Criminologists on Terrorism and Homeland Security. (Record no. 81763)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 10470nam a22005533i 4500 |
001 - CONTROL NUMBER | |
control field | EBC667580 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20181121155740.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 181113s2011 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781139007931 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Cancelled/invalid ISBN | 9780521899451 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC667580 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL667580 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr10452872 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaONFJC)MIL301723 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)707068328 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV6431 .C7624 2011 |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 363.325 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Forst, Brian. |
245 10 - TITLE STATEMENT | |
Title | Criminologists on Terrorism and Homeland Security. |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New York : |
Name of publisher, distributor, etc | Cambridge University Press, |
Date of publication, distribution, etc | 2011. |
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Date of publication, distribution, etc | ©2011. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (496 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | Cambridge Studies in Criminology |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Half-title -- Series-title -- Title -- Copyright -- Contents -- About the authors -- Preface -- DESCRIPTION, RATIONALE, AND SCOPE -- HOW THIS BOOK ADVANCES THINKING ABOUT TERORISM -- Chapter One: Introduction and Overview -- INTRODUCTION -- OVERVIEW -- CONCLUDING THOUGHTS -- Part One: Nature of the Problem -- Chapter Two: Manifestations of Aggression: Terrorism, Crime, and War -- INTRODUCTION -- TERRORISM AS CRIME -- State Laws -- Federal Law -- TERRORISM AS WAR -- IMPLICATIONS OF CONCEPTUAL APPROACHES FOR DEALING WITH TERRORISM -- CONCLUSION -- REFERENCES -- CASES CITED -- Chapter Three: The Etiology of Terrorism: Identifying, Defining, and Studying Terrorists -- DEFINING TERRORISM -- TERRORIST ACTORS -- MYTHS BROUGHT ABOUT FROM PROBLEMS WITH DEFINITION AND TYPOLOGY -- DATA ISSUES -- CONCLUSION -- REFERENCES -- Chapter Four: Balancing Counterterrorism Strategies: Lessons from Evolutionary Ecology -- INTRODUCTION -- THE EVOLUTIONARY-ECOLOGICAL PERSPECTIVE -- EVOLUTIONARY ECOLOGY AND TERRORIST ACTS -- THE INDIVIDUAL: RISK FACTORS FOR TERRORISM -- MOTIVATION FOR TERRORISM -- SITUATION, OPPORTUNITY, AND TERRORISM -- THE EVOLUTIONARY-ECOLOGICAL PERSPECTIVE ON COUNTERTERRORISM -- MODELING COUNTER-STRATEGIC BALANCE -- IMPROVED COUNTERTERRORIST STRATEGIES -- DETERRENCE -- ALTERNATIVE BEHAVIORS -- CONCLUSION -- REFERENCES -- Chapter Five: Gangs, Crime, and Terrorism -- THEORETICAL PERSPECTIVES -- THE ALLIANCE MODEL OF TERRORIST AND GANGS RELATIONS -- Gang Organization -- Gang Access to Resources from Drug Sales -- Global Interconnectivity of Gangs -- THE EL RUKN STREET GANG-LIBYA ALLIANCE -- A RECRUITMENT MODEL -- THE CRIMINAL JUSTICE SYSTEM RESPONSE -- REFERENCES -- Chapter Six: Women Terrorists -- INTRODUCTION -- A Brief History of the Role of Women in Terrorism -- Importance of Women in Terrorism Today. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | CASE STUDIES: THE WOMEN WHO JOIN TERRORIST ORGANIZATIONS -- The Roles Women Assume in Terrorist Organizations -- Demographic Characteristics of Women in Terrorist Organizations -- CONCLUSIONS: THE REASONS WHY WOMEN JOIN TERRORIST ORGANIZATIONS -- BIBLIOGRAPHY -- Part Two: Strategies for Intervention -- Chapter Seven: Is Crime Prevention Relevant to Counterterrorism? -- INTRODUCTION -- A FRAMEWORK FOR CRIME PREVENTION -- THE RELEVANCE OF THE MATRIX TO COUNTERTERRORISM INTERVENTIONS -- GUIDANCE IN USING CRIME PREVENTION CONCEPTS FOR COUNTERTERRORISM INTERVENTIONS -- HOW CAN CRIMINOLOGISTS CONTRIBUTE? -- REFERENCES -- Chapter Eight: Implications of Opportunity Theory for Combating Terrorism -- INTRODUCTION -- OPPORTUNITY THEORY -- Defining Opportunity -- TESTING OPPORTUNITY THEORY -- Evaluations of Interventions -- Naturally and Routinely Occurring Variation in Opportunity -- Addressing Displacement and Substitution -- Summary -- CAN OPPORTUNITY THEORY BE USED TO UNDERSTAND AND COMBAT TERRORISM? -- Terrorism and Ordinary Street Crime -- Building a Theory of Opportunity for Terrorism -- Summary -- OPPORTUNITY REDUCTION TO REDUCE FEAR, NOT TERRORISM -- Why Study the Opportunity-Fear Relationship? -- Opportunity Reduction and Fear of Ordinary Street Crime -- Communities and Crime -- Evaluation of Specific Opportunity Reduction Initiatives -- CONCLUSION -- REFERENCES -- Chapter Nine: Soldiers and Spies, Police and Detectives -- INTRODUCTION -- CHANGES IN THE EXTERNAL ENVIRONMENT -- Military -- Police -- ADJUSTMENTS TO THE CHANGES -- Military -- Police -- CONCLUSIONS -- REFERENCES -- Chapter Ten: Community Policing and Terrorism: Problems and Prospects for Local Community Security -- INTRODUCTION -- DEMOCRATIC POLICING AND COMMUNITY TOLERANCE FOR POLICE INTERVENTION -- THE RISE OF COMMUNITY- AND PROBLEM-ORIENTED POLICING. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | PROBLEM-ORIENTED POLICING: AN APPLICATION -- ZERO-TOLERANCE POLICING -- EXTENDING COMMUNITY-, PROBLEM-ORIENTED, AND ZERO-TOLERANCE POLICING TO TERRORISM - THE PROBLEMS -- MAPPING COP/POP TO TERRORISM PREVENTION, CONTROL, AND RESPONSE -- CAN COP/POP BE MADE TO WORK FOR TERRORISM? -- ARE COP/POP INFORMATION AND ANALYTICS USEFUL TO UNDERSTANDING TERRORISM? -- CAN COP/POP STRATEGIES AND TACTICS INFORM TERRORISM RESPONSES? -- CAN PARTNERSHIPS BE EXTENDED TO TERRORISM PREVENTION? -- WHAT ABOUT INSTITUTIONAL LEGITIMACY? -- THE PROSPECTS FOR COP AND POP AS TERRORISM RESPONSES -- CONCLUSION -- REFERENCES -- Chapter Eleven: Go Analyze!: (Connecting the Dots) -- FIRST COUNTEREXAMPLE: THE CASE OF AL-MIHDHAR AND AL-HAZMI -- A Lapse of Surveillance -- What Went Wrong? -- SECOND COUNTEREXAMPLE: GENESIS OF THE 9/11 ATTACKS -- The Looming 9/11 Attacks -- What Went Wrong? -- THE ROLE OF POLICE IN COUNTERTERRORISM -- The Police and the Cult of Evidence -- New Police Cultures -- THE LOGIC OF CONNECTING THE DOTS -- PROPOSED REFORMS -- CONCLUSION -- REFERENCES -- Chapter Twelve: Managing the Fear of Terrorism -- THE PROBLEM OF FEAR IN THE ERA OF TERRORISM -- FEAR AND RISK OF TERRORIST ACTS -- The Nature and Sources of Fear -- Fear and Risk -- THE ROLE OF THE MEDIA -- THE ROLE OF POLITICS -- FEAR AND PUBLIC POLICY -- AN AGENDA FOR REDUCING THE SOCIAL COSTS OF FEAR -- REFERENCES -- Chapter Thirteen: Should Profiling Be Used to Prevent Terrorism? -- INTRODUCTION -- WHAT IS RACIAL PROFILING? -- Who is Affected by Racial Profiling and How are They Affected? -- How is Racial Profiling Being Used? -- How Effective is Racial Profiling in Reducing Crime? -- What Can We Conclude about Racial and Ethnic Profiling? -- LEGAL AND CONSTITUTIONAL ISSUES RELATED TO RACIAL PROFILING -- TERRORISM -- Terrorism and Profiling -- Who are the Terrorists?. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | HOW EFFECTIVE IS RACIAL PROFILING IN REDUCING TERRORISM? -- RACIAL PROFILING AS A CRIME CONTROL POLICY -- WHAT CAN WE CONCLUDE ABOUT RACIAL PROFILING AND TERRORISM? -- REFERENCES -- Chapter Fourteen: Federal-Local Coordination in Homeland Security -- INTRODUCTION -- INTERORGANIZATIONAL NETWORKS -- THE ROLE OF THE FEDERAL GOVERNMENT -- The Joint Terrorism Task Forces -- Coordinating with State and Local Governments -- Other Federal Roles -- THE ROLE OF LOCAL GOVERNMENT -- The Local Role -- Prevention -- Response and Recovery -- Investigation -- THINKING ABOUT NETWORKS -- Prevention -- Response and Recovery -- Investigation -- CONCLUSION -- REFERENCES -- Chapter Fifteen: Liberty and Security in an Era of Terrorism -- INTRODUCTION -- LIBERTY -- Freedom -- Liberty -- Privacy -- SECURITY -- AN ERA OF TERRORISM? -- BALANCES, TRADE-OFFS, AND JUDGMENTS -- Balances -- Trade-Offs -- Judgment -- REFERENCES -- Chapter Sixteen: Regulating Terrorism -- RECONSIDERING DETERRENCE -- RECONSIDERING JUSTICE -- CONTAINMENT AND ENLARGEMENT -- THE TORN WEB OF U.S. CONTROLS ON TERRORISM -- THE PUBLIC HEALTH MODEL -- TOWARD AN EVIDENCE-BASED POLICY ON EXTREMISM -- CONCLUSION -- REFERENCES -- Part Three: Thinking About Tomorrow -- Chapter Seventeen: Using Open Source Data to Counter Common Myths about Terrorism -- THE EXTENT OF TERRORISM -- MYTH 1: Terrorist Attacks Reach Every Corner of the World -- MYTH 2: Terrorist Attacks were Rapidly Increasing in the Years Leading up to 9/11 -- MYTH 3: The United States is More Frequently Targeted by Terrorists than any Other Country in the World -- THE SOURCES OF TERRORISM -- MYTH 4: Most Terrorist Attacks Involve Disgruntled Groups and Individuals from One Country Carrying Out Attacks on Civilians in Other Countries -- MYTH 5: Terrorism is Unrelated to Traditional Political Grievances. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | THE LETHALITY OF TERRORISM AND THE RESILIENCE OF TERRORIST GROUPS -- MYTH 6: Most Terrorist Attacks are Incredibly Lethal -- MYTH 7: Most Terrorist Attacks Rely on Sophisticated Weaponry -- MYTH 8: Most Terrorist Organizations are Long Lasting and Difficult to Eradicate -- COUNTERTERRORISM -- MYTH 9: Terrorist Groups are Impervious to Governmental Counterterrorist Policies and Rarely Make Mistakes -- MYTH 10: To be Effective Against Terrorism, Governments Must Strike Back Rapidly and Forcefully -- DISCUSSION AND CONCLUSIONS -- REFERENCES -- Chapter Eighteen: Criminal Justice and Terrorism: A Research Agenda -- INTRODUCTION -- LESSONS LEARNED: DEFINITIONS ARE NEEDED, AND SO IS FLEXIBILITY -- LESSONS LEARNED: INTERACTIONS AND TYPOLOGIES OF TERRORISM -- LESSONS LEARNED: THE BARRIERS TO EMPIRICAL RESEARCH ON TERRORISM ARE FORMIDABLE -- PROSPECTS FOR RESEARCH ON TERRORISM -- Adapting Crime Prevention Models to Terrorism -- Estimating the Social Costs of Terrorism and Counterterrorism Policy -- Other Prospects -- CONCLUSION -- REFERENCES -- Index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This volume presents 19 original essays addressing issues surrounding terrorism from the unique perspective of criminology. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internal security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | National security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Terrorism -- Prevention. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Terrorism. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Greene, Jack R. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Lynch, James P. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Print version: |
Main entry heading | Forst, Brian |
Title | Criminologists on Terrorism and Homeland Security |
Place, publisher, and date of publication | New York : Cambridge University Press,c2011 |
International Standard Book Number | 9780521899451 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Cambridge Studies in Criminology |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=667580">https://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=667580</a> |
Public note | Click to View |
No items available.