Journal of Security Education最新文献

筛选
英文 中文
Public and Private Policing in Retail? 零售业中的公共和私人警务?
Journal of Security Education Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_03
T. Zalewski
{"title":"Public and Private Policing in Retail?","authors":"T. Zalewski","doi":"10.1300/J460v02n02_03","DOIUrl":"https://doi.org/10.1300/J460v02n02_03","url":null,"abstract":"Abstract The encroachment of alternative or private policing entities within public safety and community crime prevention has expanded to the point that private personnel greatly outnumber public police. As public resources continue to be thinly dispersed and their focus prioritised across communities, modern security providers now assume responsibility for many traditional policing functions such as surveillance of public space, protection of public buildings and “mass private property” and the investigation of internal corporate crime. Although public policing agencies tend to embrace partnerships and the concept of multi-agency approaches to prevent crime, there appears an inherent resistance to the transfer of traditional policing functions to alternative providers. This article explores the possibility whether private security personnel are able to perform traditional public policing functions including offender processing. This research considers the processing of first-offender adult shopstealers. The method adopted involved a literature review, analysis of contemporary policing practices and a descriptive case study. Findings determined the majority of respondents supported the concept, with caution. A number of system and operational considerations were identified and discussed should the transfer of any public policing function be contemplated.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interview with Dennis M. Giever, PhD, Indiana University of Pennsylvania 采访丹尼斯·m·吉弗博士,宾夕法尼亚印第安纳大学
Journal of Security Education Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_06
John Kostanoski
{"title":"Interview with Dennis M. Giever, PhD, Indiana University of Pennsylvania","authors":"John Kostanoski","doi":"10.1300/J460v02n02_06","DOIUrl":"https://doi.org/10.1300/J460v02n02_06","url":null,"abstract":"Dennis M. Giever is currently Professor and Chairperson of the Department of Criminology at Indiana University of Pennsylvania. Prior to coming to IUP he was Assistant Professor of Criminal Justice at New Mexico State University. He has been exploring various security education issues at the Academic/Practitioner Symposia hosted by the American Society for Industrial Security and held in various universities throughout the United States.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS 安全教育工作者和培训师新闻学院
Journal of Security Education Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_01
Richard W. Kobetz
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/J460v02n02_01","DOIUrl":"https://doi.org/10.1300/J460v02n02_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trying to Be a Hero and Winding Up a Zero 试图成为英雄,却以零收尾
Journal of Security Education Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_02
H. Cooper
{"title":"Trying to Be a Hero and Winding Up a Zero","authors":"H. Cooper","doi":"10.1300/J460v02n02_02","DOIUrl":"https://doi.org/10.1300/J460v02n02_02","url":null,"abstract":"Abstract Personal safety and security is, in the last resort, the responsibility of the individual. The wise do not rely on providence to shield them from the dangers and unpleasantness of modern life. This article explores the phenomenon of victimization and why some seem singled out for harm that others avoid. There are natural defenses and those that can be developed through assessment and training. Some clearly lead more hazardous lives than others. Training, even for those whose fate is placed in the hands of personal protection specialists, is still a necessity and can make all the difference in terms of survival.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134481073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Justice and Ethics 正义与道德
Journal of Security Education Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_05
Philip S. Holt, A. Basden
{"title":"Justice and Ethics","authors":"Philip S. Holt, A. Basden","doi":"10.1300/J460v02n02_05","DOIUrl":"https://doi.org/10.1300/J460v02n02_05","url":null,"abstract":"Abstract “Unauthorized network intrusions affect us all. Worse yet, certain classes of unauthorized network intrusions are a very serious matter; ones in which there are minimal defensive actions to prevent such attacks.” Denial-Of-Service (DoS) and Distributed Denial-Of-Service (DDoS) attacks are the class of attack vectors this paper examines and demystifies. We will examine certain aspects (multi/polyaspectuality) of these class-attacks by investigating the following: • The online statement from Carnegie Mellon's Computer Emergency Response Team (CERT/CC Timeline, May 2001). The interplay of three types of justice: Legal Justice (Jus Ad Rem), Social Justice (Jus Civile), and Natural-Moral Justice, or Ethics (Jus Naturalis), while asking the reasonable question, “Can these three types of justice co-exist?” The application of Lonergan's ethics, whose employment allows for the examination of the good, obligation, and value. • In doing so, we hope to arrive at some preliminary answers that will (1) serve as a concrete foundation that will verify the authenticity of positions and further develop those positions; and (2) serve to undermine and destroy weak positions, the ones which are in fact counterpositions and reverse them to concrete positions that are attentive, intelligent, reasonable, and responsible to the individual, the group that said person is a member of, and the society in which they are situated.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURITY ACADEMIC PROGRAMS 安全学术课程
Journal of Security Education Pub Date : 2006-12-29 DOI: 10.1300/j460v02n01_10
S. Lancaster
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster","doi":"10.1300/j460v02n01_10","DOIUrl":"https://doi.org/10.1300/j460v02n01_10","url":null,"abstract":"The methodology that we employed in developing this English language-based international academic program list involved gathering information directly from college websites. Many sites did not have a distinct classification for security-related degree programs. Often information was buried under computer science programs or other program listings. There is no single, comprehensive site that displays all the degrees offered in security. Information about the listed institutions was taken from their respective websites. We do not claim that these descriptions are an original creation, nor does this information necessarily reflect our opinions. Also we cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114087233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with Todd Stewart, PhD 采访托德·斯图尔特博士
Journal of Security Education Pub Date : 2006-12-29 DOI: 10.1300/J460V02N01_07
John Kostanoski
{"title":"Interview with Todd Stewart, PhD","authors":"John Kostanoski","doi":"10.1300/J460V02N01_07","DOIUrl":"https://doi.org/10.1300/J460V02N01_07","url":null,"abstract":"Todd Stewart is Director for Program for International and Homeland Security, at The Ohio State University, from April 2002. In this capacity, he is responsible for promoting research and study into the homeland-security challenges facing Ohio and the nation, particularly those associated with terrorist activities. His responsibilities include identifying and responding to the research, technology, education, training and","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125626438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS 安全教育工作者和培训师新闻学院
Journal of Security Education Pub Date : 2006-12-29 DOI: 10.1300/j460v02n01_01
Richard W. Kobetz
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v02n01_01","DOIUrl":"https://doi.org/10.1300/j460v02n01_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"291 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Negotiation Tactics in Organizations Applied to Hostage Negotiation 组织谈判策略在人质谈判中的应用
Journal of Security Education Pub Date : 2006-12-29 DOI: 10.1300/J460v02n01_05
Jonathan Matusitz, Gerald-Mark Breen
{"title":"Negotiation Tactics in Organizations Applied to Hostage Negotiation","authors":"Jonathan Matusitz, Gerald-Mark Breen","doi":"10.1300/J460v02n01_05","DOIUrl":"https://doi.org/10.1300/J460v02n01_05","url":null,"abstract":"Abstract The purpose of this paper is to take negotiation and its related concepts from the realm of organizational conflict and apply the current communication principles, strategies, and tactics used in organizations to the realm of hostage negotiation in a constructive rather than destructive manner. Another goal of this paper is to show that whether a third-party intervention or a problem-solving method is used, the ultimate goal of negotiation remains identical: to reach cooperation or peace. Yet, the authors inform the readers about the drawbacks and risks of hostage negotiation (i.e., failed manipulative endeavors, lack of effective language use, etc.). Finally, this paper offers suggestions for future research, namely the use of technological aspects that can contribute to a better teaching of negotiation in organizations and better tactics on how to bargain with hostage takers.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115836310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Global Business, Transportation, Trade, and the Concept of Unacceptable Danger 全球商业、运输、贸易和不可接受危险的概念
Journal of Security Education Pub Date : 2006-12-29 DOI: 10.1300/J460V02N01_04
Lawrence A. Howard
{"title":"Global Business, Transportation, Trade, and the Concept of Unacceptable Danger","authors":"Lawrence A. Howard","doi":"10.1300/J460V02N01_04","DOIUrl":"https://doi.org/10.1300/J460V02N01_04","url":null,"abstract":"Abstract The purpose of security is to ward off unacceptable danger. Narrowed in translation to cargo security, it means to keep the goods, merchandise, or passengers transported in domestic and international commerce free of unacceptable dangers. Sounds reasonable, correct? But, there is an issue begged: what constitutes “unacceptable danger” when it comes to commercial goods, merchandise, or passengers? It is a question no less thorny than and directly related to the question of what constitutes unacceptable danger in a larger cultural, economic, and political context. How a person answers the question of what constitutes “unacceptable” danger, in any context, is dependent upon his or her perceptions derived from the different layers of culture in which he is embedded. People strike a balance in their own minds among competing priorities and probabilities of disaster. Collectively this balancing act is the basis for how we determine public and private policy, including policy on cargo security. There is a real problem with this general approach when we realize that it isn't the probability of an event that matters, but whether or not it can actually happen, whatever the unlikelihood of it. The implications of a nuclear bomb being hidden in the cargo hold of a ship anchored in New York harbor make most nightmares wimpy things in comparison; such an event may be unlikely, but it can happen. The question is whether the improbable event is an unacceptable danger that is worthy of being warded off by a significant investment of time, money, and human resources.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128914248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信