دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st Edition نویسندگان: Gabriele Jacobs, Ilona Suojanen, Kate Horton, P. Saskia Bayerl سری: Advanced Sciences And Technologies For Security Applications ISBN (شابک) : 3030425223, 9783030425234 ناشر: Springer سال نشر: 2021 تعداد صفحات: 559 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 7 مگابایت
کلمات کلیدی مربوط به کتاب مدیریت امنیت بین المللی: راه حل های جدید برای پیچیدگی: مطالعات امنیت بین المللی
در صورت تبدیل فایل کتاب International Security Management: New Solutions To Complexity به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مدیریت امنیت بین المللی: راه حل های جدید برای پیچیدگی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب نگاه جدیدی به مدیریت امنیت بینالمللی ارائه میدهد که کاربردهای عملی و مبانی نظری را برای راهحلهای جدید برای چالشهای امنیتی و ایمنی پیچیده امروزی ترکیب میکند. تمرکز کتاب بر ایمنی به عنوان یک تجربه مثبت، مکمل رویکرد سنتی به ایمنی به عنوان خطر و تهدید است. علاوه بر این، رویکرد چند ذینفع، چند رشتهای، بینالمللی و مبتنی بر شواهد، بینشهای جامع و به موقع را برای این حوزه فراهم میکند. موضوعات مطرح شده در این کتاب بر این سؤالات اساسی متمرکز است: ایمنی واقعاً برای چه کسی است؟ (و) چگونه می توان راه حل های ایمنی پایدار را به طور مشترک ایجاد کرد؟ این کتاب بینشهای جامعی را در مورد آخرین یافتههای تحقیقاتی، کاربردهای عملی و پیشنهادات برای مواجهه با چالشها در مدیریت امنیت بینالمللی به روشهای یکپارچه و پایدار ارائه میکند و آن را برای شاغلین، و همچنین دانشگاهیان و دانشآموزان مفید میسازد - با هدف دستیابی به اطلاعات کامل، دانش دست اول از خدمت به متخصصان در این زمینه. ما راه های جدید کار با شهروندان، پلیس و سیاست گذاران را به منظور ایجاد ایمنی مشترک بررسی می کنیم. این کتاب بر اهمیت ایمنی به عنوان موضوعی که برای همه اهمیت دارد تاکید می کند.
This book offers a new look at international security management combining practical applications and theoretical foundations for new solutions to today’s complex security and safety challenges. The book’s focus on safety as a positive experience complements the traditional approach to safety as risks and threats. In addition, its multi-stakeholder, multi-disciplinary, international and evidence-based approach provides holistic and timely insights for the field. Topics raised in this book focus on the crucial questions of: Who is safety actually for? (and) How can sustainable safety solutions be jointly created? This book provides comprehensive insights into the latest research findings, practical applications and suggestions for dealing with challenges in international security management in integrated and sustainable ways, making it relevant reading for practitioners, as well as academics and students - with a view to obtaining thorough, first-hand knowledge from serving experts in the field. We explore new ways of working with citizens, police and policymakers in order to co-create safety. This book emphasises the importance of safety as a topic that matters for all.
Preface......Page 7
Contents......Page 10
Editors and Contributors......Page 14
Towards Sustainable Solutions in International Security Management—An Introduction......Page 19
1 What is Safety and Security Management?......Page 20
2 Complex, Grand Challenges in the Safety and Security Field......Page 21
3.1 Three Key Principles That Characterise Our Approach......Page 22
4 Book Sections and Cross-Cutting Themes......Page 24
References......Page 25
Conceptual Perspectives on the International Safety and Security Landscape......Page 28
1 Introduction......Page 30
2 A History of Safety and Security......Page 31
3 Security and Safety: A State of Normalcy?......Page 33
4 Security and Safety: Interconnected Concepts......Page 34
5 Security and Safety: Who’s Responsible?......Page 36
5.1 Multi-Level Responsibility......Page 39
5.2 Multi-Actor Responsibility......Page 40
6 Conclusions......Page 41
References......Page 42
Positive Safety......Page 45
1 Introduction......Page 46
3 ‘Positivity’ in Safety Research and Safety Promotion......Page 48
4 Subjectivity: Psychological Safety......Page 50
5 Optimising Safety......Page 53
6 Conclusions......Page 54
References......Page 55
1 Introduction......Page 58
2 The Concern for Security......Page 59
2.1 Differences Between Security and Safety......Page 60
3 Security by Prevention......Page 62
4 Security by Protection......Page 64
5 Security by Control......Page 65
6 Conclusions......Page 66
References......Page 67
1 Introduction......Page 69
2 Safety, Security and Criminal Justice Will Remain Important......Page 70
3 Safety and Security Become Broader and More Integrated......Page 72
5 Security and Safety Mean the Management of Expectations......Page 73
6 Security, Safety and Criminal Justice Are Big Business......Page 74
7 Security Organisations Are Structurally Receiving More Powers......Page 75
8 Security and Safety Are a Responsibility for Everyone......Page 76
10 Closing Remarks......Page 77
How Do We Talk About Security? Security Narratives......Page 79
1 Introduction: Perceived Safety and the Fear of Crime......Page 81
2 The Degree to Which People Feel (Un)Safe......Page 84
3 Safety Themes Encountered......Page 85
3.1 Safety as the Absence of Negative Aspects......Page 86
3.2 Safety as the Presence of Positive Aspects......Page 87
4 Concluding Notes and Recommendations......Page 90
4.1 Suggestions for Safety Management, Policymakers and Academics......Page 91
References......Page 93
1 Introduction......Page 96
2 A Very English Fence......Page 97
3 Ownership of Language......Page 99
4 Building Better Narratives......Page 100
5 How Journalists Create Fences......Page 101
6 Sticky Labels and Other Conclusions......Page 103
References......Page 105
1 How Emotions Can Bolster Reflexivity......Page 106
2 The Case: Forced Displacement on Lesbos, a Local Manifestation of a Global Grand Challenge......Page 107
3 Applying Reflexivity......Page 109
4 Development of a Metaphor Mediated by Emotions......Page 111
4.1 The “Mess” Metaphor......Page 112
4.3 The “Institutionalised Mess” Metaphor......Page 113
4.5 The “Settled Emergency” Metaphor......Page 114
5 Concluding Thoughts......Page 116
References......Page 117
Looking at Safety and Security Issues in Different Cultures......Page 120
1 Introduction......Page 121
2 Safety and Security Have Different Connotations in Different Cultures......Page 123
2.1 Contest Cultures......Page 124
2.2 Well-Oiled Machine Cultures......Page 126
2.3 Network Cultures......Page 128
2.4 Social Pyramid and Traditional Family Cultures......Page 129
2.5 Solar System Cultures......Page 131
2.6 Japan......Page 132
3 Conclusion......Page 133
References......Page 134
1 Why Risk Management?......Page 136
2 Institutional and Theoretical Fragmentation of Safety and Security Domains......Page 138
3 Variability of Risk Notions......Page 140
4 Inclusiveness as Panacea Versus ‘Risk Footprint’......Page 143
5 Dual Perspective of Risk: Threats and Opportunities......Page 146
7 Co-creation of Safety and Security Culture: A Way Forward......Page 147
References......Page 148
1 Introduction......Page 150
2 A Very Brief Assessment......Page 152
3 So What Are We Talking About?......Page 153
4 Matters of Fact, Matters of Concern......Page 154
5 Improvisation and Experimentation......Page 155
6 Making Things Public and the Art of Representation......Page 156
8 Tools......Page 157
8.2 The Story as a Whole......Page 158
8.3 Space for Engaging......Page 160
8.4 Qualities in Public Enterprise......Page 161
9 Conclusion: Working Within a Controversy Filled and Complex Performance......Page 162
References......Page 164
Grand Security Challenges......Page 166
International Security Challenges of Climate Change: Lessons from the Syrian Case for a Multi-stakeholder Approach to Resilient Adaptation......Page 168
1 Introduction......Page 169
2 Climate Change as a Source of International Security Challenges......Page 170
3.1 Background Information About Syria......Page 171
3.2 Reasons and Consequences of the Civil War in Syria......Page 174
4 A Multi-stakeholder Approach to Preventing and Managing International Security Challenges of Climate Change......Page 175
5 Conclusions and Policy Implications......Page 179
References......Page 180
1 Introduction......Page 184
2 Cultural Heritage and International Security......Page 185
3 The Power of Culture......Page 186
4 Cultural Heritage for International Peace and Security......Page 187
5 Cultural Heritage in Military Missions and Humanitarian Aid......Page 188
6 Cultural Heritage and Humanitarian Crises......Page 189
8 Cultural Heritage of Vital Importance: The Case of the Netherlands......Page 191
9 Dutch Safety Policies......Page 193
11 Recommendations......Page 195
References......Page 196
1 Introduction......Page 200
2 Understanding the Roots of Radicalisation......Page 201
3.1 Endogenous Drivers......Page 202
3.3 A Combined Perspective......Page 205
3.4 Suggesting a Holistic Perspective......Page 206
4 Forms of Countering Violent Extremism (CVE) at a European Level......Page 207
5 Best Practices to Prevent Radicalisation......Page 209
5.1 Comparison Among European Countries Involving a CVE Strategy......Page 210
6 Focus on the Italian Approach......Page 212
6.1 The Two Aspects of the Italian Approach......Page 214
7 Conclusion......Page 216
References......Page 218
1 Illicit Trade and Private Business......Page 221
2 What is Illicit Trade?......Page 222
3.1 Illicit Trade and Procurement......Page 223
3.2 Illicit Trade and Service Delivery......Page 224
4 How, Where and When Can Illicit Trade Develop?......Page 225
4.1 Legal Discrepancies......Page 226
4.2 Economic Discrepancies Subsidisation, Taxation and Illicit Trade......Page 227
4.3 Globalisation and Digitalisation Effects......Page 228
5.1 Making Sure the Company is Not An Accomplice of Illicit Trade......Page 229
5.2 Derailing the Unfair Competition of Illicit Trade (Tactical)......Page 230
6 Responding to Illicit Trade, A New Challenge But Old Issues and Tools......Page 232
6.1 Illicit Trade and Corporate Social Responsibility......Page 233
References......Page 234
1 Introduction......Page 236
2 A Lack of Safety in the Smart City?......Page 238
3 Safe City Dreams......Page 243
4 Actually Existing Smart Safety Practices......Page 247
5 Conclusion: Implications for Smart City Strategy and Ethics......Page 249
References......Page 251
1 Introduction......Page 254
2 Art and Design Interventions in Surveillance Practice......Page 255
3 Participatory Action Research About Surveillance Practice......Page 257
3.2 Smart City Research Game......Page 259
4 Data Walks......Page 260
4.1 Seeing Surveillance......Page 261
4.2 Responsibilities and Transparency......Page 262
5 Civic Engagement......Page 263
References......Page 264
1 Introduction......Page 266
3 Three Generations on the Scene......Page 267
4 A Diverse Workforce Ecosystem......Page 269
5.1 A Shift in Demographics......Page 271
5.2 An Alternative Workforce......Page 272
5.4 The Impact of a Redefined Workforce on Organisations......Page 273
6 The New Workforce and Security......Page 275
7.1 Integrate Security as an Employee Service......Page 276
7.2 Make Security Awareness Experience-Based......Page 277
7.3 Put Employee Engagement at the Centre......Page 278
8 Conclusion: Making Security Personal......Page 280
References......Page 281
How Do We Organise Security? Stakeholder Perspectives......Page 284
1 Introduction......Page 287
2 A Short History of Business Security and Its Constraints......Page 288
2.1 From a Limited Scope to Building Security Alliances......Page 290
3 The Shift from Reactive to Preventive......Page 291
4 Scope and Size of Security Services: A Necessary Holistic Approach......Page 292
5 Is Business Security a Hampering Cost or a Contributor to the Business?......Page 294
6 Why Business Security Matters to All: A Case for Corporate Social Responsibility......Page 296
7 Conclusion: Future Challenges for CSOs and Business Security......Page 297
References......Page 298
1 Introduction......Page 300
2 Privatisation of Security (Services)......Page 301
3 Responsibilities and Regulation......Page 302
4 If the Price Decides......Page 304
5 Minimising Weaknesses in the Private Security Sector Through the Concept of Contextual-Adequacy......Page 307
References......Page 308
1 Introduction......Page 312
2 Organisation and Functioning of the Croatian and European Police......Page 314
3 The Police Subculture as an Element of International Security Management......Page 317
4 Police Mental Resilience Education as a Prerequisite for International Security Management......Page 318
5 Science and Research as a Prerequisite for International Security Management......Page 322
6 Data Security Management as a Prerequisite for International Security Management......Page 325
6.1 Where Are the Data Found?......Page 326
6.2 How Do Data Protection Measures Impact Criminal Investigations?......Page 327
7 Conclusion......Page 328
References......Page 329
1 Introduction......Page 332
2.1 The Rise of Predictive Analytics......Page 335
2.2 The Case of Predictive Policing......Page 336
2.3 The Way Forward: AI-Based Forecasting All Over?......Page 338
3.1 Why Do We Need Foresight-Based Leadership?......Page 339
3.2 What Actually Makes the Difference Between Foresight and ‘New Forecasting’?......Page 342
4 Concluding Remarks......Page 345
References......Page 347
1 The Introduction of Artificial Intelligence in the Crime Reporting Process......Page 351
2.1 Strategic Fit......Page 353
2.2 Internal Fit......Page 354
2.4 Environmental Fit......Page 355
3.1 Artificial Intelligence and the Quantity of Work......Page 356
3.2 Artificial Intelligence and the Quality of Work......Page 357
4 Artificial Intelligence—A Change Management Perspective......Page 359
5 Conclusion......Page 361
References......Page 363
1 Introduction......Page 365
2 Towards a Practice Theory Approach to (Cyber)Security......Page 366
3 Cybersecurity in Healthcare......Page 367
4 Trainers as Practice Mediators......Page 370
4.1 Material Potentials and Challenges......Page 371
4.2 Knowledge Transition Strategies......Page 372
4.3 Motivational Transmission Processes......Page 373
5 Conclusion......Page 375
References......Page 376
Local Security Governance in Vulnerable Residential Areas......Page 378
1 Vulnerability of Persons and Residential Areas......Page 379
2 Local Safety and Security Governance......Page 382
3 Policing Vulnerable Areas......Page 384
4 Conclusion and Recommendations......Page 387
References......Page 388
1 Introduction......Page 391
2 Intelligence and Policing Activities: The Information Service for the Negative Safety Lens......Page 392
2.1 Intelligence Origins in the State......Page 393
3 Intelligence Analysis......Page 394
4 Shifting the Focus: The Positive Safety Lens and Violence Diffusion......Page 395
5.1 Tactical Level......Page 397
5.2 Strategic Level: Focusing on Happiness Conditions......Page 398
6 Conclusion......Page 400
References......Page 402
How Do We Organise Security? Collaborations and Networks......Page 404
1 Introduction: Why Focus on Work Collaborations that Cross Boundaries?......Page 406
2 Problem Definition: The Challenges of Working Together Across Boundaries......Page 407
3.1 Building a Sense of Shared Identity/Mission and/or a Collectivistic Orientation......Page 410
3.2 Communication and Contact......Page 411
3.3 Boundary-Spanning and Leadership Roles......Page 412
3.4 Human Resource Management (HRM) Practices: Selection and Training......Page 413
4 Summary: Policy and Practice Recommendations for Organisations......Page 414
References......Page 415
1 Introduction......Page 419
2.2 Complex Loyalties......Page 421
2.3 Heterogeneity......Page 423
3 Coping with Unexpected Events......Page 424
3.2 Resilience Engineering (RE)......Page 425
3.3 (Swift) Trust......Page 426
4.1 Governance and Compliance......Page 427
4.2 Adapting in the Margins......Page 428
5 Conclusion......Page 429
References......Page 430
The CBRN Threat. Perspective of an Interagency Response......Page 432
1.1 Chemical Threat......Page 433
1.2 Biological Threat......Page 434
1.3 Radiological-Nuclear Threat......Page 436
2 The Need for a CBRN Response......Page 437
3 The Key-Role of an Interagency Approach......Page 439
3.1 First Responders......Page 440
3.2 Media......Page 441
4.1 Are Civil and Military Approaches Complementary?......Page 442
4.2 Can the Equipment Be the Solution to All Issues?......Page 444
4.3 Can Psychological Consequences of a CBRN Event Impact the Interagency Response?......Page 446
5 Conclusions......Page 447
References......Page 449
1 Introduction......Page 452
2.1 Before......Page 454
2.2 During......Page 458
2.3 After......Page 459
3.1 Importance of Police-Private Security Industry Partnerships......Page 460
3.2 Growth and Regulation of the UK Private Security Sector......Page 463
References......Page 464
1 Introduction......Page 466
2 The Rationale Behind Founding the SCTF......Page 467
3 Professional Criminal Enablers......Page 468
4 Challenges to PPP Arising from the Regulatory System......Page 469
5 Interplay in the Regulatory Framework......Page 470
7 Cooperation or Collaboration?......Page 472
8 Prerequisites of Successful Cooperation: Commitment to Common Goals, Values and Trust......Page 474
9 Why It Makes Sense to Limit the Scope of PPPs......Page 475
References......Page 477
1 Introduction......Page 480
2 General Principles......Page 481
3 Characteristics of Cooperation in the German Security Sector......Page 482
4 Development of Cooperation Mechanisms......Page 483
5 German Counterterrorism Strategy and Security Architecture......Page 484
6 Conclusion......Page 487
Implications for Education and Learning......Page 488
1 Wicked Problems......Page 490
2 Systems Thinking and Complexity Leadership Theory......Page 494
3 A Co-creative Multi-stakeholder Methodology to Address Wicked Problems: Wave-making......Page 495
4 Addressing Wildfires Using the Wave-Making Methodology: A Practical Example......Page 497
5 Conclusion......Page 500
References......Page 501
A Stroke of Genius: Rembrandt’s ‘The Anatomy Lesson’ as an Inspiration for Organising Research For, About and In the World of Policing......Page 502
1.2 Composition of the Group in the Operating Theatre......Page 503
1.3 Hierarchy Within the Group......Page 505
1.4 Object of Study......Page 506
2.1 Issues Regarding the Output and Outcome of Scientific Labour......Page 507
2.2 What is a Guild?......Page 508
2.3 Building a Modern Guild: Four Stages......Page 509
3 What Makes a Research Community?......Page 511
References......Page 512
1 Background......Page 515
4 Method......Page 517
4.1 Outcome: Framework for an M.Sc. Security Management......Page 518
4.2 Context: A Multidisciplinary, Geographically Dispersed Team......Page 520
4.3 Intervention Types and Mechanisms: Blended Instructional Design......Page 521
5.1 Context......Page 523
5.2 Intervention and Mechanisms......Page 524
5.3 Lessons Learned from the Online Course Design Workshops......Page 526
6 Discussion......Page 528
References......Page 530
1 Introduction......Page 532
2 Initial Goals and Aspirations of the European Joint Master’s in Strategic Border Management......Page 533
3 Facts and Figures on the European Joint Master’s in Strategic Border Management......Page 535
4.1 Internationalisation in Higher Education......Page 537
4.2 Methodology......Page 538
4.3 Findings......Page 539
5 Continuity and Multiplication of the European Joint Master’s Activities for International Cooperation in EU Border and Coast Guard Management......Page 541
6 Concluding Remarks......Page 543
References......Page 544
The Establishment of the International Police Relations Section at the German Police University—An Investment in the Present and the Future......Page 546
1.1 The Evolving Disposition of Personnel for International Missions......Page 547
1.2 Research on IPMs in Germany......Page 548
1.5 Political Groundwork......Page 550
2 Teaching......Page 552
3 Training......Page 553
4 Research......Page 554
5 Networking......Page 556
6 Conclusions......Page 557
References......Page 558