Understanding Personal Security and Risk: A Guide for Business Travelers
Autor Charles E. Goslinen Limba Engleză Paperback – mar 2017
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 288.08 lei 6-8 săpt. | |
Taylor & Francis – mar 2017 | 288.08 lei 6-8 săpt. | |
Hardback (1) | 767.28 lei 6-8 săpt. | |
Taylor & Francis – 18 sep 2018 | 767.28 lei 6-8 săpt. |
Preț: 288.08 lei
Nou
Puncte Express: 432
Preț estimativ în valută:
55.15€ • 57.33$ • 45.73£
55.15€ • 57.33$ • 45.73£
Carte tipărită la comandă
Livrare economică 05-19 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781498765787
ISBN-10: 1498765785
Pagini: 288
Ilustrații: 10 Illustrations, black and white
Dimensiuni: 156 x 234 x 20 mm
Greutate: 0.39 kg
Ediția:1
Editura: Taylor & Francis
Colecția Routledge
Locul publicării:Oxford, United Kingdom
ISBN-10: 1498765785
Pagini: 288
Ilustrații: 10 Illustrations, black and white
Dimensiuni: 156 x 234 x 20 mm
Greutate: 0.39 kg
Ediția:1
Editura: Taylor & Francis
Colecția Routledge
Locul publicării:Oxford, United Kingdom
Public țintă
General and Professional Practice & DevelopmentCuprins
Table of Contents
Acknowledgements *
About the Author *
Charles E. Goslin, CPP, CISSP *
Introduction *
Chapter 1 – Important Personal Security Concepts *
Concept of Effectiveness *
Concepts of Threat, Vulnerability and Risk *
Concept of Time *
Committing a security plan to memory *
Threat Agents and Threat Actors *
Chapter 2 – Personal Security Principles *
The Principle of Preparation *
Principle of Detection *
Principle of Deterrence *
Principle of Delay *
The Principle of Defense *
Selected Threat Actor Profile: Street Gangsters *
Chapter 3 - When travel plans go sideways *
Arrival at the Airport *
On the road: checkpoints and roadblocks *
Selected Threat Actor Profiles: Roadblocks and Military, Insurgents and Police *
Chapter 4 - Kidnapping *
Classifying Types of Kidnap/Abduction Operations *
Tip of the Iceberg: Keeping Kidnap Threat Trends in Perspective *
Measures to Counter the Kidnap Threat *
Recovering from Kidnap *
Executive Protection: Key Elements of a Program *
Selected Threat Actor Profile: The mindset of a Kidnapper *
Chapter 5 – Patterns of threat in the environment *
Cover of darkness *
Alcohol, Drugs & the Environment *
"Broken Windows" *
Natural Disasters *
Civil Disorder and Rioting *
Chapter 6 - Hotel and Residential Security *
Considerations when choosing a hotel *
Residential Security *
Selected Threat Actor Profiles: Pickpockets, Thieves and the World’s Oldest Profession… *
Chapter 7 – Cyber Security On The Road *
"Darkhotel" Threat *
Foreign Intelligence Service Threat *
Identity Theft Abroad *
Chapter 8 – Shopping, the Sports Stadium, Theatres…Soft Targets *
Preparation *
Detection *
Considerations about the threat *
Response Countermeasure 1: Active Shooters *
Response Countermeasure 2: Suicide Bomber *
Selected Threat Actor Profiles: The Jihadist Suicide Bomber *
Chapter 9 - Risk Assessment for Personal Security *
Step 1: Asset Identification and Impact of Loss *
Step 2: Identify & Characterize the Threat to Specific Assets *
Step 3: Identify & Characterize Vulnerabilities *
Step 4: Assess Risks & Determine Priorities for You and Your Team’s Protection *
Step 5: Identify unacceptable risks and determine Risk Mitigation priorities *
Chapter 10 – Personal Security and Transportation: Securing Your Movement *
Introduction *
Ground Transportation: Vehicle and Rail *
Air Transportation *
Chapter 11 – Managing Your Team’s Personal Security *
Authority *
Communications *
The Team Briefing *
On The Ground *
Roadblock Protocol *
At the Hotel *
Managing Crisis Situations *
Conclusion *
Acknowledgements *
About the Author *
Charles E. Goslin, CPP, CISSP *
Introduction *
Chapter 1 – Important Personal Security Concepts *
Concept of Effectiveness *
Concepts of Threat, Vulnerability and Risk *
Concept of Time *
Committing a security plan to memory *
Threat Agents and Threat Actors *
Chapter 2 – Personal Security Principles *
The Principle of Preparation *
Principle of Detection *
Principle of Deterrence *
Principle of Delay *
The Principle of Defense *
Selected Threat Actor Profile: Street Gangsters *
Chapter 3 - When travel plans go sideways *
Arrival at the Airport *
On the road: checkpoints and roadblocks *
Selected Threat Actor Profiles: Roadblocks and Military, Insurgents and Police *
Chapter 4 - Kidnapping *
Classifying Types of Kidnap/Abduction Operations *
Tip of the Iceberg: Keeping Kidnap Threat Trends in Perspective *
Measures to Counter the Kidnap Threat *
Recovering from Kidnap *
Executive Protection: Key Elements of a Program *
Selected Threat Actor Profile: The mindset of a Kidnapper *
Chapter 5 – Patterns of threat in the environment *
Cover of darkness *
Alcohol, Drugs & the Environment *
"Broken Windows" *
Natural Disasters *
Civil Disorder and Rioting *
Chapter 6 - Hotel and Residential Security *
Considerations when choosing a hotel *
Residential Security *
Selected Threat Actor Profiles: Pickpockets, Thieves and the World’s Oldest Profession… *
Chapter 7 – Cyber Security On The Road *
"Darkhotel" Threat *
Foreign Intelligence Service Threat *
Identity Theft Abroad *
Chapter 8 – Shopping, the Sports Stadium, Theatres…Soft Targets *
Preparation *
Detection *
Considerations about the threat *
Response Countermeasure 1: Active Shooters *
Response Countermeasure 2: Suicide Bomber *
Selected Threat Actor Profiles: The Jihadist Suicide Bomber *
Chapter 9 - Risk Assessment for Personal Security *
Step 1: Asset Identification and Impact of Loss *
Step 2: Identify & Characterize the Threat to Specific Assets *
Step 3: Identify & Characterize Vulnerabilities *
Step 4: Assess Risks & Determine Priorities for You and Your Team’s Protection *
Step 5: Identify unacceptable risks and determine Risk Mitigation priorities *
Chapter 10 – Personal Security and Transportation: Securing Your Movement *
Introduction *
Ground Transportation: Vehicle and Rail *
Air Transportation *
Chapter 11 – Managing Your Team’s Personal Security *
Authority *
Communications *
The Team Briefing *
On The Ground *
Roadblock Protocol *
At the Hotel *
Managing Crisis Situations *
Conclusion *
Recenzii
"[W]hy choose this [book]? Two reasons at least. First, Goslin has been there and done that, and he relates it and draws sensible and useful conclusions. For instance, he recalls the two 'genuine in-flight emergencies' that he has experienced. Second, from start to finish he puts his finger on what he calls 'the red-headed stepchild of the overall discipline of security', namely personal security training and awareness. He states the obvious, which does want stating: that personal security comes down to you, the traveller, and no other; tracking devices are all very well, but if you are the 'tip of the spear' of business development, in some obscure part of the world, you have to apply thought, beyond that 45 minute briefing you had before setting off from corporate security (or HR). Third, something else Goslin shrewdly points out; the world is 'increasingly insecure': for instance, kidnappers may go after mid-level employees, for smaller ransoms, rather than take longer to get millions for the senior exec captured…it takes homework, watching the terrain, and being observant for your self-defence." – Professional Security Magazine Online, Summer 2018
"When you start using the information in a book you're reviewing before you even finish reading it, that's a sign the book has great value. That is what happened with Understanding Personal Security and Risk by Charles E. Goslin." -- Terry V. Culver, CPP, CMAS, Security Management, June 2018
"When you start using the information in a book you're reviewing before you even finish reading it, that's a sign the book has great value. That is what happened with Understanding Personal Security and Risk by Charles E. Goslin." -- Terry V. Culver, CPP, CMAS, Security Management, June 2018
Descriere
Uniting broad, time-tested security principles and the author’s 35-plus years of experience with international security, intelligence, and foreign affairs, Understanding Personal Security: A Guide for Business Travelers offers a detailed yet practical framework on which to develop personal security awareness and training programs. As a critical resource for any travelers who may need to make fast, smart judgements in high-risk environments, this book helps readers analyze threats, threat actors, and the common adversarial characteristics, as well as the function of risk as a differentiating principle. This versatile text blends abstract organizing principles with street honed instincts, becoming equally valuable to security managers with previous experience and those corporate or non-profit organizations with employees in developing nations.