1,752
Views
35
CrossRef citations to date
0
Altmetric
Original Articles

Not Just Joining the Dots But Crossing the Borders and Bridging the Voids: Constructing Security Networks after 11 September 2001Footnote

Pages 27-49 | Published online: 20 Aug 2006

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (14)

Vigneswary Pranava Rasahugan & Samihah Khalil. (2022) Systematic Literature Review on Private Security Governance by Government. Journal of Applied Security Research 17:4, pages 426-450.
Read now
Chad Whelan & Benoît Dupont. (2017) Taking stock of networks across the security field: a review, typology and research agenda. Policing and Society 27:6, pages 671-687.
Read now
Ryan Sinclair Cotter. (2017) Police intelligence: connecting-the-dots in a network society. Policing and Society 27:2, pages 173-187.
Read now
Monica den Boer & Jelle van Buuren. (2012) SECURITY CLOUDS. Journal of Cultural Economy 5:1, pages 85-103.
Read now
Matt Hidek. (2011) Military doctrine and intelligence fusion in the American homeland. Critical Studies on Terrorism 4:2, pages 239-261.
Read now
John William Coyne & Peter Bell. (2011) Strategic intelligence in law enforcement: a review. Journal of Policing, Intelligence and Counter Terrorism 6:1, pages 23-39.
Read now
Tom Vander Beken & Kristof Verfaillie. (2010) Assessing European futures in an age of reflexive security. Policing and Society 20:2, pages 187-203.
Read now
Janet Ransley & Lorraine Mazerolle. (2009) Policing in an era of uncertainty. Police Practice and Research 10:4, pages 365-381.
Read now
Darren Palmer & Chad Whelan. (2006) Counter‐terrorism across the Policing Continuum. Police Practice and Research 7:5, pages 449-465.
Read now
P.A.J. Waddington. (2006) Terrorism and Civil Libertarian Pessimism: Continuing the Debate. Policing and Society 16:4, pages 415-421.
Read now

Articles from other publishers (21)

Saskia Ryan, Maria Ioannou & Merle Parmak. (2018) Understanding the three levels of resilience: Implications for countering extremism. Journal of Community Psychology 46:5, pages 669-682.
Crossref
Anna-Liisa Heusala & Jarmo Koistinen. (2018) Règles du jeu dans la coopération transfrontalière : différences juridico-administratives dans la prévention de la criminalité entre la Finlande et la Russie. Revue Internationale des Sciences Administratives Vol. 84:2, pages 363-379.
Crossref
Anna-Liisa Heusala & Jarmo Koistinen. (2016) ‘Rules of the game’ in cross-border cooperation: legal-administrative differences in Finnish–Russian crime prevention. International Review of Administrative Sciences 84:2, pages 354-370.
Crossref
Oldrich Bures. 2018. Security Privatization. Security Privatization 23 49 .
Oldrich Bures & Helena Carrapico. 2018. Security Privatization. Security Privatization 1 19 .
Oldrich Bures & Helena Carrapico. (2016) Private security beyond private military and security companies: exploring diversity within private-public collaborations and its consequences for security governance. Crime, Law and Social Change 67:3, pages 229-243.
Crossref
Oldrich Bures. (2016) Contributions of private businesses to the provision of security in the EU: beyond public-private partnerships. Crime, Law and Social Change 67:3, pages 289-312.
Crossref
Chad Whelan. (2017) Managing dynamic security networks: Towards the strategic managing of cooperation, coordination and collaboration. Security Journal 30:1, pages 310-327.
Crossref
Chad Whelan. (2016) Informal social networks within and between organisations. Policing: An International Journal of Police Strategies & Management 39:1, pages 145-158.
Crossref
Artur GruszczakArtur Gruszczak. 2016. Intelligence Security in the European Union. Intelligence Security in the European Union 1 36 .
Conor O’Reilly. (2015) The Pluralization of High Policing: Convergence and Divergence at the Public–Private Interface:. British Journal of Criminology 55:4, pages 688-710.
Crossref
Oldrich Bures. (2014) Political Corporate Social Responsibility: Including High Politics?. Journal of Business Ethics 129:3, pages 689-703.
Crossref
David Lowe, Austin Turk & Dilip DasDarren Wilson. 2013. Examining Political Violence. Examining Political Violence 145 166 .
Oldrich Bures. (2013) Public-private partnerships in the fight against terrorism?. Crime, Law and Social Change 60:4, pages 429-455.
Crossref
Raphael Bossong. (2012) Peer reviews in the fight against terrorism: A hidden dimension of European security governance. Cooperation and Conflict 47:4, pages 519-538.
Crossref
Oldrich Bures. (2012) Informal counterterrorism arrangements in Europe: Beauty by variety or duplicity by abundance?. Cooperation and Conflict 47:4, pages 495-518.
Crossref
Darryl Plecas, Amanda V. McCormick, Jason Levine, Patrick Neal & Irwin M. Cohen. (2011) Evidence‐based solution to information sharing between law enforcement agencies. Policing: An International Journal of Police Strategies & Management 34:1, pages 120-134.
Crossref
Graham Ellison & Mary O'Rawe. (2010) Security governance in transition. Theoretical Criminology 14:1, pages 31-57.
Crossref
Gabe Mythen & Sandra Walklate. (2008) Terrorism, Risk and International Security: The Perils of Asking 'What If?'. Security Dialogue 39:2-3, pages 221-242.
Crossref
MONICA DEN BOER, CLAUDIA HILLEBRAND & ANDREAS NÖLKE. (2007) Legitimacy under Pressure: The European Web of Counter-Terrorism Networks*. JCMS: Journal of Common Market Studies 46:1, pages 101-124.
Crossref
Graham Ellison. (2016) A Blueprint for Democratic Policing Anywhere in the World?. Police Quarterly 10:3, pages 243-269.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.