Criminologists on Terrorism and Homeland Security. (Record no. 81763)

000 -LEADER
fixed length control field 10470nam a22005533i 4500
001 - CONTROL NUMBER
control field EBC667580
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20181121155740.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181113s2011 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781139007931
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9780521899451
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC667580
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL667580
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10452872
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL301723
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)707068328
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6431 .C7624 2011
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.325
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Forst, Brian.
245 10 - TITLE STATEMENT
Title Criminologists on Terrorism and Homeland Security.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Cambridge University Press,
Date of publication, distribution, etc 2011.
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc ©2011.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (496 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Cambridge Studies in Criminology
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Half-title -- Series-title -- Title -- Copyright -- Contents -- About the authors -- Preface -- DESCRIPTION, RATIONALE, AND SCOPE -- HOW THIS BOOK ADVANCES THINKING ABOUT TERORISM -- Chapter One: Introduction and Overview -- INTRODUCTION -- OVERVIEW -- CONCLUDING THOUGHTS -- Part One: Nature of the Problem -- Chapter Two: Manifestations of Aggression: Terrorism, Crime, and War -- INTRODUCTION -- TERRORISM AS CRIME -- State Laws -- Federal Law -- TERRORISM AS WAR -- IMPLICATIONS OF CONCEPTUAL APPROACHES FOR DEALING WITH TERRORISM -- CONCLUSION -- REFERENCES -- CASES CITED -- Chapter Three: The Etiology of Terrorism: Identifying, Defining, and Studying Terrorists -- DEFINING TERRORISM -- TERRORIST ACTORS -- MYTHS BROUGHT ABOUT FROM PROBLEMS WITH DEFINITION AND TYPOLOGY -- DATA ISSUES -- CONCLUSION -- REFERENCES -- Chapter Four: Balancing Counterterrorism Strategies: Lessons from Evolutionary Ecology -- INTRODUCTION -- THE EVOLUTIONARY-ECOLOGICAL PERSPECTIVE -- EVOLUTIONARY ECOLOGY AND TERRORIST ACTS -- THE INDIVIDUAL: RISK FACTORS FOR TERRORISM -- MOTIVATION FOR TERRORISM -- SITUATION, OPPORTUNITY, AND TERRORISM -- THE EVOLUTIONARY-ECOLOGICAL PERSPECTIVE ON COUNTERTERRORISM -- MODELING COUNTER-STRATEGIC BALANCE -- IMPROVED COUNTERTERRORIST STRATEGIES -- DETERRENCE -- ALTERNATIVE BEHAVIORS -- CONCLUSION -- REFERENCES -- Chapter Five: Gangs, Crime, and Terrorism -- THEORETICAL PERSPECTIVES -- THE ALLIANCE MODEL OF TERRORIST AND GANGS RELATIONS -- Gang Organization -- Gang Access to Resources from Drug Sales -- Global Interconnectivity of Gangs -- THE EL RUKN STREET GANG-LIBYA ALLIANCE -- A RECRUITMENT MODEL -- THE CRIMINAL JUSTICE SYSTEM RESPONSE -- REFERENCES -- Chapter Six: Women Terrorists -- INTRODUCTION -- A Brief History of the Role of Women in Terrorism -- Importance of Women in Terrorism Today.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note CASE STUDIES: THE WOMEN WHO JOIN TERRORIST ORGANIZATIONS -- The Roles Women Assume in Terrorist Organizations -- Demographic Characteristics of Women in Terrorist Organizations -- CONCLUSIONS: THE REASONS WHY WOMEN JOIN TERRORIST ORGANIZATIONS -- BIBLIOGRAPHY -- Part Two: Strategies for Intervention -- Chapter Seven: Is Crime Prevention Relevant to Counterterrorism? -- INTRODUCTION -- A FRAMEWORK FOR CRIME PREVENTION -- THE RELEVANCE OF THE MATRIX TO COUNTERTERRORISM INTERVENTIONS -- GUIDANCE IN USING CRIME PREVENTION CONCEPTS FOR COUNTERTERRORISM INTERVENTIONS -- HOW CAN CRIMINOLOGISTS CONTRIBUTE? -- REFERENCES -- Chapter Eight: Implications of Opportunity Theory for Combating Terrorism -- INTRODUCTION -- OPPORTUNITY THEORY -- Defining Opportunity -- TESTING OPPORTUNITY THEORY -- Evaluations of Interventions -- Naturally and Routinely Occurring Variation in Opportunity -- Addressing Displacement and Substitution -- Summary -- CAN OPPORTUNITY THEORY BE USED TO UNDERSTAND AND COMBAT TERRORISM? -- Terrorism and Ordinary Street Crime -- Building a Theory of Opportunity for Terrorism -- Summary -- OPPORTUNITY REDUCTION TO REDUCE FEAR, NOT TERRORISM -- Why Study the Opportunity-Fear Relationship? -- Opportunity Reduction and Fear of Ordinary Street Crime -- Communities and Crime -- Evaluation of Specific Opportunity Reduction Initiatives -- CONCLUSION -- REFERENCES -- Chapter Nine: Soldiers and Spies, Police and Detectives -- INTRODUCTION -- CHANGES IN THE EXTERNAL ENVIRONMENT -- Military -- Police -- ADJUSTMENTS TO THE CHANGES -- Military -- Police -- CONCLUSIONS -- REFERENCES -- Chapter Ten: Community Policing and Terrorism: Problems and Prospects for Local Community Security -- INTRODUCTION -- DEMOCRATIC POLICING AND COMMUNITY TOLERANCE FOR POLICE INTERVENTION -- THE RISE OF COMMUNITY- AND PROBLEM-ORIENTED POLICING.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note PROBLEM-ORIENTED POLICING: AN APPLICATION -- ZERO-TOLERANCE POLICING -- EXTENDING COMMUNITY-, PROBLEM-ORIENTED, AND ZERO-TOLERANCE POLICING TO TERRORISM - THE PROBLEMS -- MAPPING COP/POP TO TERRORISM PREVENTION, CONTROL, AND RESPONSE -- CAN COP/POP BE MADE TO WORK FOR TERRORISM? -- ARE COP/POP INFORMATION AND ANALYTICS USEFUL TO UNDERSTANDING TERRORISM? -- CAN COP/POP STRATEGIES AND TACTICS INFORM TERRORISM RESPONSES? -- CAN PARTNERSHIPS BE EXTENDED TO TERRORISM PREVENTION? -- WHAT ABOUT INSTITUTIONAL LEGITIMACY? -- THE PROSPECTS FOR COP AND POP AS TERRORISM RESPONSES -- CONCLUSION -- REFERENCES -- Chapter Eleven: Go Analyze!: (Connecting the Dots) -- FIRST COUNTEREXAMPLE: THE CASE OF AL-MIHDHAR AND AL-HAZMI -- A Lapse of Surveillance -- What Went Wrong? -- SECOND COUNTEREXAMPLE: GENESIS OF THE 9/11 ATTACKS -- The Looming 9/11 Attacks -- What Went Wrong? -- THE ROLE OF POLICE IN COUNTERTERRORISM -- The Police and the Cult of Evidence -- New Police Cultures -- THE LOGIC OF CONNECTING THE DOTS -- PROPOSED REFORMS -- CONCLUSION -- REFERENCES -- Chapter Twelve: Managing the Fear of Terrorism -- THE PROBLEM OF FEAR IN THE ERA OF TERRORISM -- FEAR AND RISK OF TERRORIST ACTS -- The Nature and Sources of Fear -- Fear and Risk -- THE ROLE OF THE MEDIA -- THE ROLE OF POLITICS -- FEAR AND PUBLIC POLICY -- AN AGENDA FOR REDUCING THE SOCIAL COSTS OF FEAR -- REFERENCES -- Chapter Thirteen: Should Profiling Be Used to Prevent Terrorism? -- INTRODUCTION -- WHAT IS RACIAL PROFILING? -- Who is Affected by Racial Profiling and How are They Affected? -- How is Racial Profiling Being Used? -- How Effective is Racial Profiling in Reducing Crime? -- What Can We Conclude about Racial and Ethnic Profiling? -- LEGAL AND CONSTITUTIONAL ISSUES RELATED TO RACIAL PROFILING -- TERRORISM -- Terrorism and Profiling -- Who are the Terrorists?.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note HOW EFFECTIVE IS RACIAL PROFILING IN REDUCING TERRORISM? -- RACIAL PROFILING AS A CRIME CONTROL POLICY -- WHAT CAN WE CONCLUDE ABOUT RACIAL PROFILING AND TERRORISM? -- REFERENCES -- Chapter Fourteen: Federal-Local Coordination in Homeland Security -- INTRODUCTION -- INTERORGANIZATIONAL NETWORKS -- THE ROLE OF THE FEDERAL GOVERNMENT -- The Joint Terrorism Task Forces -- Coordinating with State and Local Governments -- Other Federal Roles -- THE ROLE OF LOCAL GOVERNMENT -- The Local Role -- Prevention -- Response and Recovery -- Investigation -- THINKING ABOUT NETWORKS -- Prevention -- Response and Recovery -- Investigation -- CONCLUSION -- REFERENCES -- Chapter Fifteen: Liberty and Security in an Era of Terrorism -- INTRODUCTION -- LIBERTY -- Freedom -- Liberty -- Privacy -- SECURITY -- AN ERA OF TERRORISM? -- BALANCES, TRADE-OFFS, AND JUDGMENTS -- Balances -- Trade-Offs -- Judgment -- REFERENCES -- Chapter Sixteen: Regulating Terrorism -- RECONSIDERING DETERRENCE -- RECONSIDERING JUSTICE -- CONTAINMENT AND ENLARGEMENT -- THE TORN WEB OF U.S. CONTROLS ON TERRORISM -- THE PUBLIC HEALTH MODEL -- TOWARD AN EVIDENCE-BASED POLICY ON EXTREMISM -- CONCLUSION -- REFERENCES -- Part Three: Thinking About Tomorrow -- Chapter Seventeen: Using Open Source Data to Counter Common Myths about Terrorism -- THE EXTENT OF TERRORISM -- MYTH 1: Terrorist Attacks Reach Every Corner of the World -- MYTH 2: Terrorist Attacks were Rapidly Increasing in the Years Leading up to 9/11 -- MYTH 3: The United States is More Frequently Targeted by Terrorists than any Other Country in the World -- THE SOURCES OF TERRORISM -- MYTH 4: Most Terrorist Attacks Involve Disgruntled Groups and Individuals from One Country Carrying Out Attacks on Civilians in Other Countries -- MYTH 5: Terrorism is Unrelated to Traditional Political Grievances.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note THE LETHALITY OF TERRORISM AND THE RESILIENCE OF TERRORIST GROUPS -- MYTH 6: Most Terrorist Attacks are Incredibly Lethal -- MYTH 7: Most Terrorist Attacks Rely on Sophisticated Weaponry -- MYTH 8: Most Terrorist Organizations are Long Lasting and Difficult to Eradicate -- COUNTERTERRORISM -- MYTH 9: Terrorist Groups are Impervious to Governmental Counterterrorist Policies and Rarely Make Mistakes -- MYTH 10: To be Effective Against Terrorism, Governments Must Strike Back Rapidly and Forcefully -- DISCUSSION AND CONCLUSIONS -- REFERENCES -- Chapter Eighteen: Criminal Justice and Terrorism: A Research Agenda -- INTRODUCTION -- LESSONS LEARNED: DEFINITIONS ARE NEEDED, AND SO IS FLEXIBILITY -- LESSONS LEARNED: INTERACTIONS AND TYPOLOGIES OF TERRORISM -- LESSONS LEARNED: THE BARRIERS TO EMPIRICAL RESEARCH ON TERRORISM ARE FORMIDABLE -- PROSPECTS FOR RESEARCH ON TERRORISM -- Adapting Crime Prevention Models to Terrorism -- Estimating the Social Costs of Terrorism and Counterterrorism Policy -- Other Prospects -- CONCLUSION -- REFERENCES -- Index.
520 ## - SUMMARY, ETC.
Summary, etc This volume presents 19 original essays addressing issues surrounding terrorism from the unique perspective of criminology.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on publisher supplied metadata and other sources.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internal security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element National security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Terrorism -- Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Terrorism.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Greene, Jack R.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lynch, James P.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Forst, Brian
Title Criminologists on Terrorism and Homeland Security
Place, publisher, and date of publication New York : Cambridge University Press,c2011
International Standard Book Number 9780521899451
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Cambridge Studies in Criminology
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=667580">https://ebookcentral.proquest.com/lib/buse-ebooks/detail.action?docID=667580</a>
Public note Click to View

No items available.

Powered by Koha