Advertisement

Abstract

Today’s security landscape has been described as transnational in nature. In light of this, the security studies domain has seen a deepening and broadening in response to the changing landscape. In addition to the issues pertaining to the traditional security concerns of threat, force and state actors, non-traditional security issues have emerged.

Keywords

Social Network Site Critical Infrastructure Economic Security Security Challenge Situational Crime Prevention 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Battin-Pearson SR, Thornberry TP, Hawkins JD, Krohn MD (1998) Gang membership, delinquent peers, and delinquent behavior. Department of Justice, Office of Juvenile Justice and Delinquency Prevention Bulletin. Youth Gang Series. Washington, DCGoogle Scholar
  2. Beck U (1992) Risk society: towards a new modernity. Sage, LondonGoogle Scholar
  3. Beck U (2009) World at risk. Polity Press, CambridgeGoogle Scholar
  4. Bullock K, Tilley N (2002) Shootings, gangs and violent incidents in Manchester: developing a crime reduction strategy. Crime reduction research series paper, vol 13. Home Office, LondonGoogle Scholar
  5. Central Intelligence Agency (2013) The world factbook: Bermuda. The Central Intelligence Agency. https://www.cia.gov/library/publications/the-world-factbook/geos/bd.html. Accessed 9 Sept 2013
  6. Helbing D (2013) Globally networked risks and how to respond. Nature 497:51–59CrossRefADSGoogle Scholar
  7. Masys AJ (2012) Black swans to grey swans—revealing the uncertainty. Int J Disaster Prev Manage 21(3):320–335CrossRefGoogle Scholar
  8. Masys AJ (2014a) Critical infrastructure and vulnerability: a relational analysis through actor network theory. In: Masys AJ (ed) Networks and network analysis for defence and security. Springer, BerlinGoogle Scholar
  9. Masys AJ (2014b) Dealing with complexity: thinking about networks and the comprehensive approach. In: Masys AJ (ed) networks and network analysis for defense and security. Springe, BerlinGoogle Scholar
  10. Masys AJ, Ray-Bennett N, Shiroshita H, Jackson P (2014) High impact/low frequency extreme events: enabling reflection and resilience in a hyper-connected world. In: 4th international conference on building resilience, procedia economics and finance, vol 18, 8–11 Sept 2014. Salford Quays, UK, pp 772–779Google Scholar
  11. Muncie J (1999) Deconstructing criminology. Crim Justice Matters 34:4–5CrossRefGoogle Scholar
  12. Parliamentary Joint Select Committee (2011) Joint select on the causes of violent crime and gun violence in Bermuda: a parliamentary joint select committee publication under Part 1 V of the parliamentary act 1957, July 2011. Available from http://www.parliament.bm/uploadedFiles/Content/Home/Report%20on%20Violent%20Crime%20and%20Gun%20Violence%20in%20Bermuda.pdf. Accessed 11 Nov 2012
  13. Roberts N, Everton SF (2011) Strategies for combating dark networks. J Soc Struct 12(2). http://www.cmu.edu/joss/content/articles/volume12//RobertsEverton.pdf
  14. Strangeways S (2010) Bermuda’s per capita murder rate was more than five times London’s Rate in 2009, RoyalGazette.com. The Royal Gazette, 9 Jan. 2010. Available from http://www.royalgazette.com/article/20100109/NEWS/301099993. Accessed 13 Sept 2013
  15. Subrahmanian VS, Mannes A, Siliva A, Shakarian J, Dickerson JP (2013) Computational analysis of terrorist groups: Lashkar-e-Taiba. Springer, BerlinGoogle Scholar
  16. The Washington Post (2006) Gang violence jolts formerly quiet Bermuda; tourist Getaway grapples with string of shootings highbeam research. The Washington Post, 6 Aug 2006. Available from http://www.highbeam.com/doc/1P2-139686.html. Accessed 3 Aug 2013
  17. UNISDR—United Nations National Strategy for Disaster Reduction (eds.) (2011) National strategy for disaster reduction. Themes and issues in disaster risk reduction, [Online] Available: http://www.preventionweb.net/files/23647_themesandissuesindisasterriskreduct.pdf. [Accessed 01.07.2015].

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.University of LeicesterLeicesterUK

Personalised recommendations