0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (38)
  • R500+ (396)
  • -
Status
Format
Author / Contributor
Publisher

Books > Business & Economics > Industry & industrial studies > Service industries > Security services

Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Paperback): John Mueller, Mark... Terror, Security, and Money - Balancing the Risks, Benefits, and Costs of Homeland Security (Paperback)
John Mueller, Mark Stewart
R992 Discovery Miles 9 920 Ships in 12 - 19 working days

In seeking to evaluate the efficacy of post-9/11 homeland security expenses--which have risen by more than a trillion dollars, not including war costs--the common query has been, "Are we safer?" This, however, is the wrong question. Of course we are "safer"--the posting of a single security guard at one building's entrance enhances safety. The correct question is, "Are any gains in security worth the funds expended?"
In this engaging, readable book, John Mueller and Mark Stewart apply risk and cost-benefit evaluation techniques to answer this very question. This analytical approach has been used throughout the world for decades by regulators, academics, and businesses--but, as a recent National Academy of Science study suggests, it has never been capably applied by the people administering homeland security funds. Given the limited risk terrorism presents, expenses meant to lower it have for the most part simply not been worth it. For example, to be considered cost-effective, increased American homeland security expenditures would have had each year to have foiled up to 1,667 attacks roughly like the one intended on Times Square in 2010--more than four a day. Cataloging the mistakes that the US has made--and continues to make--in managing homeland security programs, Terror, Security, andMoney has the potential to redirect our efforts toward a more productive and far more cost-effective course.

Security Sector Reform in Sierra Leone 1997-2007 - Views from the Front Line (Paperback): Peter Albrecht, Paul Jackson Security Sector Reform in Sierra Leone 1997-2007 - Views from the Front Line (Paperback)
Peter Albrecht, Paul Jackson
R912 Discovery Miles 9 120 Ships in 12 - 19 working days

Sierra Leone is often cited as a highly influential example of security sector reform (SSR) in practice. In the ten years (1997 - 2007) covered in this volume, Sierra Leone transitioned from open conflict to a process of consolidation and development that culminated in the successful general elections of 2007. SSR is understood as being at the heart of this change. Security Sector Reform in Sierra Leone 1997 - 2007: Views from the Frontline seeks to shed new light on this process by giving a voice to stakeholders that were intimately involved in SSR efforts within Sierra Leone. Contributions from both UK and Sierra Leonean personnel provide authentic perspectives that enable us to draw important lessons from a dynamic and evolving relationship between national actors and the wider international community.

Weak Links - Fragile States, Global Threats, and International Security (Paperback): Stewart Patrick Weak Links - Fragile States, Global Threats, and International Security (Paperback)
Stewart Patrick
R1,187 Discovery Miles 11 870 Ships in 12 - 19 working days

Conventional wisdom holds that weak and failing states are the source of the world's most pressing security threats. After all, the 9/11 attacks originated in an impoverished, war-ravaged country, and transnational crime appears to flourish in weakly governed states. However, our assumptions about the threats posed by failing states are based on anecdotal arguments, not on a systematic analysis of the connections between state failure and transnational security threats. Analyzing terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity, Stewart Patrick shows that while some global threats do emerge in fragile states, most of their weaknesses create misery only for their own citizenry. Moreover, many threats originate farther up the chain, in wealthier and more stable countries like Russia and Venezuela. Weak Links will force policymakers to rethink what they assume about state failure and transnational insecurity.

Ukraine's National Security - An Agenda for the Security Sector (Paperback): V.P. Horbulin, O.F. Byelov, O.V. Lytvynenko Ukraine's National Security - An Agenda for the Security Sector (Paperback)
V.P. Horbulin, O.F. Byelov, O.V. Lytvynenko
R897 Discovery Miles 8 970 Ships in 12 - 19 working days

This volume seeks to address the security interest of independent Ukraine comprehensively in the light of international security cooperation options, including NATO membership. The Geneva Centre for the Democratic Control of Armed Forces has cooperated with the Ukrainian parliament and defence ministry since 2000. Current cooperation focuses on defence management reform.

The Globalization of Surveillance (Paperback): A. Mattelart The Globalization of Surveillance (Paperback)
A. Mattelart
R854 Discovery Miles 8 540 Ships in 10 - 15 working days

Video surveillance, public records, fingerprints, hidden microphones, RFID chips: in contemporary societies the intrusive techniques of surveillance used in daily life have increased dramatically. The "war against terror" has only exacerbated this trend, creating a world that is closer than one might have imagined to that envisaged by George Orwell in 1984.How have we reached this situation? Why have democratic societies accepted that their rights and freedoms should be taken away, a little at a time, by increasingly sophisticated mechanisms of surveillance?From the anthropometry of the 19th Century to the Patriot Act, through an analysis of military theory and the Echelon Project, Armand Mattelart constructs a genealogy of this new power of control and examines its globalising dynamic. This book provides an essential wake-up call at a time when democratic societies are becoming less and less vigilant against the dangers of proliferating systems of surveillance.

The Bodyguard (Paperback): Roy Snell The Bodyguard (Paperback)
Roy Snell 1
R422 Discovery Miles 4 220 Ships in 10 - 15 working days

Roy Snell has been in what he calls "close protection" for more than 16 years, guarding international royalty and celebrities including Madonna, Schwarzenegger, Stallone, Bruce Willis, Tom Jones, and Frank Sinatra. A former SAS sniper and heavyweight boxing champion, Roy is Britain's ultimate bodyguard. Roy was trained at the Regency College in Herefordshire, where the royal protection squad is drilled. He started out in security at showcases for the big bands of the 1980s--Duran Duran, Eurythmics, Aha, Kajagoogoo, and at a Wham! gig, he protected George Michael from a man with a baseball bat. A "Category A" bodyguard--a level that takes two years of training to reach--Roy is qualified to look after top level celebrity clients, from film stars to athletes, singers to royalty. Roy is also a skilled marksman trained in the use of the 9mm Bereta sub-machine gun and the 38 Snubnose--the standard issue weapon for the FBI.

Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover): Jacqueline D. Lipton Our Data, Ourselves - A Personal Guide to Digital Privacy (Hardcover)
Jacqueline D. Lipton
R1,931 Discovery Miles 19 310 Ships in 12 - 19 working days

A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.

Democratic Governance of the Security Sector Beyond the OSCE Area - Regional Approaches in Africa and the Americas (Paperback):... Democratic Governance of the Security Sector Beyond the OSCE Area - Regional Approaches in Africa and the Americas (Paperback)
Victor-Yves Ghebali, Alexander Lambert
R923 Discovery Miles 9 230 Ships in 12 - 19 working days

The present book addresses the prospects for security sector reform and governance regimes, focusing on democratic civilian control of armed forces. It assesses the extent to which the pioneering OSCE experience has inspired Africa and the Americas within their respective multilateral institutional settings.

Borderland Circuitry - Immigration Surveillance in the United States and Beyond (Hardcover): Ana Muniz Borderland Circuitry - Immigration Surveillance in the United States and Beyond (Hardcover)
Ana Muniz
R1,931 Discovery Miles 19 310 Ships in 12 - 19 working days

Political discourse on immigration in the United States has largely focused on what is most visible, including border walls and detention centers, while the invisible information systems that undergird immigration enforcement have garnered less attention. Tracking the evolution of various surveillance-related systems since the 1980s, Borderland Circuitry investigates how the deployment of this information infrastructure has shaped immigration enforcement practices. Ana Muniz illuminates three phenomena that are becoming increasingly intertwined: digital surveillance, immigration control, and gang enforcement. Using ethnography, interviews, and analysis of documents never before seen, Muniz uncovers how information-sharing partnerships between local police, state and federal law enforcement, and foreign partners collide to create multiple digital borderlands. Diving deep into a select group of information systems, Borderland Circuitry reveals how those with legal and political power deploy the specter of violent cross-border criminals to justify intensive surveillance, detention, brutality, deportation, and the destruction of land for border militarization.

ISpy - Surveillance and Power in the Interactive Era (Paperback): Mark Andrejevic ISpy - Surveillance and Power in the Interactive Era (Paperback)
Mark Andrejevic
R1,050 Discovery Miles 10 500 Ships in 10 - 15 working days

'This book will change the way you think about today's new media technologies' - Daniel J. Solove, author of ""The Digital Person: Technology and Privacy in the Information Age"". Whether you're purchasing groceries with your Safeway 'club card' or casting a vote on ""American Idol"", those data are being collected. From Amazon to iTunes, smart phones to GPS devices, Google to TiVo - all of these products and services give us an expansive sense of choice, access, and participation. Mark Andrejevic shows, however, that these continuously evolving new technologies have also been employed as modes of surveillance and control, most disturbingly exemplified by revelations about the NSA's secret monitoring of our phone calls, e-mails, and internet searches. Many contend that our proliferating interactive media empower individuals and democratize society. But, Andrejevic asks, at what cost? In ""iSpy"", he reveals that these and other highly advertised benefits are accompanied by hidden risks and potential threats that we all tend to ignore. His book, providing the first sustained critique of a concept that has been a talking point for twenty years, debunks the false promises of the digital revolution still touted by the popular media while seeking to rehabilitate, rather than simply write off, the potentially democratic uses of interactive media. Andrejevic opens up the world of digital rights management and the data trail each of us leaves - data about our locations, preferences, or life events that are already put to use in various economic, political, and social contexts. He notes that, while citizens are becoming increasingly transparent to private and public monitoring agencies, they themselves are unable to access the information gathered about them - or know whether it's even correct. (The watchmen, it seems, don't want to be watched.) He also considers the appropriation of consumer marketing for political campaigns in targeting voters and examines the implications of the Internet for the so-called War on Terror. In ""iSpy"", Andrejevic poses real challenges for our digital future. Amazingly detailed, compellingly readable, it warns that we need to temper our enthusiasm for these technologies with a better understanding of the threats they pose - to be able to distinguish between interactivity as centralized control and as collaborative participation.

Neglected Defense - Mobilizing the Private Sector to Support Homeland Security (Paperback): Stephen E. Flynn, Daniel B. Prieto Neglected Defense - Mobilizing the Private Sector to Support Homeland Security (Paperback)
Stephen E. Flynn, Daniel B. Prieto
R431 Discovery Miles 4 310 Ships in 10 - 15 working days

The March 2006 furor over a Dubai firms attempt to purchase the company managing some U.S. ports illustrates the difficult homeland security challenges that exist at the nexus of privately owned critical assets as well as global interdependence. Unfortunately, nearly five years after the September 11 attacks on New York and Washington, D.C., federal efforts to enlist the private sector in bolstering homeland security remain largely stillborn. Neglected Defense offers a thoughtful and tightly reasoned analysis of why that is so. It presents a way forward for strengthening cooperation between the private sector and government on homeland security. The report begins by laying out the policy dilemma in detail. It offers a recent history of the security role of the private sector, and highlights specific problems that have kept public-private security partnerships from maturing. It concludes with a series of recommendationsfor Congress, the Bush administration, and the private sectorto better secure the homeland.

The New Politics of Surveillance and Visibility (Paperback): Kevin Haggerty, Richard V. Ericson The New Politics of Surveillance and Visibility (Paperback)
Kevin Haggerty, Richard V. Ericson; Edited by Kevin Haggerty, Richard V. Ericson
R1,142 Discovery Miles 11 420 Ships in 12 - 19 working days

Since the terrorist attacks of September 2001, surveillance has been put forward as the essential tool for the aEURO"war on terror,aEURO(t) with new technologies and policies offering police and military operatives enhanced opportunities for monitoring suspect populations. The last few years have also seen the publicaEURO(t)s consumer tastes become increasingly codified, with aEURO"data minesaEURO(t) of demographic information such as postal codes and purchasing records. Additionally, surveillance has become a form of entertainment, with aEURO"realityaEURO(t) shows becoming the dominant genre on network and cable television.In The New Politics of Surveillance and Visibility, editors Kevin D. Haggerty and Richard V. Ericson bring together leading experts to analyse how society is organized through surveillance systems, technologies, and practices. They demonstrate how the new political uses of surveillance make visible that which was previously unknown, blur the boundaries between public and private, rewrite the norms of privacy, create new forms of inclusion and exclusion, and alter processes of democratic accountability. This collection challenges conventional wisdom and advances new theoretical approaches through a series of studies of surveillance in policing, the military, commercial enterprises, mass media, and health sciences.

The Security Handbook (Paperback, 2nd edition): Philip Purpura The Security Handbook (Paperback, 2nd edition)
Philip Purpura
R1,836 Discovery Miles 18 360 Ships in 10 - 15 working days

The Security Handbook, Second Edition is a user-friendly guide for security officers and guards, covering everything from introductory information to advanced topics. Whether looking for entry into the profession or development within the security industry, this book offers the practical information, training, and need-to-know techniques for the realization of professional goals.
The Second Edition emphasizes the proper skills required to improve job performance -- customer service, security methods, patrolling, communicating, and report writing. Chapters cover such important topics as arrest law and procedure (including legal liability), self-defense and weapons, a new section on career planning, violence in the workplace, internal theft, burglary, robbery, terrorism, cybercrime, and first response during emergencies. Countermeasures to a variety of threats are explained throughout the book.
Experienced security officers, supervisors, and managers will also find the book useful in outlining the changing roles and responsibilities of the protection officer and for helping train their front line staff.
* Covers every important aspect of the security officer's job, with several new updates and access to online sources
* Defines key terms and outlines basic information before moving on to more advanced topics
* Each chapter includes an outline, chapter objectives, and follows with review questions to aid in the learning process
* Features numerous examples, illustrations, Web sites, case studies, and new "What if?" scenarios to relate theory to practice
* Serves as a comprehensive study guide for state mandated training and certification exams such as the Certified Protection Officer (CPO) program sponsored by the IFPO

Preventing Corporate Embezzlement (Paperback): Paul Shaw, Jack Bologna Preventing Corporate Embezzlement (Paperback)
Paul Shaw, Jack Bologna
R2,163 Discovery Miles 21 630 Ships in 10 - 15 working days

Internal loss is one of the most costly forms of loss. Embezzlement is one of the least detected and prosecuted forms of internal theft. Preventing Corporate Embezzlement is a professional reference that offers solutions. Managers, auditors and others charged with protecting assets must achieve a heightened awareness of embezzlement. They need to recognize and understand the opportunities, methods, and varieties of embezzlement, as well as establish internal controls that will prevent and detect embezzlement.

Practical tool for detecting and combatting embezzlement: checklists, forms and evaluations
Offers how-to advice on avoiding lawsuits by practicing preventive law
Lists further resources, publications and directories on embezzlement, internal controls and security, risk management, insurance, auditors, and security services and equipment

Netspionage - The Global Threat to Information (Paperback): William C. Boni, Gerald Kovacich Netspionage - The Global Threat to Information (Paperback)
William C. Boni, Gerald Kovacich
R1,685 Discovery Miles 16 850 Ships in 10 - 15 working days

This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow the perilous future. Close study of these incidents demonstrates how difficult yet how important it is to confront the challenges of "netspionage" and its less intrusive cousins. The authors present a set of the known incidents and then outline protective measures that will reduce the potential and consequences of netspionage.
Unlike most security books, this one is written for managers and executives in non-protection roles of the organization, since they are the ones who must take a leadership role in safeguarding the information assets of the networked enterprise.

*Practical guide written from front-line experience
*Explains the evolution of information collection and why it has never been easier
*Highlights the tools of the trade and how they can be put to best use

Loss Prevention and the Small Business - The Security Professional's Guide to Asset Protection Strategies (Paperback): J.... Loss Prevention and the Small Business - The Security Professional's Guide to Asset Protection Strategies (Paperback)
J. Robert Wyman
R1,683 Discovery Miles 16 830 Ships in 10 - 15 working days

With half of all new businesses failing in the first two years, every aspect of good business planning must be considered, but loss prevention is very often overlooked. Most small business owners grapple with the day to day challenges of sales and marketing, never realizing that the shadow of shrinkage is expanding daily, waiting to reveal itself in the annual inventory results. Ravaged by theft and paperwork losses, the already tight profit margin can shrink into oblivion. Loss Prevention and the Small Business opens the eyes of the reader to the reality of shrinkage in all its guises including shoplifting, fraud, and embezzlement. Armed with this awareness, the security specialist or owner/manager can utilize the many strategies to both inhibit losses and aggressively pursue those persons and processes that cause losses.
This is a comprehensive guide to developing and maintaining a loss prevention strategy. It assists the reader in creating a dynamic proactive plan for protecting their hard-earned profits from the menace of internal and external loss.



Includes information beyond the typical retail theft by employees and customers
Cover business losses from administrative errors to white collar crime
Practical with numerous worksheets, forms, and templates for asset protection exercises

Premises Security - A Guide for Security Professionals and Attorneys (Paperback): William Blake, Walter F. Bradley Premises Security - A Guide for Security Professionals and Attorneys (Paperback)
William Blake, Walter F. Bradley
R1,761 Discovery Miles 17 610 Ships in 10 - 15 working days

Premises Security: A Guide for Attorneys and Security Professionals guides the security professional through the ins and outs of premises security liability. Premises security litigation claims represent a serious financial threat to owners and occupiers of property. This book provides an overview of risk assessment techniques, identification of reasonable security measures, legal issues and litigation strategies.
Premises security litigation is increasing at a dramatic rate and has a significant negative impact on corporate profits. Realizing the increasing costs of litigation, business owners and other interested parties are initiating proactive measures to provide adequate security. Attorneys can use this book as a security resource for providing legal advice to their clients and during the litigation process. Security professionals will be better able to propose and implement reasonable and appropriate security measures. The format of providing information in response to specific questions carries the reader through a logical and sequential method for understanding the legal concepts of premises liability, the identification of reasonable and appropriate protection measures, and how to acquire premises security information.
This is a practical, concise and informative guide. This book can be used in a proactive prevention mode as well as a reactive response to litigation claims. It explains what security professionals should be thinking about and planning for when it comes to protecting people on their premises. It also provides a common base of knowledge for attorneys and security professionals that does not exist in any other publication.

Designed to meet the needs of both attorneys and security professionals
Covers both liability and security issues
Appendices provide detailed premises security information to facilitate a proactive approach to providing reasonable and appropriate security measures and reacting to litigation

Police Visibility - Privacy, Surveillance, and the False Promise of Body-Worn Cameras (Hardcover): Bryce Clayton Newell Police Visibility - Privacy, Surveillance, and the False Promise of Body-Worn Cameras (Hardcover)
Bryce Clayton Newell
R1,938 Discovery Miles 19 380 Ships in 12 - 19 working days

Police Visibility presents empirically grounded research into how police officers experience and manage the information politics of surveillance and visibility generated by the introduction of body cameras into their daily routines and the increasingly common experience of being recorded by civilian bystanders. Newell elucidates how these activities intersect with privacy, free speech, and access to information law and argues that rather than being emancipatory systems of police oversight, body-worn cameras are an evolution in police image work and state surveillance expansion. Throughout the book, he catalogs how surveillance generates information, the control of which creates and facilitates power and potentially fuels state domination. The antidote, he argues, is robust information law and policy that puts the power to monitor and regulate the police squarely in the hands of citizens.

Issues in Security Management - Thinking Critically About Security (Paperback): Robert Robinson Issues in Security Management - Thinking Critically About Security (Paperback)
Robert Robinson
R2,158 Discovery Miles 21 580 Ships in 10 - 15 working days

This is a truly unique collection of 39 articles written by authorities or based on authoritative research. It goes beyond locks, lighting, and alarms to offer provocative viewpoints on a variety of security topics.
Contributors to this book are knowledgeable and practical individuals who are aware of the impact of their work on society. They have extensive and specialized experience in their respective sectors including corporate, retail, college, hospital, art gallery, and within the community at large. They are knowledgeable about technical and legal aspects of CCTV, electronic counter-intelligence, computers, fire safety, violent employees, terrorism and the future of policing. In addition, they are concerned about the right to privacy, the influence of gambling on employee theft, privatization of correctional services, the place of women in security work, security audit anxiety, and crime control/prevention.

The book looks beyond everyday applications and routines to an understanding of the social significance of careers in security. It will be of interest to practitioners in all sectors as well as students at all levels.
Goes beyond the usual nuts and bolts security book
An important, horizon-broadening supplement to the basic texts
Appeals to everybody in the security field from students to practitioners

Counterespionage for American Business (Paperback): Peter Pitorri Counterespionage for American Business (Paperback)
Peter Pitorri
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

The idea of espionage has always carried a certain mystique, having grown its roots in the political and national defense spheres. Today, espionage must be taken seriously in the business arena as well. Having company secrets stolen by competitors is costly and can be lethal. Counterespionage for American Business is a how-to manual for security professionals that teaches secret methods counterespionage experts have been using for years to protect business information
Secret techniques you will learn include:
. screening employee applicants; how to use standard screening methods to defend against industrial espionage and violent persons
. how to design security education programs by teaching protection of critical business information
. how to avoid liability
Counterespionage for American Business also names the foreign countries that are conducting espionage against American business.

Learn how to protect your proprietary business information and reduce liability riskGuidlines on how small businesses can save thousands of dollars"

The Deregulation of the Banking and Securities Industries (Paperback): Lawrence G. Goldberg, Lawrence J. White The Deregulation of the Banking and Securities Industries (Paperback)
Lawrence G. Goldberg, Lawrence J. White
R998 Discovery Miles 9 980 Ships in 10 - 15 working days

Goldberg (finance, U. of Miami) and White (economics, New York U.) present the results of a 1978 conference that brought together representatives from business, government, and academics. Much of the conversation revolves around the Glass- Steagall Act and attempts to remove the dividing line betwee

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,650 Discovery Miles 26 500 Ships in 12 - 19 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Windows into the Soul (Paperback): Gary T. Marx Windows into the Soul (Paperback)
Gary T. Marx
R1,042 Discovery Miles 10 420 Ships in 9 - 17 working days

We live in an age saturated with surveillance. Our personal and public lives are increasingly on display for governments, merchants, employers, hackers-and the merely curious-to see. In Windows into the Soul, Gary T. Marx, a central figure in the rapidly expanding field of surveillance studies, argues that surveillance itself is neither good nor bad, but that context and comportment make it so. In this landmark book, Marx sums up a lifetime of work on issues of surveillance and social control by disentangling and parsing the empirical richness of watching and being watched. Using fictional narratives as well as the findings of social science, Marx draws on decades of studies of covert policing, computer profiling, location and work monitoring, drug testing, caller identification, and much more, Marx gives us a conceptual language to understand the new realities and his work clearly emphasizes the paradoxes, trade-offs, and confusion enveloping the field. Windows into the Soul shows how surveillance can penetrate our social and personal lives in profound, and sometimes harrowing, ways. Ultimately, Marx argues, recognizing complexity and asking the right questions is essential to bringing light and accountability to the darker, more iniquitous corners of our emerging surveillance society.

War Virtually - The Quest to Automate Conflict, Militarize Data, and Predict the Future (Hardcover): Roberto J. Gonzalez War Virtually - The Quest to Automate Conflict, Militarize Data, and Predict the Future (Hardcover)
Roberto J. Gonzalez
R848 R688 Discovery Miles 6 880 Save R160 (19%) Ships in 12 - 19 working days

A critical look at how the US military is weaponizing technology and data for new kinds of warfare-and why we must resist. War Virtually is the story of how scientists, programmers, and engineers are racing to develop data-driven technologies for fighting virtual wars, both at home and abroad. In this landmark book, Roberto J. Gonzalez gives us a lucid and gripping account of what lies behind the autonomous weapons, robotic systems, predictive modeling software, advanced surveillance programs, and psyops techniques that are transforming the nature of military conflict. Gonzalez, a cultural anthropologist, takes a critical approach to the techno-utopian view of these advancements and their dubious promise of a less deadly and more efficient warfare. With clear, accessible prose, this book exposes the high-tech underpinnings of contemporary military operations-and the cultural assumptions they're built on. Chapters cover automated battlefield robotics; social scientists' involvement in experimental defense research; the blurred line between political consulting and propaganda in the internet era; and the military's use of big data to craft new counterinsurgency methods based on predicting conflict. Gonzalez also lays bare the processes by which the Pentagon and US intelligence agencies have quietly joined forces with Big Tech, raising an alarming prospect: that someday Google, Amazon, and other Silicon Valley firms might merge with some of the world's biggest defense contractors. War Virtually takes an unflinching look at an algorithmic future-where new military technologies threaten democratic governance and human survival.

The Myth of International Order - Why Weak States Persist and Alternatives to the State Fade Away (Paperback): Arjun Chowdhury The Myth of International Order - Why Weak States Persist and Alternatives to the State Fade Away (Paperback)
Arjun Chowdhury
R832 Discovery Miles 8 320 Ships in 12 - 19 working days

In February of 2011, Libyan citizens rebelled against Muammar Qaddafi and quickly unseated him. The speed of the regime's collapse confounded many observers, and the ensuing civil war showed Foreign Policy's index of failed states to be deeply flawed-FP had, in 2010, identified 110 states as being more likely than Libya to descend into chaos. They were spectacularly wrong, but this points to a larger error in conventional foreign policy wisdom: failed, or weak and unstable, states are not anomalies but are instead in the majority. More states resemble Libya than Sweden. Why are most states weak and unstable? Taking as his launching point Charles Tilly's famous dictum that 'war made the state, and the state made war,' Arjun Chowdhury argues that the problem lies in our mistaken equation of democracy and economic power with stability. But major wars are the true source of stability: only the existential crisis that such wars produced could lead citizens to willingly sacrifice the resources that allowed the state to build the capacity it needed for survival. Developing states in the postcolonial era never experienced the demands major interstate war placed on European states, and hence citizens in those nations have been unwilling to sacrifice the resources that would build state capacity. For example, India and Mexico are established democracies with large economies. Despite their indices of stability, both countries are far from stable: there is an active Maoist insurgency in almost a quarter of India's districts, and Mexico is plagued by violence, drug trafficking, and high levels of corruption in local government. Nor are either effective at collecting revenue. As a consequence, they do not have the tax base necessary to perform the most fundamental tasks of modern states: controlling organized violence in a given territory and providing basic services to citizens. By this standard, the majority of states in the world-about two thirds-are weak states. Chowdury maintains that an accurate evaluation of international security requires a normative shift : the language of weakness and failure belies the fact that strong states are exceptions. Chowdhury believes that dismantling this norm is crucial, as it encourages developing states to pursue state-building via war, which is an extremely costly approach-in terms of human lives and capital. Moreover, in our era, such an approach is destined to fail because the total wars of the past are highly unlikely to occur today. Just as importantly, the non-state alternatives on offer are not viable alternatives. For better or worse, we will continue to live in a state-dominated world where most states are weak. Counterintuitive and sweeping in its coverage, The Myth of International Order demands that we fundamentally rethink foundational concepts of international politics like political stability and state failure.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
VHDL '92 - The New Features of the VHDL…
Jean-Michel Berge, Etc, … Hardcover R2,597 Discovery Miles 25 970
New Waves in Philosophical Logic
G. Restall, G. Russell Hardcover R1,521 Discovery Miles 15 210
Visual C# How to Program, Global Edition
Harvey Deitel, Paul Deitel Paperback R2,321 Discovery Miles 23 210
Modality and Tense - Philosophical…
Kit Fine Hardcover R4,669 Discovery Miles 46 690
IUTAM Symposium on the Vibration…
Alexander K. Belyaev, Robin S. Langley Hardcover R4,631 Discovery Miles 46 310
Fundamentals of Multicore Software…
Victor Pankratius, Ali-Reza Adl-Tabatabai, … Paperback R2,500 Discovery Miles 25 000
Active Control of Vibration
Christopher C. Fuller, S.J. Elliott, … Paperback R2,664 R2,509 Discovery Miles 25 090
Python for Beginners - A Programming…
Robert Campbell Hardcover R843 R731 Discovery Miles 7 310
The Oxford Handbook of Philosophy of…
Stewart Shapiro Hardcover R4,464 Discovery Miles 44 640
Progress in Turbulence VII - Proceedings…
Ramis Oerlu, Alessandro Talamelli, … Hardcover R6,159 R4,950 Discovery Miles 49 500

 

Partners