Search
Search Results
-
Conclusion
The conclusion looks back and assesses the opening chapter, On Cyberwarfare, the potential that attacking critical infrastructure holds, the risks of... -
The illegal trade in European eels: outsourcing, funding, and complex symbiotic-antithetical relationships
Whilst traditionally, the study of the illegal wildlife trade has been focused on species that consider the role of the Western world as a consumer...
-
Water Crimes and Governance: The Slovenian Perspective
The demand for water is increasing due to its finite availability and a water-dependent world whose population is growing every day. It is important...
-
-
Context and Controversies of Australian Courts
As with most criminal justice systems internationally, the Australian system is not immune from controversy—both historically and contemporaneously.... -
An Overview of Legalising Prostitution in Thailand
In March 2023, Thai lawmakers drafted a law proposing the legalisation of engagement in prostitution for anyone aged 20 or above. The proposed... -
The threat of ransomware in the food supply chain: a challenge for food defence
In the food industry, the level of awareness of the need for food defence strategies has accelerated in recent years, in particular, mitigating the...
-
-
-
When corruption creates its Mafia. The “middle-world” case in Rome
The judicial operation “mondo di mezzo” (middle-world) revealed in 2014 the existence of a criminal network in Rome, dubbed Mafia capitale. Its main...
-
-
Globalism Failed – Iceland Alone in an Insecure Arctic
Following a brief summary of how forms of globalism provided strategic-level protection for Iceland since the mid-thirteenth century, this chapter... -
Border Security: An Essential but Effective Tool in Combatting Cross-Border Crime
Effective border security (excluding the function of borderline protection), within overarching border control structures at ports of entry and land... -
Exploring the social implications of buying and selling cyber security
Governments, businesses, private citizens and even organised crime are increasingly investing in cyber security, with the cyber security industry...
-
-
State challenge and social legitimacy: Brazilian militias as violent non-state actors and informal institutions
Militias are irregular armed groups that emerge from anti-drug trafficking discourses, seeking legitimacy by providing services to the population and...
-
The Resource Curse and Structural Violence in Angola: A Path for Perpetual Conflicts
The chapter examines the underlying factors of structural violence, social disorder, and poverty in Angola. The chapter is informed by the resource... -
The Carbon Footprint of Crime and Security
There has been little discussion or consideration to date of the carbon footprint of crime and security, despite climate change impacts and much... -
The Fight Against Wildlife Trafficking
The Fight Against Wildlife Trafficking—The illegal wildlife trade is nestled between law enforcement, conservation/environmental protection, and the... -
Victim-Oriented Police Reform: A Comparative Perspective
The growth of the global Black Lives Matter movement has shone a renewed spotlight on the universal experience of victimization in the form of...