Details

Introduction to Homeland Security


Introduction to Homeland Security

Understanding Terrorism Prevention and Emergency Management
2. Aufl.

von: David A. McEntire

66,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 28.08.2018
ISBN/EAN: 9781119430674
Sprache: englisch
Anzahl Seiten: 416

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Introduces readers to the world of homeland security and provides them with up-to-date information on recent attacks, new terrorist threats, visible terrorist organizations, current dilemmas, updated research, and best practices</b></p> <p>This book provides comprehensive coverage of issues relating to terrorism, terrorist behavior, homeland security policies, and emergency management. It offers a foundation that spans the readily apparent chasm between the homeland security and disaster communities, and covers the stages of emergency management with a focus on terrorism prevention and response. Based on both the academic literature and practical understanding, the book includes research findings, covering theory and principles as well as their application.</p> <p><i>Introduction to Homeland Security: Understanding Terrorism</i> <i>Prevention and Emergency Management, Second Edition </i>teaches how to define homeland security, understand how it changed after 9/11, and explore its relationship with emergency management; recognize the causes of terrorism and what prompts people to engage in terrorist attacks; assess the trade-offs between security and rights, and understand how terrorism exploits the tension between these two priorities; work to prevent terrorist attacks through intelligence gathering, by promoting laws that prohibit terrorism, and by protecting borders and various sectors of society; prepare for a terrorist attack by creating an advisory council, passing ordinances, acquiring monetary resources, and establishing an EOC; effectively respond to a terrorist attack through the many functions involved, including the protection of first responders and the decontamination of the victims; recover from a terrorist attack through both short-term and long-term measures; anticipate the current challenges faced in homeland security; and comprehend the various types of attacks that might take place in the future. The second edition:</p> <ul> <li>Covers the four traditional phases of emergency response, with a focus on terrorism prevention and infrastructure protection</li> <li>Includes new content such as recent domestic and international terrorist attacks including the attacks in Paris and Boston</li> <li>Has a strong "practitioner" approach and draws upon a solid foundation of academic literature in the field</li> <li>Discusses the roles and responsibilities of government agencies, non-government organizations, and individual citizens</li> </ul> <p><i>Introduction to Homeland Security</i> is an excellent book for all scholars, students, and practitioners interested or involved in homeland security and emergency management.</p>
<p><b>CHAPTER 1. UNDERSTANDING A NEW GLOBAL PRIORITY: TERRORISM, HOMELAND SECURITY, AND EMERGENCY MANAGEMENT 1</b></p> <p>Introduction 2</p> <p>1.1 Terrorism Is the New Normal 2</p> <p>1.1.1 Boston Marathon Bombing 2</p> <p>1.1.2 San Bernardino Regional Center Shooting 2</p> <p>1.1.3 Orlando Nightclub Shooting 3</p> <p>1.1.4 Other Notable Attacks 3</p> <p>Self-Check 6</p> <p>1.2 A Growing Threat 6</p> <p>1.2.1 Reasons to Anticipate More Attacks 7</p> <p>Self-Check 9</p> <p>1.3 9/11: A Wake-Up Call 9</p> <p>Self-Check 11</p> <p>1.4 The Nature of Homeland Security 11</p> <p>1.4.1 Definitions of Homeland Security 12</p> <p>1.4.2 Agreement About Homeland Security 12</p> <p>Self-Check 16</p> <p>1.5 Disciplines Involved in Homeland Security and the Emergency Management Profession 16</p> <p>1.5.1 The Role of Emergency Management 17</p> <p>1.5.2 Important Terminology 21</p> <p>Self-Check 22</p> <p>Summary 23</p> <p>Assess Your Understanding 24 <br /><br />Applying This Chapter 25</p> <p>Be a Homeland Security Professional 26</p> <p>Key Terms 26</p> <p>References 28</p> <p><b>CHAPTER 2. IDENTIFYING TERRORISM: IDEOLOGICALLY MOTIVATED ACTS OF VIOLENCE AND THEIR RELATION TO DISASTERS 31</b></p> <p>Introduction 32</p> <p>2.1 Defining Terrorism 32</p> <p>Self-Check 34</p> <p>2.2 Common Characteristics Of Terrorism 34</p> <p>Self-Check 35</p> <p>2.3 Types of Terrorism 35</p> <p>Self-Check 38</p> <p>2.4 Relation of Terrorism to Other Disasters 38</p> <p>Self-Check 41</p> <p>Summary 42</p> <p>Assess Your Understanding 43 Applying This Chapter 44</p> <p>Be a Homeland Security Professional 44</p> <p>Key Terms 45</p> <p>References 46</p> <p><b>CHAPTER 3. RECOGNIZING THE CAUSES OF TERRORISM: DIFFERING PERSPECTIVES AND THE ROLE OF IDEOLOGY 47</b></p> <p>Introduction 48</p> <p>3.1 Frequently Mentioned Causes of Terrorism 48</p> <p>3.1.1 Historical Grievances 48</p> <p>3.1.2 US Foreign Policy 49</p> <p>3.1.3 Poverty 50</p> <p>Self-Check 51</p> <p>3.2 Political Causes 5</p> <p>3.2.1 Politics 52</p> <p>3.2.2 Political Systems 52</p> <p>3.2.3 Political Functions 53</p> <p>3.2.4 Political Structure 54</p> <p>Self-Check 56</p> <p>3.3 Cultural and Religious Causes 56</p> <p>3.3.1 Cultural Dimensions of Terrorism 56</p> <p>3.3.2 The Role of Religion in Terrorism 57</p> <p>Self-Check 60</p> <p>3.4 Ideology 60</p> <p>3.4.1 The Nature of Ideologies 61</p> <p>3.4.2 Ideological Dimensions of Terrorism 62</p> <p>Self-Check 63</p> <p>Summary 63</p> <p>Assess Your Understanding 64 Applying This Chapter 65</p> <p>Be a Homeland Security Professional 65</p> <p>Key Terms 66</p> <p>References 68</p> <p><b>CHAPTER 4. COMPREHENDING TERRORISTS AND THEIR BEHAVIOR: WHO THEY ARE AND WHAT THEY DO 69</b></p> <p>Introduction 70</p> <p>4.1 Terrorists and Terrorist Organizations 70</p> <p>4.1.1 Terrorist Classification 73</p> <p>Self-Check 75</p> <p>4.2 Personal Characteristics 75</p> <p>4.2.1 Distinct Differences 76</p> <p>Self-Check 78</p> <p>4.3 The Behavior and Tactics of Terrorists 78</p> <p>4.3.1 Propaganda 78</p> <p>4.3.2 Recruiting 79</p> <p>4.3.3 Financing 79</p> <p>4.3.4 Training 81</p> <p>4.3.5 False Documents, Travel, and Safe Haven 82</p> <p>4.3.6 Code Words and Secret Communications 82</p> <p>4.3.7 Planning 83</p> <p>4.3.8 Weapons 85</p> <p>4.3.9 Acts of Civil Disorder or Terrorisms 86</p> <p>Self-Check 88</p> <p>Summary 88</p> <p>Assess Your Understanding 89 Applying This Chapter 90</p> <p>Be a Homeland Security Professional 91</p> <p>Key Terms 91</p> <p>References 93</p> <p><b>CHAPTER 5. UNCOVERING THE DYNAMIC NATURE OF TERRORISM: HISTORY OF VIOLENCE AND CHANGE OVER TIME 95</b></p> <p>Introduction 96</p> <p>5.1 The Appearance of Terrorism 96</p> <p>Self-Check 98</p> <p>5.2 The Evolution of Terrorism Abroad 98</p> <p>Self-Check 101</p> <p>5.3 Terrorism and the United States 102</p> <p>Self-Check 105</p> <p>5.4 Terrorism Today 105</p> <p>Self-Check 109</p> <p>Summary 110</p> <p>Assess Your Understanding 111</p> <p>Applying This Chapter 112</p> <p>Be a Homeland Security Professional 113</p> <p>Key Terms 113</p> <p>References 114</p> <p><b>CHAPTER 6. EVALUATING A MAJOR DILEMMA: TERRORISM, THE MEDIA, AND CENSORSHIP 115</b></p> <p>Introduction 116</p> <p>6.1 Changes in the Media Over Time 116</p> <p>Self-Check 117</p> <p>6.2 Terrorists and the Media 117</p> <p>Self-Check 120</p> <p>6.3 The Media and Terrorism 120</p> <p>Self-Check 123</p> <p>6.4 Government and the Media 123</p> <p>Self-Check 126</p> <p>6.5 Censorship and Self-Censorships 126</p> <p>Self-Check 129</p> <p>Summary 129</p> <p>Assess Your Understanding 130</p> <p>Applying This Chapter 131</p> <p>Be a Homeland Security Professional 132</p> <p>Key Terms 133</p> <p>References 134</p> <p><b>CHAPTER 7. CONTEMPLATING A QUANDARY:  TERRORISM, SECURITY, AND LIBERTY 135</b></p> <p>Introduction 136</p> <p>7.1 War, Terrorism, and Law 136</p> <p>Self-Check 138</p> <p>7.2 Security and Liberty 138</p> <p>Self-Check 142</p> <p>7.3 Cases and Considerations 142</p> <p>Self-Check 148</p> <p>Summary 148</p> <p>Assess Your Understanding 149 Applying This Chapter 150</p> <p>Be a Homeland Security Professional 151</p> <p>Key Terms 151</p> <p>References 152</p> <p><b>CHAPTER 8. PREVENTING TERRORIST ATTACKS: ROOT CAUSES, LAW, INTELLIGENCE, AND COUNTERTERRORISM 153</b></p> <p>Introduction 154</p> <p>8.1 Addressing Root Causes 154</p> <p>Self-Check 156</p> <p>8.2 Policy and Legislation 156</p> <p>8.2.1 Laws Prior to 9/11 157</p> <p>8.2.2 Legislation After 9/11 158</p> <p>Self-Check 160</p> <p>8.3 Intelligence 161</p> <p>8.3.1 The Need for Intelligence 161</p> <p>8.3.2 The Intelligence Cycle 162</p> <p>8.3.3 Challenges Facing the Intelligence Community 163</p> <p>8.3.4 Successes 166</p> <p>Self-Check 167</p> <p>8.4 Counterterrorism 167</p> <p>8.4.1 Risky Operations 170</p> <p>8.4.2 Learning from Other Nations 171</p> <p>8.4.3 Controversy Regarding Counterterrorism 173</p> <p>Self-Check 174</p> <p>Summary 174</p> <p>Assess Your Understanding 175</p> <p>Applying This Chapter 176</p> <p>Be a Homeland Security Professional 176</p> <p>Key Terms 177</p> <p>References 179</p> <p><b>CHAPTER 9. SECURING THE NATION: BORDER  CONTROL AND SECTOR SAFETY 181</b></p> <p>Introduction 182</p> <p>9.1 Border Control 182</p> <p>9.1.1 What Is the Border? 182</p> <p>9.1.2 Our Porous Border 183</p> <p>9.1.3 Participants Involved in Border Control 185</p> <p>9.1.4 Measures to Secure Borders 186</p> <p>Self-Check 188</p> <p>9.2 Protecting Air Transportation 189</p> <p>Self-Check 192</p> <p>9.3 Rail Transportation Security 192</p> <p>Self-Check 195</p> <p>9.4 Protection of Sea Ports and Maritime Transportation 195</p> <p>Self-Check 198</p> <p>9.5 Protection of Petrochemical Facilities 199</p> <p>Self-Check 200</p> <p>Summary 201</p> <p>Assess Your Understanding 202 Applying This Chapter 203</p> <p>Be a Homeland Security Professional 203</p> <p>Key Terms 204</p> <p>References 206</p> <p><b>CHAPTER 10. PROTECTING AGAINST POTENTIAL ATTACKS: THREAT ASSESSMENT, MITIGATION, AND OTHER MEASURES 207</b></p> <p>Introduction 208</p> <p>10.1 Threat Assessment 208</p> <p>10.1.1 Critical Infrastructure, Key Assets, and Soft Targets 208</p> <p>10.1.2 Collaboration with Others to Identify Threats 210</p> <p>10.1.3 Points of Consideration 212</p> <p>Self-Check 217</p> <p>10.2 Structural and Nonstructural Mitigation 217</p> <p>10.2.1 Architectural Design and Construction 218</p> <p>10.2.2 Zoning and Set-back Regulations 219</p> <p>10.2.3 Other Protective Measures 220</p> <p>Self-Check 223</p> <p>Summary 223</p> <p>Assess Your Understanding 224 Applying This Chapter 225</p> <p>Be a Homeland Security Professional 226</p> <p>Key Terms 227</p> <p>References 228</p> <p><b>CHAPTER 11. PREPARING FOR THE UNTHINKABLE: EFFORTS FOR READINESS 229</b></p> <p>Introduction 230</p> <p>11.1 The Importance and Nature of Preparedness 230</p> <p>11.1.1 Federal and State Initiatives 231</p> <p>Self-Check 237</p> <p>11.2 Foundations of Preparedness 237</p> <p>11.2.1 Preparedness Councils 238</p> <p>11.2.2 Ordinances 239</p> <p>11.2.3 Budgets and Grants 239</p> <p>11.2.4 Emergency Operations Centers 241</p> <p>Self-Check 242</p> <p>11.3 Planning 242</p> <p>Self-Check 245</p> <p>11.4 Other Measures 245</p> <p>11.4.1 Training 245</p> <p>11.4.2 Exercises 247</p> <p>11.4.3 Community Education 249</p> <p>Self-Check 251</p> <p>Summary 252</p> <p>Assess Your Understanding 253</p> <p>Applying This Chapter 254</p> <p>Be a Homeland Security Professional 255</p> <p>Key Terms 255</p> <p>References 258</p> <p><b>CHAPTER 12. RESPONDING TO ATTACKS: IMPORTANT FUNCTIONS AND COORDINATION MECHANISMS 259</b></p> <p>Introduction 260</p> <p>12.1 Behavior and Major Priorities 260</p> <p>12.1.1 Initial Investigation and Apprehension 261</p> <p>12.1.2 Safety and Security 263</p> <p>12.1.3 Search and Rescue 266</p> <p>12.1.4 Medical Care and Triage 266</p> <p>12.1.5 Decontamination 267</p> <p>12.1.6 Closing the Investigation 268</p> <p>Self-Check 270</p> <p>12.2 Other Crucial Functions 270</p> <p>12.2.1 Warning, Intelligence, and Public Information 271</p> <p>12.2.2 Evacuation and Sheltering 273</p> <p>Self-Check 274</p> <p>12.3 Coordination Mechanisms 275</p> <p>12.3.1 The Incident Command System 275</p> <p>12.3.2 Strengths and Weakness of ICS 277</p> <p>12.3.3 Utilization of Emergency Operations Centers 278</p> <p>12.3.4 EOC Management 280</p> <p>Self-Check 281</p> <p>Summary 281</p> <p>Assess Your Understanding 282</p> <p>Applying This Chapter 283</p> <p>Be a Homeland Security Professional 283</p> <p>Key Terms 284</p> <p>References 286</p> <p><b>CHAPTER 13. RECOVERING FROM IMPACTS: SHORT- AND LONG-TERM MEASURES 287</b></p> <p>Introduction 288</p> <p>13.1 Initial Recovery Steps 288</p> <p>13.1.1 Damage Assessment 288</p> <p>13.1.2 Damage Assessment Concerns and Procedures 289</p> <p>13.1.3 Declaring a Disaster and Seeking Help 290</p> <p>Self-Check 292</p> <p>13.2 Key Recovery Functions 292</p> <p>13.2.1 Mass Fatality Management 292</p> <p>13.2.2 Debris Management 294</p> <p>13.2.3 Emotional Issues 296</p> <p>Self-Check 297</p> <p>13.3 The Importance of Disaster Assistance 298</p> <p>13.3.1 Volunteer and Donation Management 298</p> <p>13.3.2 Individual and Public Assistance 300</p> <p>13.3.3 Novel Approaches 302</p> <p>Self-Check 304</p> <p>Summary 304</p> <p>Assess Your Understanding 305</p> <p>Applying This Chapter 306</p> <p>Be a Homeland Security Professional 307</p> <p>Key Terms 307</p> <p>References 310</p> <p><b>CHAPTER 14. ASSESSING SIGNIFICANT THREATS: WMD AND CYBERTERRORISM  311</b></p> <p>Introduction 312</p> <p>14.1 The Future of Terrorism and WMD 312</p> <p>Self-Check 317</p> <p>14.2 Radiological Weapons 317</p> <p>Self-Check 321</p> <p>14.3 Nuclear Weapons 321</p> <p>Self-Check 325</p> <p>14.4 Biological Weapons 325</p> <p>Self-Check 329</p> <p>14.5 Chemical Weapons 330</p> <p>Self-Check 333</p> <p>14.6 Cyberterrorism 333</p> <p>Self-Check 337</p> <p>Summary 337</p> <p>Assess Your Understanding 338 <br /><br />Applying This Chapter 339</p> <p>Be a Homeland Security Professional 339</p> <p>Key Terms 340</p> <p>References 342</p> <p><b>CHAPTER 15. LOOKING TOWARD THE  FUTURE:  CHALLENGES AND OPPORTUNITIES 343</b></p> <p>Introduction 344</p> <p>15.1 The Lessons of this Book 344</p> <p>Self-Check 348</p> <p>15.2 Accountability in Homeland Security 348</p> <p>Self-Check 351</p> <p>15.3 Clarification of Homeland Security Policy 351</p> <p>Self-Check 353</p> <p>15.4 Research Needs and Recommendations for the Future 354</p> <p>15.4.1 Direction for Researchers 354</p> <p>15.4.2 Guidance for Practitioners 356</p> <p>Self-Check 358</p> <p>Summary 359</p> <p>Assess Your Understanding 360</p> <p>Applying This Chapter 361</p> <p>Be a Homeland Security Professional 361</p> <p>Key Terms 362</p> <p>References 362</p> <p>Glossary 363</p> <p>Index 377</p>
<p><b>DAVID A. McENTIRE, P<small>H</small>D,</b> is the Dean of the College of Health and Public Service at Utah Valley University in Orem, Utah. He is responsible for the oversight of numerous undergraduate and graduate programs in the areas of emergency services, homeland security, national security, public service, aviation and health care. He has received several grants—funded by the Natural Hazards Center, the National Science Foundation, and other sources— that allowed him to conduct research in Peru, the Dominican Republic, Texas, New York, California, and Haiti.
<p><b>INTRODUCES READERS TO THE WORLD OF HOMELAND SECURITY AND PROVIDES THEM WITH UP-TO-DATE INFORMATION ON RECENT ATTACKS, NEW TERRORIST THREATS, VISIBLE TERRORIST ORGANIZATIONS, CURRENT DILEMMAS, UPDATED RESEARCH, AND BEST PRACTICES</b> <p>This book provides comprehensive coverage of issues relating to terrorism, terrorist behavior, homeland security policies, and emergency management. It offers a foundation that spans the chasm between the homeland security and disaster communities, and covers the stages of emergency management with a focus on terrorism prevention and response. Based on both the academic literature and practical understanding, the book includes research findings, covering theory and principles as well as their application. <p><i>Introduction to Homeland Security: Understanding Terrorism</i> <i>Prevention and Emergency Management, Second Edition,</i>defines homeland security, explores how it changed after 9/11, and clarifies its relationship with emergency management. The book also identifies the causes of terrorism and what prompts people to engage in terrorist attacks; assesses the trade-offs between security and rights; and recognizes how terrorism exploits the tension between these two priorities. Chapters discuss how to prevent terrorist attacks through intelligence gathering, by promoting laws that prohibit terrorism, and by protecting borders and various sectors of society. Other topics include preparing for terrorist attacks by creating an advisory council, passing ordinances, acquiring monetary resources, and establishing an EOC. The book also notes how to effectively respond to a terrorist attack through the protection of first responders and the decontamination of the victims; recover from a terrorist attack through both short-term and long-term measures; anticipate the current challenges faced in homeland security; and comprehend the various types of attacks that might take place in the future. <p><b>The second edition:</b> <ul> <li>Covers the four traditional phases of emergency response, with a focus border control and infrastructure protection</li> <li>Includes new content about recent domestic and international terrorist attacks as well as weapons of mass destruction</li> <li>Discusses the roles and responsibilities of government agencies, non-government organizations, and individual citizens</li> <li>Has a strong "practitioner" approach and draws upon a solid foundation of academic literature in the field</li> </ul> <p><i>Introduction to Homeland Security</i> is an excellent book for all scholars, students, and practitioners interested or involved in homeland security and emergency management.

Diese Produkte könnten Sie auch interessieren:

Projektmanagement und Prozessmessung
Projektmanagement und Prozessmessung
von: Ernst Jankulik, Peter Kuhlang, Roland Piff
PDF ebook
51,99 €
Project Management
Project Management
von: Harold Kerzner
PDF ebook
71,99 €