The Handbook of Security:
The substantially revised third edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. It reflects the developments in security technology, the convergence of the cyber and security worlds, and the fact that security management...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Software E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2022
Imprint: Palgrave Macmillan 2022 |
Ausgabe: | 3rd ed. 2022 |
Schlagworte: | |
Online-Zugang: | UER01 UBM01 TUM01 UBY01 BTU01 Volltext |
Zusammenfassung: | The substantially revised third edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. It reflects the developments in security technology, the convergence of the cyber and security worlds, and the fact that security management has become even more business focused. It covers newer topics like terrorism, violence, and cybercrime through various offence types such as commercial robbery and bribery. This handbook comprises mostly brand new chapters and a few thoroughly revised chapters, with discussions of the impact of the pandemic. It includes contributions from some of the world's leading scholars from an even broader geographic scale to critique the way security is provided and managed. It speaks to professionals working in security and students studying security-related courses. Chapter 5 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com |
Beschreibung: | 1 Online-Ressource (XLII, 1029 Seiten 41 illus.) |
ISBN: | 9783030917357 |
DOI: | 10.1007/978-3-030-91735-7 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV048557768 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cu|uuu---uuuuu | ||
008 | 221111s2022 |||| ||u| ||||||eng d | ||
020 | |a 9783030917357 |9 978-3-030-91735-7 | ||
024 | 7 | |a 10.1007/978-3-030-91735-7 |2 doi | |
035 | |a (ZDB-2-LCR)978-3-030-91735-7 | ||
035 | |a (OCoLC)1350773652 | ||
035 | |a (DE-599)BVBBV048557768 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-91 |a DE-19 |a DE-706 |a DE-29 |a DE-188 | ||
245 | 1 | 0 | |a The Handbook of Security |c edited by Martin Gill |
250 | |a 3rd ed. 2022 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2022 | |
264 | 1 | |b Imprint: Palgrave Macmillan |c 2022 | |
300 | |a 1 Online-Ressource (XLII, 1029 Seiten 41 illus.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a 1. Introduction, Martin Gill -- PART 1. The Subject Area of Security -- 2. Security: History, Genealogy, Ideology, Dodsworth, F -- 3. Shifting The Boundaries Of Security: Meanings And Applications, Dr Helen Forbes-Mewett -- 4. Explaining The Impact And Implications Of Covid-19 On Crime Rates: A Criminological Perspective , Rob Mawby -- 5. Forensic Intelligence And Traceology In Digitalised Environments: The Detection And Analysis Of Crime Patterns To Inform Practice, Olivier Ribaux Simon Baechler, Quentin Rossy -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways To Manage Them, Tochukwu Omenma And Silvia D'amato -- 7 -- PART 2. Offence Types. - Private Security/Private Military: One Phenomenon Or Two?, Adam White -- 8. The Evolution Of The Terrorism And Extremism Landscape In The Age Of Covid-19, Kumar Ramakrishna -- 9. Violence Against Shop Workers: Trends And Triggers In The United Kingdom, Emmeline Taylor -- | |
505 | 8 | |a 10. Burglary Research And Conceptualizing The Community Security Function, A Learning Organization, Jim Calder April -- 11. Meeting The Challenges Of Fraud In A Digital World, Cassandra Cross -- 12. Examining Private Sector Strategies For Preventing Insurance Fraud, Dr. Yuriy Timofeyev And Mike Skidmore -- 13. Economic And Industrial Espionage: Characteristics, Techniques And Response, Mark Button And Susanne Knickmeier -- 14. Combatting Money Laundering: Some Considerations For Security Professionals, Professor Mike Levi -- 15. - PART 3. Crime And Security In Different Domains. - Corruption, Bribery And Corporate Crime: Victims And Perpetrators, Hock, B., Shepherd, D And Button, M -- 16. Securing The Bioeconomy: Exploring The Role Of Cyberbiosecurity, Patrick Walsh -- 17. Border Security: An Essential But Effective Tool In Combating Cross-Border Crime, Prof Anthony Minnaar -- 18. Security In The Chemical Industry: Theory And Practice, Chao Chen And Genserik Reniers -- | |
505 | 8 | |a 19. The Evolution Of College And University Campus Security In The United States: Congressional Legislation, Administrative Directives, And Policing, Bonnie Fisher, Michelle Protas, Logan Lanson And John Sloan -- 20. Addressing The Security Issues Related To Illegal Commercial Fishing, Gohar A. Petrossian And Ron Clarke -- 21. Crime On The Darknet: The Case Of Brand Abuse, Victoria Wang. Jim Gee, Mark Button -- 22. - PART 4. Researching Security. - Representing Security: A Popular Criminology Of Private Policing In Film, Steven Kohm -- 23. Systematic Reviews And Meta-Analysis Of Security, Matthew Manning, Gabriel T.W. Wong, Hien-Thuc Pham -- 24. Realistic Evaluation And The 5is: A Systematic Approach For Evaluating Security Interventions, Andrew Newton -- 25. Script Analysis For Security Professionals: Past, Present And Future, Dr. Harald Haelterman -- | |
505 | 8 | |a 26. Using Mobile Applications And Physiological Sensing To Measure Perception Of Security In Built Environments, Reka Solymosi, Ines Guedes, Laura Vozmediano -- 27.Researching The Relationship Between Tourism And Crime: The Tourism Industry And The Disenfranchised Citizens, Rob I Mawby And Zarina I Vakhitova -- PART 5. Security Products And Services. - 28. Security Officers: The Public Face Of The Security Industry, Mahesh K. Nalla And Alison Wakefield -- 30. Private And Corporate Investigations - Internal Security Governance Within Organisation, Clarissa Meerts -- 31. Training And Education Within The Security Sector: Challenges And Opportunities For Development, Declan Garrett, Glen Kitteringham And Ken Livingstone -- 32. CCTV As A Socio-Technology, Markus Lahtinen And Benjamin Weaver -- 33. Intrusion Detection Systems In The Protection Of Assets, David J Brooks -- | |
505 | 8 | |a PART 6. Towards a Better Security. - 34. Crime And The Consumer Internet Of Things, Shane D Johnson, John M Blythe, Eon Kim And Nissy Sombatruang -- 35. Professional Security In The Fourth Industrial Revolution, Alison Wakefield And Mike Gips -- 36. Security Or Liberty? Human Rights And Protest, Kate Moss -- 37. Facilitating Best Practice In Security: The Role Of Regulation, Tim Prenzler And R Sarre -- 38. Formal And Informal (In)Security In South Africa, G. D. Breetzke -- 39. Facing Up To The Future: The Role Of Horizon-Scanning In Helping Security Keep Up With The Changes To Come, Paul Ekblom -- 40. The Securitization Of Terrestrial Protected Areas, William D. Moreto -- PART 7. The Impacts of Security. - 41. The Carbon Footprint Of Crime And Security,Helen Shoesmith (Nee Skudder), Ian Brunton-Smith, Andromachi Tseloni, Rebecca Thompson, And Angela Druckman -- 42. Security And International Crime Drops, Nick Tilley And Graham Farrell -- | |
505 | 8 | |a 43. The Role Of Crime Prevention Through Environmental Design (Cpted) In Improving Household Security Rachel Armitage, Lisa Tompson.-44. Examining The Use Of Video Technologies In Retailing, Adrian Beck -- 45. Making An Economic Case For Security, Matthew Manning, Christopher M. Fleming, Hien-Thuc Pham -- 46. Business Resilience To Crime: The Harms Of Crime, Business Fragility And The Role Of Security, Matt Hopkins -- 47. Security In Perspective, Martin Gill | |
520 | 3 | |a The substantially revised third edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. It reflects the developments in security technology, the convergence of the cyber and security worlds, and the fact that security management has become even more business focused. It covers newer topics like terrorism, violence, and cybercrime through various offence types such as commercial robbery and bribery. This handbook comprises mostly brand new chapters and a few thoroughly revised chapters, with discussions of the impact of the pandemic. It includes contributions from some of the world's leading scholars from an even broader geographic scale to critique the way security is provided and managed. It speaks to professionals working in security and students studying security-related courses. Chapter 5 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com | |
650 | 4 | |a Crime Control and Security | |
650 | 4 | |a Organized Crime | |
650 | 4 | |a Military and Defence Studies | |
650 | 4 | |a Business and Management | |
650 | 4 | |a Corporate Governance | |
650 | 4 | |a International Security Studies | |
650 | 4 | |a Criminology | |
650 | 4 | |a Organized crime | |
650 | 4 | |a Politics and war | |
650 | 4 | |a Business | |
650 | 4 | |a Management science | |
650 | 4 | |a Corporate governance | |
650 | 4 | |a Security, International | |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Technologie |0 (DE-588)4059276-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | 1 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Technologie |0 (DE-588)4059276-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Gill, Martin |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783030917340 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783030917364 |
856 | 4 | |u https://doi.org/10.1007/978-3-030-91735-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext | |
912 | |a ZDB-2-LCR | ||
940 | 1 | |q ZDB-2-LCR_2022 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-033934023 | ||
347 | |a text file |b PDF |2 rda | ||
966 | e | |u https://doi.org/10.1007/978-3-030-91735-7 |l UER01 |p ZDB-2-LCR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-91735-7 |l UBM01 |p ZDB-2-LCR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-91735-7 |l TUM01 |p ZDB-2-LCR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-91735-7 |l UBY01 |p ZDB-2-LCR |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-91735-7 |l BTU01 |p ZDB-2-LCR |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184569279152128 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Gill, Martin |
author2_role | edt |
author2_variant | m g mg |
author_facet | Gill, Martin |
building | Verbundindex |
bvnumber | BV048557768 |
collection | ZDB-2-LCR |
contents | 1. Introduction, Martin Gill -- PART 1. The Subject Area of Security -- 2. Security: History, Genealogy, Ideology, Dodsworth, F -- 3. Shifting The Boundaries Of Security: Meanings And Applications, Dr Helen Forbes-Mewett -- 4. Explaining The Impact And Implications Of Covid-19 On Crime Rates: A Criminological Perspective , Rob Mawby -- 5. Forensic Intelligence And Traceology In Digitalised Environments: The Detection And Analysis Of Crime Patterns To Inform Practice, Olivier Ribaux Simon Baechler, Quentin Rossy -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways To Manage Them, Tochukwu Omenma And Silvia D'amato -- 7 -- PART 2. Offence Types. - Private Security/Private Military: One Phenomenon Or Two?, Adam White -- 8. The Evolution Of The Terrorism And Extremism Landscape In The Age Of Covid-19, Kumar Ramakrishna -- 9. Violence Against Shop Workers: Trends And Triggers In The United Kingdom, Emmeline Taylor -- 10. Burglary Research And Conceptualizing The Community Security Function, A Learning Organization, Jim Calder April -- 11. Meeting The Challenges Of Fraud In A Digital World, Cassandra Cross -- 12. Examining Private Sector Strategies For Preventing Insurance Fraud, Dr. Yuriy Timofeyev And Mike Skidmore -- 13. Economic And Industrial Espionage: Characteristics, Techniques And Response, Mark Button And Susanne Knickmeier -- 14. Combatting Money Laundering: Some Considerations For Security Professionals, Professor Mike Levi -- 15. - PART 3. Crime And Security In Different Domains. - Corruption, Bribery And Corporate Crime: Victims And Perpetrators, Hock, B., Shepherd, D And Button, M -- 16. Securing The Bioeconomy: Exploring The Role Of Cyberbiosecurity, Patrick Walsh -- 17. Border Security: An Essential But Effective Tool In Combating Cross-Border Crime, Prof Anthony Minnaar -- 18. Security In The Chemical Industry: Theory And Practice, Chao Chen And Genserik Reniers -- 19. The Evolution Of College And University Campus Security In The United States: Congressional Legislation, Administrative Directives, And Policing, Bonnie Fisher, Michelle Protas, Logan Lanson And John Sloan -- 20. Addressing The Security Issues Related To Illegal Commercial Fishing, Gohar A. Petrossian And Ron Clarke -- 21. Crime On The Darknet: The Case Of Brand Abuse, Victoria Wang. Jim Gee, Mark Button -- 22. - PART 4. Researching Security. - Representing Security: A Popular Criminology Of Private Policing In Film, Steven Kohm -- 23. Systematic Reviews And Meta-Analysis Of Security, Matthew Manning, Gabriel T.W. Wong, Hien-Thuc Pham -- 24. Realistic Evaluation And The 5is: A Systematic Approach For Evaluating Security Interventions, Andrew Newton -- 25. Script Analysis For Security Professionals: Past, Present And Future, Dr. Harald Haelterman -- 26. Using Mobile Applications And Physiological Sensing To Measure Perception Of Security In Built Environments, Reka Solymosi, Ines Guedes, Laura Vozmediano -- 27.Researching The Relationship Between Tourism And Crime: The Tourism Industry And The Disenfranchised Citizens, Rob I Mawby And Zarina I Vakhitova -- PART 5. Security Products And Services. - 28. Security Officers: The Public Face Of The Security Industry, Mahesh K. Nalla And Alison Wakefield -- 30. Private And Corporate Investigations - Internal Security Governance Within Organisation, Clarissa Meerts -- 31. Training And Education Within The Security Sector: Challenges And Opportunities For Development, Declan Garrett, Glen Kitteringham And Ken Livingstone -- 32. CCTV As A Socio-Technology, Markus Lahtinen And Benjamin Weaver -- 33. Intrusion Detection Systems In The Protection Of Assets, David J Brooks -- PART 6. Towards a Better Security. - 34. Crime And The Consumer Internet Of Things, Shane D Johnson, John M Blythe, Eon Kim And Nissy Sombatruang -- 35. Professional Security In The Fourth Industrial Revolution, Alison Wakefield And Mike Gips -- 36. Security Or Liberty? Human Rights And Protest, Kate Moss -- 37. Facilitating Best Practice In Security: The Role Of Regulation, Tim Prenzler And R Sarre -- 38. Formal And Informal (In)Security In South Africa, G. D. Breetzke -- 39. Facing Up To The Future: The Role Of Horizon-Scanning In Helping Security Keep Up With The Changes To Come, Paul Ekblom -- 40. The Securitization Of Terrestrial Protected Areas, William D. Moreto -- PART 7. The Impacts of Security. - 41. The Carbon Footprint Of Crime And Security,Helen Shoesmith (Nee Skudder), Ian Brunton-Smith, Andromachi Tseloni, Rebecca Thompson, And Angela Druckman -- 42. Security And International Crime Drops, Nick Tilley And Graham Farrell -- 43. The Role Of Crime Prevention Through Environmental Design (Cpted) In Improving Household Security Rachel Armitage, Lisa Tompson.-44. Examining The Use Of Video Technologies In Retailing, Adrian Beck -- 45. Making An Economic Case For Security, Matthew Manning, Christopher M. Fleming, Hien-Thuc Pham -- 46. Business Resilience To Crime: The Harms Of Crime, Business Fragility And The Role Of Security, Matt Hopkins -- 47. Security In Perspective, Martin Gill |
ctrlnum | (ZDB-2-LCR)978-3-030-91735-7 (OCoLC)1350773652 (DE-599)BVBBV048557768 |
doi_str_mv | 10.1007/978-3-030-91735-7 |
edition | 3rd ed. 2022 |
format | Electronic Software eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08951nmm a2200781 c 4500</leader><controlfield tag="001">BV048557768</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cu|uuu---uuuuu</controlfield><controlfield tag="008">221111s2022 |||| ||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030917357</subfield><subfield code="9">978-3-030-91735-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-91735-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LCR)978-3-030-91735-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1350773652</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048557768</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Handbook of Security</subfield><subfield code="c">edited by Martin Gill</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3rd ed. 2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">Imprint: Palgrave Macmillan</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XLII, 1029 Seiten 41 illus.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Introduction, Martin Gill -- PART 1. The Subject Area of Security -- 2. Security: History, Genealogy, Ideology, Dodsworth, F -- 3. Shifting The Boundaries Of Security: Meanings And Applications, Dr Helen Forbes-Mewett -- 4. Explaining The Impact And Implications Of Covid-19 On Crime Rates: A Criminological Perspective , Rob Mawby -- 5. Forensic Intelligence And Traceology In Digitalised Environments: The Detection And Analysis Of Crime Patterns To Inform Practice, Olivier Ribaux Simon Baechler, Quentin Rossy -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways To Manage Them, Tochukwu Omenma And Silvia D'amato -- 7 -- PART 2. Offence Types. - Private Security/Private Military: One Phenomenon Or Two?, Adam White -- 8. The Evolution Of The Terrorism And Extremism Landscape In The Age Of Covid-19, Kumar Ramakrishna -- 9. Violence Against Shop Workers: Trends And Triggers In The United Kingdom, Emmeline Taylor -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">10. Burglary Research And Conceptualizing The Community Security Function, A Learning Organization, Jim Calder April -- 11. Meeting The Challenges Of Fraud In A Digital World, Cassandra Cross -- 12. Examining Private Sector Strategies For Preventing Insurance Fraud, Dr. Yuriy Timofeyev And Mike Skidmore -- 13. Economic And Industrial Espionage: Characteristics, Techniques And Response, Mark Button And Susanne Knickmeier -- 14. Combatting Money Laundering: Some Considerations For Security Professionals, Professor Mike Levi -- 15. - PART 3. Crime And Security In Different Domains. - Corruption, Bribery And Corporate Crime: Victims And Perpetrators, Hock, B., Shepherd, D And Button, M -- 16. Securing The Bioeconomy: Exploring The Role Of Cyberbiosecurity, Patrick Walsh -- 17. Border Security: An Essential But Effective Tool In Combating Cross-Border Crime, Prof Anthony Minnaar -- 18. Security In The Chemical Industry: Theory And Practice, Chao Chen And Genserik Reniers -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">19. The Evolution Of College And University Campus Security In The United States: Congressional Legislation, Administrative Directives, And Policing, Bonnie Fisher, Michelle Protas, Logan Lanson And John Sloan -- 20. Addressing The Security Issues Related To Illegal Commercial Fishing, Gohar A. Petrossian And Ron Clarke -- 21. Crime On The Darknet: The Case Of Brand Abuse, Victoria Wang. Jim Gee, Mark Button -- 22. - PART 4. Researching Security. - Representing Security: A Popular Criminology Of Private Policing In Film, Steven Kohm -- 23. Systematic Reviews And Meta-Analysis Of Security, Matthew Manning, Gabriel T.W. Wong, Hien-Thuc Pham -- 24. Realistic Evaluation And The 5is: A Systematic Approach For Evaluating Security Interventions, Andrew Newton -- 25. Script Analysis For Security Professionals: Past, Present And Future, Dr. Harald Haelterman -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">26. Using Mobile Applications And Physiological Sensing To Measure Perception Of Security In Built Environments, Reka Solymosi, Ines Guedes, Laura Vozmediano -- 27.Researching The Relationship Between Tourism And Crime: The Tourism Industry And The Disenfranchised Citizens, Rob I Mawby And Zarina I Vakhitova -- PART 5. Security Products And Services. - 28. Security Officers: The Public Face Of The Security Industry, Mahesh K. Nalla And Alison Wakefield -- 30. Private And Corporate Investigations - Internal Security Governance Within Organisation, Clarissa Meerts -- 31. Training And Education Within The Security Sector: Challenges And Opportunities For Development, Declan Garrett, Glen Kitteringham And Ken Livingstone -- 32. CCTV As A Socio-Technology, Markus Lahtinen And Benjamin Weaver -- 33. Intrusion Detection Systems In The Protection Of Assets, David J Brooks -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">PART 6. Towards a Better Security. - 34. Crime And The Consumer Internet Of Things, Shane D Johnson, John M Blythe, Eon Kim And Nissy Sombatruang -- 35. Professional Security In The Fourth Industrial Revolution, Alison Wakefield And Mike Gips -- 36. Security Or Liberty? Human Rights And Protest, Kate Moss -- 37. Facilitating Best Practice In Security: The Role Of Regulation, Tim Prenzler And R Sarre -- 38. Formal And Informal (In)Security In South Africa, G. D. Breetzke -- 39. Facing Up To The Future: The Role Of Horizon-Scanning In Helping Security Keep Up With The Changes To Come, Paul Ekblom -- 40. The Securitization Of Terrestrial Protected Areas, William D. Moreto -- PART 7. The Impacts of Security. - 41. The Carbon Footprint Of Crime And Security,Helen Shoesmith (Nee Skudder), Ian Brunton-Smith, Andromachi Tseloni, Rebecca Thompson, And Angela Druckman -- 42. Security And International Crime Drops, Nick Tilley And Graham Farrell -- </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">43. The Role Of Crime Prevention Through Environmental Design (Cpted) In Improving Household Security Rachel Armitage, Lisa Tompson.-44. Examining The Use Of Video Technologies In Retailing, Adrian Beck -- 45. Making An Economic Case For Security, Matthew Manning, Christopher M. Fleming, Hien-Thuc Pham -- 46. Business Resilience To Crime: The Harms Of Crime, Business Fragility And The Role Of Security, Matt Hopkins -- 47. Security In Perspective, Martin Gill</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The substantially revised third edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. It reflects the developments in security technology, the convergence of the cyber and security worlds, and the fact that security management has become even more business focused. It covers newer topics like terrorism, violence, and cybercrime through various offence types such as commercial robbery and bribery. This handbook comprises mostly brand new chapters and a few thoroughly revised chapters, with discussions of the impact of the pandemic. It includes contributions from some of the world's leading scholars from an even broader geographic scale to critique the way security is provided and managed. It speaks to professionals working in security and students studying security-related courses. Chapter 5 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime Control and Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Organized Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Military and Defence Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business and Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporate Governance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International Security Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Organized crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politics and war</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporate governance</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, International</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gill, Martin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783030917340</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783030917364</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-91735-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LCR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LCR_2022</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033934023</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-91735-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-91735-7</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-91735-7</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-91735-7</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-91735-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LCR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048557768 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:59:09Z |
indexdate | 2024-07-10T09:41:25Z |
institution | BVB |
isbn | 9783030917357 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033934023 |
oclc_num | 1350773652 |
open_access_boolean | |
owner | DE-634 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-706 DE-29 DE-188 |
owner_facet | DE-634 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-706 DE-29 DE-188 |
physical | 1 Online-Ressource (XLII, 1029 Seiten 41 illus.) |
psigel | ZDB-2-LCR ZDB-2-LCR_2022 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer International Publishing Imprint: Palgrave Macmillan |
record_format | marc |
spelling | The Handbook of Security edited by Martin Gill 3rd ed. 2022 Cham Springer International Publishing 2022 Imprint: Palgrave Macmillan 2022 1 Online-Ressource (XLII, 1029 Seiten 41 illus.) txt rdacontent c rdamedia cr rdacarrier 1. Introduction, Martin Gill -- PART 1. The Subject Area of Security -- 2. Security: History, Genealogy, Ideology, Dodsworth, F -- 3. Shifting The Boundaries Of Security: Meanings And Applications, Dr Helen Forbes-Mewett -- 4. Explaining The Impact And Implications Of Covid-19 On Crime Rates: A Criminological Perspective , Rob Mawby -- 5. Forensic Intelligence And Traceology In Digitalised Environments: The Detection And Analysis Of Crime Patterns To Inform Practice, Olivier Ribaux Simon Baechler, Quentin Rossy -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways To Manage Them, Tochukwu Omenma And Silvia D'amato -- 7 -- PART 2. Offence Types. - Private Security/Private Military: One Phenomenon Or Two?, Adam White -- 8. The Evolution Of The Terrorism And Extremism Landscape In The Age Of Covid-19, Kumar Ramakrishna -- 9. Violence Against Shop Workers: Trends And Triggers In The United Kingdom, Emmeline Taylor -- 10. Burglary Research And Conceptualizing The Community Security Function, A Learning Organization, Jim Calder April -- 11. Meeting The Challenges Of Fraud In A Digital World, Cassandra Cross -- 12. Examining Private Sector Strategies For Preventing Insurance Fraud, Dr. Yuriy Timofeyev And Mike Skidmore -- 13. Economic And Industrial Espionage: Characteristics, Techniques And Response, Mark Button And Susanne Knickmeier -- 14. Combatting Money Laundering: Some Considerations For Security Professionals, Professor Mike Levi -- 15. - PART 3. Crime And Security In Different Domains. - Corruption, Bribery And Corporate Crime: Victims And Perpetrators, Hock, B., Shepherd, D And Button, M -- 16. Securing The Bioeconomy: Exploring The Role Of Cyberbiosecurity, Patrick Walsh -- 17. Border Security: An Essential But Effective Tool In Combating Cross-Border Crime, Prof Anthony Minnaar -- 18. Security In The Chemical Industry: Theory And Practice, Chao Chen And Genserik Reniers -- 19. The Evolution Of College And University Campus Security In The United States: Congressional Legislation, Administrative Directives, And Policing, Bonnie Fisher, Michelle Protas, Logan Lanson And John Sloan -- 20. Addressing The Security Issues Related To Illegal Commercial Fishing, Gohar A. Petrossian And Ron Clarke -- 21. Crime On The Darknet: The Case Of Brand Abuse, Victoria Wang. Jim Gee, Mark Button -- 22. - PART 4. Researching Security. - Representing Security: A Popular Criminology Of Private Policing In Film, Steven Kohm -- 23. Systematic Reviews And Meta-Analysis Of Security, Matthew Manning, Gabriel T.W. Wong, Hien-Thuc Pham -- 24. Realistic Evaluation And The 5is: A Systematic Approach For Evaluating Security Interventions, Andrew Newton -- 25. Script Analysis For Security Professionals: Past, Present And Future, Dr. Harald Haelterman -- 26. Using Mobile Applications And Physiological Sensing To Measure Perception Of Security In Built Environments, Reka Solymosi, Ines Guedes, Laura Vozmediano -- 27.Researching The Relationship Between Tourism And Crime: The Tourism Industry And The Disenfranchised Citizens, Rob I Mawby And Zarina I Vakhitova -- PART 5. Security Products And Services. - 28. Security Officers: The Public Face Of The Security Industry, Mahesh K. Nalla And Alison Wakefield -- 30. Private And Corporate Investigations - Internal Security Governance Within Organisation, Clarissa Meerts -- 31. Training And Education Within The Security Sector: Challenges And Opportunities For Development, Declan Garrett, Glen Kitteringham And Ken Livingstone -- 32. CCTV As A Socio-Technology, Markus Lahtinen And Benjamin Weaver -- 33. Intrusion Detection Systems In The Protection Of Assets, David J Brooks -- PART 6. Towards a Better Security. - 34. Crime And The Consumer Internet Of Things, Shane D Johnson, John M Blythe, Eon Kim And Nissy Sombatruang -- 35. Professional Security In The Fourth Industrial Revolution, Alison Wakefield And Mike Gips -- 36. Security Or Liberty? Human Rights And Protest, Kate Moss -- 37. Facilitating Best Practice In Security: The Role Of Regulation, Tim Prenzler And R Sarre -- 38. Formal And Informal (In)Security In South Africa, G. D. Breetzke -- 39. Facing Up To The Future: The Role Of Horizon-Scanning In Helping Security Keep Up With The Changes To Come, Paul Ekblom -- 40. The Securitization Of Terrestrial Protected Areas, William D. Moreto -- PART 7. The Impacts of Security. - 41. The Carbon Footprint Of Crime And Security,Helen Shoesmith (Nee Skudder), Ian Brunton-Smith, Andromachi Tseloni, Rebecca Thompson, And Angela Druckman -- 42. Security And International Crime Drops, Nick Tilley And Graham Farrell -- 43. The Role Of Crime Prevention Through Environmental Design (Cpted) In Improving Household Security Rachel Armitage, Lisa Tompson.-44. Examining The Use Of Video Technologies In Retailing, Adrian Beck -- 45. Making An Economic Case For Security, Matthew Manning, Christopher M. Fleming, Hien-Thuc Pham -- 46. Business Resilience To Crime: The Harms Of Crime, Business Fragility And The Role Of Security, Matt Hopkins -- 47. Security In Perspective, Martin Gill The substantially revised third edition of The Handbook of Security provides the most comprehensive analysis of scholarly security debates and issues to date. It reflects the developments in security technology, the convergence of the cyber and security worlds, and the fact that security management has become even more business focused. It covers newer topics like terrorism, violence, and cybercrime through various offence types such as commercial robbery and bribery. This handbook comprises mostly brand new chapters and a few thoroughly revised chapters, with discussions of the impact of the pandemic. It includes contributions from some of the world's leading scholars from an even broader geographic scale to critique the way security is provided and managed. It speaks to professionals working in security and students studying security-related courses. Chapter 5 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com Crime Control and Security Organized Crime Military and Defence Studies Business and Management Corporate Governance International Security Studies Criminology Organized crime Politics and war Business Management science Corporate governance Security, International Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Technologie (DE-588)4059276-5 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Innere Sicherheit (DE-588)4127888-4 s Sicherheitspolitik (DE-588)4116489-1 s Computersicherheit (DE-588)4274324-2 s Technologie (DE-588)4059276-5 s DE-604 Gill, Martin edt Erscheint auch als Druck-Ausgabe 9783030917340 Erscheint auch als Druck-Ausgabe 9783030917364 https://doi.org/10.1007/978-3-030-91735-7 Verlag URL des Erstveröffentlichers Volltext text file PDF rda |
spellingShingle | The Handbook of Security 1. Introduction, Martin Gill -- PART 1. The Subject Area of Security -- 2. Security: History, Genealogy, Ideology, Dodsworth, F -- 3. Shifting The Boundaries Of Security: Meanings And Applications, Dr Helen Forbes-Mewett -- 4. Explaining The Impact And Implications Of Covid-19 On Crime Rates: A Criminological Perspective , Rob Mawby -- 5. Forensic Intelligence And Traceology In Digitalised Environments: The Detection And Analysis Of Crime Patterns To Inform Practice, Olivier Ribaux Simon Baechler, Quentin Rossy -- 6. Changing Threats And Challenges In International Relations: Debating (In)Securities And Ways To Manage Them, Tochukwu Omenma And Silvia D'amato -- 7 -- PART 2. Offence Types. - Private Security/Private Military: One Phenomenon Or Two?, Adam White -- 8. The Evolution Of The Terrorism And Extremism Landscape In The Age Of Covid-19, Kumar Ramakrishna -- 9. Violence Against Shop Workers: Trends And Triggers In The United Kingdom, Emmeline Taylor -- 10. Burglary Research And Conceptualizing The Community Security Function, A Learning Organization, Jim Calder April -- 11. Meeting The Challenges Of Fraud In A Digital World, Cassandra Cross -- 12. Examining Private Sector Strategies For Preventing Insurance Fraud, Dr. Yuriy Timofeyev And Mike Skidmore -- 13. Economic And Industrial Espionage: Characteristics, Techniques And Response, Mark Button And Susanne Knickmeier -- 14. Combatting Money Laundering: Some Considerations For Security Professionals, Professor Mike Levi -- 15. - PART 3. Crime And Security In Different Domains. - Corruption, Bribery And Corporate Crime: Victims And Perpetrators, Hock, B., Shepherd, D And Button, M -- 16. Securing The Bioeconomy: Exploring The Role Of Cyberbiosecurity, Patrick Walsh -- 17. Border Security: An Essential But Effective Tool In Combating Cross-Border Crime, Prof Anthony Minnaar -- 18. Security In The Chemical Industry: Theory And Practice, Chao Chen And Genserik Reniers -- 19. The Evolution Of College And University Campus Security In The United States: Congressional Legislation, Administrative Directives, And Policing, Bonnie Fisher, Michelle Protas, Logan Lanson And John Sloan -- 20. Addressing The Security Issues Related To Illegal Commercial Fishing, Gohar A. Petrossian And Ron Clarke -- 21. Crime On The Darknet: The Case Of Brand Abuse, Victoria Wang. Jim Gee, Mark Button -- 22. - PART 4. Researching Security. - Representing Security: A Popular Criminology Of Private Policing In Film, Steven Kohm -- 23. Systematic Reviews And Meta-Analysis Of Security, Matthew Manning, Gabriel T.W. Wong, Hien-Thuc Pham -- 24. Realistic Evaluation And The 5is: A Systematic Approach For Evaluating Security Interventions, Andrew Newton -- 25. Script Analysis For Security Professionals: Past, Present And Future, Dr. Harald Haelterman -- 26. Using Mobile Applications And Physiological Sensing To Measure Perception Of Security In Built Environments, Reka Solymosi, Ines Guedes, Laura Vozmediano -- 27.Researching The Relationship Between Tourism And Crime: The Tourism Industry And The Disenfranchised Citizens, Rob I Mawby And Zarina I Vakhitova -- PART 5. Security Products And Services. - 28. Security Officers: The Public Face Of The Security Industry, Mahesh K. Nalla And Alison Wakefield -- 30. Private And Corporate Investigations - Internal Security Governance Within Organisation, Clarissa Meerts -- 31. Training And Education Within The Security Sector: Challenges And Opportunities For Development, Declan Garrett, Glen Kitteringham And Ken Livingstone -- 32. CCTV As A Socio-Technology, Markus Lahtinen And Benjamin Weaver -- 33. Intrusion Detection Systems In The Protection Of Assets, David J Brooks -- PART 6. Towards a Better Security. - 34. Crime And The Consumer Internet Of Things, Shane D Johnson, John M Blythe, Eon Kim And Nissy Sombatruang -- 35. Professional Security In The Fourth Industrial Revolution, Alison Wakefield And Mike Gips -- 36. Security Or Liberty? Human Rights And Protest, Kate Moss -- 37. Facilitating Best Practice In Security: The Role Of Regulation, Tim Prenzler And R Sarre -- 38. Formal And Informal (In)Security In South Africa, G. D. Breetzke -- 39. Facing Up To The Future: The Role Of Horizon-Scanning In Helping Security Keep Up With The Changes To Come, Paul Ekblom -- 40. The Securitization Of Terrestrial Protected Areas, William D. Moreto -- PART 7. The Impacts of Security. - 41. The Carbon Footprint Of Crime And Security,Helen Shoesmith (Nee Skudder), Ian Brunton-Smith, Andromachi Tseloni, Rebecca Thompson, And Angela Druckman -- 42. Security And International Crime Drops, Nick Tilley And Graham Farrell -- 43. The Role Of Crime Prevention Through Environmental Design (Cpted) In Improving Household Security Rachel Armitage, Lisa Tompson.-44. Examining The Use Of Video Technologies In Retailing, Adrian Beck -- 45. Making An Economic Case For Security, Matthew Manning, Christopher M. Fleming, Hien-Thuc Pham -- 46. Business Resilience To Crime: The Harms Of Crime, Business Fragility And The Role Of Security, Matt Hopkins -- 47. Security In Perspective, Martin Gill Crime Control and Security Organized Crime Military and Defence Studies Business and Management Corporate Governance International Security Studies Criminology Organized crime Politics and war Business Management science Corporate governance Security, International Innere Sicherheit (DE-588)4127888-4 gnd Technologie (DE-588)4059276-5 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4127888-4 (DE-588)4059276-5 (DE-588)4116489-1 (DE-588)4274324-2 |
title | The Handbook of Security |
title_auth | The Handbook of Security |
title_exact_search | The Handbook of Security |
title_exact_search_txtP | The Handbook of Security |
title_full | The Handbook of Security edited by Martin Gill |
title_fullStr | The Handbook of Security edited by Martin Gill |
title_full_unstemmed | The Handbook of Security edited by Martin Gill |
title_short | The Handbook of Security |
title_sort | the handbook of security |
topic | Crime Control and Security Organized Crime Military and Defence Studies Business and Management Corporate Governance International Security Studies Criminology Organized crime Politics and war Business Management science Corporate governance Security, International Innere Sicherheit (DE-588)4127888-4 gnd Technologie (DE-588)4059276-5 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Crime Control and Security Organized Crime Military and Defence Studies Business and Management Corporate Governance International Security Studies Criminology Organized crime Politics and war Business Management science Corporate governance Security, International Innere Sicherheit Technologie Sicherheitspolitik Computersicherheit |
url | https://doi.org/10.1007/978-3-030-91735-7 |
work_keys_str_mv | AT gillmartin thehandbookofsecurity |