A Practical Introduction to Homeland Security and Emergency Management (eBook)
632 Seiten
Cq Press (Verlag)
978-1-5063-0135-8 (ISBN)
Lese- und Medienproben
Part I. Scope
Chapter 1. Homeland Security Definitions and Structure
Learning Objectives and Outcomes
What Is Security?
Security Domains
Homeland Security
Final Case Study: Should the DHS Be Abolished? (Michael D. Tanner and Christian Beckner)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 2. Policy and Law in Homeland Security
Learning Objectives and Outcomes
Assessing Homeland Security Risk
The Just War
Homeland Security Policy
Homeland Security in Law and Policy
Summary
Final Case Study: How Has Homeland Security Policy and Law Changed Since 9/11? (Tom Kean)
Chapter Summary
Key Terms
Questions and Exercises
Part II. Hazards and Threats
Chapter 3. Terrorism
Learning Objectives and Outcomes
Definitions
Actors
Behavior and Activities
Targets
Motivation, Ideology, and Intent
Terrorism Frequency and Distribution
The Outcomes and the Cost of Terrorism
Terrorist Targets
Terrorist Profiles
American Terrorists
Counterterrorism
U.S. Counterterrorism Since 9/11
Final Case Study: How Should We Assess the Terrorist Threat in Formulating Policy? (Bob Kerrey)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 4. Transnational Crime
Learning Objectives and Outcomes
Definition of Transnational Crime
The Structure of Transnational Crime Organizations
How Motives of Transnational Crime Organizations Differ From Terrorists
Similarities Between Transnational Crime Organizations and International Terrorism With Respect to Modi Operandi
How Transnational Crime Exploits the Mechanisms of Globalization and Technology in Similar Ways as Legitimate Actors
Transnational Crime Groups and the Potency of Their Threat
The Role of Failed States in Facilitating Organized Crime and Terrorism
Current Anticrime Methods, Regimes, and Capacity-Building Efforts to Counter Crime Worldwide
Final Case Study: The Future of Transnational Crime (Jeffrey K. Harp)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 5. Material Hazards and Weapons
Learning Objectives and Outcomes
Material Hazards and Weapons in General
Chemical Hazards
Biological Hazards
Nuclear Hazards
Radiological Hazards
Chemical Explosives
Energy Weapons
Firearms
Final Case Study: How Could We Improve Nuclear Security? (Sam Nunn)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 6. Natural Risks
Learning Objectives and Outcomes
Natural Hazards and Threats in General
Climate Change
Weather Events
Geological and Geomorphic Hazards
Cosmic Risks
Final Case Study: Comparing the Future of Wildfire Risks and Flooding Risks in the United States (Jessica Block and Sally Thompson)
Chapter Summary
Key Terms
Questions and Exercises
Part III. Providing Security
Chapter 7. Emergency Management
Learning Objectives and Outcomes
Emergencies
Assessing Emergencies
Emergency Management
Federal Structure
Capacity and Capability
Vulnerability
Exposure
Communicating Emergencies
Final Case Study: How Do We Address the Complexities of Emergency Management? (Thad Allen)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 8. Site Security
Learning Objectives and Outcomes
Scope and Definitions
Assessing Targets
Access Controls
Bypasses of Access Controls
Guards
Emergency Services and Quick-Reaction Forces
Gates
Emergency Refuges
Passive Perimeters
Surveillance and Countersurveillance
Security Engineering
Site Security Services
Final Case Study: Trends in Terrorist Attacks on Sites (FEMA)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 9. Infrastructure Security
Learning Objectives and Outcomes
Scope and Definition of the Critical Infrastructure
Sector-Specific Organization
Supervisory Control and Data Acquisition Systems
The Infrastructure Asset Inventory and Risk Assessment
Final Case Study: How Could Terrorism Complicate Matters? (Bansari Saha)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 10. Information, Communications, and Cybersecurity
Learning Objectives and Outcomes
Scope and Definitions
Sources of Attacks
Access Vectors
Malicious Activities
Providing Security
Cybersecurity
The Structure of U.S. Cybersecurity
Final Case Study: A Perspective on Cyber Readiness (Melissa E. Hathaway)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 11. Maritime Security
Learning Objectives and Outcomes
Scope and Definitions
Port Security
Cargo Security
Maritime Cargo and Container Security
Maritime Transportation Security Act
Maritime Terrorism
Final Case Study: How Can Container Security Be Improved? (Stephen Flynn)
Summary
Chapter Summary
Key Terms
Questions and Exercises
Chapter 12. Aviation Security
Learning Objectives and Outcomes
Scope
Hazards and Threats
Providing Aviation Security
Countering Antiaircraft Weapons
Guided Missiles
Key Terms
Final Case Study: Two Forecasts of Aviation Terrorism (FEMA and Jeffrey C. Price)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 13. Ground Transport Security
Learning Objectives and Outcomes
Scope
Threats and Hazards
Providing Ground Transport Security
Navigation
Communications
Vehicle Survivability
Escorts and Guards
Final Case Study: Beyond Protection: The Case for Resilience in Surface Transportation (Michael Dinning)
Chapter Summary
Key Terms
Questions and Exercises
Chapter 14. Border Security
Learning Objectives and Outcomes
Scope
Risk Management and Assessment
Border Security: Key Agencies
Summary
Final Case Study: How Does Immigration Policy Impact Political and Economic Cost Effectiveness? (Rey Koslowski)
Chapter Summary
Key Terms
Questions and Exercises
| Erscheint lt. Verlag | 24.9.2015 |
|---|---|
| Verlagsort | Washington DC |
| Sprache | englisch |
| Themenwelt | Recht / Steuern ► Strafrecht ► Kriminologie |
| Sozialwissenschaften ► Politik / Verwaltung | |
| Sozialwissenschaften ► Soziologie | |
| Schlagworte | Countermeasures • emergency management • Homeland Security • terrorism |
| ISBN-10 | 1-5063-0135-5 / 1506301355 |
| ISBN-13 | 978-1-5063-0135-8 / 9781506301358 |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich