首页 > 最新文献

Journal of Security Education最新文献

英文 中文
Public and Private Policing in Retail? 零售业中的公共和私人警务?
Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_03
T. Zalewski
Abstract The encroachment of alternative or private policing entities within public safety and community crime prevention has expanded to the point that private personnel greatly outnumber public police. As public resources continue to be thinly dispersed and their focus prioritised across communities, modern security providers now assume responsibility for many traditional policing functions such as surveillance of public space, protection of public buildings and “mass private property” and the investigation of internal corporate crime. Although public policing agencies tend to embrace partnerships and the concept of multi-agency approaches to prevent crime, there appears an inherent resistance to the transfer of traditional policing functions to alternative providers. This article explores the possibility whether private security personnel are able to perform traditional public policing functions including offender processing. This research considers the processing of first-offender adult shopstealers. The method adopted involved a literature review, analysis of contemporary policing practices and a descriptive case study. Findings determined the majority of respondents supported the concept, with caution. A number of system and operational considerations were identified and discussed should the transfer of any public policing function be contemplated.
替代或私人警务实体在公共安全和社区预防犯罪方面的侵犯已经扩大到私人人员大大超过公共警察的地步。由于公共资源继续分散,重点放在各个社区,现代安全供应商现在承担了许多传统的警务职能,如监视公共空间、保护公共建筑和“大量私有财产”,以及调查内部企业犯罪。虽然公共警务机构倾向于采用伙伴关系和多机构方法的概念来预防犯罪,但将传统警务职能转移给其他提供者似乎存在固有的阻力。本文探讨了私人保安人员是否能够履行包括罪犯处理在内的传统公共警务职能的可能性。本研究考虑对初犯成人购物行窃者的处理。所采用的方法包括文献综述、当代警务实践分析和描述性案例研究。调查结果表明,大多数受访者支持这一概念,但持谨慎态度。如果考虑转移任何公共警务职能,确定并讨论了若干制度和业务方面的考虑。
{"title":"Public and Private Policing in Retail?","authors":"T. Zalewski","doi":"10.1300/J460v02n02_03","DOIUrl":"https://doi.org/10.1300/J460v02n02_03","url":null,"abstract":"Abstract The encroachment of alternative or private policing entities within public safety and community crime prevention has expanded to the point that private personnel greatly outnumber public police. As public resources continue to be thinly dispersed and their focus prioritised across communities, modern security providers now assume responsibility for many traditional policing functions such as surveillance of public space, protection of public buildings and “mass private property” and the investigation of internal corporate crime. Although public policing agencies tend to embrace partnerships and the concept of multi-agency approaches to prevent crime, there appears an inherent resistance to the transfer of traditional policing functions to alternative providers. This article explores the possibility whether private security personnel are able to perform traditional public policing functions including offender processing. This research considers the processing of first-offender adult shopstealers. The method adopted involved a literature review, analysis of contemporary policing practices and a descriptive case study. Findings determined the majority of respondents supported the concept, with caution. A number of system and operational considerations were identified and discussed should the transfer of any public policing function be contemplated.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interview with Dennis M. Giever, PhD, Indiana University of Pennsylvania 采访丹尼斯·m·吉弗博士,宾夕法尼亚印第安纳大学
Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_06
John Kostanoski
Dennis M. Giever is currently Professor and Chairperson of the Department of Criminology at Indiana University of Pennsylvania. Prior to coming to IUP he was Assistant Professor of Criminal Justice at New Mexico State University. He has been exploring various security education issues at the Academic/Practitioner Symposia hosted by the American Society for Industrial Security and held in various universities throughout the United States.
Dennis M. Giever现任宾夕法尼亚印第安纳大学(Indiana University of Pennsylvania)犯罪学教授和系主任。在加入IUP之前,他是新墨西哥州立大学刑事司法助理教授。他一直在美国工业安全协会主办的学术/从业者研讨会上探讨各种安全教育问题,并在美国各地的多所大学举行。
{"title":"Interview with Dennis M. Giever, PhD, Indiana University of Pennsylvania","authors":"John Kostanoski","doi":"10.1300/J460v02n02_06","DOIUrl":"https://doi.org/10.1300/J460v02n02_06","url":null,"abstract":"Dennis M. Giever is currently Professor and Chairperson of the Department of Criminology at Indiana University of Pennsylvania. Prior to coming to IUP he was Assistant Professor of Criminal Justice at New Mexico State University. He has been exploring various security education issues at the Academic/Practitioner Symposia hosted by the American Society for Industrial Security and held in various universities throughout the United States.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS 安全教育工作者和培训师新闻学院
Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_01
Richard W. Kobetz
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/J460v02n02_01","DOIUrl":"https://doi.org/10.1300/J460v02n02_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128887982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trying to Be a Hero and Winding Up a Zero 试图成为英雄,却以零收尾
Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_02
H. Cooper
Abstract Personal safety and security is, in the last resort, the responsibility of the individual. The wise do not rely on providence to shield them from the dangers and unpleasantness of modern life. This article explores the phenomenon of victimization and why some seem singled out for harm that others avoid. There are natural defenses and those that can be developed through assessment and training. Some clearly lead more hazardous lives than others. Training, even for those whose fate is placed in the hands of personal protection specialists, is still a necessity and can make all the difference in terms of survival.
人身安全和保障归根到底是个人的责任。智者不依赖上帝来保护他们免受现代生活的危险和不愉快。这篇文章探讨了受害现象,以及为什么有些人似乎被挑出来伤害别人。有天然的防御能力,也有可以通过评估和培训来发展的防御能力。有些人显然过着比其他人更危险的生活。即使对那些命运掌握在个人保护专家手中的人来说,培训仍然是必要的,并且可以在生存方面产生重大影响。
{"title":"Trying to Be a Hero and Winding Up a Zero","authors":"H. Cooper","doi":"10.1300/J460v02n02_02","DOIUrl":"https://doi.org/10.1300/J460v02n02_02","url":null,"abstract":"Abstract Personal safety and security is, in the last resort, the responsibility of the individual. The wise do not rely on providence to shield them from the dangers and unpleasantness of modern life. This article explores the phenomenon of victimization and why some seem singled out for harm that others avoid. There are natural defenses and those that can be developed through assessment and training. Some clearly lead more hazardous lives than others. Training, even for those whose fate is placed in the hands of personal protection specialists, is still a necessity and can make all the difference in terms of survival.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134481073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Justice and Ethics 正义与道德
Pub Date : 2007-04-26 DOI: 10.1300/J460v02n02_05
Philip S. Holt, A. Basden
Abstract “Unauthorized network intrusions affect us all. Worse yet, certain classes of unauthorized network intrusions are a very serious matter; ones in which there are minimal defensive actions to prevent such attacks.” Denial-Of-Service (DoS) and Distributed Denial-Of-Service (DDoS) attacks are the class of attack vectors this paper examines and demystifies. We will examine certain aspects (multi/polyaspectuality) of these class-attacks by investigating the following: • The online statement from Carnegie Mellon's Computer Emergency Response Team (CERT/CC Timeline, May 2001). The interplay of three types of justice: Legal Justice (Jus Ad Rem), Social Justice (Jus Civile), and Natural-Moral Justice, or Ethics (Jus Naturalis), while asking the reasonable question, “Can these three types of justice co-exist?” The application of Lonergan's ethics, whose employment allows for the examination of the good, obligation, and value. • In doing so, we hope to arrive at some preliminary answers that will (1) serve as a concrete foundation that will verify the authenticity of positions and further develop those positions; and (2) serve to undermine and destroy weak positions, the ones which are in fact counterpositions and reverse them to concrete positions that are attentive, intelligent, reasonable, and responsible to the individual, the group that said person is a member of, and the society in which they are situated.
“未经授权的网络入侵影响着我们所有人。更糟糕的是,某些类别的未经授权的网络入侵是一个非常严重的问题;在这种情况下,防止此类袭击的防御行动最少。”拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击是本文研究和揭示的一类攻击向量。我们将通过调查以下内容来检查这些类攻击的某些方面(多/多方面):•卡内基梅隆大学计算机应急响应小组(CERT/CC Timeline, 2001年5月)的在线声明。三种类型的正义:法律正义(Jus Ad Rem),社会正义(Jus Civile)和自然道德正义或伦理学(Jus Naturalis)的相互作用,同时提出合理的问题,“这三种类型的正义可以共存吗?”朗尼根伦理学的应用,其应用允许对善、义务和价值进行检验。•在这样做的过程中,我们希望得到一些初步的答案,这些答案将(1)作为验证立场真实性的具体基础,并进一步发展这些立场;(2)有助于破坏和摧毁弱势地位,即那些实际上是对立的地位,并将其逆转为具体的地位,这种地位是对个人,对个人所属的群体,对他们所处的社会负责的,明智的,合理的和负责的。
{"title":"Justice and Ethics","authors":"Philip S. Holt, A. Basden","doi":"10.1300/J460v02n02_05","DOIUrl":"https://doi.org/10.1300/J460v02n02_05","url":null,"abstract":"Abstract “Unauthorized network intrusions affect us all. Worse yet, certain classes of unauthorized network intrusions are a very serious matter; ones in which there are minimal defensive actions to prevent such attacks.” Denial-Of-Service (DoS) and Distributed Denial-Of-Service (DDoS) attacks are the class of attack vectors this paper examines and demystifies. We will examine certain aspects (multi/polyaspectuality) of these class-attacks by investigating the following: • The online statement from Carnegie Mellon's Computer Emergency Response Team (CERT/CC Timeline, May 2001). The interplay of three types of justice: Legal Justice (Jus Ad Rem), Social Justice (Jus Civile), and Natural-Moral Justice, or Ethics (Jus Naturalis), while asking the reasonable question, “Can these three types of justice co-exist?” The application of Lonergan's ethics, whose employment allows for the examination of the good, obligation, and value. • In doing so, we hope to arrive at some preliminary answers that will (1) serve as a concrete foundation that will verify the authenticity of positions and further develop those positions; and (2) serve to undermine and destroy weak positions, the ones which are in fact counterpositions and reverse them to concrete positions that are attentive, intelligent, reasonable, and responsible to the individual, the group that said person is a member of, and the society in which they are situated.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURITY ACADEMIC PROGRAMS 安全学术课程
Pub Date : 2006-12-29 DOI: 10.1300/j460v02n01_10
S. Lancaster
The methodology that we employed in developing this English language-based international academic program list involved gathering information directly from college websites. Many sites did not have a distinct classification for security-related degree programs. Often information was buried under computer science programs or other program listings. There is no single, comprehensive site that displays all the degrees offered in security. Information about the listed institutions was taken from their respective websites. We do not claim that these descriptions are an original creation, nor does this information necessarily reflect our opinions. Also we cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.
我们在开发这个以英语为基础的国际学术项目清单时所采用的方法包括直接从大学网站上收集信息。许多网站对与安全相关的学位课程没有明确的分类。信息通常被隐藏在计算机科学程序或其他程序列表中。没有一个单一的、全面的网站显示所有提供的安全学位。有关上市机构的资料来自其各自的网站。我们并不认为这些描述是原创的,这些信息也不一定反映我们的观点。我们也不能保证这个列表是没有错误的。此列表仅提供认证学位课程的信息。
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster","doi":"10.1300/j460v02n01_10","DOIUrl":"https://doi.org/10.1300/j460v02n01_10","url":null,"abstract":"The methodology that we employed in developing this English language-based international academic program list involved gathering information directly from college websites. Many sites did not have a distinct classification for security-related degree programs. Often information was buried under computer science programs or other program listings. There is no single, comprehensive site that displays all the degrees offered in security. Information about the listed institutions was taken from their respective websites. We do not claim that these descriptions are an original creation, nor does this information necessarily reflect our opinions. Also we cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114087233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with Todd Stewart, PhD 采访托德·斯图尔特博士
Pub Date : 2006-12-29 DOI: 10.1300/J460V02N01_07
John Kostanoski
Todd Stewart is Director for Program for International and Homeland Security, at The Ohio State University, from April 2002. In this capacity, he is responsible for promoting research and study into the homeland-security challenges facing Ohio and the nation, particularly those associated with terrorist activities. His responsibilities include identifying and responding to the research, technology, education, training and
托德·斯图尔特自2002年4月起担任俄亥俄州立大学国际和国土安全项目主任。在这个职位上,他负责促进对俄亥俄州和国家面临的国土安全挑战的研究,特别是与恐怖主义活动有关的挑战。他的职责包括识别和响应研究,技术,教育,培训和
{"title":"Interview with Todd Stewart, PhD","authors":"John Kostanoski","doi":"10.1300/J460V02N01_07","DOIUrl":"https://doi.org/10.1300/J460V02N01_07","url":null,"abstract":"Todd Stewart is Director for Program for International and Homeland Security, at The Ohio State University, from April 2002. In this capacity, he is responsible for promoting research and study into the homeland-security challenges facing Ohio and the nation, particularly those associated with terrorist activities. His responsibilities include identifying and responding to the research, technology, education, training and","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125626438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS 安全教育工作者和培训师新闻学院
Pub Date : 2006-12-29 DOI: 10.1300/j460v02n01_01
Richard W. Kobetz
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v02n01_01","DOIUrl":"https://doi.org/10.1300/j460v02n01_01","url":null,"abstract":"","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"291 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Negotiation Tactics in Organizations Applied to Hostage Negotiation 组织谈判策略在人质谈判中的应用
Pub Date : 2006-12-29 DOI: 10.1300/J460v02n01_05
Jonathan Matusitz, Gerald-Mark Breen
Abstract The purpose of this paper is to take negotiation and its related concepts from the realm of organizational conflict and apply the current communication principles, strategies, and tactics used in organizations to the realm of hostage negotiation in a constructive rather than destructive manner. Another goal of this paper is to show that whether a third-party intervention or a problem-solving method is used, the ultimate goal of negotiation remains identical: to reach cooperation or peace. Yet, the authors inform the readers about the drawbacks and risks of hostage negotiation (i.e., failed manipulative endeavors, lack of effective language use, etc.). Finally, this paper offers suggestions for future research, namely the use of technological aspects that can contribute to a better teaching of negotiation in organizations and better tactics on how to bargain with hostage takers.
本文的目的是将谈判及其相关概念从组织冲突领域中提取出来,并以建设性而非破坏性的方式,将当前组织中使用的沟通原则、策略和战术应用于人质谈判领域。本文的另一个目标是表明,无论是第三方干预还是解决问题的方法,谈判的最终目标仍然是相同的:达成合作或和平。然而,作者告诉读者人质谈判的缺点和风险(即,失败的操纵努力,缺乏有效的语言使用等)。最后,本文为未来的研究提供了建议,即利用技术方面可以有助于更好地在组织中进行谈判教学,以及如何与劫持者讨价还价的更好策略。
{"title":"Negotiation Tactics in Organizations Applied to Hostage Negotiation","authors":"Jonathan Matusitz, Gerald-Mark Breen","doi":"10.1300/J460v02n01_05","DOIUrl":"https://doi.org/10.1300/J460v02n01_05","url":null,"abstract":"Abstract The purpose of this paper is to take negotiation and its related concepts from the realm of organizational conflict and apply the current communication principles, strategies, and tactics used in organizations to the realm of hostage negotiation in a constructive rather than destructive manner. Another goal of this paper is to show that whether a third-party intervention or a problem-solving method is used, the ultimate goal of negotiation remains identical: to reach cooperation or peace. Yet, the authors inform the readers about the drawbacks and risks of hostage negotiation (i.e., failed manipulative endeavors, lack of effective language use, etc.). Finally, this paper offers suggestions for future research, namely the use of technological aspects that can contribute to a better teaching of negotiation in organizations and better tactics on how to bargain with hostage takers.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115836310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Global Business, Transportation, Trade, and the Concept of Unacceptable Danger 全球商业、运输、贸易和不可接受危险的概念
Pub Date : 2006-12-29 DOI: 10.1300/J460V02N01_04
Lawrence A. Howard
Abstract The purpose of security is to ward off unacceptable danger. Narrowed in translation to cargo security, it means to keep the goods, merchandise, or passengers transported in domestic and international commerce free of unacceptable dangers. Sounds reasonable, correct? But, there is an issue begged: what constitutes “unacceptable danger” when it comes to commercial goods, merchandise, or passengers? It is a question no less thorny than and directly related to the question of what constitutes unacceptable danger in a larger cultural, economic, and political context. How a person answers the question of what constitutes “unacceptable” danger, in any context, is dependent upon his or her perceptions derived from the different layers of culture in which he is embedded. People strike a balance in their own minds among competing priorities and probabilities of disaster. Collectively this balancing act is the basis for how we determine public and private policy, including policy on cargo security. There is a real problem with this general approach when we realize that it isn't the probability of an event that matters, but whether or not it can actually happen, whatever the unlikelihood of it. The implications of a nuclear bomb being hidden in the cargo hold of a ship anchored in New York harbor make most nightmares wimpy things in comparison; such an event may be unlikely, but it can happen. The question is whether the improbable event is an unacceptable danger that is worthy of being warded off by a significant investment of time, money, and human resources.
安全的目的是防范不可接受的危险。货物安全的意思是保证在国内和国际贸易中运输的货物、商品或旅客免受不可接受的危险。听起来很合理,对吧?但是,有一个问题需要解决:当涉及到商业货物、商品或乘客时,什么构成“不可接受的危险”?这是一个棘手的问题,与在更大的文化、经济和政治背景下,什么构成不可接受的危险这个问题直接相关。在任何情况下,一个人如何回答什么构成“不可接受的”危险的问题,取决于他或她从他所处的不同文化层次中得出的看法。人们在自己的头脑中,在相互竞争的优先事项和灾难的可能性之间取得平衡。总的来说,这种平衡行为是我们如何确定公共和私人政策的基础,包括货物安全政策。当我们意识到重要的不是事件发生的概率,而是它是否真的会发生,不管它的不可能性有多大时,这种一般方法就存在一个真正的问题。一枚核弹藏在停泊在纽约港的一艘船的货舱里的暗示,使大多数噩梦相比之下显得微不足道;这样的事件可能不太可能发生,但它可能发生。问题在于,这种不可能发生的事件是否是一种不可接受的危险,是否值得投入大量的时间、金钱和人力来加以防范。
{"title":"Global Business, Transportation, Trade, and the Concept of Unacceptable Danger","authors":"Lawrence A. Howard","doi":"10.1300/J460V02N01_04","DOIUrl":"https://doi.org/10.1300/J460V02N01_04","url":null,"abstract":"Abstract The purpose of security is to ward off unacceptable danger. Narrowed in translation to cargo security, it means to keep the goods, merchandise, or passengers transported in domestic and international commerce free of unacceptable dangers. Sounds reasonable, correct? But, there is an issue begged: what constitutes “unacceptable danger” when it comes to commercial goods, merchandise, or passengers? It is a question no less thorny than and directly related to the question of what constitutes unacceptable danger in a larger cultural, economic, and political context. How a person answers the question of what constitutes “unacceptable” danger, in any context, is dependent upon his or her perceptions derived from the different layers of culture in which he is embedded. People strike a balance in their own minds among competing priorities and probabilities of disaster. Collectively this balancing act is the basis for how we determine public and private policy, including policy on cargo security. There is a real problem with this general approach when we realize that it isn't the probability of an event that matters, but whether or not it can actually happen, whatever the unlikelihood of it. The implications of a nuclear bomb being hidden in the cargo hold of a ship anchored in New York harbor make most nightmares wimpy things in comparison; such an event may be unlikely, but it can happen. The question is whether the improbable event is an unacceptable danger that is worthy of being warded off by a significant investment of time, money, and human resources.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128914248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Security Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1