Show Less
Restricted access

The Business of Counterterrorism

Public-Private Partnerships in Homeland Security


Nathan E. Busch and Austen D. Givens

The Business of Counterterrorism focuses on the opportunities and challenges that public-private partnerships (PPPs) face in the post-9/11 world. Although these partnerships are a major topic of discussion and study among businesses and government agencies involved in homeland security efforts, they have received a much less thorough analysis by scholars. The Business of Counterterrorism identifies the essential role that PPPs are now taking in homeland security and explores the implications of this transformative shift in the field. In its discussion, it focuses on five areas in homeland security – critical infrastructure protection, cybersecurity, information sharing, security at U.S. ports of entry, and disaster recovery.
Show Summary Details
Restricted access



Library of Congress Cataloging-in-Publication Data

Busch, Nathan E. The business of counterterrorism: public-private partnerships in homeland security / Nathan E. Busch, Austen D. Givens. pages cm. — (Terrorism studies; 4) Includes bibliographical references and index. 1. Terrorism—Prevention—United States. 2. Public-private sector cooperation—United States. 3. National security— United States. I. Givens, Austen D. II. Title. HV6432.B874 363.325’170973—dc 3 2013046986 ISBN 978-1-4331-1955-2 (hardcover) ISBN 978-1-4331-1954-5 (paperback) ISBN 978-1-4539-1294-2 (e-book) ISSN 2167-8545

Bibliographic information published by Die Deutsche Nationalbibliothek. Die Deutsche Nationalbibliothek lists this publication in the “Deutsche Nationalbibliografie”; detailed bibliographic data is available on the Internet at

Cover design by Amy Lois Mayberry Cover photo by John Franco

© 2014 Peter Lang Publishing, Inc., New York 29 Broadway, 18th floor, New York, NY 10006

All rights reserved. Reprint or reproduction, even partially, in all forms such as microfilm, xerography, microfiche, microcard, and offset strictly prohibited.

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.