Skip to main content

The Politics of Corporate Security and the Translation of National Security

  • Chapter
Corporate Security in the 21st Century

Part of the book series: Crime Prevention and Security Management ((CPSM))

Abstract

In the intelligence community, there is now a tendency to treat terrorism and other global threats as demanding active involvement of businesses and other social communities. Private companies are called upon to manage issues of national security, including terrorism, climate change, and organized crime. The overall political aim is to make ‘the entire society’1 resilient against natural disasters and human-made catastrophes. The US Secretary of Homeland Security Janet Napolitano (2011) put it this way:

[T]he homeland security enterprise extends far beyond DHS [Department of Homeland Security] and the federal government … it requires not just a ‘whole of government,’ but a ‘whole of nation’ approach. In some respects, local law enforcement, community groups, citizens, and the private sector play as much of a role in homeland security as the federal government. That is why I like to say that ‘homeland security starts with hometown security.’

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Andersen, N.Å. and I.J. Sand. (eds) (2012) Hybrid Forms of Governance. New York: Palgrave Macmillan.

    Google Scholar 

  • Alliance for Enterprise Security Risk Management. (2005) Convergence of Enterprise Security Organizations, http://iris.nyit.edu/~kkhoo/Fall2008/755/ConvergenceEnterpriseSecurityOrg_08Nov05.pdf, accessed 16 April 2013.

  • ASIS International. (2010) Enterprise Security Risk Management: How Great Risks Lead to Great Deeds (A Benchmarking Survey and White Paper). Alexandria, VA: The CSO Roundtable of ASIS International.

    Google Scholar 

  • ASIS. (2012) ASIS International webpage, http://asisonline.org/certification/cpp/about/history.xml, accessed 10 July 2012.

    Google Scholar 

  • Barry, A., Osborne, T. and N. Rose. (1996) Foucault and Political Reason. London: UCL Press.

    Google Scholar 

  • Beck, U. (2002) ‘The Terrorist Threat: World Risk Society Revisited.’ Theory Culture & Society 19/4: 39–55.

    Article  Google Scholar 

  • Beck, U. (2003) ‘The Silence of Words: On Terror and War.’ Security Dialogue 34/3: 225–268.

    Article  Google Scholar 

  • Bhabha, H.K. (1994) The Location of Culture. London and New York: Routledge.

    Google Scholar 

  • Borodzicz, E.P. and S.D. Gibson. (2006) ‘Corporate Security Education: Towards Meeting the Challenge.’ Security Journal 19/3: 180–195.

    Article  Google Scholar 

  • Briggs, R. and C. Edwards. (2006) The Business of Resilience: Corporate Security for the 21st Century. London: Demos.

    Google Scholar 

  • Davidson, M.A. (2012) Managing Risk across the Enterprise. Security Management, http://www.securitymanagement.com/article/managing-risk-across-enterprise- 005823, accessed 16 April 2013.

    Google Scholar 

  • Dean, M. (1999) Governmentality, Power and Rule in Modern Society. London: Sage.

    Google Scholar 

  • Department of Homeland Security. (2002) National Strategy for Homeland Security (July), http://www.ncs.gov/library/policy_docs/nat_strat_hls.pdf, accessed 16 April 2013.

    Google Scholar 

  • Department of Homeland Security. (2013a) See Something Say Something, http://www.dhs.gov/if-you-see-something-say-something-campaign, accessed 15 July 2013.

    Google Scholar 

  • Department of Homeland Security. (2013b) DHS Press Release, http://ipv6.dhs.gov/ynews/releases/20111118-% 20see-say-partners-with-mls.shtm, accessed 15 July 2013.

    Google Scholar 

  • Eggen, D. (2007) ‘Judge invalidates Patriot Act Provisions.’ Washington Post 7 September 2007: A3.

    Google Scholar 

  • Ewald, F. (1991) ‘Insurance and Risk.’ in G. Burchell, C. Gordon and P. Miller (eds) The Foucault Effect: Studies in Governmentality. Chicago, IL: University of Chicago Press.

    Google Scholar 

  • Foucault, M. (1991) ‘Governmentality.’ in G. Burchell, C. Gordon and P. Miller (eds) The Foucault Effect: Studies in Governmentality. Chicago, IL: The University of Chicago Press.

    Google Scholar 

  • Freeman, R.E. (1984) Strategic Management: A Stakeholder Approach. Boston, MA: Pitman.

    Google Scholar 

  • Friedman, Milton. (1970) ‘The Social Responsibility of Business is to Increase its Profits.’ New York Times Magazine 13 September 1970.

    Google Scholar 

  • Garland, D. (2001) The Culture of Control. Oxford: Oxford University Press.

    Google Scholar 

  • Hont, I. (2005) Jealousy of Trade: International Competition and the Nation-State in Historical Perspective. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Johnson, T. (1995) ‘Governmentality and the Institutionalization of Expertise.’ in T. Johnson, G. Larkin and M. Saks (eds) Health Professions and the State in Europe. London: Routledge.

    Google Scholar 

  • Michaels, J.D. (2008) ‘All the President’s Spies: Private-public Intelligence Partnerships in the War on Terror.’ California Law Review 96/4: 901–966.

    Google Scholar 

  • Nalla, M. and Morash, M. (2002) ‘Assessing the Scope of Corporate Security: Common Practices and Relationships with Other Business Functions.’ Security Journal 15/3: 7–19.

    Article  Google Scholar 

  • Napolitano, J. (2011) State of America’s Homeland Security Address. Washington, DC: George Washington University, 27 January, http://www.dhs.gov/ynews/speeches/sp_1296152572413.shtm, accessed 15 July 2013.

    Google Scholar 

  • O’Brien, K.A. (2009) ‘Managing National Security and Law Enforcement Intelligence in a Globalized World.’ Review of International Studies 35/4: 903–915.

    Article  Google Scholar 

  • Petersen, K.L. and V.S. Tjalve. (2013) ‘(Neo) Republican Security Governance? US homeland Security and the Politics of “shared responsibility.”’ International Political Sociology 7/1: 1–18.

    Article  Google Scholar 

  • Porter, M.E. and M. R. Kramer. (2006) ‘Strategy and Society: The Link Between Competitive Advantage and Corporate Social Responsibility.’ Harvard Business Review 84/12: 78–93.

    Google Scholar 

  • Power, M. (2007) Organized Uncertainty: Designing a World of Risk Management. Oxford and New York: Oxford University Press.

    Google Scholar 

  • Ridley, G. (2011) ‘National Security as a Corporate Social Responsibility: Critical Infrastructure Resilience.’ Journal of Business Ethics 103/1: 111–125.

    Article  Google Scholar 

  • Rigakos, G.S. (2002) The New Parapolice — Risk Markets and Commodified Social Control. Toronto, Buffalo and London: University of Toronto Press.

    Google Scholar 

  • Ritchey, D. (2011) ‘Proud to be Security: How Roles Changed after 9/11,’ Security Magazine, 1 September, http://www.securitymagazine.com/articles/82306- proud-to-be-security-how-roles-changedafter-911, accessed 15 July 2013.

    Google Scholar 

  • Ritzer, G. (1975) ‘Professionalization, Bureaucratization and Rationalization: The Views of Max Weber.’ Social Forces 53/4: 627–634.

    Article  Google Scholar 

  • Rose, N. (1993) ‘Government, Authority and Expertise in Advanced Liberalism.’ Economy and Society 22/3: 283–299.

    Article  Google Scholar 

  • Rose, N. and P. Miller. (2008) Governing the Present: Administering Economic, Social and Personal Life. Malden, MA and Cambridge: Polity Press.

    Google Scholar 

  • Simonsen, C.E. (1996) ‘The Case for: Security Management is a Profession.’ International Journal of Risk, Security and Crime Prevention 1/3: 229–232.

    Google Scholar 

  • Slater, D. (2008) Jeff Spivey on Enterprise Risk Management, http://www.csoonline.com/article/print/461481, accessed 16 June 2012.

    Google Scholar 

  • Teubner, G. (1991) ‘Autopoiesis and Steering: How Politics Profit from the Normative Surplus of Capital.’ in R. Veld, L. Schaap, C. Termeer and M. Twist (eds) Autopoiesis and Configuration Theory: New Approaches to Societal Steering. Dordrecht, the Netherlands: Kluwer Academic Publishing.

    Google Scholar 

  • Thompson, Grahame F. (2012) The Constitutionalization of the Global Corporate Sphere? Oxford: Oxford University Press.

    Book  Google Scholar 

  • van der Heijden, J. (2011) ‘Friends, Enemies, or Strangers? On Relationships between Public and Private Sector Service Providers in Hybrid forms of Governance.’ Law & Policy 33/3: 367–390.

    Article  Google Scholar 

  • Washington Post. (2007) Judge Invalidates Patriot Act Provisions, 7 September. Translated by Eggen, D.

    Google Scholar 

  • Weber, M. (1968) Economy and Society: An Outline of Interpretive Sociology. New York: Bedminster Press.

    Google Scholar 

  • Wenger, E. (1998) Communities of Practice: Learning, Meaning, and Identity. Cambridge, MA: Cambridge University Press.

    Book  Google Scholar 

  • Wenger, E. and W. Snyder. (2000) ‘Communities of Practice: The Organizational Frontier.’ Harvard Business Review 78/1: 139–145.

    Google Scholar 

  • Wolf, K.D. Deitelhoff, N. and S. Engert. (2007) ‘Corporate Security Responsibility: Towards a Conceptual Framework for a Comparative Research Agenda.’ Cooperation and Conflict 42/3: 294–320.

    Article  Google Scholar 

  • Youtube. (2013) Walmart Public Service Announcement, http://youtube.com/watch?v=Czoww2l1xdw), accessed 15 July 2013.

    Google Scholar 

  • Zegart, Amy (2012) ‘Spooks, Incorporated. Does Every Company Need its Own CIA?,’ Foreign Policy, 5 December 2012, http://www.foreignpolicy.com/articles/2012/12/05/spooks_incorporated accessed 29 August 2013.

    Google Scholar 

Survey and Interviews

  • Survey (2011) ‘Survey on Corporate Security Thinking,’ Questionnaire answered by 210 private companies in the UK, the US, Sweden and Denmark, Conducted by Karen Lund Petersen in 2011.

    Google Scholar 

  • Archer Daniels Midland Company (ADM) (2010) Interview with Security Director Mark Cheviron, 31 August (Conference call).

    Google Scholar 

  • Cargill (2010) Interview with Vice President and Director, Global Security, Claude Nebel, 10 July (Conference call).

    Google Scholar 

  • Chiquita (2010) Interview with Director of Global Security Edmundo Guevara, 24 August (Conference call).

    Google Scholar 

  • Chumer (2010) Interview with Michael Chumer, PhD, research professor in the Department of Information Systems at New Jersey Institute of Technology, and Director of the NJIT MS Emergency Management and Business Continuity program, 3 July (Conference call).

    Google Scholar 

  • Krebs (2010) Interview with Vice President, Dutko Worldwide, Chris Krebs, Washington, DC, Interview, 1 July (Conference call).

    Google Scholar 

  • Metropolitan Transportation Authority (MTA) (2010) Interview with Deputy Executive Director/Director of Security William A. Morange, MTA office, New York, 13 May.

    Google Scholar 

  • Port Authority (2010) Interview with Chief Operating Officer of the Port Authority of NY & NJ Ernesto L. Butcher, Port Authority New York, 13 May.

    Google Scholar 

  • Procter & Gamble (2010) Interview with Leader of Global Security, Jim Hutton, 19 May (Conference call).

    Google Scholar 

  • Walmart (2011) Interview with Kenneth Senser, Walmart security leader, November 2011 (Conference call).

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 Karen Lund Petersen

About this chapter

Cite this chapter

Petersen, K.L. (2014). The Politics of Corporate Security and the Translation of National Security. In: Walby, K., Lippert, R.K. (eds) Corporate Security in the 21st Century. Crime Prevention and Security Management. Palgrave Macmillan, London. https://doi.org/10.1057/9781137346070_5

Download citation

Publish with us

Policies and ethics