You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"Has the emergence of new transnational threats - terrorism, drug cartels, natural disasters - affected the dynamics of security relations among Canada, Mexico, and the United States? What is the likely future of these relations in a highly securitized world? Richard Kilroy, Abelardo Rodríguez Sumano, and Todd Hataley trace the evolution of security relations in North America from the bilateral approach that existed prior to the events of September 11, to the unilateral US approach of perimeter defense after September 11, to the creation of a trilateral regional security framework. Their analysis highlights both the move toward cooperation and the significant obstacles that limit the potential for an effective regional security complex." -- Publisher's description.
Complete guide to understanding homeland security law, with an extensive index and with exhaustive references and related links throughout The newly revised and updated Third Edition of Foundations of Homeland Security and Emergency Management enables readers to develop a conceptual understanding of the legal foundations of homeland security and emergency management (HSEM) by presenting the primary source law and policy documents we have established to address "all hazards," both terrorism and natural disasters. The book demonstrates that HSEM involves many specialties and that it must be viewed expansively and in the long-term. The Third Edition has more sources than previous editions and i...
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics. Information operations (IO), in which time zones are as important as national boundaries, is the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior. Contemporary IO differs from traditional psychological operations practiced by nation-states, because the availability of low-cost high technology permits nongovernmental organizations and rogue elements, such as terrorist groups...
Issues of defence politics and policy have long been at the forefront of political agendas and defining of international affairs. However, the dramatic changes to the global system that have taken place since the end of the Cold War and parrticularly since the terror attacks on the USA on 11 September 2001 have amplified the world's attention toward political and policy issues of national, regional and global security. The focus of this volume is on examining the fundamental causes of, and defence policy responses to this new 'post-9/11' security environment. Edited by Isaiah (Ike) Wilson III and James J. F. Forest of the US Military Academy, West Point, USA, this volume is international in scope, with pieces written by experts in the field, offering a collection of up-to-date and balanced insights on key contemporary issues of concern to defence policymakers. The book will be an invaluable reference tool for academics and students, researchers in international relations, policymakers, media professionals and government officials.
This volume addresses the governance and evolution of Canada's international policies, and the challenges facing Canada's international policy relations on multiple fronts.
This handbook offers insights into how science (physical, natural and social) and technology can support new developments to manage the complexity resident within the threat and risk landscape. The security landscape can be described as dynamic and complex stemming from the emerging threats and risks that are both persistent and transborder. Globalization, climate change, terrorism, transnational crime can have significant societal impact and forces one to re-evaluate what ‘national security’ means. Recent global events such as mass migration, terrorist acts, pandemics and cyber threats highlight the inherent vulnerabilities in our current security posture. As an interdisciplinary body o...
The Complete Guide to Understanding the Structure of Homeland Security Law New topics featuring leading authors cover topics on Security Threats of Separatism, Secession and Rightwing Extremism; Aviation Industry’s 'Crew Resource Management' Principles'; and Ethics, Legal, and Social Issues in Homeland Security Legal, and Social Issues in Homeland Security. In addition, the chapter devoted to the Trans-Pacific Partnership is a description of economic statecraft, what we really gain from the TPP, and what we stand to lose. The Power of Pop Culture in the Hands of ISIS describes how ISIS communicates and how pop culture is used expertly as a recruiting tool Text organized by subject with the...
Now updated with examples through 2010, this classic study examines the disruptive effects of disasters on patterns of human behavior and the operations of government, and the conditions under which even relatively minor crises can lead to system breakdown.
This text analyzes the history, evolution, and processes of national security policies. It examines national security from two fundamental fault lines--the end of the Cold War and the evolution of contemporary terrorism, dating from the 9/11 terrorist attacks and tracing their path up to the Islamic State (ISIS) and beyond. The book considers how the resulting era of globalization and geopolitics guides policy. Placing these trends in conceptual and historical context and following them through military, semi-military, and non-military concerns, National Security treats its subject as a nuanced and subtle phenomenon that encompasses everything from the global to the individual with the natio...
"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher.