Security Privatization

How Non-security-related Private Businesses Shape Security Governance
 
 
Springer (Verlag)
  • erschienen am 29. September 2017
  • |
  • XIV, 302 Seiten
 
E-Book | PDF mit Adobe DRM | Systemvoraussetzungen
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-63010-6 (ISBN)
 

This book widens the current debate on security privatization by examining how and why an increasing number of private actors beyond private military and security companies (PMSCs) have come to perform various security related functions. While PMSCs provide security for profit, most other private sector stakeholders make a profit by selling goods and services that were not originally connected with security in the traditional sense. However, due to the continuous introduction of new legal and technical regulations by public authorities, many non-security-related private businesses now have to perform at least some security functions.

This volume offers new insights into security practices of non-security-related private businesses and their impact on security governance. The contributions extend beyond the conceptual and theoretical arguments in the existing body of literature to offer a range of original case studies on the specific roles of non-security-related private companies of all sizes, from all areas of business and from different geographic regions.

1st ed. 2018
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 3
  • |
  • 2 farbige Tabellen, 3 s/w Abbildungen
  • |
  • 3 schwarz-weiße Abbildungen, 2 farbige Tabellen, Bibliographie
  • 3,82 MB
978-3-319-63010-6 (9783319630106)
3319630105 (3319630105)
10.1007/978-3-319-63010-6
weitere Ausgaben werden ermittelt

Associate Professor Oldrich Bures is the Head of the Department of International Relations and European Studies and the Center of Security Studies, both at Metropolitan University Prague. He was previously a senior lecturer at Palacky University, a Fulbright Fellow at the Joan. B. Kroc Institute, University of Notre Dame; an External Research Fellow at the Centre for European Security, School of English, Sociology, Politics & Contemporary History, University of Salford; and Marie-Curie COFUND Senior Research Fellow at the Institute of Health, Risk and Resilience at Durham University. His research is focused in the areas privatization of security and the EU counterterrorism policy. He was awarded several external research grants, including three multiple-institutions grants by the Czech Science Foundation. His work has been published in Security Dialogue, Cooperation and Conflict, Terrorism and Political Violence, Studies in Conflict and Terrorism, International Studies Review, and Intelligence and National Security among other key journals. He is the author of several monographs, including EU Counterterrorism Policy: A Paper Tiger? (Ashgate, 2011) and Private Security Companies: Transforming Politics and Security in the Czech Republic (Palgrave Macmillan, 2015), and (co-)editor of several edited volumes, including A Decade of EU Counter-Terrorism and Intelligence: A Critical Assessment (Routledge 2016).

Helena Carrapico is a Senior Lecturer in Politics and International Relations at Aston University and she is a co- Director for the Aston Centre for Europe and its Jean Monnet Centre of Excellence. Her research focuses on European internal security, in particular EU organised crime. She holds a doctoral degree in Social and Political Sciences from the European University Institute, where she developed her thesis on the securitization of organised crime. She has considerable experience publishing on this topic in journals such as the Journal of Common Market Studies, European Foreign Affairs Review, Crime, Law and Social Change, European Security, and Global Crime. She is also co-editor of several edited volumes including EU Borders and Shifting Internal Security: Technology, Externalization and Accountability, published with Springer. She has attracted research funding from the European Commission, the Economic and Social Research Council, the British Academy, and the Royal Society. She also has a track record of engagement with policy making in this field, having advised the United Kingdom and Portuguese Governments in matters relating to their organised crime strategies.

1. Private Security Beyond Private Military and Security Companies: Exploring Diversity Within Private-public Collaborations and Its Consequences for Security Governance.- Part I: Privatization of Security: Terminology, Concepts and Theories.- 2. Contributions of Private Businesses to the Provision of Security in the EU: Beyond Public-Private Partnerships.- 3. Who am I? The Blurring of the Private Military and Security Company (PMSC) Category.- Part II: The Continuous Expansion of Security Privatization: Industry and Geographical Trends.- 4. Maritime Security and Transformations in Global Governance.- 5. Privatising Security in Finance: Measures Against the Money Threatening Society.- 6. The Role of For-Profit Actors in Implementing Targeted Sanctions: The case of the European Union.- 7. The New (Private) National Security: Social and Political Consequences of Securitization in the United States Post 9/11.- 8. The Sentinel and the Rebel: Multi-choice Policing in Burundi and the State-centered Approach of Security Sector Reform.- Part III: The Privatization of Security in an Expanding Digital World.- 9. Blurring Public and Private: Cybersecurity in the Age of Regulatory Capitalism.- 10. A Typology of Cybersecurity and Public-Private Partnerships in the Context of the European Union.- 11. Exploring the New Frontiers of Security Privatisation: Web-Based Social Networking Services and Their Challenging Contribution to Foster Security and Public Safety.- 12. Mitigation and Notification of Data Breaches in the European Union: Private Companies in the Driver's Seat of Cybersecurity?

Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

130,89 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen

130,89 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen

Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok