P 2000 The Security Economy The Security Economy



Download 1,43 Mb.
Pdf ko'rish
bet16/16
Sana26.02.2020
Hajmi1,43 Mb.
#40911
1   ...   8   9   10   11   12   13   14   15   16

Document Outline

  • Foreword
  • Table of Contents
  • Chapter 1. The Emerging Security Economy: An Introduction
    • Key factors shaping demand
    • Tomorrow’s identification and surveillance technologies
      • Biometrics
      • Radio frequency identification systems
      • Satellite-based tracking and surveillance
      • “Hybrid technology” cards
    • The longer-term economic implications
    • Longer-term societal implications
  • Chapter 2. Factors Shaping Future Demand for Security Goods and Services
    • 1. Growing preoccupation with criminal activity
      • Figure 1. Trends in reported crime levels in selected OECD countries, 1993-2002
    • 2. Changing patterns of terrorist activity
    • 3. The growing mobility of people and goods
      • a) Mobility of people
        • Figure 2. Motor vehicle kilometres traveled (VKT), 1990 to 2020
        • Figure 3. Air passenger traffic projections: growth in air traffic 2000-2020
        • Figure 4. Air passenger traffic projections: top ten markets
        • Figure 6. Major migration patterns in the early 21st century
        • Figure 5. Inward migration into selected OECD countries 1980-2000
        • Figure 7. World exports, 1995-2020
      • b) Mobility of goods
        • Figure 8. The global supply line cost squeeze
    • 4. Operational efficiency
      • Figure 9. Projections of international tourist arrivals to 2020
    • 5. The growing need for information security
    • 6. Institutional and organisational change
      • Figure 10. US Government spending on Homeland Security
    • Bibliography
  • Chapter 3. Biometrics
    • 1. A short introduction to Biometrics
      • “Open Sesame”
      • Some definitions and consequences
      • Assessing the performance of biometric systems
        • Table 1. Technology performance
    • 2. Segmentation: the different uses of biometrics
      • Segmentation is difficult
      • Using biometrics to combat crime: the police market
      • Institutional biometric systems
      • Biometric systems for commercial and industrial use
      • Biometric systems for personal use
      • Conclusion
    • 3. Tomorrow’s markets
      • The last century, the coming century…
      • After September 11
      • The breakdown of the “business model”
      • The rising trend in identity theft
      • Market trends
    • 4. Challenges for the future
      • Technology
      • Respect for privacy
      • Standards
    • Notes
    • Bibliography
  • Chapter 4. RFID: The Concept and the Impact
    • 1. Introduction
    • 2. Technology
      • Introduction to RFID systems
        • Figure 1. Examples of an RFID tag and different types of reader
      • How RFID operates
      • History and current state of the art
      • The Auto-ID Centre
      • Comparison with other technologies
        • Table 1. A comparison of RFID and other identification and data carrying technologies
    • 3. Applications
      • Applications: past, present and planned
        • Table 2. Summary of the characteristics of different RFID applications
      • More detailed case studies
        • Table 3. Potential RFID applications across the retail supply chain
        • Figure 2. An RFID-enabled library system
      • Potential future applications
        • Figure 3. Product information content along the supply chain
    • 4. Drivers and effects
      • Commercial drivers for RFID
      • Legislative drivers for RFID
      • Social impact of RFID
      • Potential barriers to success of RFID
    • 5. Conclusion
    • Bibliography
  • Chapter 5. Tracking by Satellite: GALILEO
    • The Global Navigation Satellite System
    • Global Navigation Satellite Systems – How does it work?
    • Global Positioning System (GPS)
    • GLONASS
    • The GALILEO Programme
    • GALILEO – Architecture
      • Figure 1. Galileo’s components and services
    • An independent yet interoperable system
      • Figure 2. Open Service (OS)
      • Figure 3. Public-Regulated Service (PRS)
    • Safety and security applications
    • Applications in the field of transport
      • Road applications
      • Civil aviation
      • Maritime
      • Rail
    • Industrial applications
    • Local-based services (LBS)
    • Personal navigation assistance for people with impaired vision
    • Assistance to Alzheimer’s sufferers with memory loss
    • Personal protection and emergency calls
    • Disaster monitoring and prediction
    • Optimising disaster relief operations
    • Law enforcement and liability issues
    • Conclusion
  • Chapter 6. Security Products: Inside the Italian Electronic Identity Card
    • Overview
    • Goals
    • The solution adopted
      • Document layout
        • Figure 1. Instruments (solution adopted)
      • Print
      • Laser engraving
      • Security hologram
      • Optical memory band
        • Figure 2. Instruments (solution adopted)
        • Figure 3. Instruments (solution adpoted)
    • Recent evolution and prospects
    • Services provided
    • The production process
      • Card production
        • Figure 4. The actors involved: company profiles
        • Figure 5. The actors involved: company profiles
      • Initialisation phase
      • Activation phase
      • Issuance phase
    • Other applications
      • European driving licence
      • Permesso di Soggiorno (Immigrant Visa)
  • Chapter 7. Assessing the Economic Trade-offs of the Security Economy
    • 1. Introduction
    • 2. Characterising the security economy
      • What is the security economy?
      • How large is the security economy?
    • 3. Effects of the security economy
      • How is the economy affected by insecurity?
      • How is the economy affected by the response to insecurity?
      • How large are the effects?
    • 4. Aiming for optimal security
      • Is there an optimal level of security?
      • What are the trade-offs?
    • 5. Policy implications
      • What types of security policies exist?
      • How to regulate the security economy?
      • How should security policy be co-ordinated?
    • 6. Conclusions
    • Bibliography
  • Chapter 8. Surveillance Technologies: Trends and Social Implications
    • Introduction
    • 1. Surveillance society
    • 2. Surveillance as social sorting
    • 3. Surveillance politics
    • 4. Surveillance scenarios
    • 5. Conclusions
    • Notes
    • Bibliography
  • Annex. List of Participants
  • Questionnaire on the quality of OECD publications

Download 1,43 Mb.

Do'stlaringiz bilan baham:
1   ...   8   9   10   11   12   13   14   15   16




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish