Skip to main content
  • Book
  • © 2018

Securing Mega-Events

Networks, Strategies and Tensions

Palgrave Macmillan
  • Examines mega-events using case studies, such as the G20 Summit in Brisbane, Australia
  • Considers the organisational dynamics of designing and delivering effective security
  • Discusses the variety of approaches and complexity of event security

Part of the book series: Crime Prevention and Security Management (CPSM)

Buy it now

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (7 chapters)

  1. Front Matter

    Pages i-xix
  2. Introduction

    • Chad Whelan, Adam Molnar
    Pages 1-24
  3. Analysing Mega-Event Security: Looking Inside Operations

    • Chad Whelan, Adam Molnar
    Pages 25-58
  4. Securing Places: Security Risks, Techniques and Technologies

    • Chad Whelan, Adam Molnar
    Pages 123-153
  5. Securing Populations: Protests, Residents and Spectators

    • Chad Whelan, Adam Molnar
    Pages 155-184
  6. Conclusion

    • Chad Whelan, Adam Molnar
    Pages 185-201
  7. Back Matter

    Pages 203-229

About this book

Mega-events such as the Olympic Games, World Cup finals and international political summits are occasions of almost unparalleled economic, political and social significance for host nations and cities. The scale and scope of mega-event security has continued to grow enormously since 11 September 2001, consistently involving the largest policing and security operations for event hosts outside of wartime. This book is the first to focus exclusively on the organisational dynamics underpinning the design and delivery of mega-event security.

Using the G20 Summit in Brisbane, Australia in November 2014 as a case study, in conjunction with comparisons with events such as the Toronto 2010 G20, the authors engage in a comprehensive assessment of the networks, strategies and tensions involved in mega-event security. By drawing on the insightful experiences of those responsible for securing the Brisbane 2014 G20, the authors look behind-the-scenes to capture the complexity of mega-eventsecurity. The authors argue that such an approach is essential to better appreciate how different conceptions of security, ways of thinking and acting, impact a range of security ideals and outcomes.

Reviews

“Mega-events such as political summits and international sports tournaments present immense security challenges to the mosaic of public and private organizations that are responsible for the safety of their participants and the surrounding populations. Coordinating such a diverse patchwork of organizations, whose rationalities, capacities and goals vary widely proves a complex undertaking that generates its fair share of tensions. In this richly documented book, Chad Whelan and Adam Molnar take us through a deep dive into one of those mega-events (the Brisbane 2014 G20 summit) and show in unprecedented detail how their security is planned and delivered. Using a security network approach, they provide new insights into the inherent tensions that run through these temporary assemblages. They also develop a detailed and nuanced analysis of the conflicting conceptions of security at play and how their frequent collisions produced unexpected outcomes. This book makes a unique contribution to our understanding of the governance of security in globalized societies.” (Benoît Dupont, International Centre for Comparative Criminology, Université de Montréal, Canada)

Whelan and Molnar note differences and similarities in key notions such as ‘security’ and ‘perceived threat,’ the tensions resulting, problems in assigning roles and responsibilities, and the role of organizational culture, and trust. They explore the uses of technology in security provision and information sharing. Given that creating security is a process, a matter of social construction and communication, both the structural (design, internal structures) and relational (interpersonal and inter-organizational relations) aspects of the networks created are considered. This is a creative, well-theorized study using interviews with key actors and organizations, and an important contribution to an area of study with increasing importance. (Peter Manning, School of Criminology and Criminal Justice,Northeastern University, USA)



Authors and Affiliations

  • School of Humanities and Social Sciences, Faculty of Arts and Education, Deakin University, Geelong, Australia

    Chad Whelan

  • School of Humanities and Social Sciences, Faculty of Arts and Education, Deakin University, Melbourne, Australia

    Adam Molnar

About the authors

Chad Whelan is Associate Professor in Criminology at Deakin University, Australia.

Adam Molnar is Lecturer in Criminology at Deakin University, Australia.

Bibliographic Information

Buy it now

Buying options

eBook USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access