Security

Security


  • Release: 2009-05-07
  • Publisher: Routledge
  • Price: FREE
  • File: PDF, 216 page
  • ISBN: 9781135249014
GET EBOOK

Just a decade ago security had little claim to criminological attention. Today a combination of disciplinary paradigm shifts, policy changes, and world political events have pushed security to the forefront of the criminological agenda. Distinctions between public safety and private protection, policing and security services, national and international security are being eroded. Post-9/11 the pursuit of security has been hotly debated not least because countering terrorism raises the stakes and licenses extraordinary measures. Security has become a central plank of public policy, a topical political issue, and lucrative focus of private venture but it is not without costs, problems, and paradoxes. As security governs our lives, governing security become a priority. This book provides a brief, authoritative introduction to the history of security from Hobbes to the present day and a timely guide to contemporary security politics and dilemmas. It argues that the pursuit of security poses a significant challenge for criminal justice practices and values. It defends security as public good and suggests a framework of principles by which it might better be governed. Engaging with major academic debates in criminology, law, international relations, politics, and sociology, this book stands at the vanguard of interdisciplinary writing on security.

Security  Governance  and State Fragility in South Africa

Security Governance and State Fragility in South Africa


  • Release: 2020-04-15
  • Publisher:
  • Price: FREE
  • File: PDF, 224 page
  • ISBN: 9781793609533
GET EBOOK

Do existing measures of state fragility measure fragility accurately? Based on commonly used fragility measures, South Africa (SA) is classified as a relatively stable state, yet rising violent crime, high unemployment, endemic poverty, eroding public trust, identity group based preferential treatment policies, and the rapid rise of the private security sector are all indications that SA may be suffering from latent state fragility. Based on a comprehensive view of security, this study examines the extent to which measures of political legitimacy and good governance, effectiveness in the security system - especially with respect to the police system - and mounting economic challenges may be undermining the stability of SA in ways undetected by commonly used measures of state fragility. Using a mixed-methods approach based on quantitative secondary data analysis and semi-structured interviews with government officials, security practitioners, and leading experts in the field, this study finds that the combination of colonization, apartheid, liberation struggle, transition from autocracy to democracy, high levels of direct and structural violence, stagnating social, political, and economic developments make South Africa a latently fragile state. Conceptually, the results of this research call into question the validity of commonly used measures of state fragility and suggest the need for a more comprehensive approach to assessing state fragility. Practically, this study offers a number of concrete policy recommendations for how South Africa may address mounting levels of latent state fragility.

Communications and Multimedia Security

Communications and Multimedia Security


  • Release: 2005-09-14
  • Publisher: Springer
  • Price: FREE
  • File: PDF, 290 page
  • ISBN: 9780387244860
GET EBOOK

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security. This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation, mobile security, applied cryptography, and security of communication protocols. Of special interest are several papers which addressed security in the Microsoft .Net architecture, and the threats that builders of web service applications need to be aware of. The papers were a result of research sponsored by Microsoft at five European University research centers. This collection will be important not only for multimedia security experts and researchers, but also for all teachers and administrators interested in communications security.