Skip to main content

Introduction

  • Chapter
  • First Online:
Corporate Security Surveillance

Abstract

On December 25, 2021, the recreational vehicle (RV) Anthony Quinn Warner drove to the historical section of Nashville and parked on Second Avenue detonated in front of an AT&T transmission facility. The bomb inside that RV exploded with enough force to decimate a city block.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The decision to rank countries based on numbers of U.S. based MNC “parent organizations” is also useful because in three out of the five country cases examined (i.e., India, Brazil, and Thailand), the 2019 Uniworld rankings of subsidiaries (and their numbers) closely corresponded to the rankings for “parent organizations”.

  2. 2.

    The neoliberal institutionalist approach puts emphasis on non-state actor efforts, with focus on inter-governmental organizations in particular, to promote cooperation between states.

  3. 3.

    Morgan, Patrick. [40] “Safeguarding Security Studies” Arms Control, 13(3):466–479)

  4. 4.

    This concept draws on Jervis’ notion of “subjective security demands,” where leaders have various security sensitivities.

  5. 5.

    This example suggests the role of culture as one of the determinants to security conceptualization.

  6. 6.

    Risk, as conceptualized, parallels notions of power as conceptualized by Robert A. Dahl, Anatol Rapoport, and Morton Deutsch.

  7. 7.

    There was insufficient information in the GTD data and supplemental data available to make accurate determinations about whether or not terrorist group chieftains qualified as charismatic leaders.

References

  1. Al S (2015) Local armed uprisings and the transnational image of claim making: the Kurds of Turkey and the Zapatistas of Mexico in comparative perspective. Globalizations 12(5):677–694. https://www.tandfonline.com/doi/abs/10.1080/14747731.2014.991541

  2. Allison N, Tamburin A (2020) Retracing the key moments after the Christmas bombing in Nashville. Nashville Tennessean. https://www.tennessean.com/in-depth/news/local/2021/01/10/timeline-christmas-morning-bombing-nashville/6578915002/

  3. Barash DP, Webel CP (2002) Peace and conflict studies. Sage Publications

    Google Scholar 

  4. Beres LR (1988) Terrorism and international law. Florida International Law Journal 3(3):291–306

    Google Scholar 

  5. Beres LR (1988) Genocide, law and power politics. Whitter Law Review 10(2):329–351

    Google Scholar 

  6. Beres LR (1990) Confronting nuclear terrorism. The Hastings International and Comparative Law Review 14(1):129–154

    Google Scholar 

  7. Booth K (2007) Theory of world security. Cambridge University Press

    Book  Google Scholar 

  8. Buzan B, Waever O (2003) Regions and powers: the structure of international security. Cambridge University Press

    Google Scholar 

  9. Chasdi RJ (2010) Counterterror offensives for the ghost war world: the rudiments of counterterrorism policy. Lexington Books

    Google Scholar 

  10. Chasdi RJ (2014) A continuum of nation-state resiliency to watershed terrorist events. Armed Forces Soc 40(3):476–503

    Article  Google Scholar 

  11. Chasdi RJ (2020) Research note—the new frontier of enhanced terrorism with the United States in mind. The International Journal of Intelligence, Security, and Public Affairs 22(2):119–131. https://doi.org/10.1080/23800992.2020.1780075

    Article  Google Scholar 

  12. Chasdi RJ (2013) Risks of terrorism, homicide, and illness: a methodological consideration. Perspectives on Terrorism 7(6):126–136. https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2013/issue-6/risks-of-terrorism-homicide-and-illness-a-methodological-consideration.pdf

  13. Chasdi RJ (2018) Corporate security crossroads responding to terrorism, cyberthreats, and other hazards in the global business environment. ABC-CLIO Praeger, 1–3,183, n1; 183 n4, 184, n10, 184 n7

    Google Scholar 

  14. Chasdi RJ (2022) Rudiments of a space security policy framework. The centre for international governance innovation (CIGI), CIGI Papers No. 265, 1–15. https://www.cigionline.org/

  15. Collier P, Hoeffler A (2000) Greed and grievance in civil war, policy research working paper no. 2355, World Bank. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=630727

  16. Cullen JB, Parboteeah KP (2014) Multinational management: a strategic approach, 6th edn. South-Western Cengage Learning

    Google Scholar 

  17. Dahl RA (1957) The concept of power. Behavioral Sciences 2(3):201–205

    Google Scholar 

  18. DeBonis M (2022) House votes to strip Russia of trade status, but Congress treads carefully. Washington Post

    Google Scholar 

  19. Deutsch M (1973) The resolution of conflict: constructive and destructive processes. Yale University Press

    Google Scholar 

  20. Fernandez LM (2009) Organized crime and terrorism: from the cells towards political communication, a case study. Terrorism and Political Violence

    Google Scholar 

  21. Flores RG, Aguilera RV (2007) Globalization and location choice: analysis of US multinational firms in 1980 and 2000. Journal of International Business Studies 38(7):1187–1210. https://link.springer.com/article/10.1057/palgrave.jibs.8400307

  22. Fuerth L, Faber EMH (2012) Anticipatory governance practical upgrades: equipping the executive branch to cope with increasing speed and complexity of major challenges. National Defense University, Center for Technology & National Security Policy

    Google Scholar 

  23. Gurr TR, Harff B (1994) Ethnic conflict in world politics. Westview Press

    Google Scholar 

  24. Gurr TR (2003) Terrorism in democracies: when it occurs, why it fails. In: Kegley CW (ed) The new global terrorism: characteristics, causes, controls. Prentice Hall, pp 202–215

    Google Scholar 

  25. Gurr TR (1988) Some characteristics of political terrorism in the 1960’s. In: Stohl M (ed) Politics of terrorism third edition, revised and expanded. Marcel Dekker

    Google Scholar 

  26. Gurr TR (1989) The history of protest, rebellion and reform in America: an overview. In Gurr TR (ed) Protest, rebellion, reform. Vol. 2 of violence in America. Sage Publications

    Google Scholar 

  27. Gurr TR (1989) Political terrorism: Historical antecedents and contemporary trends. In Gurr TR (ed) Protest, rebellion, reform. Vol. 2 of violence in America. Sage Publications

    Google Scholar 

  28. Hawkins D, Kranish M, Sebastian S, Kornfield M (2020) 63-year-old Anthony Q. Warner is a person of interest in Christmas blast in Nashville, authorities say. Washington Post. https://www.washingtonpost.com/national-security/2020/12/26/after-nashville-blast-tennessee-governor-asks-trump-emergency-disaster-declaration/

  29. Hill CWL (2014) Global business today—eighth edition. McGraw Hill Irwin

    Google Scholar 

  30. Hill CWL, Hult GTM (2016) Global business today–ninth edition. McGraw Hill Education

    Google Scholar 

  31. Hofstede G (1993) Cultural constraints in management theory. Acad Manag Exec 7(1):81–90. https://doi.org/10.5465/AME.1993.9409142061

    Article  Google Scholar 

  32. Jervis R (1978) Cooperation under the security dilemma. World Politics 30(2):173–174

    Article  Google Scholar 

  33. Kegley C (2007) World politics: trends and transformations, 11th edn. Thomson Wadsworth

    Google Scholar 

  34. Lasswell HD (1935) World politics and personal insecurity. McGraw Hill, Whittlesey House

    Google Scholar 

  35. Lasswell HD (1978) Terrorism and the political process. Terrorism: An International Journal 1(3/4):253–263

    Google Scholar 

  36. Luthans F, Doh JP (2012) International management: culture, strategy, and behavior, 8th edn. McGraw Hill Irwin

    Google Scholar 

  37. Makarenko T (2004) The crime-terror continuum: tracing the interplay between transnational organized crime and terrorism. Global Crime 6(1):129–145

    Article  Google Scholar 

  38. Miller G, Menn J (2022) Putin’s prewar threats to U.S. tech giants fruitful. Washington Post

    Google Scholar 

  39. Monahan J (2011) The individual risk assessment of terrorism. Psychol Public Policy Law. https://doi.org/10.1037/a0025792,14-17,6n7,4

    Article  Google Scholar 

  40. Morgan P (1992) “Safeguarding Security Studies”, Arms Control. 13(3):466–479

    Google Scholar 

  41. Nadal A (1998) Terrorism in Chiapas. Bulletin of the Atomic Scientists 52(4):18–25. https://www.tandfonline.com/doi/abs/10.1080/00963402.1998.11456823?journalCode=rbul20

  42. Nakashima E, Suliman A, Kuo L (2022) In call, Biden warns China’s Xi not to assist Russia. Washington Post

    Google Scholar 

  43. Nye JS (1993) Understanding international conflicts: an introduction to theory and history. Harper Collins College Publishers

    Google Scholar 

  44. Office of Public Affairs (2010) Faisal Shahzad indicted for attempted car bombing in Times Square. U.S. Department of Justice. https://www.justice.gov/opa/pr/faisal-shahzad-indicted-attempted-car-bombing-times-square

  45. Patterson T, Blue SG (2005) Mapping security: the corporate security sourcebook for today’s global economy. Addison Wesley

    Google Scholar 

  46. Pearson FS, Rochester JM (1998) International relations: the global condition in the twenty-first century, 4th edn. McGraw Hill

    Google Scholar 

  47. Pitigala N (2021) The impact of trade and economic contagion on developing and emerging markets. In: Gunaratna R, Aslam MMM (eds) COVID-19: a global security threat. Amsterdam University Press

    Google Scholar 

  48. Powell R (1990) Nuclear deterrence theory: the search for credibility. Cambridge University Press

    Book  Google Scholar 

  49. Rapoport A (1995) The origins of violence: approaches to the study of conflict. Transaction Books

    Google Scholar 

  50. Rogers P (2010) Losing control global security in the twenty-first century, 3rd edn. Pluto Press

    Google Scholar 

  51. Ronis SR (2007) Timelines into the future: strategic visioning methods for government, business and other organizations. Hamilton Books

    Google Scholar 

  52. Chasdi RJ (2021) Prevention of major economic disruption following acts of terrorism—the case of the Bali bombings of 2002 and (2005). In: Schmid A (ed) Handbook of terrorism prevention and preparedness. ICCT, The Hague, pp 985–1026

    Google Scholar 

  53. Shelley LI (2014) Identifying, counting and categorizing transnational criminal organizations. In: Sheptycki J (ed) Transnational organized crime, volume II: definitional and methodological issues, constructionist and critical perspectives. Sage Publications, pp 93–109

    Google Scholar 

  54. Shelley LI, Picarelli JT, Irby A, Hart DM, Craig-Hart PA, Williams P, Simon S, Abdullaev N, Stanislawski B, Covill L (2005) Methods and motives: exploring links between transnational organized crime and international terrorism. Trends in Organized Crime 8(2). https://link.springer.com/article/10.1007/s12117-005-1024-x

  55. Spich R, Grosse R (2005) How does homeland security affect U.S. firm’s international competitiveness? Journal of International Management 11(4):457–478. https://www.sciencedirect.com/science/article/abs/pii/S1075425305000669

  56. Stein J, Dixon R (2022) Sanctions freeze “Putin’s war chest” and endanger Russian economy. Washington Post

    Google Scholar 

  57. Stohl MS, Lopez GA (1984) Introduction. In: Stohl MS, Lopez GA (eds) The state as terrorist: the dynamics of governmental violence and repression. Greenwood Press

    Google Scholar 

  58. Uniworld Database 2019 on-line. Accessed at George Mason University, 11–14 March 2019

    Google Scholar 

  59. Wagner RH (2007) War and the state: the theory of international politics. University of Michigan Press

    Book  Google Scholar 

  60. Watkins S (2022) Russia’s invasion of Ukraine highlights America’s fading geopolitical influence. Oil Price. oilprice.com

    Google Scholar 

  61. Wolfers A (1973) National security as an ambiguous symbol. In: Art RJ, Jervis R (eds) International politics; anarchy, force, imperialism. Little, Brown and Company, pp 29–45

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard J. Chasdi .

Rights and permissions

Reprints and permissions

Copyright information

© 2024 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chasdi, R.J. (2024). Introduction. In: Corporate Security Surveillance. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-39550-5_1

Download citation

Publish with us

Policies and ethics