did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781420070781

Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection

by ;
  • ISBN13:

    9781420070781

  • ISBN10:

    1420070789

  • Format: Hardcover
  • Copyright: 2008-10-22
  • Publisher: Auerbach Pub
  • Purchase Benefits
List Price: $99.95

Summary

The challenge in combating terrorism is not that any of us could die tomorrow in an attack, but that we cannot seem to perform the basic functions of diagnosing and treating the problem so that it is manageable.  Given this, and because public and private sector partnerships are critical to the success of this management, Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats.Organized to take into consideration differing leadership and management styles, organizational cultural change barriers, and team dynamics, the information is structured to appeal to most adult learning styles, ensuring effective communication of critical messages. Using helpful case studies and exercises, the author presents invaluable instruction on how to establish, implement, and reinforce terrorismawareness and regulatory compliance with national critical infrastructure interests. Comprehensive in scope, the book reviews threat factors, risk mitigation, readiness plans, prevention approaches, human factors, and training methods. It concludes with insights into the limitations businesses must respect as they adjust to this new paradigm.A recognized expert in terrorism deterrence and counterintelligence methods, Elsa Lee brings her 28 years of experience in counterterrorism, counterintelligence, and counterespionage investigations to inform the discussion. Organizations which integrate her recommendations into their internal corporate strategies will not only contribute to Homeland Security efforts, but will also ultimately improve business continuity, resiliency, and operational and financial security for the corporation.

Table of Contents

Prefacep. xi
Acknowledgmentsp. xv
About the Authorp. xvii
Introduction: Homeland Security Visionp. 1
The Desired State of Homeland Securityp. 1
The Current State of Homeland Securityp. 4
Homeland Security Issues and Challengesp. 9
Everyone Has a Role in Homeland Securityp. 11
History of Terrorismp. 12
The Direct Impact of Modern-Day Terrorismp. 14
What's at Stake with Today's Terrorist Attacksp. 15
Countering Terrorism with DHS Helpp. 20
DHS Help Is Not Enoughp. 23
Essential Threat Factorsp. 25
The Problem We Face with Threatsp. 25
General Threats to Security Hierarchy Componentsp. 27
General Threat Effect on Homeland Securityp. 29
Threat Management Through Intelligencep. 30
Terrorists' Operational Methodologyp. 33
Limitations of Early Warningsp. 37
Creating Your Own Threat-Warning Capabilitiesp. 40
Painful Lesson: The USS Cole Attackp. 41
Implications of Not Understanding Threatsp. 43
Lesson Learned: First World Trade Center Attack, 1993p. 45
Lesson Learned: First American Hijacking, 1961p. 45
Homeland Security Roles and Misconceptionsp. 46
Sharing Informationp. 48
Threat Trendsp. 49
Conclusionp. 51
Threat, Vulnerability, and Risk Componentsp. 53
Overviewp. 53
DHS Risk Model and National Infrastructure Protection Plan (NIPP)p. 57
Responsibility and Accountability per DHSp. 60
How to Perform Your Own Threat Assessmentp. 60
NIPP as a Templatep. 62
A Framework for Taking the NIPP Approachp. 64
A Framework for Assessing Threatp. 65
What the Results Suggestp. 70
Terrorist Activity Indicatorsp. 71
Espionage or Insider Threatsp. 71
Information and Technical Threatsp. 71
How to Handle Discoveries of Threat and Vulnerabilitiesp. 72
Determining Vulnerabilityp. 73
Countermeasurep. 76
Reporting Informationp. 77
Cost versus Investmentp. 78
Penaltiesp. 80
Mini Case Studyp. 81
Risk Mitigation, Transference, and Eliminationp. 83
Risk Decision Principlesp. 84
Lessons Not Easily Learnedp. 89
Readiness Plans: Develop, Validate, and Updatep. 95
Overviewp. 95
How Terrorists Planp. 98
Collaboration with External Organizationsp. 99
Beginning the Development Processp. 102
Plan Developmentp. 105
Overlooked Plan Itemsp. 107
Internal Communications Considerationsp. 108
External Communicationsp. 109
Crisis and Media Communicationsp. 109
Plan Response for Bomb Threatsp. 111
Addressing Loading Docks and Mailroomsp. 112
Plan Validationp. 113
Plan Updatesp. 114
Plan to Share Informationp. 114
What DHS Says about Protected Critical Infrastructure Information (PCII)p. 117
Prevention, Detection, and Response Factors across Sectorsp. 119
Overviewp. 119
Innovative Prevention Approachesp. 124
Innovative Detection Technologyp. 127
Investing in Response Capabilities through Partnershipp. 128
Other Contributors to Homeland Securityp. 132
Response Considerationsp. 133
Preparedness Snapshotp. 135
Case Studyp. 136
Human Factors and Team Dynamicsp. 141
The Human Factorp. 141
Humanity in Crisis and Hero Modep. 142
Female Terrorists: THE Human Factor Gone Wrongp. 143
Humans in Conflictp. 144
Human Overconfidencep. 146
Human Technologyp. 149
SuperDiversityp. 151
Diversity as a Problem Solverp. 152
The "Human Factor" as a Toolp. 153
Dysfunctional Group Dynamicsp. 156
Discussion versus Dialoguep. 158
How to Get your Team to Dialoguep. 159
Leadership versus Managementp. 160
Roadblocks to Effective TeamWorkp. 162
Lack of Proper Foundationp. 164
Linguistic Differencesp. 165
Conflictsp. 166
Chapter Exercisep. 167
Toolkits and Innovative Ideas for Changep. 169
Overviewp. 169
Organizational Leadershipp. 170
Fundamental Management Knowledgep. 171
Stephen Coveyp. 171
Problem-Solving Exercisesp. 173
Appreciation Exercises: Extracting Maximum Information from Factsp. 173
How to Use the Toolp. 174
Examplep. 174
Key Pointsp. 174
5 Whys: Quickly Getting to the Root of a Problemp. 174
Why Use the Tool?p. 174
How to Use the Toolp. 175
Examplep. 175
Key Pointsp. 175
Fundamental Terrorism Knowledgep. 176
Gary Berntsenp. 176
Peter L. Bergenp. 177
Michael Scheuerp. 177
Steven Emersonp. 178
Brian Jenkinsp. 178
Jessica Sternp. 179
Wafa Sultanp. 180
Why Workforce Breakdown Is Critical (by personality type, leadership style, and team role)p. 182
Theory X and Theory Yp. 182
Myers-Briggs Type Indicatorp. 183
Group Roles and Team Rolesp. 186
Low-Context and High-Context Communicationsp. 188
Reactive versus Proactive Languagep. 189
Active Listeningp. 190
What to Avoidp. 190
What We Achieve by Listeningp. 190
How to Listenp. 190
What to Dop. 190
The Forming, Storming, Norming, Performing Modelp. 191
Chapter Exercisep. 194
Training and Exercises: Touch It, Feel It, Live It, Breathe It!p. 197
Overviewp. 197
Benefits of Trainingp. 198
Adult Learningp. 199
Training Methodsp. 200
Crawl Walk Run Methodologyp. 203
Video Example for Trainingp. 205
Another Show Solving a Problemp. 205
Exercisesp. 206
Building an Exercisep. 211
Other Key Factorsp. 211
How Often Should You Exercise?p. 212
Training Evaluationp. 213
Training Failuresp. 215
A Subjective Method for Calculating Return on Investment (ROI)p. 216
You Can Deter But You Can't Interdict: Don't Cross the Line!p. 219
Know Thy Limitsp. 219
Distinctions between Collecting information and Collecting Intelligencep. 220
How to Avoid Botching Up an Investigationp. 221
Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agenciesp. 223
National Infrastructure Protection Plan - Table of Contentsp. 225
ASCE Report on Critical Infrastructurep. 231
Bomb Threat Checklistp. 239
Best Practices for Mail Center Securityp. 241
General Mail Operation Preventive Recommendationp. 241
Employee Security Proceduresp. 242
General Safety and Security Procedures for Incoming-Outgoing Mail Areasp. 243
Access to Information: Education and Communicationsp. 244
Guidelines for Mail Center Theft Preventionp. 245
FY07 National Incident Management System (NIMS) Training Guidelinesp. 247
Fact Sheet on Dirty Bombsp. 249
Backgroundp. 249
Impact of a Dirty Bombp. 249
Protective Actionsp. 250
Sources of Radioactive Materialp. 250
Control of Radioactive Materialp. 251
Risk of Cancerp. 251
Other Contact informationp. 252
Arab American Psychiatrist Wafa Sultanp. 253
There Is No Clash of Civilizations But a Clash between the Mentality of the Middle Ages and That of the 21st Centuryp. 253
Referencep. 255
Homeland Security Exercise and Evaluation Programp. 257
Indexp. 265
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program