security industry
Recently Published Documents


TOTAL DOCUMENTS

304
(FIVE YEARS 88)

H-INDEX

11
(FIVE YEARS 2)

2022 ◽  
Vol 98 (1) ◽  
pp. 183-207
Author(s):  
Nivi Manchanda ◽  
Sharri Plonski

Abstract This article wrestles with the question of ‘national’ borders in racial capitalism. We do so through an examination of border and capitalist corridors. We focus particularly on the Israeli border, branded and then sold to the rest of the world by the epistemic community of border-makers and interlocutors. In tracking the Israeli border and showing the implication of the experts and their markets, we ask how the border reflects and is refracted through a global order organized by the twin dictates of racism and capitalism. We are especially interested in how racialized processes of bordering, ostensibly governed by national exigencies, are transplanted on to other contexts. Two points emerge from this: in the first instance, we ask who and what enables this movement of the border. And in the second, we interrogate which logics and practices are transplanted with the border, as it is reproduced and seemingly fixed in a new place. We examine the violent ontologies that give shape and reputation to Israel's high-tech border industry, which has become a model for the ever-growing global homeland security industry. We ask: has Israel's border become an exportable commodity and who are the actors who have enabled this ‘achievement’? Related to this, what sort of occlusions and structural violence does the fetishization of the Israeli border rely on?


2021 ◽  
Vol 26 ◽  
pp. 728-741
Author(s):  
Linda Mbana ◽  
Dorcas Khosa ◽  
Jacob Tseko Mofokeng ◽  
Witness Maluleke

The professionalisation of the private security industry (PSI) can be beneficial and costly and these need to be measured against undertaking any professionalisation initiatives, since they can provide some degree of quality control to some businesses working in the field but can also impose hindrances and negative experiences to those wishing to enter the industry. The purpose of this study was to explore the following question: What are the experiences on hindrances to professionalisation of the PSI by Private Security Industry Regulatory Authority [PSiRA] in South Africa? Following a qualitative research approach, this study employed the exploratory research design. The judgemental sampling technique was adopted to select a sample of 40 participants from Gauteng (GP), KwaZulu-Natal (KZN) and Western Cape (WC) provinces. The findings highlighted that the majority of the participants agreed that the professionalisation of the PSI through PSiRA is facing many positive and negative experiences and hindrances, particularly in the private security training space where corruption and criminality are rife. This study recommends that, to overcome the noted hindrances, PSiRA needs to update the training curriculum, empower and train more inspectors and build relationships with industry stakeholders.


Viking ◽  
2021 ◽  
Vol 84 (1) ◽  
Author(s):  
Christian Cooijmans

Like any other medieval mariner, itinerant viking hosts would regularly have made their way ashore to regroup and reinforce their constituent craft and crews. Accordingly, historical and archaeological records from across Atlantic Europe attest to various waterside encampments having been established during overseas viking campaigns. The everyday practical operation of these camps remains largely underexplored, however, maintaining long-standing impressions that these were relatively dormant hideouts, principally used to intersperse bouts of conflict or to wait out the winter. Bringing together the interdisciplinary evidence for viking encampment from Ireland, England, and the Frankish realm, this study provides a more pronounced picture of the overall logistics involved in establishing and maintaining sites like these. Focusing on the themes of sustenance, security, industry, and commerce, it affirms that the encampments played host to an intricate, adaptive system of logistical (inter)relationships, which contributed to the overall sustainability of the earlyviking phenomenon.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Michal Krelina

AbstractQuantum technology is an emergent and potentially disruptive discipline, with the ability to affect many human activities. Quantum technologies are dual-use technologies, and as such are of interest to the defence and security industry and military and governmental actors. This report reviews and maps the possible quantum technology military applications, serving as an entry point for international peace and security assessment, ethics research, military and governmental policy, strategy and decision making. Quantum technologies for military applications introduce new capabilities, improving effectiveness and increasing precision, thus leading to ‘quantum warfare’, wherein new military strategies, doctrines, policies and ethics should be established. This report provides a basic overview of quantum technologies under development, also estimating the expected time scale of delivery or the utilisation impact. Particular military applications of quantum technology are described for various warfare domains (e.g. land, air, space, electronic, cyber and underwater warfare and ISTAR—intelligence, surveillance, target acquisition and reconnaissance), and related issues and challenges are articulated.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042020
Author(s):  
Yougang Yao ◽  
Linling Zou

Abstract The security industry is generated by the needs of modern public security precaution. With the popularization of hardware and network technology, the amount of data in the field of security increases rapidly. Under such a condition, big data technology in the field of security arises. This paper discusses the current situation of the security industry, and discusses the related security problems in the application process of big data in the field of public security precaution. Taking the video image database application platform as an example, combined with the national standards 28181, 25724, 35114, this paper discusses the data security problems involved in the process of data acquisition and data transmission. Based on the Kerberos authentication mechanism of Hadoop, this paper introduces the big data security and access control technology, and forms relevant solutions in the whole process of data acquisition, data transmission and data access.


Sign in / Sign up

Export Citation Format

Share Document