The Handbook of Security 2014
DOI: 10.1007/978-1-349-67284-4_1
|View full text |Cite
|
Sign up to set email alerts
|

Introducing The Handbook of Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Today there is an extensive and diverse scholarly literature on the market for security (for a recent overview see Gill 2014). A common feature of this literature, however, is the assumption that it is possible to transform security goods whether in their human form (the labour of private security officers) or nonhuman form (security equipment, .…”
Section: Security Goods As Contested Commoditiesmentioning
confidence: 99%
“…Today there is an extensive and diverse scholarly literature on the market for security (for a recent overview see Gill 2014). A common feature of this literature, however, is the assumption that it is possible to transform security goods whether in their human form (the labour of private security officers) or nonhuman form (security equipment, .…”
Section: Security Goods As Contested Commoditiesmentioning
confidence: 99%
“…As the negative impact of security risks usually is a kind of damage, disruption, or a decline in health, wellbeing or prosperity, it might be comparable with loss. In the security domain security risk management and reduction of a possible negative impact is considered the main goal of a security professional (Gill 2014). So, in this domain a level of professional risk aversion might be expected.…”
Section: Figure 1 Risk Management Process According To Iso 31000 (Nen...mentioning
confidence: 99%
“…There has been more research of late on the 'high end' of the private security industry (see O'Reilly, 2010), namely, contract corporate security services (Williams 2005a(Williams , b, 2012 and investigation services (Gill andHart, 1997, 1999) but still far less than on contract guard services. Williams (2005b), for example, documents what he calls the 'forensic accounting and corporate investigation services' industry: 'a diverse and loosely coupled network of private firms and professional groups providing investigative, advisory and adjudicative services to clients embroiled in cases of economic and financial wrongdoing, whether as "victims" or "offenders" ' (p. 188).…”
Section: Previous Researchmentioning
confidence: 99%
“…Conducted a decade ago, this study had discerned that 'corporate security has shifted into a more managerial mode' and moved up the organizational hierarchy (Nalla and Morash, 2002, p. 17). On the basis of this rare survey, corporate security research is perhaps rightfully thought to be conceptually impoverished compared with the green pastures of contract guard security, public police, and national and international security (which are not always mutually exclusive -see Gill, 2006;Petersen, 2013). We think corporate security is worth renewed study in its own right, but also as a well-spring of insights about trends in contemporary security and policing and forms of accountability.…”
Section: Introductionmentioning
confidence: 97%