Search results
11 – 20 of over 3000Successful National Security Special Events (NSSE) have several critical components that will ensure success; one key component is collaboration among various and distinctive…
Abstract
Successful National Security Special Events (NSSE) have several critical components that will ensure success; one key component is collaboration among various and distinctive organizations. During the 2002 Winter Olympics in Salt Lake City, Utah, 11,000 public safety officers came together from federal, state, and local agencies and successfully protected the games. In subsequent years following the 9/11 terror attacks and the Olympic Games, however, law enforcement and public safety agencies at every level have, at times, struggled to successfully implement collaborations on a continuing and consistent basis.
Creating collaborations that endure throughout a national security event is an important issue for public safety organizations. What are the key factors that foster an environment in which collaborations can be sustained? Based on research and numerous interviews with law enforcement and public safety leaders involved in the 2002 Winter Olympics, several factors were identified that impact the effectiveness and endurance of collaborations. The enablers for effective collaborations before, during, and after the 2002 Winter Olympics included leadership, trust, social capital, and felt need.
Details
Keywords
There is a current argument that “national security” and “national defense” are no longer synonymous terms-that there is a new and broader definition for the activities that…
Abstract
There is a current argument that “national security” and “national defense” are no longer synonymous terms-that there is a new and broader definition for the activities that contribute to “the common defense.“ A whole of government approach is suggested as a means for integrating and coordinating national security policies and programs. To support this approach, recommendations have been made for an integrated national security budget. Focusing on the executive budget process, three approaches to an integrated national security budget are examined: organization-based, program-based and function-based. Though there are questions about the importance of budget structure and the effectiveness of program budgeting, a whole of government integrated unified national security budget could facilitate the fiscal trade-offs required between alternative means of pursuing national security objectives in the executive budget.
Recognizing the 9/11 attacks as a turning point in the history of American emergency management and response philosophies, this chapter examines the evolution to a standardized…
Abstract
Recognizing the 9/11 attacks as a turning point in the history of American emergency management and response philosophies, this chapter examines the evolution to a standardized National Incident Management System (NIMS). This involved the movement from individual jurisdictional and agency autonomy to adoption of a multilayered system where all efforts are intended to support a response beginning and ending at the local level. This chapter discusses the overarching NIMS doctrine and its incumbent on-scene Incident Command System (ICS) for coordinating on-scene operations. The specific focus is the application to the NIMS and the ICS to law enforcement.
Details
Keywords
The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence…
Abstract
Purpose
The purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.
Design/methodology/approach
The methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community (IC) in Thailand. The relevant literature survey consists of the literature on US intelligence databases for Homeland Security, criticisms of the IC, the ethical debate on national databases in the USA, the Thai National Security Council, ethical debates on the Internal Security Act and Computer Crime Act, Buddhism and “spiritual computing.”
Findings
The findings reflect that the US model of national security has significant influence on the Thai intelligence approach and application of IT for national security while both intelligence communities have similar intelligence problems and have raised ethical debates on violations of human rights.
Research limitations/implications
The research limitations include the nature of the topic which is a closed subject under legal restrictions in Thailand so that the sources of official information could not be disclosed nor elaborated in details; and literature on this topic has not been widely available except unclassified information which limits a more in‐depth investigation and analysis.
Originality/value
The value of this paper lies in being the first attempt to throw light on a “forbidden” subject in Thailand by discussing the US experiences against the Thai case study. The application of “spiritual computing” and Buddhist precepts to the context of national security and intelligence databases could be a starting point for developing a “happier” and “successful” IC and possibly open a new approach to national security.
Details
Keywords
Ying Wang, Francis Kofi Andoh-Baidoo and Jun Sun
Terrorist attacks have generated interests among practitioners and researchers on transportation security enhancement. This study investigates the role that rationality play in…
Abstract
Purpose
Terrorist attacks have generated interests among practitioners and researchers on transportation security enhancement. This study investigates the role that rationality play in government funding on this important aspect of homeland security. In particular, it examines how environmental changes and project characteristics influence the allocation of security-related Airport Improvement Program (AIP) grants in the aviation industry. The paper aims to discuss these issues.
Design/methodology/approach
The central hypothesis is that rationality regulates transportations security investment through the dynamic balancing between type I error and type II error concerns. To empirically validate it, this study conducts various analyses on AIP history data. In particular, it uses text mining to identify the security-related AIP grants and their coverage, trend analysis to compare the trends of security funding and other transportation investment, and classification tree analysis to determine the factors that influence the allocation of security-related grants.
Findings
The longitudinal distribution of security-related grants differs from other types of transportation funding in terms of their distinct responses to terrorist and economic events. Project characteristics including project coverage and facility location have secondary yet consistent effects on the allocation of security-related grants.
Originality/value
This study empirically validates the concept of rationality in transportation security investment. In particular, the findings support that it in constant moves along both longitudinal and cross-sectional dimensions. The dynamic and multi-facet nature of rationality provides the key for researchers and practitioners to understand security funding in aviation industry.
Details
Keywords
Tilman Brück, Olaf J. de Groot and Neil T. N. Ferguson
The purpose of this study is to define the interactions that determine how secure a society is from terrorism and to propose a method for measuring the threat of terrorism in an…
Abstract
Purpose
The purpose of this study is to define the interactions that determine how secure a society is from terrorism and to propose a method for measuring the threat of terrorism in an objective and spatio-temporally comparable manner.
Methodology/approach
Game-theoretic analysis of the determinants of security and discussion of how to implement these interactions into a measure of security.
Findings
We show that governments concerned with popularity have an incentive to over-invest in security and that, in certain situations, this leads to a deterioration in net security position. Our discussion provides an implementable means for measuring the levels of threat and protection, as well as individuals’ perceptions of both, which we propose can be combined into an objective and scientific measure of security.
Research limitations/implications
The implication for researchers is the suggestion that efficiency, as well as scale of counter-terrorism, is important in determining a country’s overall security position. Furthermore, we suggest that individuals’ perceptions are at least as important in determining suitable counter-terrorism policy as objective measures of protection and threat. The limitations of this research are found in the vast data requirements that any attempt to measure security will need.
Originality/value of the chapter
We propose the first method for objectively measuring the net security position of a country, using economic and econometric means.
Details
Keywords
Paul J. Liquorie and Michael R. Ward
Acts of mass violence are not a new phenomenon in the United States. Law enforcement and homeland security officials prepare, prevent, respond, investigate, and assist in…
Abstract
Acts of mass violence are not a new phenomenon in the United States. Law enforcement and homeland security officials prepare, prevent, respond, investigate, and assist in prosecuting offenders in these events. How then can the greater homeland security community effectively avert future acts of mass violence with its even broader mission set? Physical and technological security countermeasures are not enough to prevent these types of incidents from occurring. The purpose of this chapter is to briefly give an overview of some of the research into the indicators and traits exhibited by perpetrators of mass violence and the best practices that have evolved to intervene as a result. Recognizing the common traits and behaviors displayed by past attackers, their surrounding influences and the common traumas most of them have experienced, is an essential first step in developing effective strategies to prevent acts of mass violence.
Details
Keywords
John D Blair, Myron D Fottler and Albert C Zapanta
This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist…
Abstract
This paper presents an overview of the articles used in this edition of Advances in Health Care Management. The beginning of the article gives the reader a history of bioterrorist activity within the United States, and how these events have led to current situations. It also provides a model for health care leaders to follow when looking at a bioterrorist attack. The model includes descriptions of how the articles within this book relate to an overall bioterrorist formula. Through this, the reader shall be able to deduce which individual article fits into the vastness of healthcare research pertaining to bioterrorism.