LEADER 03952nam 22006375 450 001 9910299861703321 005 20200704012540.0 010 $a1-137-59668-6 024 7 $a10.1057/978-1-137-59668-0 035 $a(CKB)4100000007127618 035 $a(MiAaPQ)EBC5596905 035 $a(DE-He213)978-1-137-59668-0 035 $a(PPN)232474869 035 $a(EXLCZ)994100000007127618 100 $a20181111d2018 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring Mega-Events $eNetworks, Strategies and Tensions /$fby Chad Whelan, Adam Molnar 205 $a1st ed. 2018. 210 1$aLondon :$cPalgrave Macmillan UK :$cImprint: Palgrave Macmillan,$d2018. 215 $a1 online resource (229 pages) 225 1 $aCrime Prevention and Security Management 311 $a1-137-59667-8 327 $aIntroduction -- Chapter 1. Analysing Mega-Event Security: Looking Inside Operations -- Chapter 2. Organising Security Actors: Designing New Nodes and Networks -- Chapter 3. Organising Across Boundaries: Communication, Coordination and Conflict -- Chapter 4. Securing Place: Security Risks, Techniques and Technologies -- Chapter 5. Securing Populations: Protests, Resident and Spectators -- Chapter 6 -- Conclusion. 330 $aMega-events such as the Olympic Games, World Cup finals and international political summits are occasions of almost unparalleled economic, political and social significance for host nations and cities. The scale and scope of mega-event security has continued to grow enormously since 11 September 2001, consistently involving the largest policing and security operations for event hosts outside of wartime. This book is the first to focus exclusively on the organisational dynamics underpinning the design and delivery of mega-event security. Using the G20 Summit in Brisbane, Australia in November 2014 as a case study, in conjunction with comparisons with events such as the Toronto 2010 G20, the authors engage in a comprehensive assessment of the networks, strategies and tensions involved in mega-event security. By drawing on the insightful experiences of those responsible for securing the Brisbane 2014 G20, the authors look behind-the-scenes to capture the complexity of mega-event security. The authors argue that such an approach is essential to better appreciate how different conceptions of security, ways of thinking and acting, impact a range of security ideals and outcomes. 410 0$aCrime Prevention and Security Management 606 $aCrime prevention 606 $aPolice 606 $aCrime?Sociological aspects 606 $aTerrorism 606 $aSecurity, International 606 $aCrime Prevention$3https://scigraph.springernature.com/ontologies/product-market-codes/1BE010 606 $aPolicing$3https://scigraph.springernature.com/ontologies/product-market-codes/1B2000 606 $aCrime and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/1B3000 606 $aTerrorism$3https://scigraph.springernature.com/ontologies/product-market-codes/1BE020 606 $aInternational Security Studies$3https://scigraph.springernature.com/ontologies/product-market-codes/912120 615 0$aCrime prevention. 615 0$aPolice. 615 0$aCrime?Sociological aspects. 615 0$aTerrorism. 615 0$aSecurity, International. 615 14$aCrime Prevention. 615 24$aPolicing. 615 24$aCrime and Society. 615 24$aTerrorism. 615 24$aInternational Security Studies. 676 $a363.10019 700 $aWhelan$b Chad$4aut$4http://id.loc.gov/vocabulary/relators/aut$0858136 702 $aMolnar$b Adam$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910299861703321 996 $aSecuring Mega-Events$91935472 997 $aUNINA