Annual Editions Homeland Security (Annual Editions) (4TH)

個数:

Annual Editions Homeland Security (Annual Editions) (4TH)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 183 p.
  • 言語 ENG
  • 商品コード 9781259882968
  • DDC分類 327

Full Description


The Annual Editions series is designed to provide convenient inexpensive access to a wide range of current articles from some of the most respected magazines, newspapers and journals published today. Annual Editions are updated on a regular basis through a continuous monitoring of over 300 periodical sources. The articles selected are authored by prominent scholars, researchers, and commentators writing for a general audience. Each Annual Editions volume has a number of features designed to make them especially valuable for classroom use; including a brief overview for each unit, as well as Learning Outcomes, Critical Thinking questions, and Internet References to accompany each article. Go to the McGraw-Hill Create (R) Annual Editions Article Collection at http://www.mcgrawhillcreate.com/annualeditions to browse the entire collection. Select individual Annual Editions articles to enhance your course, or access and select the entire Badey: Annual Editions: Homeland Security, 4/e book here http://create.mheducation.com/createonline/index.html#qlink=search%2Ftext%3Disbn:1259882969 for an easy, pre-built teaching resource. Visit http://create.mheducation.com for more information on other McGraw-Hill titles and special collections.

Contents

Unit 1"Homeland Security": The Trillion-Dollar Concept That No One Can Define, Mattea Kramer and Chris Hellman, The Nation, 2013Kramer and Hellman argue that despite the fact that there is no agreed-upon definition of homeland security the government spends billions of dollars each year. They suggest that by addressing waste, duplication and poor management in the DHS we could spend far less and be much safer.The Two Faces of DHS: Balancing the Department's Responsibilities, Jerome H. Kahan, Homeland Security Affairs, 2013Jerome H. Kahan believes that the Department of Homeland Security's efforts to manage non-homeland security activities could compromise its primary mission. He recommends changes that may enable the DHS to execute its primary responsibilities, while carrying out its other obligations.DHS: The Department of Everything? Joan Johnson-Freese, Breaking Defense, 2015Joan Johnson-Freese identifies three fundamental problems in the Department of Homeland Security. She argues that divergent organizational cultures, poor personnel management, and an overly broad mission have led to the creation of an inefficient and dysfunctional.Senate Appropriations Committee Addresses President's FY 2017 DHS Budget Request, Olivia Colbert, Homeland Security Today, 2016Homeland Security Secretary Jeh Johnson presented the DHS 2017 budget request to the Senate Appropriations Committee Homeland Security Subcommittee in February of 2016. He outlined the agency's priorities in support of his request for $40.6 billion in appropriated funds and a total spending authority of $66.8 billion.Unit 2: Threats to Homeland SecurityHomeland Security at a Crossroads: Evolving DHS to Meet the Next Generation of Threats, Rick "Ozzie" Nelson and Rob Wise, Center for Strategic & International Studies Commentary, 2013Nelson and Wise contend that the DHS must evolve to focus on the next generation of threats before they can inflict significant damage to the United States. They believe that a shift in priorities, structures, and missions is needed in order to focus on cyber-security, screening and credentialing, and information sharing.How Dangerous Are Domestic Terror Plotters with Foreign Fighter Experience? The Case of Home-grown Jihadis in the United States, Christopher J. Wright, Perspectives on Terrorism, 2016Wright attempts to analyze the potential threat posed by domestic terror plotters with foreign-fighter experience. His study indicates that plots carried out with American returnees from Islamist insurgencies abroad decrease the likelihood that a plot will come to fruition and that the presence of a returnee decreases the likelihood that an executed plot will cause mass casualties.Family-Affiliated Terrorism: From Paris to San Bernadino and Beyond, Dean C. Alexander, Security Magazine, 2016Dean Alexander suggests that Terrorism by family units is an increasing threat. The three sets of brothers who served as hijackers on 9/11, Boston Marathon bombers Tamerlan and Dzhokhar Tsarnaev, and the San Bernardino attacks carried out by husband and wife, Syed Rizwan Farook and Tashfeen Malik indicate that family-affiliated political violence will likely continue.Four Reasons ISIS Is a Threat to the American Homeland, Stuart Gottlieb, The National Interest, 2014According to Gottlieb, there are four reasons ISIS is a threat to the American Homeland; the potential increase in quality of fighters, the expansion of ISIS "friendly" territories, asymmetric advantages, and the perception of strength.Age of the Wolf, Ryan Lenz and Mar Potok, Southern Poverty Law Center, 2015Lenz and Potok study terrorism in the United States. They conclude that the vast majority terrorist attacks are carried out by "lone wolves" or "leaderless resistance" groups.Unit 3: VulnerabilitiesCan the Power Grid Survive a Cyberattack? Michael McElfresh, The Conversation, 2015Michael McElfresh warns that the U.S. power grid, essential to maintain critical infrastructure, such as communications, water, and banking may be vulnerable to cyberattacks. He argues that as society becomes increasingly reliant on the power grid and an array of devices are connected to the Internet, security and protection must be a high priority.Brussels Terrorists Struck Soft Underbelly of Airport Security, Alan Levin, Bloomberg.com, 2016Terrorist attacks at the airport terminal in Brussels highlight the limits of airport security. Levin argues that even with tighter security and sophisticated detection equipment there will always be areas of vulnerability.Terrorism 3.0 and the Need for 100 Percent Cargo Scanning, Daniel Goure, Lexington Institute, 2015Daniel Goure argues that "less than one percent of cargo containers" coming into the United States by air or on ships are actually inspected. He suggests that it is only a matter of time before terrorist exploit this vulnerability unless we get ahead of the threat.The United States Is "Significantly Underprepared" to Deal with Biological Terrorism, Kevin Loria, Tech Insider, 2015In October of 2015, Blue Ribbon Panel concluded that the United States is "significantly underprepared" to deal with biological terrorism. According to the panel the main problem is the lack of clear leadership and a coordinated response plan to stop spread of a dangerous illness.Obama Warns of Nuclear Terrorism Threat, Pamela Dockins, Voice of America (VOA), 2016President Obama's address at the Nuclear Security Summit in Washington in April of 2016 identifies "terrorists getting their hands on a weapon of mass destruction" as "one of the greatest threats to global security." Pamela Dockins highlights some of the critical issues discussed at the summit.Unit 4: The Federal Government and Homeland SecurityExposing Waste and Mismanagement at the Department of Homeland Security, Rep. Scott Perry, The Daily Signal, 2016Rep. Scott Perry discusses deficiencies in the Department of Homeland Security identified by the Subcommittee on Oversight and Management Efficiency. He offers suggestions for more efficient management and spending.TSA's Idea: End Screening at Some Airports, Heather Caygle, The Politico, 2016Heather Caygle discusses the strongly debated proposals to alter the Transportation Security Administration's (TSA) security screening practices at smaller airports. Some politicians have raised safety concerns in light of the Brussels airport attack.Border Control Needs to Crack Down on Internal Corruption, Report Says, Brian Bennett, Los Angeles Times, 2015A 2015 Department of Homeland Security report concluded that the CBP, the nation's largest law enforcement agency, is vulnerable to "systematic corruption." The Homeland Security Advisory Council suggests that 350 criminal investigators should be added to address this issue.Obama: Guantanamo Bay Undermines Security, Must Be Closed, Lolita C. Baldor and Kathleen Hennessey, The Associated Press, 2016President Obama's plans to close Guantanamo Bay prison which is viewed by some as a recruitment tool for terrorists, continues to face strong opposition, particularly from states being considered to house the new potential prison facility.Unit 5: State and Local Governments and Homeland SecurityHomeland Security in Small Law Enforcement Agencies: Preparedness and Proximity to Big-City Peers, George W. Burruss, et al., National Institute of Justice, 2014Researchers from Southern Illinois University Carbondale focused on the ability of small law enforcement agencies to handle this broader range of homeland security threats. Their findings suggest that local jurisdictions are better prepared when they work closely with nearby larger agencies.Fusion Centers: What's Working and What Isn't, Jason Barnosky, The Brookings Institution, 2015Barnosky discusses some of the positive and negative aspects of fusion centers-state and local run organizations dedicated to information sharing and analysis-that according to him "play an important role in addressing problems identified after the 9/11 attacks."Left of Boom: The Fire/EMS Role in Terrorism Prevention, Greggory J. Favre, Medium, 2015Farve makes the case for the importance of pre-incident indicator training for local fire and EMS responders. He argues that first responders are essential partners in efforts related to homeland security both pre- and post-incident.Politics of Border Security Hamper Immigration Reform, Bob Ortega and Erin Kelly, The Arizona Republic, 2014Ortega and Erin examine the often one-dimensional political discussion of U.S. Border security. Making immigration reform contingent on border security ignores the fact that an estimated 40 percent of illegal immigrants in the United States entered legally through official ports of entry.Unit 6: Emergency Management and ResponseAfter Hurricane Sandy: Time to Learn and Implement the Lessons in Preparedness, Response, and Resilience, Steven Bucci, et al., The Heritage Foundation, 2013This report prepared by the Heritage Foundation Emergency Preparedness Working Group focuses on the lessons learned from Hurricane Sandy in 2012. The report makes important recommendations to improve preparation for and response to natural disasters.Before the Storm, Shifting Federal Disaster Policy Toward Mitigation, Jason Barnosky, The Brookings Institution, 2015Barnosky argues that shifting federal disaster policy and grants toward mitigation is beneficial to emergency management post disaster recovery and relief. He believes that focusing on mitigation can reduce the amount of recovery and relief needed post disaster.Counter-Terrorism and Emergency Management: Keeping a Proper Balance, Jibum Chung, The Brookings Institution, 2013Chung suggests that while preventing future terrorist attacks should be a leading priority for the government, reducing resources, preparation, and skills needed for management of other types of disasters could pose an even greater risk to the population. He believes keeping proper balance counter-terrorism and emergency management is essential.Emergency Preparedness Plans Must Involve Preparation for All Disasters, Including Cyber, Amanda Vicinanzo, Homeland Security Today, 2014The increased reliance upon computer systems to drive critical infrastructure has increased the likelihood that the next major disaster may be a catastrophic cyberattack. Amanda Vicinanzo argues that emergency preparedness plans should include preparation for cyberattacks.Unit 7: New Technologies in Homeland SecurityThe New Tech of Disaster Response, from Apps to Aqua-Drones, Tim Moynihan, Wired, 2015Tim Moynihan cites some of the failure of FEMA in its response to Hurricane Katrina as he suggests that the change in attitude and policy coupled with the use and integration of new technology has made FEMA more efficient.Surveillance Strategies: Closing Intelligence Gaps with Smarter Surveillance, Bob Liscouski, Security Magazine, 2015The lack of technological integration across agencies continues to be a critical security issue. Bob Liscouski suggests that there is a need for "a holistic system that correlates threats with vulnerabilities" to "deliver situational awareness...and response resources."DHS Testing Border Biometric Program in Hunt to Identify Terrorists, Anthony Kimery, Homeland Security Today, 2015Anthony Kimery discusses the launch of a new pilot program called Identity Intelligence Biometrics. This automated face and fingerprint biometric identification system will be used to keep known and suspected terrorists and "Special Interest Aliens" from entering the United States.New Approach to Biological Threat Detection Promises Savings for Defense, Stew Magnuson, National Defense, 2014Magnuson points out some of the difficulties in detecting biological agents in the field. He believes that a recently developed chemical-biological-explosive detector provides a more effective approach to biological threat detection but also may result in significant savings.Unit 8: Intelligence and Homeland SecurityThe U.S. Intelligence Community Is Bigger Than Ever, But Is It Worth the Cost? Michael German, defenseone.com, 2015Michael German argues that the United States spends nearly $1 trillion on national security programs and agencies each year. He believes that excessive secrecy undermines Americans ability to evaluate whether the intelligence enterprise is worth the investment.Data Transparency-A Solution to the FBI's Surveillance Dilemma, Marshall Erwin, Overt Action, 2015Access to encrypted data has been a major point of conflict between FBI and U.S. technology firms. Marshall Erwin argues that the FBI should focus on ways to streamline the process of requesting and accessing user data that is available rather than fighting for access to secure data.DHS Actions Needed to Address DHS Intelligence Analysis, Workforce Challenges, Homeland Security Staff Writer, Homeland Security Today, 2014A recent GAO report assert that in order to be more effective the DHS Under Secretary for Intelligence and Analysis needs to establish clear strategic priorities and use them to inform analytic activities throughout the department.Unit 9: Civil Liberties and Homeland SecurityLiberty versus Security: An Old Debate Renewed in the Age of Terror, David D. Haynes, Milwaukee Wisconsin Journal Sentinel, 2015The collection of massive amounts of personal data by the National Security Agency (NSA) continues to be a point of controversy. David Haynes argues that there has to be a balance between the protection of civil liberties and the need for national security.Public Advocate: FBI's Use of PRISM Surveillance Data Is Unconstitutional, Ellen Nakashima, The Washington Post, 2016A challenge to the constitutionality of a provision of the PRISM program that enables the FBI to query foreign intelligence information for evidence of domestic crime was recently rejected by the Foreign Intelligence Surveillance Court. The judge noted that there was no statutory requirement that all activities involving PRISM data serve "solely a foreign intelligence requirement."The New Culture of Security and Surveillance, Hille Haker, Journal of Political Sciences and Public Affairs, 2015Haker asserts that after 9/11 the emerging paradigm of "human security" was replaced by "homeland" security. She argues that a reorientation toward social freedom, deliberative democracy, and a human rights-oriented concept of justice is needed.I Am a Black Woman; That Doesn't Mean I Have a Bomb in My Hair, Taja Lindley, Salon, 2016Taja Lindley recounts her personal experiences with TSA security protocols and raises questions of the efficiency of those efforts. Lindley opens the door for a discussion of the effectiveness and appropriateness of TSA's security screening activities.Unit 10: The Future of Homeland SecurityA Vision for Homeland Security in the Year 2025, Darrell M. West, The Brookings Institution, 2012West summarizes key ideas that emerged during discussions of a group of leading experts trying to formulate a vision for homeland security in 2025.These ideas include future threats, integrationchallenges, and resulting considerations.Mission Creep: Homeland Security a "Runaway Train," Michael Coleman, Albuquerque Journal, N.M., 2014Michael Coleman contends that the Department of Homeland Security has strayed from its primary mission to "prevent terrorist attacks within the United States." He believes that mission creep has resulted in murky missions, a lack of leadership, low morale, and inefficient oversight.Collaboration Enables Operational and Cultural Change on a Shoestring, Kriste J. Smith, The Public Manager, 2013Kriste Smith argues that by build trust, listening to and empowering change advocates, and building on what's already there the TSA could break through the inertia and transform for aviation security.Homeland Security Chief Discusses Changing Nature of Terrorism, Jim Garamone, U.S. Department of Defense, 2015Secretary of Homeland Security Jeh Johnson at the Association of the U.S. Army annual meeting, argues that "The global terrorist threat has evolved." He believes that the nature of terrorism has shifted to radicalized home-grown terrorists and that the best defense is to counter the extremist message in at risk communities.NER(01): WOW

最近チェックした商品