CHF59.90
Download est disponible immédiatement
This book seeks to understand the investigation and settlement of employer/employee disputes within companies. It argues that there is effectively no democratic knowledge about, or control over, corporate security, due to companies' preference for private, out-of-court settlements when faced with norm violations raised by employees. This book fills the knowledge gap by providing an overview of the corporate security sector including legal frameworks and an analysis of the role, and powers of, private investigative services, inhouse security, forensic accountants and forensic legal investigators. It draws on close observation, case studies and interviews with practitioners in and around the industry. Corporate Investigations, Corporate Justice and Public-Private Relations also looks at public/private relationships in this sector to propose policy remedies applicable to all corporate security providers, regardless of the disparate professional backgrounds and skill-sets of their staff.
Auteur
Clarissa Meerts is Assistant Professor of Criminology at the Vrije Universiteit Amsterdam, Netherlands. Her research interests primarily include corporate investigations, corporate settlements, public-private relationships, white-collar and financial crime and organised crime.
Contenu
Preface and acknowledgements1. IntroductionIntroduction1. Defining core concepts2. Some theoretical notions on private security, corporate investigations and private-public relations2.1 The over-burdened state privatisation, responsibilisation and junior partner theory2.2 The growth of mass private property multilateralisation, nodal theory, anchored pluralism and loss prevention theory2.3 An assessment of traditional private security theories2.4 Juridification the exploitation of the dark number of economic crime2.5 Recapitulation and beyond: a public-private continuum3. Methodology3.1 Interviews3.2 Observations3.3 Case studies3.4 Some methodological reflections3.4.1Internal and external validity3.4.2Internal and external reliability3.4.3Trust access and confidentiality3.4.4Getting captivated the role of the researcher Book structure