

Publisher: Palgrave Macmillan Ltd
Founded in: 2000
Total resources: 2
E-ISSN: 1743-4645
ISSN: 0955-1662
Subject: D035 State administration
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Security Journal
Menu

The corporate security professional: A hybrid agent between corporate and national security
By Petersen Karen Lund in (2013)
Security Journal , Vol. 26, Iss. 3, 2013-07 , pp.
Corporate security - Private justice? (Un)settling employer-employee troubles
Security Journal , Vol. 26, Iss. 3, 2013-07 , pp.
Addressing the weakest link: Implementing converged security
Security Journal , Vol. 26, Iss. 3, 2013-07 , pp.

`Acting like chameleons': On the McDonaldization of private security
By van Steden Ronald in (2013)
Security Journal , Vol. 26, Iss. 3, 2013-07 , pp.

Responding to intimate partner violence in the workplace
Security Journal , Vol. 26, Iss. 3, 2013-07 , pp.
Multiplicities of corporate security: Identifying emerging types, trends and issues
Security Journal , Vol. 26, Iss. 3, 2013-07 , pp.
A comparative study of hazardous material transportation security issues in Flanders and in Apulia
Security Journal , Vol. 26, Iss. 2, 2013-04 , pp.
The value of trust: The danger of betrayal - A case study approach to business gone bad
Security Journal , Vol. 26, Iss. 2, 2013-04 , pp.