nicholas shows how surreptitious monitoring of Latinx immigrants is the focus of and driving force behind Silicon Valley's growing industry within defense technology manufacturing. Villa-Nicholas reveals a murky network that gathers data on marginalized communities for purposes of exploitation and control that implicates law enforcement, border patrol, and ICE, but that also pulls in public workers and the general public, often without their knowledge or consent. Enriched by interviews of Latinx immigrants living in the borderlands who describe their daily use of technology and their caution around surveillance, this book argues that in order to move beyond a heavily surveilled state that dehumanizes both immigrants and citizens, we must first understand how our data is being collected, aggregated, correlated, and weaponized with artificial intelligence and then push for immigrant and citizen information privacy rights along the border and throughout the United States.
The U.S. Department of Homeland Security (DHS) became the nation's 15th Cabinet department in January 2003. Twenty-two agencies with different missions, operations and cultures were consolidated and realigned into one organisation with its primary mission being that of prevention, preparation for and response to catastrophes affecting our homeland, while facilitating legitimate travel and trade (Appendix C). DHS now employs over 208,000 individuals who are located in every state and many foreign countries making it the third largest cabinet agency.
Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues—blockchain, cybersecurity, AI, and more—each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas—and prepare you and your company for the future.
Defence is the ultimate public good, and it thus falls to government to determine the appropriate amount of public revenue to commit to the defence of the realm. This will depend on history, strategic threat, international security obligations, entreaties from allies and, of course, the threat faced. The Political Economy of Defence is structured to identify, explain and analyse the policy, process and problems that government faces from the starting point of national security through to the ultimate objective of securing a peaceful world. Accordingly, it provides insights into how defence budgets are determined and managed, offering relevant and refreshingly practical policy perspectives on defence finance, defence and development trade-offs, sovereignty vs globalisation debates, and many other pertinent issues. It will appeal to policymakers, analysts, graduate students and academics interested in defence economics, political economy, public economics and public policy.
"It will be very important, building on the goodwill which the Turkish military possess in society, to develop an informed security community consisting of members of parliament, academicians, journalists underpinning of security policy. I trust that this reference book will provide them with most useful support"-Dr. W. F. van Eekelen, former minister of defence, the Netherlands.
One of the most serious crises since the end of the Cold War began with Russia's seizure and annexation of Crimea in March 2014 and subsequent 'secret' war in Eastern Ukraine. As more territory was taken from Eastern Ukraine, Western countries countered with economic sanctions directed against Russia. While the conflict did not escalate to the levels originally feared, over time, it became apparent that President Putin had failed to affect the regime change intended in Ukraine, and Russia's economy had been damaged. In Ukraine and the Art of Strategy, Sir Lawrence Freedman provides an account of the origins and course of the Russia-Ukraine conflict through the lens of the theory and practice of strategy. That is, he explores Putin's near, medium, and long-term strategies when he decided to initiate the conflict. How successful has he been? In contrast to many who see Putin as a master operator who has resuscitated a supine Russia against all odds, Freedman is less impressed with his strategic acumen in terms of the long-term fallout. By exploring concepts such as coercive diplomacy, limited war, escalation and information operations, Freedman brings the story up to the present, where a low-level conflict between Ukrainian and breakaway rebel forces in the east grinds on, and illuminates the external challenges faced by the governments' involved. Freedman's application of his unique strategic perspective to this supremely important conflict has the potential to reshape our understanding of it, and his analysis of the likely outcomes will force readers to reconsider the idea that Vladimir Putin is unmatched as a strategic mastermind.
When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.
From the rising significance of non-state actors to the increasing influence of regional powers, the nature and conduct of international politics has arguably changed dramatically since the height of the Cold War. Yet much of the literature on deterrence and compellence continues to draw (whether implicitly or explicitly) upon assumptions and precepts formulated in-and predicated upon-politics in a state-centric, bipolar world. Coercion moves beyond these somewhat hidebound premises and examines the critical issue of coercion in the 21st century, with a particular focus on new actors, strategies and objectives in this very old bargaining game. The chapters in this volume examine intra-state, inter-state, and transnational coercion and deterrence as well as both military and non-military instruments of persuasion, thus expanding our understanding of coercion for conflict in the 21st century. ? Scholars have analyzed the causes, dynamics, and effects of coercion for decades, but previous works have principally focused on a single state employing conventional military means to pressure another state to alter its behavior. In contrast, this volume captures fresh developments, both theoretical and policy relevant. This chapters in this volume focus on tools (terrorism, sanctions, drones, cyber warfare, intelligence, and forced migration), actors (insurgents, social movements, and NGOs) and mechanisms (trilateral coercion, diplomatic and economic isolation, foreign-imposed regime change, coercion of nuclear proliferators, and two-level games) that have become more prominent in recent years, but which have yet to be extensively or systematically addressed in either academic or policy literatures.
A critical look at how the US military is weaponizing technology and data for new kinds of warfare-and why we must resist. War Virtually is the story of how scientists, programmers, and engineers are racing to develop data-driven technologies for fighting virtual wars, both at home and abroad. In this landmark book, Roberto J. Gonzalez gives us a lucid and gripping account of what lies behind the autonomous weapons, robotic systems, predictive modeling software, advanced surveillance programs, and psyops techniques that are transforming the nature of military conflict. Gonzalez, a cultural anthropologist, takes a critical approach to the techno-utopian view of these advancements and their dubious promise of a less deadly and more efficient warfare. With clear, accessible prose, this book exposes the high-tech underpinnings of contemporary military operations-and the cultural assumptions they're built on. Chapters cover automated battlefield robotics; social scientists' involvement in experimental defense research; the blurred line between political consulting and propaganda in the internet era; and the military's use of big data to craft new counterinsurgency methods based on predicting conflict. Gonzalez also lays bare the processes by which the Pentagon and US intelligence agencies have quietly joined forces with Big Tech, raising an alarming prospect: that someday Google, Amazon, and other Silicon Valley firms might merge with some of the world's biggest defense contractors. War Virtually takes an unflinching look at an algorithmic future-where new military technologies threaten democratic governance and human survival.
Since Pakistan was founded in 1947, its army has dominated the state. The military establishment has locked the country in an enduring rivalry with India, with the primary aim of wresting Kashmir from it. To that end, Pakistan initiated three wars over Kashmir-in 1947, 1965, and 1999-and failed to win any of them. Today, the army continues to prosecute this dangerous policy by employing non-state actors under the security of its ever-expanding nuclear umbrella. It has sustained a proxy war in Kashmir since 1989 using Islamist militants, as well as supporting non-Islamist insurgencies throughout India and a country-wide Islamist terror campaign that have brought the two countries to the brink of war on several occasions. In addition to these territorial revisionist goals, the Pakistani army has committed itself to resisting India's slow but inevitable rise on the global stage. Despite Pakistan's efforts to coerce India, it has achieved only modest successes at best. Even though India vivisected Pakistan in 1971, Pakistan continues to see itself as India's equal and demands the world do the same. The dangerous methods that the army uses to enforce this self-perception have brought international opprobrium upon Pakistan and its army. And in recent years, their erstwhile proxies have turned their guns on the Pakistani state itself. Why does the army persist in pursuing these revisionist policies that have come to imperil the very viability of the state itself, from which the army feeds? In Fighting to the End, C. Christine Fair argues that the answer lies, at least partially, in the strategic culture of the army. Through an unprecedented analysis of decades' worth of the army's own defense publications, she concludes that from the army's distorted view of history, it is victorious as long as it can resist India's purported drive for regional hegemony as well as the territorial status quo. Simply put, acquiescence means defeat. Fighting to the End convincingly shows that because the army is unlikely to abandon these preferences, Pakistan will remain a destabilizing force in world politics for the foreseeable future.
Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues—blockchain, cybersecurity, AI, and more—each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas—and prepare you and your company for the future.
Between 1994-2014, Israel's security service was transformed, becoming one of the most extreme examples of privatised security in the world. This book is an investigation into this period and the conditions that created 'Occupation Inc.': the institution of a private military-security-industrial complex. State sponsored violence is increasing as a result of this securitisation, but why is it necessary, and what are its implications? In this book, Shir Hever considers the impact of the ongoing Palestinian resistance to Israeli occupation, the influence of U.S. military aid and the rise of neoliberalism in Israel, to make sense of this dramatic change in security policy. Through the lens of political economy, this book shows how the Israeli security elites turn violence into a commodity in order to preserve their status and wealth, providing a fresh new perspective on the Israeli occupation.
Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative new technology that promises a paralyzing first-strike advantage difficult for opponents to deter. Yet, what is cyber strategy? How do actors use cyber capabilities to achieve a position of advantage against rival states? This book examines the emerging art of cyber strategy and its integration as part of a larger approach to coercion by states in the international system between 2000 and 2014. To this end, the book establishes a theoretical framework in the coercion literature for evaluating the efficacy of cyber operations. Cyber coercion represents the use of manipulation, denial, and punishment strategies in the digital frontier to achieve some strategic end. As a contemporary form of covert action and political warfare, cyber operations rarely produce concessions and tend to achieve only limited, signaling objectives. When cyber operations do produce concessions between rival states, they tend to be part of a larger integrated coercive strategy that combines network intrusions with other traditional forms of statecraft such as military threats, economic sanctions, and diplomacy. The books finds that cyber operations rarely produce concessions in isolation. They are additive instruments that complement traditional statecraft and coercive diplomacy. The book combines an analysis of cyber exchanges between rival states and broader event data on political, military, and economic interactions with case studies on the leading cyber powers: Russia, China, and the United States. The authors investigate cyber strategies in their integrated and isolated contexts, demonstrating that they are useful for maximizing informational asymmetries and disruptions, and thus are important, but limited coercive tools. This empirical foundation allows the authors to explore how leading actors employ cyber strategy and the implications for international relations in the 21st century. While most military plans involving cyber attributes remain highly classified, the authors piece together strategies based on observations of attacks over time and through the policy discussion in unclassified space. The result will be the first broad evaluation of the efficacy of various strategic options in a digital world.
The end of the Cold War and subsequent dissolution of the Soviet Union resulted in a new unipolar international system that presented fresh challenges to international relations theory. Since the Enlightenment, scholars have speculated that patterns of cooperation and conflict might be systematically related to the manner in which power is distributed among states. Most of what we know about this relationship, however, is based on European experiences between the seventeenth and twentieth centuries, when five or more powerful states dominated international relations, and the latter twentieth century, when two superpowers did so. Building on a highly successful special issue of the leading journal World Politics, this book seeks to determine whether what we think we know about power and patterns of state behaviour applies to the current 'unipolar' setting and, if not, how core theoretical propositions about interstate interactions need to be revised.
Strategic Security Management, Second Edition provides security leadership and decision-makers with a fresh perspective on threat, vulnerability, and risk assessment. The book offers a framework to look at applying security analysis and theory into practice for effective security program, implementation, management and evaluation. Chapters examine metric-based security resource allocation of countermeasures, including security procedures, utilization of personnel, and electronic measures. The new edition is fully updated to reflect the latest industry best-practices and includes contributions from security industry leaders-based on their years of professional experience-including Norman Bates, Robert Emery, Jack Follis, Steve Kaufer, Andrew Rubin, Michael Silva, and Ken Wheatley. Strategic Security Management, Second Edition will be a welcome addition to the security literature for all security professionals, security managers, and criminal justice students interested in understanding foundational security principles and their application.
For fans of Darkest Hour and Dunkirk, discover the story of Walter H. Thompson, the man who saved Winston Churchill's life more than once. Walter H. Thompson was Churchill's bodyguard from 1921 until 1945, brought back from retirement at the outbreak of war. Tom Hickman's authorised biography draws heavily on extracts from a manuscript recently discovered by his great-niece, in which Thompson gives a unique insider's account of a number of occasions on which Churchill's life was put seriously at risk and his intervention was needed. After the war, Thompson married one of Churchill's secretaries, and her recollections, as well as those of surviving family members, are interwoven to tell the revelatory inside story of life beside the Greatest Briton.
In 1960, President Kennedy warned of a dangerous future, rife with nuclear-armed states and a widespread penchant for conflict by the end of the century. Thankfully, his prediction failed to pass; in fact, roughly three times as many countries have since opted to give up their nuclear pursuit or relinquish existing weapons than have maintained their arsenals. Nevertheless, clandestine acquisition of nuclear materials and technology by states such as Iraq, Syria, and Iran, and a nuclear North Korea, has reaffirmed the need for United States' commitment to pursuing aggressive counterproliferation strategies, particularly with rogue states. This book looks at the experiences of countries that ventured down the path of nuclear proliferation but were stopped short, and examines how the international community bargains with proliferators to encourage nuclear reversal. It asks why so many states have relented to pressure to abandon their nuclear weapons programs, and which counterproliferation policies have been successful. Rupal N. Mehta argues that the international community can persuade countries to reverse their weapons programs with rewards and sanctions especially when the threat to use military force remains "on the table". Specifically, nuclear reversal is most likely when states are threatened with sanctions and offered face-saving rewards that help them withstand domestic political opposition. Historically, the United States has relied on a variety of policy levers-including economic and civilian nuclear assistance and, sometimes, security guarantees, as well as economic sanctions-to achieve nuclear reversal. Underlying these negotiations is the possibility of military intervention, which incentivizes states to accept the agreement (often spearheaded by the United States) and end their nuclear pursuit. The book draws on interviews with current and former policymakers, as well as in-depth case studies of India, Iran, and North Korea, to provide policy recommendations on how best to manage nuclear proliferation challenges from rogue states. It also outlines the proliferation horizon, or the set of state and non-state actors that are likely to have interest in acquiring nuclear technology for civilian, military, or unknown purposes. The book concludes with implications and recommendations for U.S. and global nuclear counterproliferation policy. |
![]() ![]() You may like...
Dying for an iPhone - Apple, Foxconn and…
Jenny Chan, Mark Selden, …
Hardcover
R2,747
Discovery Miles 27 470
|