|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
A quick, easy-to-read synthesis of theory, guidelines, and
evidence-based research, this book offers timely, practical
guidance for library and information professionals who must
navigate ethical crises in information privacy and stay on top of
emerging privacy trends. Emerging technologies create new concerns
about information privacy within library and information
organizations, and many information professionals lack guidance on
how to navigate the ethical crises that emerge when information
privacy and library policy clash. What should we do when a patron
leaves something behind? How do we justify filtering internet
access while respecting accessibility and privacy? How do we
balance new technologies that provide anonymity with the library's
need to prevent the illegal use of their facilities? Library
Patrons' Privacy presents clear, conversational, evidence-based
guidance on how to navigate these ethical questions in information
privacy. Ideas from professional organizations, government
entities, scholarly publications, and personal experiences are
synthesized into an approachable guide for librarians at all stages
of their career. This guide, designed by three experienced LIS
scholars and professionals, is a quick and enjoyable read that
students and professionals of all levels of technical knowledge and
skill will find useful and applicable to their libraries. Presents
practical, evidence-based guidance for navigating common ethical
problems in library and information science Introduces library and
information professionals and students to emerging issues in
information privacy Provides students and practitioners with a
foundation of practical problem-solving strategies for handling
information privacy issues in emerging technologies Guides the
design of new information privacy policy in all types of libraries
Encourages engagement with information privacy technologies to
assist in fulfilling the American Library Association's core values
In recent history, planned violent attacks have persisted in the
United States and abroad. Ranging from targeted attacks on private
individuals, public figures, schools, universities, corporations,
and public venues, among others, these attacks have continued to
illustrate the need for improved threat assessment and management
efforts at local and national levels. In the few years since its
publication in 2014, the International Handbook of Threat
Assessment has become the gold standard textbook for the prevention
of targeted violence. With this new edition, editors J. Reid Meloy
and Jens Hoffmann have expanded their landmark text, reflecting the
rise of scholarship and growth within the field of threat
assessment and management. The book spans across disciplines and
explores the foundations of threat assessment, the fields of
practice in which it is utilized, and provides detail on practical
applications from the most notable threat assessors and programs in
North America, Europe, and Australia. Since the first edition, new
chapters focusing on lone actor terrorism, insider threats,
cyberthreats, the use of artificial intelligence, bystander
effects, and enhanced interviewing techniques, offer new guidance
for threat assessment professionals. International Handbook of
Threat Assessment is the comprehensive resource for mental health
practitioners, law enforcement, and professionals working to
prevent targeted violence. This guide will serve as inspiration for
further research and equip those working to intercept harm with the
necessary tools for intervention.
Maritime security is one of the latest additions to the field of
international as well as national security. The concept has
received growing attention especially due to the intensification of
concerns over maritime terrorism since 2000. The rise of modern
piracy, maritime crimes such as human trafficking, and the
increasing importance of the 'blue economy' and issues relating to
freedom of navigation, maritime environmental protection, and
resource management have resulted in the increased significance of
maritime security studies. A significant number of states and other
international actors such as Multinational Corporations (MNCs) and
Transnational Corporations (TNCs) have placed maritime security
high in their security agenda. This priority is reflected in
several governmental and intergovernmental strategies for maritime
security. In addition to that, the regional grouping in the Indian
Ocean and Indo - Pacific, such as ASEAN, BIMSTEC, IORA, and IONS
have placed maritime security issues high in their agenda.
2020 Foreword Indie Award Winner (Gold) in the "Science &
Technology" Category "Chilling, eye-opening, and timely, Cyber
Privacy makes a strong case for the urgent need to reform the laws
and policies that protect our personal data. If your reaction to
that statement is to shrug your shoulders, think again. As April
Falcon Doss expertly explains, data tracking is a real problem that
affects every single one of us on a daily basis." -General Michael
V. Hayden, USAF, Ret., former Director of CIA and NSA and former
Principal Deputy Director of National Intelligence You're being
tracked. Amazon, Google, Facebook, governments. No matter who we
are or where we go, someone is collecting our data: to profile us,
target us, assess us; to predict our behavior and analyze our
attitudes; to influence the things we do and buy-even to impact our
vote. If this makes you uneasy, it should. We live in an era of
unprecedented data aggregation, and it's never been more difficult
to navigate the trade-offs between individual privacy, personal
convenience, national security, and corporate profits. Technology
is evolving quickly, while laws and policies are changing slowly.
You shouldn't have to be a privacy expert to understand what
happens to your data. April Falcon Doss, a privacy expert and
former NSA and Senate lawyer, has seen this imbalance in action.
She wants to empower individuals and see policy catch up. In Cyber
Privacy, Doss demystifies the digital footprints we leave in our
daily lives and reveals how our data is being used-sometimes
against us-by the private sector, the government, and even our
employers and schools. She explains the trends in data science,
technology, and the law that impact our everyday privacy. She
tackles big questions: how data aggregation undermines personal
autonomy, how to measure what privacy is worth, and how society can
benefit from big data while managing its risks and being clear-eyed
about its cost. It's high time to rethink notions of privacy and
what, if anything, limits the power of those who are constantly
watching, listening, and learning about us. This book is for
readers who want answers to three questions: Who has your data? Why
should you care? And most important, what can you do about it?
The Coast Guard, within the Department of Homeland Security (DHS),
is charged with preventing loss of life, injury, and property
damage in the maritime environment through its SAR mission. It
maintains over 200 stations with various assets, such as boats and
helicopters (depending on the station), along U.S. coasts and
inland waterways to carry out this mission, as well as its other
missions such as maritime security. Chapter 1 will review: the
status of the Coast Guard's recapitalisation program; new
technologies that could assist the Coast Guard; maintenance
requirements of its ageing vessels; operating costs for the new
vessels; and shoreside infrastructure needs and priorities. The
Coast Guard's missions in the Arctic include: defense readiness,
ice operations, marine environmental protection, and ports,
waterways and coastal security. Chapter 2 discusses the Coast
Guard's Arctic capabilities. Chapter 3 addresses the extent to
which the Coast Guard has (1) a sound process for analysing the
need for its boat stations and (2) taken actions to implement its
boat station process results.
No external observer knows more about Myanmar's security and
intelligence apparatus than Andrew Selth. In this book he presents
an account of the structure and functions of Myanmar's deep state,
along with a tale of personal ambition, rivalry and ruthless power
politics worthy of John Le Carre. A thoroughly educative,
entertaining and intriguing read."" - Professor Michael Wesley,
Dean, College of Asia and the Pacific, The Australian National
University ""Andrew Selth has once again amply illustrated the
depth and penetration of his study of Myanmar/Burma and its
institutions. This work on the more recent aspects of the country's
intelligence apparatus goes beyond a masterful and comprehensive
analysis of the Burmese intelligence community, and probes the
social and institutional bases of the attitudes giving rise to that
critical aspect of power. We are once again in Dr Selth's debt.
This is required reading for serious observers of the Burmese
scene."" - David I. Steinberg, Distinguished Professor of Asian
Studies Emeritus, Georgetown University ""By lifting the lid on a
pervasive yet secretive intelligence apparatus, Andrew Selth makes
an outstanding contribution to Myanmar Studies. For scholars and
practitioners alike, this book provides an essential history of a
security state that remains powerful even during the transition
away from overt authoritarian rule."" - Professor Ian Holliday,
Vice-President (Teaching and Learning), The University of Hong Kong
Now, for the first time, Robert K. DeArment has told the full
story of George Scarborough's life, illuminating his activity as a
lawman during the final part of the nineteenth century and his
controversial killings while wearing the badge-he was tried for
murder on three occasions and acquitted each time.
Following terrorist attacks against the U.S. embassy in Beirut,
Lebanon, in 1983, the U.S. Department of State began an embassy
construction program -- known as the Inman program -- to protect
U.S. personnel. However, the U.S. Department of State completed
only 24 of the 57 planned construction projects, in part due to
poor planning, systemic weaknesses in program management,
difficulties acquiring sites, schedule delays, cost increases, and
subsequent funding limitations. Following the demise of the Inman
program in the early 1990s, very few new construction projects were
initiated until after the two 1998 embassy bombings in Africa.
Following those attacks, the Secure Embassy Construction and
Counterterrorism Act of 1999 required the U.S. Department of State
to maintain a list of diplomatic facilities to be scheduled for
replacement based on their vulnerability to attack. The U.S.
Department of State determined that diplomatic facilities at over
180 posts -- more than half of U.S. overseas missions -- needed to
be replaced to meet security standards. By 2016, over 30,000 staff
were moved into more secure facilities. From October 2012 to
September 2016, State evacuated overseas post staff and family
members from 23 overseas posts in response to various threats, such
as terrorism, civil unrest, and natural disasters. Overseas posts
undergoing evacuations generally experience authorised departure or
ordered departure of specific post staff or family members,
potentially leading to suspended operations. On 29 September 2017
the U.S. Department of State ordered the departure of nonemergency
personnel assigned to the U.S. Embassy in Havana, Cuba, as well as
their families, in order to minimise the risk of their exposure to
harm because of a series of unexplained injuries suffered by
embassy personnel since November 2016.
|
|