Search results

11 – 20 of over 3000
Book part
Publication date: 6 September 2021

Chris D. Bertram

Successful National Security Special Events (NSSE) have several critical components that will ensure success; one key component is collaboration among various and distinctive…

Abstract

Successful National Security Special Events (NSSE) have several critical components that will ensure success; one key component is collaboration among various and distinctive organizations. During the 2002 Winter Olympics in Salt Lake City, Utah, 11,000 public safety officers came together from federal, state, and local agencies and successfully protected the games. In subsequent years following the 9/11 terror attacks and the Olympic Games, however, law enforcement and public safety agencies at every level have, at times, struggled to successfully implement collaborations on a continuing and consistent basis.

Creating collaborations that endure throughout a national security event is an important issue for public safety organizations. What are the key factors that foster an environment in which collaborations can be sustained? Based on research and numerous interviews with law enforcement and public safety leaders involved in the 2002 Winter Olympics, several factors were identified that impact the effectiveness and endurance of collaborations. The enablers for effective collaborations before, during, and after the 2002 Winter Olympics included leadership, trust, social capital, and felt need.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Article
Publication date: 1 March 2012

Douglas A. Brook

There is a current argument that “national security” and “national defense” are no longer synonymous terms-that there is a new and broader definition for the activities that…

Abstract

There is a current argument that “national security” and “national defense” are no longer synonymous terms-that there is a new and broader definition for the activities that contribute to “the common defense.“ A whole of government approach is suggested as a means for integrating and coordinating national security policies and programs. To support this approach, recommendations have been made for an integrated national security budget. Focusing on the executive budget process, three approaches to an integrated national security budget are examined: organization-based, program-based and function-based. Though there are questions about the importance of budget structure and the effectiveness of program budgeting, a whole of government integrated unified national security budget could facilitate the fiscal trade-offs required between alternative means of pursuing national security objectives in the executive budget.

Details

Journal of Public Budgeting, Accounting & Financial Management, vol. 24 no. 1
Type: Research Article
ISSN: 1096-3367

Book part
Publication date: 6 September 2021

Brett Bailey

Recognizing the 9/11 attacks as a turning point in the history of American emergency management and response philosophies, this chapter examines the evolution to a standardized…

Abstract

Recognizing the 9/11 attacks as a turning point in the history of American emergency management and response philosophies, this chapter examines the evolution to a standardized National Incident Management System (NIMS). This involved the movement from individual jurisdictional and agency autonomy to adoption of a multilayered system where all efforts are intended to support a response beginning and ending at the local level. This chapter discusses the overarching NIMS doctrine and its incumbent on-scene Incident Command System (ICS) for coordinating on-scene operations. The specific focus is the application to the NIMS and the ICS to law enforcement.

Article
Publication date: 27 June 2008

Krisana Kitiyadisai

The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence…

2037

Abstract

Purpose

The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.

Design/methodology/approach

The methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community (IC) in Thailand. The relevant literature survey consists of the literature on US intelligence databases for Homeland Security, criticisms of the IC, the ethical debate on national databases in the USA, the Thai National Security Council, ethical debates on the Internal Security Act and Computer Crime Act, Buddhism and “spiritual computing.”

Findings

The findings reflect that the US model of national security has significant influence on the Thai intelligence approach and application of IT for national security while both intelligence communities have similar intelligence problems and have raised ethical debates on violations of human rights.

Research limitations/implications

The research limitations include the nature of the topic which is a closed subject under legal restrictions in Thailand so that the sources of official information could not be disclosed nor elaborated in details; and literature on this topic has not been widely available except unclassified information which limits a more in‐depth investigation and analysis.

Originality/value

The value of this paper lies in being the first attempt to throw light on a “forbidden” subject in Thailand by discussing the US experiences against the Thai case study. The application of “spiritual computing” and Buddhist precepts to the context of national security and intelligence databases could be a starting point for developing a “happier” and “successful” IC and possibly open a new approach to national security.

Details

Journal of Information, Communication and Ethics in Society, vol. 6 no. 2
Type: Research Article
ISSN: 1477-996X

Keywords

Content available
Article
Publication date: 1 April 2004

72

Abstract

Details

Disaster Prevention and Management: An International Journal, vol. 13 no. 2
Type: Research Article
ISSN: 0965-3562

Article
Publication date: 4 March 2014

Ying Wang, Francis Kofi Andoh-Baidoo and Jun Sun

Terrorist attacks have generated interests among practitioners and researchers on transportation security enhancement. This study investigates the role that rationality play in…

1204

Abstract

Purpose

Terrorist attacks have generated interests among practitioners and researchers on transportation security enhancement. This study investigates the role that rationality play in government funding on this important aspect of homeland security. In particular, it examines how environmental changes and project characteristics influence the allocation of security-related Airport Improvement Program (AIP) grants in the aviation industry. The paper aims to discuss these issues.

Design/methodology/approach

The central hypothesis is that rationality regulates transportations security investment through the dynamic balancing between type I error and type II error concerns. To empirically validate it, this study conducts various analyses on AIP history data. In particular, it uses text mining to identify the security-related AIP grants and their coverage, trend analysis to compare the trends of security funding and other transportation investment, and classification tree analysis to determine the factors that influence the allocation of security-related grants.

Findings

The longitudinal distribution of security-related grants differs from other types of transportation funding in terms of their distinct responses to terrorist and economic events. Project characteristics including project coverage and facility location have secondary yet consistent effects on the allocation of security-related grants.

Originality/value

This study empirically validates the concept of rationality in transportation security investment. In particular, the findings support that it in constant moves along both longitudinal and cross-sectional dimensions. The dynamic and multi-facet nature of rationality provides the key for researchers and practitioners to understand security funding in aviation industry.

Details

Industrial Management & Data Systems, vol. 114 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

Abstract

Details

Terrorism and Counter-Terrorism
Type: Book
ISBN: 978-0-76231-040-1

Book part
Publication date: 21 June 2014

Tilman Brück, Olaf J. de Groot and Neil T. N. Ferguson

The purpose of this study is to define the interactions that determine how secure a society is from terrorism and to propose a method for measuring the threat of terrorism in an…

Abstract

Purpose

The purpose of this study is to define the interactions that determine how secure a society is from terrorism and to propose a method for measuring the threat of terrorism in an objective and spatio-temporally comparable manner.

Methodology/approach

Game-theoretic analysis of the determinants of security and discussion of how to implement these interactions into a measure of security.

Findings

We show that governments concerned with popularity have an incentive to over-invest in security and that, in certain situations, this leads to a deterioration in net security position. Our discussion provides an implementable means for measuring the levels of threat and protection, as well as individuals’ perceptions of both, which we propose can be combined into an objective and scientific measure of security.

Research limitations/implications

The implication for researchers is the suggestion that efficiency, as well as scale of counter-terrorism, is important in determining a country’s overall security position. Furthermore, we suggest that individuals’ perceptions are at least as important in determining suitable counter-terrorism policy as objective measures of protection and threat. The limitations of this research are found in the vast data requirements that any attempt to measure security will need.

Originality/value of the chapter

We propose the first method for objectively measuring the net security position of a country, using economic and econometric means.

Book part
Publication date: 6 September 2021

Paul J. Liquorie and Michael R. Ward

Acts of mass violence are not a new phenomenon in the United States. Law enforcement and homeland security officials prepare, prevent, respond, investigate, and assist in…

Abstract

Acts of mass violence are not a new phenomenon in the United States. Law enforcement and homeland security officials prepare, prevent, respond, investigate, and assist in prosecuting offenders in these events. How then can the greater homeland security community effectively avert future acts of mass violence with its even broader mission set? Physical and technological security countermeasures are not enough to prevent these types of incidents from occurring. The purpose of this chapter is to briefly give an overview of some of the research into the indicators and traits exhibited by perpetrators of mass violence and the best practices that have evolved to intervene as a result. Recognizing the common traits and behaviors displayed by past attackers, their surrounding influences and the common traumas most of them have experienced, is an essential first step in developing effective strategies to prevent acts of mass violence.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Book part
Publication date: 1 June 2004

John D Blair, Myron D Fottler and Albert C Zapanta

This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist…

Abstract

This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist activity within the United States, and how these events have led to current situations. It also provides a model for health care leaders to follow when looking at a bioterrorist attack. The model includes descriptions of how the articles within this book relate to an overall bioterrorist formula. Through this, the reader shall be able to deduce which individual article fits into the vastness of healthcare research pertaining to bioterrorism.

Details

Bioterrorism Preparedness, Attack and Response
Type: Book
ISBN: 978-1-84950-268-9

11 – 20 of over 3000