Skip to main content
Security is a multidimensional concept, with many meanings, practising domains and heterogeneous occupations. Therefore it is difficult to define security as a singular, although understanding may be achieved by its applied context in... more
    • by 
    •   5  
      SecuritySecurity StudiesCritical Security StudiesCorporate Security Management
Evaluación de aspectos de seguridad y protección de activos previos a la elección de un inmueble Este trabajo propone una serie de pautas para el análisis de aspectos de seguridad que puede realizarse sobre diferentes sitios o lugares... more
    • by 
    •   4  
      Facility ManagementArquitecturaCorporate Security ManagementCorporate Architecture
Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give... more
    • by 
    •   3  
      SecuritySecurity StudiesCorporate Security Management
Risk management is becoming a well established discipline, with its own body of knowledge and domain practitioners. States worldwide now have their own risk management standards and in many, it is the company director’s responsibility to... more
    • by 
    •   4  
      Risk ManagementSecurity Risk ManagementCorporate Security ManagementSecurity Threat Groups
    • by 
    •   6  
      Risk Assessment & Risk ManagementCyberspaceCybersecurityCyber Security
There have been a number of studies that have attempted to defi ne the concept of security. However, as past authors have indicated, security is multidimensional in nature and diverse in practice. This diversity leads to diffi culty in... more
    • by 
    •   4  
      EducationSecurityCorporate Security ManagementCorporate Security
    • by 
    •   322  
      Critical TheoryBusinessIndustrial And Labor RelationsInformation Systems
Das Essay bietet den Lesern eine erste Übersicht über die kriminologische Täterbetrachtung doloser Handlungen. Auf Grundlage des Fraud - Triangles nach Cressey wird auf die verschiedenen Aspekte eingegangen, die zur kriminologischen... more
    • by 
    •   7  
      PsychologyPsychologieFraudCorporate Security Management
This chapter reviews the juggernaut of surveillance technologies that have been (in the last three decades) and are constantly being developed around the world. It examines their technological capacities in detail, and highlights the... more
    • by 
    •   6  
      SurveillanceVideo SurveillanceCorporate Security ManagementSecurity Technology
Intelligent Buildings (IB) are facility-wide systems that connect, control, and monitor the plant and equipment of a facility. The aim of IB is to ensure a facility is more efficient, productive, and safe, at a reduced cost. A typical IB... more
    • by 
    •   6  
      Intelligent SystemsIntrusion Detection Systems (IDSs)Corporate Security ManagementSecurity Science
Increasing political turmoil across many regions has increased concerns amongst business, social and governmental circles over the ability of organisations to anticipate and respond positively to disruptions. Organisations are spending... more
    • by 
    •   3  
      ResilienceCorporate Security ManagementSecurity Science
Intrusion detection systems (IDSs) play an important role in the defense of the companies’ IT systems. These systems provide automated protection against a variety of attacks and intrusions. Without them in several cases system... more
    • by  and +1
    •   4  
      Data SecurityIntrusion Detection Systems (IDSs)IT SecurityCorporate Security Management
International Journal of Wireless Network Security (IJWNS) http://flyccs.com/jounals/IJWNS/Home.html Scope International Journal of Wireless Network Security (IJWNS) is a open access journal that publishes articles which contribute... more
    • by 
    •   15  
      Security ManagementBorder Managment, Migration and Border Management, Migration and SecuritySecure Cloud ComputingInformation Security Management
Closed Circuit Television (CCTV) systems are found in a variety of environments and used for a multitude of purposes, leading to differing views of CCTV within an organisation. In accordance to management theory, organisations contain a... more
    • by  and +1
    •   4  
      Corporate Security ManagementCCTV technologyeffectiveness of CCTVCorporate Security
This paper challenges the mainstream social scientific approach that emphasizes “moral inferiority” in corruption and bribery in Central and Eastern Europe. We argue that in many cases, people participate in informal organizational... more
    • by 
    •   291  
      BusinessEntrepreneurshipIndustrial And Labor RelationsOrganizational Behavior
    • by 
    •   8  
      Corporate CommunicationCorporate GovernanceRiskInternal Audit
    • by 
    •   5  
      Military IntelligenceStrategic ManagementCorporate Security ManagementInternazionalizzazione Imprese
We live in an ever connected and digital world which brings great convenience, capability, and comfort to our modern quality of life, but at the same time introduces significant threats and vulnerabilities as well when things fall apart... more
    • by 
    •   3  
      Crisis communication and managementSocial MediaCorporate Security Management
Information security can benefit from multiple approaches to achieve staff compliance. While some will naturally accept their responsibilities, others require encouragement to stay on the right path. Referring to deterrence theory, one... more
    • by 
    •   4  
      Organizational BehaviorInformation SecurityComputer SecurityCorporate Security Management
Experts have found that employees represent the greatest risk for unauthorized leak of business-critical information for organizations since they have access to a wide range of business-critical information, knowledge and understanding of... more
    • by 
    •   4  
      HRM & Organisational BehaviourCorporate cultureCorporate Security ManagementCorporate Espionage
The chapter critiques Intrusion Detection Systems (IDS) as applied in the domestic and commercial environments in the protection of assets, with Defence in Depth providing an underlying strategy. IDS is the integration of technology and... more
    • by 
    •   5  
      Intrusion Detection SystemsCorporate Security ManagementSecurity ScienceBurglar Alarm
This chapter reviews the juggernaut of surveillance technologies that have been (in the last three decades) and are constantly being developed around the world. It examines their technological capacities in detail, and highlights the... more
    • by 
    •   9  
      CriminologyCriminal JusticeTechnologySurveillance
    • by 
    •   3  
      Corporate Security ManagementSustainabilityRisk Appetite
The Role of Intelligence in the Private Sector Among the topics of interest to be inspected in this issue of the JEAIS are: • Intelligence analysis tools & open-source information; • Identifying and mitigating transnational threats and... more
    • by 
    •   5  
      Intelligence StudiesInternational SecuritySecurity StudiesBusiness Intelligence
Partendo dall'attuale conformazione delle security aziendali viste dall'occhio esterno di una società di consulenza, il paper intende ipotizzare lo sviluppo della Corporate Security come approccio strategico che sia-attraverso lo... more
    • by 
    •   5  
      IntelligenceSecuritySecurity StudiesCorporate Security Management
Start-up is a basic thing that a person trying to do something original. Technopreneurs are the genes of technology based entrepreneurs, but they are not only bearing the risk in business and also crossing the danger zone in innovative... more
    • by 
    •   7  
      EntrepreneurshipCorporate Social ResponsibilityTechnopreneurshipCorporate Security Management
Public street surveillance – a domain of Closed Circuit Television (CCTV) – has grown enormously and become common place in our society as an all-purpose security tool. Previous authors have raised concerns over social, civil and privacy... more
    • by 
    •   6  
      SecurityApplied PsychometricsCctvCorporate Security Management