- Home
- ACADEMIC
- Business & Management
- Business Technology
- Corporate Security Crossroads
Corporate Security Crossroads
Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment
Corporate Security Crossroads
Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment
You must sign in to add this item to your wishlist. Please sign in or create an account
Description
Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance.
Multinational corporations are on the front lines of terrorism and cyberattacks—two of the world's biggest threats to global security. How can corporate leaders mitigate their organizations' risks and develop an infrastructure that detects and deters a security menace before it happens? This timely reference lays out essential political context and historical background to help executives identify contemporary threats and understand the interconnections between threat dynamics in an increasingly dangerous international environment.
This compelling work is organized into seven chapters. The beginning chapters profile the specific risks for multinational companies and detail which global—and regional—factors might propagate violence targeted at American-based businesses. Next, two historical case studies on terrorist assaults at Tigantourine and Mombasa illustrate how counterterrorism can successfully thwart potential attacks against business targets. The final part describes industrial espionage and criminal activity and then outlines a corporate counterterror blueprint to combat the prospect of terrorism, providing specific recommendations for preventative measures.
Table of Contents
Acknowledgments
Chapter 1 Conceptualization of Risk to Multinational Corporations in a World of Intensive Globalization
Chapter 2 Relationships between Traditional Terrorism, Virtual World Threats, and the International Political System: Impact on International Business
Chapter 3 Tides of Terrorism: Historical Retrospectives on the Jewish Sicarri, the Thugs in India, and Methodological Considerations for Contemporary Threat Analysis
Chapter 4 The Case of the Tigantourine Gas Plant Terrorist Assault in Algeria: A Complexity Systems Analysis
Chapter 5 The Case of the Mombasa Terrorist Assaults in Kenya: A Complexity Systems Analysis
Chapter 6 The Radicalization Spectrum: Apolitical and Political Threat Conceptualization and Lone Wolf Attribute Analysis
Chapter 7 Conclusions
Appendix I Terrorist Business Target Preferences: Algeria, Niger, and Mauritania, 2003–2013
Appendix II Lone Wolf Terrorist Data
Notes
Index
Product details
| Published | 10 Nov 2017 |
|---|---|
| Format | Ebook (PDF) |
| Edition | 1st |
| Pages | 256 |
| ISBN | 9781440832864 |
| Imprint | Praeger |
| Publisher | Bloomsbury Publishing |
About the contributors
Reviews
-
…deserves kudos but also a rightful place among serious and committed researchers and academia engaged in counter-terrorism studies.This book must be on libraries' shelves for the general and enlightened readership.
Indian Journal of Asian Affairs
-
Richard Chasdi has produced a well-informed work, which underscores the need for business and government entities to understand the political, cultural, and economic environments in which they operate, particularly when in foreign countries. . . . The book contains useful insights for a broad spectrum of readership.The main audience would seem to be CEOs and security officials for multinational corporations and government foreign policy officials. Yet his methodology will appeal to political scientists and statisticians, as will his study of 'lone wolf' terrorists attract psychologists and sociologists. As such, the book provides value in several fields. . . . Professor Chasdi's research provides a very useful guidebook towards the way ahead.
CDA Institute
-
Conceptually innovative.
Perspectives on Terrorism
ONLINE RESOURCES
Bloomsbury Collections
This book is available on Bloomsbury Collections where your library has access.
























