Preparing for the World Risk Society: Towards a New Security Paradigm for the...
Journal of Contingencies and Crisis Management (2009). Volume: 17, Issue: 4. Pages: 285-294. Arjen Boin, Magnus Ekengren et al.Published using Mendeley: The research tool for desktop & web
View ArticleSproats, Kevin in Kouzmin, Alexander (2000): Crisis Management: Toward a New...
International Review of Public Administration, let. A Jarman et al.Published using Mendeley: The research paper manager
View ArticleCrisis, planning, and the quality of life: managing the new historical...
Environment and Planning D: Society and Space (1983). Volume: 1, Issue: 1. Pages: 3-21. Castells M et al.We live in the midst of a major structural crisis. This crisis is multidimensional, cultural,...
View ArticleMegacities as global risk areas
Urban ecology (2008). F Kraas et al.Published using Mendeley: The digital library for researchers
View ArticleDefinition of Sovereignty
Political Theology. C Schmitt et al.Published using Mendeley: Academic software for researchers
View ArticleDefinition of Sovereignty
Political Theology. Four Chapters on the Concept of Sovereignty (1922). C Schmitt et al.Published using Mendeley: The reference manager for researchers
View ArticleMorality and Emergency
Proceedings of the Aristotelian Society Hardback (2003). Volume: 103, Issue: 1. Pages: 21-37. Tom Sorell et al.Agents sometimes feel free to resort to underhand or brutal measures in coping with an...
View ArticleThe future perfect of (in)security (P8) : Pre-crime strategy, Proactivity,...
No description available.Published using Mendeley: The bibliography manager for researchers
View ArticleSecuring Liberty in the Face of Terror: Reflections from Criminal Justice
Journal of Law and Society (2005). Volume: 32, Issue: 4. Pages: 507-533. Lucia Zedner et al.Published using Mendeley: The research tool for desktop & web
View ArticleData Derivatives: On the Emergence of a Security Risk Calculus for Our Times
Theory, Culture & Society (2011). Volume: 28, Issue: 6. Pages: 24-43. L. Amoore et al.In a quiet London office, a software designer muses on the algorithms that will make possible the risk flags to...
View ArticleA View Inside the Preventive State: Reflections on a Decade of Anti-Terror Law
Tamara Tulich et al.Published using Mendeley: The reference software for researchers
View ArticleEU and US Data Protection Reforms: A Comparative View
Social Science Research Network (2012). Gabriela Zanfir et al.This research makes a comparative analysis of two significant reform projects in data protection legislation, proposed in early 2012 in the...
View ArticleThe EU Data Protection Reform 2012: Safeguarding Privacy in a Connected World
V Reding et al.Published using Mendeley: The reference software for researchers
View ArticlePreparing for the World Risk Society: Towards a New Security Paradigm for the...
Journal of Contingencies and Crisis Management (2009). Volume: 17, Issue: 4. Pages: 285-294. Arjen Boin, Magnus Ekengren et al.Published using Mendeley: The bibliography manager for researchers
View ArticleSecuring Liberty in the Face of Terror: Reflections from Criminal Justice
Journal of Law and Society (2005). Volume: 32, Issue: 4. Pages: 507-533. Lucia Zedner et al.Published using Mendeley: The research paper manager
View ArticleInformation sharing and interoperability: the case of major incident management
European Journal of Information Systems (2013). David K Allen, Stan Karanasios, Alistair Norman et al.Published using Mendeley: The bibliography manager for researchers
View ArticleToo Well-Travelled, Not Well-Formed? the Reform of Criminality Information...
The Police Journal (2013). Volume: 86, Issue: 1. Pages: 29-52. J. Grace et al.Published using Mendeley: The reference software for researchers
View ArticleActivists repeatedly stopped and searched as police officers 'mark' cars
The Guardian (2009). P. Lewis, R. Evans et al.Published using Mendeley: The bibliography manager for researchers
View ArticleEstablishing effective systems for
Design. Establishing Effective, Systems For et al.Published using Mendeley: The digital library for researchers
View ArticlePost Disaster Recovery Needs Assessment and Methodologies Experiences from...
Assessment (2007). Christina Bollin et al.Published using Mendeley: The bibliography manager for researchers
View Article