Police Corruption in the NYPD: From Knapp to Mollen explores how the New York Police Department experienced two major investigations within a quarter of a century.
Preventing recidivism is one of the aims of criminal justice, yet existing means of pursuing this aim are often poorly effective, highly restrictive of basic freedoms, and significantly harmful.
Extremist Propaganda in Social Media: A Threat to Homeland Security presents both an analysis of the impact of propaganda in social media and the rise of extremism in mass society from technological and social perspectives.
The book provides a pentapartite theoretical analysis of socio-economic factors as the grand basis for the evolution of Boko Haram terrorism in Nigeria.
Organised crime, corruption, and terrorism are considered to pose significant and unrelenting threats to the integrity, security, and stability of contemporary societies.
When people witness occasions when police use their powers to investigate crime and arrest offenders, how do those members of the public assess what they have seen?
This ground breaking book is the first law enforcement defensive tactics publication that realistically addresses the limited training that law enforcement officers currently receive.
Doing Harm pries open the black box on a critical chapter in the recent history of psychology: the field's enmeshment in the so-called war on terror and the ensuing reckoning over do-no-harm ethics during times of threat.
With cities increasingly following rigid rules for designing out crime and producing spaces under surveillance, this book asks how information shapes bodies, space, and, ultimately, policymaking.
This book analyses the usefulness of terrorist profiling utilised by law enforcement officers as a pre-emptive means to assist them in the detection, prevention and deterrence of terrorism and/or its preparatory activities.
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
This book aims to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third party arrangements and emphasises that organisations retain accountability for business activities, functions and services outsourced to a third party.
* LONGLISTED FOR THE WOMEN'S PRIZE FOR FICTION 2025 ** A READ WITH JENNA BOOK CLUB PICK MARCH 2025 *'A gripping, Kafkaesque foray into an all-too-plausible future' JENNIFER EGAN'So cleverly conceived, so relevant, that everyone should read it and sweat' THE TIMES'Extraordinary' RUMAAN ALAM'Absolutely unputdownable' SANDRA NEWMANSara is returning home from a conference abroad when agents from the Risk Assessment Administration pull her aside at the airport.
This new work explores the growth of information and communication technologies with an emphasis on cyber-physical systems and security management of these systems.
Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions.
AN INSIDE LOOK INTO INVESTIGATING THE MOST VIOLENT SUB-CULTURE IN THE WORLDOnce an offender is behind bars, many people believe that he is no longer a threat to society.
Building on previous work in rural criminology, this book casts a global and comparative look across 19 countries, drawing on themes of crime and victimisation, safety and fear, practices of policing and police trust, and crime prevention practices.
Spätestens seit dem tödlichen Hochgeschwindigkeitsunfall infolge des illegalen Straßenrennens vom Berliner Kurfürstendamm ist das Thema Raserei in die öffentliche Aufmerksamkeit gerückt.
Crime, Regulation and Control during the Blitz looks at the social effect of bombing on urban centres like Liverpool, Coventry and London, critically examining how the wartime authorities struggled to regulate and control crime and offending during the Blitz.
War, poverty, and famine; political, social, and economic change; and the deep seated views and rituals rooted in a culture's history and traditions all contribute to the widespread and growing trafficking of women and children.
In Bloodstain Pattern Evidence, the concepts introduced in the author's first book, Blood Dynamics, are updated and applied to provide essential answers in the resolution of actual crimes.
This edited collection by internationally recognized authors provides essays on police behavior in the categories of police administration, police operations, and combating specific crimes.
"e;The chapters in this book reveal that police education, training, and practices are now closely tied to collaboration between police, academics, professional practitioners, and community agencies, and such collaboration is described and evaluated.
Although intervention and campaigning have long been integral to critical criminology, in recent years, criminal justice activism has taken new directions and gathered momentum, especially with the advent of digital technologies and social media.
Reflecting the diverse and specialized nature of the security industry, this volume provides an up-to-date treatment of a topic that has become increasingly complex as more vulnerabilities arise.
Threats in Context: Identify, Analyze, Anticipate begins with the premise that a risk assessment is relevant primarily-and hinges upon-the correct evaluation of the threat.
Approaching the topic from a law enforcement perspective, this volume provides an unprecedented look at the investigation of human trafficking in America.
Millions in our nation are under some type of judicial sanction, with some individuals behind bars but the majority serving their sentences while living and working among us.
A new installment of the series of Interviews with Global Leaders in Policing, Courts, and Prisons, this book expands upon the criminal justice coverage of earlier volumes, offering the voices of 14 lawyers from 13 diverse locales, including countries in Africa, North America, South America, Europe, and the Asia-Pacific region.
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.