Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
5Activity

Table Of Contents

I. Introduction: interdependence old and new
II. 11 September 2001 as catalyst
III. Two years on: new agenda items, second thoughts?
IV. Other players, other interests
V. This book
1. Security and the responsibilities of the public and private sectors
I. Introduction
II. New threats, new thinking
III. The new role of the private sector
2. Public–private sector cooperation
I. Introduction: the development of modern terrorism
II. The role of private corporations in the provision of security
3. What price values?
I. The ambivalence of value and the obscurity of price
II. Values in public policy and in the European institutions
4. An international response to terrorism
II. Terrorism: a threat to the international community
III. Countering terrorism
IV. Measures to counter terrorist financing
V. Success or failure?
VI. The way forward
VII. Conclusions
III. An assessment of the effectiveness of UN Security Council measures
IV. Legal issues, problems and challenges
6. Strategic export controls and the private sector
II. The US approach
IV. Characteristics and limitations of existing regimes
V. The impact of new priorities: non-proliferation and terrorism
7. The European Union: new threats and the problem of coherence
II. The EU’s policy responses to the September 2001 attacks
III. Remaining challenges for the EU
II. International initiatives
III. New developments in international law
IV. Liechtenstein as an example
V. The private sector
VI. Future developments
9. The resources and tactics of terrorism: a view from Russia
II. The dual role of states
III. Asymmetric warfare
IV. The social resources of terrorism
10. Business investment, humanitarian problems and conflict
II. Conflict as the multiplier of humanitarian problems
III. Differentiating legitimate business from criminal activity
IV. Why invest in conflict-torn areas?
V. The business–humanitarian relationship
VI. The special role of resource companies
VII. Meeting security requirements
VIII. Respect for human rights
IX. The role of sanctions
X. The need for business–humanitarian dialogue and cooperation
11. Conflict diamonds: the De Beers Group and the Kimberley Process
II. The Kimberley Process
III. An example well set?
Annex 11A. The Kimberley Process Certification Scheme
II. Sudan’s war
III. Lundin in Sudan
IV. Lessons learned
II. Business and the economy in conflict prevention
III. Challenges for business in conflict areas
IV. Dialogue between companies and the ICRC
14. The security of business: a view from the security industry
II. The services available
III. Survival planning: never a state monopoly?
IV. Terrorism and intelligence
V. Conclusions
15. Survival planning for business: a view from Nokia
I. Current threat assessment
II. What has changed after 11 September 2001?
III. Why is security needed and what is the focus?
IV. Vulnerabilities and attacks increase
V. Emergency response and business planning
VI. Partnership with the authorities?
16. Defending against cyber terrorism: preserving the legitimate economy
II. Cyber terrorism
III. Attribution and business continuity planning
IV. Globalization and the role of business in cyber security
17. The concept of critical infrastructure protection
II. CIP from an operational perspective
III. CIP from a conceptual perspective
V. Conclusions and recommendations
II. Implications of the new European security framework
III. Developing CESI protection models and strategies
19. The economic consequences of terrorism
I. Introduction: the shock of the new
II. A less safe world
III. Is the private sector spending more on security?
IV. The insurance problem
V. Tighter border controls and their costs
Box 19.1. New cargo inspection procedures
20. A view from the League of Arab States
II. Obstacles to a just system of collective global security and governance
III. Rich men’s and poor men’s agendas
IV. The way to a common agenda?
21. A view from Africa
II. Terrorism: the political and economic dimensions
III. ‘Business as terror’ in Africa
IV. Prioritizing security in Africa
0 of .
Results for:
No results containing your search query
P. 1
Business & Security

Business & Security

Ratings: (0)|Views: 98 |Likes:
Published by Roetsdb01

More info:

Published by: Roetsdb01 on Dec 12, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/06/2013

pdf

text

original

You're Reading a Free Preview
Pages 7 to 89 are not shown in this preview.
You're Reading a Free Preview
Pages 96 to 163 are not shown in this preview.
You're Reading a Free Preview
Pages 170 to 219 are not shown in this preview.
You're Reading a Free Preview
Pages 226 to 270 are not shown in this preview.
You're Reading a Free Preview
Pages 277 to 348 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
josoell liked this
belsecblog liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->