File #2453: "2018_Book_SecuringMega-Events.pdf"
Testo
1|Series Editor Introduction|6
1|Acknowledgements|8
1|Contents|10
1|About the Authors|13
1|Abbreviations|15
1|List of Figures|18
1|1 Introduction|19
2|Securing Mega-Events|21
2|Networks, Strategies and Tensions|24
2|The Brisbane 2014 G20|30
2|The Book|34
2|References|36
1|2 Analysing Mega-Event Security: Looking Inside Operations|43
2|Introduction|43
2|Approaching ‘Security’ and ‘Mega-Events’|44
3|Comparing Mega-Events|46
3|Mega-Events and ‘Knowledge Networks’|51
2|Securing from What and for Whom? Threats, Risks and Responses|54
3|Approaching Risk and Threat|55
3|Asking ‘What If’?|59
2|Planning Mega-Event Security|61
3|Questions of Scale and Scope|61
3|The Search for Lessons|64
3|The Struggle of Logistics and Integration|69
2|Conclusion|72
2|References|73
1|3 Organising Security Actors: Designing New Nodes and Networks|77
2|Introduction|77
2|Specialised Units: Forming New Security Nodes|78
3|G20 Taskforce|78
3|QPS G20 Group|82
3|Physically Locating the G20 Taskforce and G20 Group|87
2|Security Networks|89
3|G20 Event Operations Centre|91
3|Police Operations Centre|92
3|Joint Intelligence Group|99
2|Conclusion|104
2|References|105
1|4 Organising Across Boundaries: Communication, Coordination and Conflict|108
2|Introduction|108
2|Negotiating Organisational Boundaries|109
3|Organisational Communication|110
3|Coordination and Decision-Making|115
2|Organisational and Personal Relationships|122
3|Reflecting on Relationships: ‘Ambiguity Creates Conflict’|122
3|Organisational Culture|125
3|Organisational and Personal Trust|131
2|Conclusion|135
2|References|136
1|5 Securing Places: Security Risks, Techniques and Technologies|140
2|Introduction|140
2|Organising Principles for Event Security: From Planning to Practice|141
3|The Three Tiers: Managing Jurisdictional Space|142
3|Venue Security: Policing Versus Security|149
2|Security Techniques and Technologies|156
3|Securing Territories|157
3|Security Technologies|163
2|Conclusion|167
2|References|168
1|6 Securing Populations: Protests, Residents and Spectators|171
2|Introduction|171
2|Public Order Policing: Learning from Toronto|172
2|Managing Police: Command and Control|176
2|(Stage-)Managing Protesters: Engagement and Relationship-Building|184
3|Engaging Protest Groups|186
3|Public Order Policing Contingencies|190
2|Conclusion|196
2|References|197
1|7 Conclusion|201
2|Introduction|201
2|Organising for Mega-Event Security|202
2|Conceptions of and Approaches to Security|206
2|Recognising and Reconciling Tensions in Security|210
2|References|216
1|References|218
1|Index|235
1|Acknowledgements|8
1|Contents|10
1|About the Authors|13
1|Abbreviations|15
1|List of Figures|18
1|1 Introduction|19
2|Securing Mega-Events|21
2|Networks, Strategies and Tensions|24
2|The Brisbane 2014 G20|30
2|The Book|34
2|References|36
1|2 Analysing Mega-Event Security: Looking Inside Operations|43
2|Introduction|43
2|Approaching ‘Security’ and ‘Mega-Events’|44
3|Comparing Mega-Events|46
3|Mega-Events and ‘Knowledge Networks’|51
2|Securing from What and for Whom? Threats, Risks and Responses|54
3|Approaching Risk and Threat|55
3|Asking ‘What If’?|59
2|Planning Mega-Event Security|61
3|Questions of Scale and Scope|61
3|The Search for Lessons|64
3|The Struggle of Logistics and Integration|69
2|Conclusion|72
2|References|73
1|3 Organising Security Actors: Designing New Nodes and Networks|77
2|Introduction|77
2|Specialised Units: Forming New Security Nodes|78
3|G20 Taskforce|78
3|QPS G20 Group|82
3|Physically Locating the G20 Taskforce and G20 Group|87
2|Security Networks|89
3|G20 Event Operations Centre|91
3|Police Operations Centre|92
3|Joint Intelligence Group|99
2|Conclusion|104
2|References|105
1|4 Organising Across Boundaries: Communication, Coordination and Conflict|108
2|Introduction|108
2|Negotiating Organisational Boundaries|109
3|Organisational Communication|110
3|Coordination and Decision-Making|115
2|Organisational and Personal Relationships|122
3|Reflecting on Relationships: ‘Ambiguity Creates Conflict’|122
3|Organisational Culture|125
3|Organisational and Personal Trust|131
2|Conclusion|135
2|References|136
1|5 Securing Places: Security Risks, Techniques and Technologies|140
2|Introduction|140
2|Organising Principles for Event Security: From Planning to Practice|141
3|The Three Tiers: Managing Jurisdictional Space|142
3|Venue Security: Policing Versus Security|149
2|Security Techniques and Technologies|156
3|Securing Territories|157
3|Security Technologies|163
2|Conclusion|167
2|References|168
1|6 Securing Populations: Protests, Residents and Spectators|171
2|Introduction|171
2|Public Order Policing: Learning from Toronto|172
2|Managing Police: Command and Control|176
2|(Stage-)Managing Protesters: Engagement and Relationship-Building|184
3|Engaging Protest Groups|186
3|Public Order Policing Contingencies|190
2|Conclusion|196
2|References|197
1|7 Conclusion|201
2|Introduction|201
2|Organising for Mega-Event Security|202
2|Conceptions of and Approaches to Security|206
2|Recognising and Reconciling Tensions in Security|210
2|References|216
1|References|218
1|Index|235