Airport and Aviation Security – Annotated Bibliography Example

The paper "Airport and Aviation Security" is a delightful example of an annotated bibliography on social science. Abrahamsen, R., & Williams, M. C. (2009). Security beyond the state: Global security assemblages in international politics. International Political Sociology, 3(1), 1-17. The book provides an in-depth analysis of global security privatization. It analyses global governance in relation to security in private companies. The books put forth theories examining state authorities and the private e-commerce sectors and how this impacts global security. The book content is very current and politically inclined. The information can be relied on as credible and useful. Adey, P. (2009). Facing airport security: affect, biopolitics, and the preemptive securitization of the mobile body. Environment and Planning D: Society and Space, 27(2), 274-295. The book preemptively narrates the openings that airports provide to global security or insecurity. The book cross examines why airports are insecurity targets. The book also provides a peek into the future of airport security on several dimensions. The book is current and very useful in providing credible discourse in upgrading airport security mechanisms. Elias, B. (2009). Airport and aviation security: US policy and strategy in the age of global terrorism. CRC Press. The books explore the challenges that current airport security strategies are facing. The measures put forth by security protocols and why they do not effectively counter insecurity. There is wide coverage of the imbalance between air commerce whenever global security measures are enforced. The author’s perspective is absolutely convincing as they relate with the most recent al-Qaida attacks. More than this, the book is recently published and has been referenced a lot meaning it is credible and the information reliable. Frederickson, H. G., & LaPorte, T. R. (2002). Airport security, high reliability, and the problem of rationality. Public Administration Review, 62(s1), 33-43. The article appeals to the aspects of the reliability of airport security operations. The author explores a myriad of efforts to ensure enforced airport security standards to bear fruit in global security. The article further provides an overview of the information needed to implement the high standards of security. The author being a public administrator provides the administrative view where the airline sector is to charge for the responsibility of global security. The public administration theories are more accurate and relevant in the application. Heng, Y. K., & McDonagh, K. (2009). Risk, Global Governance and Security: The Other War on Terror. Routledge. The book provides a multilateral view of global security cutting across the militaristic forces, the rhetorical war on terror and emerging issues in global security. With the incessant explosion of terrorism, the book covers strategic ways to end the insecurity. The book exhaustively discusses anti-terror initiatives and the modes of implementation exploring their effectiveness. The information as presented is credible. The author has vast knowledge in international relations from his long lecturing career in many universities. The author’s reference to theories of risk and key concepts adds credibility that makes the knowledge very useful. Kibaroğlu, M., Kibaroğlu, A., & Halman, T. S. (2009). Global security watch--Turkey: A reference handbook. Westport, Conn: Praeger Security International. The book examines Turkey’s reaction to foreign policies and decisions. It also explains how the private sector has boosted the state of global airline safety. The book provides a conceptual framework for the role that airport security plays in global security by demonstrating the state of Turkish airports. Other than been current the information is practically drawn making this credible source.  McCarley, J. S., Kramer, A. F., Wickens, C. D., Vidoni, E. D., & Boot, W. R. (2004). Visual skills in airport-security screening. Psychological Science, 15(5), 302-306. The journal is based on an experimental check on the tools employed in airport security. The experiment purely is used to reveal how the travels and screening tools can contribute to global insecurity. Moreover, the journal uncovers the need to upgrade airport security screening tools. This information is credible and having been conducted scientifically, it is highly accurate and reliable. Sparke, M. B. (2006). A neoliberal nexus: Economy, security and the biopolitics of citizenship on the border. Political Geography, 25(2), 151-180. The book identifies the ways in which airport security is has failed. It examines the inadequate security designs that airports employ. The role that bodies such as the Transport Security Administration and Homeland security play are discussed. This is a very recent publication, therefore, gives a current view. The author is a diplomat and a keen analysis of security matters. This information is fairly credible and accurate when related to the current state of affairs. Sweet, K. (2008). Aviation and airport security: terrorism and safety concerns. CRC Press. The descriptive analysis of biometrics, predictive analysis and dataveillance in the book scrutinized the role of airport security on state borders. The book relates technology, the airport travels and global security on many levels. The text is also particular in technological techniques through which airport security enhances global security. The content is relatively recent, credible and accurate technologically and other senses. TYLER, S. T. A. C. E. Y. L. (2017). AIRPORT SECURITY: Passenger screening and governance post-9/11. S.l.: ROSEDOG PR. This book narrates the tenets of airlines exploring their operations, economic impacts and political roles. It addresses the challenges faced, global security being a major threat. The book also provides great insight into the age of terrorism and its impact on airports. The author writes on account of their first-hand experience from their experience working in the Turkish embassy. This author’s active involvement in business security has enabled her to argue substantially on the subject making credible and reliable arguments.