Corporate Security Crossroads
eBook - ePub

Corporate Security Crossroads

Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment

  1. 256 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Corporate Security Crossroads

Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment

Book details
Table of contents
Citations

About This Book

Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance. Multinational corporations are on the front lines of terrorism and cyberattacks—two of the world's biggest threats to global security. How can corporate leaders mitigate their organizations' risks and develop an infrastructure that detects and deters a security menace before it happens? This timely reference lays out essential political context and historical background to help executives identify contemporary threats and understand the interconnections between threat dynamics in an increasingly dangerous international environment. This compelling work is organized into seven chapters. The beginning chapters profile the specific risks for multinational companies and detail which global—and regional—factors might propagate violence targeted at American-based businesses. Next, two historical case studies on terrorist assaults at Tigantourine and Mombasa illustrate how counterterrorism can successfully thwart potential attacks against business targets. The final part describes industrial espionage and criminal activity and then outlines a corporate counterterror blueprint to combat the prospect of terrorism, providing specific recommendations for preventative measures.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Corporate Security Crossroads by Richard J. Chasdi in PDF and/or ePUB format, as well as other popular books in Informatica & Sicurezza informatica. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Praeger
Year
2017
ISBN
9798216066583

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. Contents
  6. Foreword by Yair Sharan
  7. Acknowledgments
  8. Chapter 1: Conceptualization of Risk to Multinational Corporations in a World of Intensive Globalization
  9. Chapter 2: Relationships between Traditional Terrorism, Virtual World Threats, and the International Political System: Impact on International Business
  10. Chapter 3: Tides of Terrorism: Historical Retrospectives on the Jewish Sicarri, the Thugs in India, and Methodological Considerations for Contemporary Threat Analysis
  11. Chapter 4: The Case of the Tigantourine Gas Plant Terrorist Assault in Algeria: A Complexity Systems Analysis
  12. Chapter 5: The Case of the Mombasa Terrorist Assaults in Kenya: A Complexity Systems Analysis
  13. Chapter 6: The Radicalization Spectrum: Apolitical and Political Threat Conceptualization and Lone Wolf Attribute Analysis
  14. Chapter 7: Conclusions
  15. Appendix I: Terrorist Business Target Preferences: Algeria, Niger, and Mauritania, 2003–2013
  16. Appendix II: Lone Wolf Terrorist Data
  17. Notes
  18. Index
  19. About The Author