Securing mega-events networks, strategies and tensions

Mega-events such as the Olympic Games, World Cup finals and international political summits are occasions of almost unparalleled economic, political and social significance for host nations and cities. The scale and scope of mega-event security has continued to grow enormously since 11 September 200...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Whelan, Chad (VerfasserIn), Molnar, Adam (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: London Palgrave Macmillan UK [2018]
London Palgrave Macmillan
Schriftenreihe:Crime prevention and security management
Schlagworte:
Online-Zugang:URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV045913000
003 DE-604
005 20211102
007 cr|uuu---uuuuu
008 190606s2018 xx o|||| 00||| eng d
020 |a 9781137596680  |c Online  |9 978-1-137-59668-0 
024 7 |a 10.1057/978-1-137-59668-0  |2 doi 
035 |a (ZDB-2-LCR)9781137596680 
035 |a (OCoLC)1185909482 
035 |a (DE-599)BVBBV045913000 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-188  |a DE-634 
082 0 |a 364.4  |2 23 
100 1 |a Whelan, Chad  |e Verfasser  |0 (DE-588)1022091867  |4 aut 
245 1 0 |a Securing mega-events  |b networks, strategies and tensions  |c Chad Whelan, Adam Molnar 
264 1 |a London  |b Palgrave Macmillan UK  |c [2018] 
264 1 |a London  |b Palgrave Macmillan 
264 4 |c © 2018 
300 |a 1 Online-Ressource (XIX, 229 p. 5 illus) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Crime prevention and security management 
520 3 |a Mega-events such as the Olympic Games, World Cup finals and international political summits are occasions of almost unparalleled economic, political and social significance for host nations and cities. The scale and scope of mega-event security has continued to grow enormously since 11 September 2001, consistently involving the largest policing and security operations for event hosts outside of wartime. This book is the first to focus exclusively on the organisational dynamics underpinning the design and delivery of mega-event security. Using the G20 Summit in Brisbane, Australia in November 2014 as a case study, in conjunction with comparisons with events such as the Toronto 2010 G20, the authors engage in a comprehensive assessment of the networks, strategies and tensions involved in mega-event security. By drawing on the insightful experiences of those responsible for securing the Brisbane 2014 G20, the authors look behind-the-scenes to capture the complexity of mega-event security. The authors argue that such an approach is essential to better appreciate how different conceptions of security, ways of thinking and acting, impact a range of security ideals and outcomes 
611 2 7 |a G20-Gipfel  |n 9.  |d 2014  |c Brisbane  |0 (DE-588)1134908768  |2 gnd  |9 rswk-swf 
611 2 7 |a G20 Toronto Summit  |d 2010  |c Toronto  |0 (DE-588)1031444750  |2 gnd  |9 rswk-swf 
650 4 |a Policing 
650 4 |a Crime and Society 
650 4 |a International Security Studies 
650 4 |a Crime prevention 
650 4 |a Police 
650 4 |a Crime  |x Sociological aspects 
650 4 |a Terrorism 
650 4 |a Security, International 
650 0 7 |a Organisation  |0 (DE-588)4043774-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Planung  |0 (DE-588)4046235-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Sicherheitsmaßnahme  |0 (DE-588)4181167-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Großveranstaltung  |0 (DE-588)4121388-9  |2 gnd  |9 rswk-swf 
689 0 0 |a Großveranstaltung  |0 (DE-588)4121388-9  |D s 
689 0 1 |a Sicherheitsmaßnahme  |0 (DE-588)4181167-7  |D s 
689 0 2 |a Planung  |0 (DE-588)4046235-3  |D s 
689 0 3 |a Organisation  |0 (DE-588)4043774-7  |D s 
689 0 |5 DE-188 
689 1 0 |a G20-Gipfel  |n 9.  |d 2014  |c Brisbane  |0 (DE-588)1134908768  |D f 
689 1 1 |a G20 Toronto Summit  |d 2010  |c Toronto  |0 (DE-588)1031444750  |D f 
689 1 2 |a Sicherheitsmaßnahme  |0 (DE-588)4181167-7  |D s 
689 1 |5 DE-188 
700 1 |a Molnar, Adam  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-137-59667-3 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-349-93698-4 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-349-93699-1 
856 4 0 |u https://doi.org/10.1057/978-1-137-59668-0  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-LCR 
940 1 |q ZDB-2-LCR_2018 
943 1 |a oai:aleph.bib-bvb.de:BVB01-031295536 

Datensatz im Suchindex

_version_ 1819306246998589441
any_adam_object
author Whelan, Chad
Molnar, Adam
author_GND (DE-588)1022091867
author_facet Whelan, Chad
Molnar, Adam
author_role aut
aut
author_sort Whelan, Chad
author_variant c w cw
a m am
building Verbundindex
bvnumber BV045913000
collection ZDB-2-LCR
ctrlnum (ZDB-2-LCR)9781137596680
(OCoLC)1185909482
(DE-599)BVBBV045913000
dewey-full 364.4
dewey-hundreds 300 - Social sciences
dewey-ones 364 - Criminology
dewey-raw 364.4
dewey-search 364.4
dewey-sort 3364.4
dewey-tens 360 - Social problems and services; associations
discipline Rechtswissenschaft
doi_str_mv 10.1057/978-1-137-59668-0
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03820nam a2200697zc 4500</leader><controlfield tag="001">BV045913000</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211102 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190606s2018 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781137596680</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-137-59668-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1057/978-1-137-59668-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LCR)9781137596680</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1185909482</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045913000</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.4</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Whelan, Chad</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1022091867</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing mega-events</subfield><subfield code="b">networks, strategies and tensions</subfield><subfield code="c">Chad Whelan, Adam Molnar</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Palgrave Macmillan UK</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Palgrave Macmillan</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 229 p. 5 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Crime prevention and security management</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Mega-events such as the Olympic Games, World Cup finals and international political summits are occasions of almost unparalleled economic, political and social significance for host nations and cities. The scale and scope of mega-event security has continued to grow enormously since 11 September 2001, consistently involving the largest policing and security operations for event hosts outside of wartime. This book is the first to focus exclusively on the organisational dynamics underpinning the design and delivery of mega-event security. Using the G20 Summit in Brisbane, Australia in November 2014 as a case study, in conjunction with comparisons with events such as the Toronto 2010 G20, the authors engage in a comprehensive assessment of the networks, strategies and tensions involved in mega-event security. By drawing on the insightful experiences of those responsible for securing the Brisbane 2014 G20, the authors look behind-the-scenes to capture the complexity of mega-event security. The authors argue that such an approach is essential to better appreciate how different conceptions of security, ways of thinking and acting, impact a range of security ideals and outcomes</subfield></datafield><datafield tag="611" ind1="2" ind2="7"><subfield code="a">G20-Gipfel</subfield><subfield code="n">9.</subfield><subfield code="d">2014</subfield><subfield code="c">Brisbane</subfield><subfield code="0">(DE-588)1134908768</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="611" ind1="2" ind2="7"><subfield code="a">G20 Toronto Summit</subfield><subfield code="d">2010</subfield><subfield code="c">Toronto</subfield><subfield code="0">(DE-588)1031444750</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Policing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International Security Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Police</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Crime</subfield><subfield code="x">Sociological aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, International</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Organisation</subfield><subfield code="0">(DE-588)4043774-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Planung</subfield><subfield code="0">(DE-588)4046235-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Großveranstaltung</subfield><subfield code="0">(DE-588)4121388-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Großveranstaltung</subfield><subfield code="0">(DE-588)4121388-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Planung</subfield><subfield code="0">(DE-588)4046235-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Organisation</subfield><subfield code="0">(DE-588)4043774-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">G20-Gipfel</subfield><subfield code="n">9.</subfield><subfield code="d">2014</subfield><subfield code="c">Brisbane</subfield><subfield code="0">(DE-588)1134908768</subfield><subfield code="D">f</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">G20 Toronto Summit</subfield><subfield code="d">2010</subfield><subfield code="c">Toronto</subfield><subfield code="0">(DE-588)1031444750</subfield><subfield code="D">f</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheitsmaßnahme</subfield><subfield code="0">(DE-588)4181167-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Molnar, Adam</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-137-59667-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-349-93698-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-349-93699-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1057/978-1-137-59668-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LCR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LCR_2018</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031295536</subfield></datafield></record></collection>
id DE-604.BV045913000
illustrated Not Illustrated
indexdate 2024-12-24T07:33:42Z
institution BVB
isbn 9781137596680
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031295536
oclc_num 1185909482
open_access_boolean
owner DE-188
DE-634
owner_facet DE-188
DE-634
physical 1 Online-Ressource (XIX, 229 p. 5 illus)
psigel ZDB-2-LCR
ZDB-2-LCR_2018
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Palgrave Macmillan UK
Palgrave Macmillan
record_format marc
series2 Crime prevention and security management
spelling Whelan, Chad Verfasser (DE-588)1022091867 aut
Securing mega-events networks, strategies and tensions Chad Whelan, Adam Molnar
London Palgrave Macmillan UK [2018]
London Palgrave Macmillan
© 2018
1 Online-Ressource (XIX, 229 p. 5 illus)
txt rdacontent
c rdamedia
cr rdacarrier
Crime prevention and security management
Mega-events such as the Olympic Games, World Cup finals and international political summits are occasions of almost unparalleled economic, political and social significance for host nations and cities. The scale and scope of mega-event security has continued to grow enormously since 11 September 2001, consistently involving the largest policing and security operations for event hosts outside of wartime. This book is the first to focus exclusively on the organisational dynamics underpinning the design and delivery of mega-event security. Using the G20 Summit in Brisbane, Australia in November 2014 as a case study, in conjunction with comparisons with events such as the Toronto 2010 G20, the authors engage in a comprehensive assessment of the networks, strategies and tensions involved in mega-event security. By drawing on the insightful experiences of those responsible for securing the Brisbane 2014 G20, the authors look behind-the-scenes to capture the complexity of mega-event security. The authors argue that such an approach is essential to better appreciate how different conceptions of security, ways of thinking and acting, impact a range of security ideals and outcomes
G20-Gipfel 9. 2014 Brisbane (DE-588)1134908768 gnd rswk-swf
G20 Toronto Summit 2010 Toronto (DE-588)1031444750 gnd rswk-swf
Policing
Crime and Society
International Security Studies
Crime prevention
Police
Crime Sociological aspects
Terrorism
Security, International
Organisation (DE-588)4043774-7 gnd rswk-swf
Planung (DE-588)4046235-3 gnd rswk-swf
Sicherheitsmaßnahme (DE-588)4181167-7 gnd rswk-swf
Großveranstaltung (DE-588)4121388-9 gnd rswk-swf
Großveranstaltung (DE-588)4121388-9 s
Sicherheitsmaßnahme (DE-588)4181167-7 s
Planung (DE-588)4046235-3 s
Organisation (DE-588)4043774-7 s
DE-188
G20-Gipfel 9. 2014 Brisbane (DE-588)1134908768 f
G20 Toronto Summit 2010 Toronto (DE-588)1031444750 f
Molnar, Adam aut
Erscheint auch als Druck-Ausgabe 978-1-137-59667-3
Erscheint auch als Druck-Ausgabe 978-1-349-93698-4
Erscheint auch als Druck-Ausgabe 978-1-349-93699-1
https://doi.org/10.1057/978-1-137-59668-0 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Whelan, Chad
Molnar, Adam
Securing mega-events networks, strategies and tensions
G20-Gipfel 9. 2014 Brisbane (DE-588)1134908768 gnd
G20 Toronto Summit 2010 Toronto (DE-588)1031444750 gnd
Policing
Crime and Society
International Security Studies
Crime prevention
Police
Crime Sociological aspects
Terrorism
Security, International
Organisation (DE-588)4043774-7 gnd
Planung (DE-588)4046235-3 gnd
Sicherheitsmaßnahme (DE-588)4181167-7 gnd
Großveranstaltung (DE-588)4121388-9 gnd
subject_GND (DE-588)1134908768
(DE-588)1031444750
(DE-588)4043774-7
(DE-588)4046235-3
(DE-588)4181167-7
(DE-588)4121388-9
title Securing mega-events networks, strategies and tensions
title_auth Securing mega-events networks, strategies and tensions
title_exact_search Securing mega-events networks, strategies and tensions
title_full Securing mega-events networks, strategies and tensions Chad Whelan, Adam Molnar
title_fullStr Securing mega-events networks, strategies and tensions Chad Whelan, Adam Molnar
title_full_unstemmed Securing mega-events networks, strategies and tensions Chad Whelan, Adam Molnar
title_short Securing mega-events
title_sort securing mega events networks strategies and tensions
title_sub networks, strategies and tensions
topic G20-Gipfel 9. 2014 Brisbane (DE-588)1134908768 gnd
G20 Toronto Summit 2010 Toronto (DE-588)1031444750 gnd
Policing
Crime and Society
International Security Studies
Crime prevention
Police
Crime Sociological aspects
Terrorism
Security, International
Organisation (DE-588)4043774-7 gnd
Planung (DE-588)4046235-3 gnd
Sicherheitsmaßnahme (DE-588)4181167-7 gnd
Großveranstaltung (DE-588)4121388-9 gnd
topic_facet G20-Gipfel 9. 2014 Brisbane
G20 Toronto Summit 2010 Toronto
Policing
Crime and Society
International Security Studies
Crime prevention
Police
Crime Sociological aspects
Terrorism
Security, International
Organisation
Planung
Sicherheitsmaßnahme
Großveranstaltung
url https://doi.org/10.1057/978-1-137-59668-0
work_keys_str_mv AT whelanchad securingmegaeventsnetworksstrategiesandtensions
AT molnaradam securingmegaeventsnetworksstrategiesandtensions