搜尋

關 於 本 書

‧強力推薦
‧內容簡介
‧作者簡介
‧譯者簡介
‧目 錄
‧讀者書評

線 上 試 閱

導讀 地球村的大草原
書摘 1
書摘 2
書摘 3
書摘 4
ILLICIT-1
ILLICIT-2
ILLICIT-3
ILLICIT-4
ILLICIT-5
ILLICIT-6
ILLICIT-7
ILLICIT-8
ILLICIT-9
ILLICIT-10
ILLICIT-11
BIBLIOGRAPHY

譯 者 作 品

解密陌生人:顛覆識人慣性,看穿表相下的真實人性。
獨角獸與牠的產地—矽谷新創公司歷險記
Deep Work深度工作力──淺薄時代,個人成功的關鍵能力
誰來拯救全球經濟?
影響力習慣:5種心態×15個習慣,從邊緣人變成最有價值的關鍵人物
父酬者—姓氏、階級與社會不流動
跟誰都能一起工作─如何搞定職場野蠻人、權謀家、白目者和大明星
「改變世界的力量&解決問題的智慧」套書:《影響力習慣》+《BCG問題解決力》
克魯曼戰殭屍:洞悉殭屍經濟的本質,揪出政經失能的本源
Deep Work深度工作力:淺薄時代,個人成功的關鍵能力【暢銷新裝版】

其他

【類別最新出版】
武士的日本史
中日關係的光和影(海外增訂版)
屠殺
和魂洋才:締造明治時代的那些人
文言津逮


誰劫走了全球經濟(BE0140)
Illicit

類別: 史地‧法律‧政治>其他
叢書系列:NEXT
作者:摩伊希斯‧奈姆
       Moises Naim
譯者:吳國卿
出版社:時報文化
出版日期:2006年09月18日
定價:320 元
售價:253 元(約79折)
開本:25開/平裝/304頁
ISBN:9571345377

已絕版

 轉 寄 給 朋 友

 發 表 書 評 

 我 要 評 等 

Share/Bookmark

線 上 試 閱

 

導讀 地球村的大草原書摘 1書摘 2書摘 3書摘 4ILLICIT-1ILLICIT-2ILLICIT-3ILLICIT-4ILLICIT-5ILLICIT-6ILLICIT-7ILLICIT-8ILLICIT-9ILLICIT-10ILLICIT-11BIBLIOGRAPHY



  ILLICIT-10

ILLICIT

Business Brigades

209 [Software police] Business Software Alliance, http://www.bsa.org; on founding of BSA, see “Amnesty in May Will Let Firms Check for Software Violations,” Business Journal, April 26, 2002, p. 7.

209 [1997 Singapore Raid] “Piracy Raid on Singapore Computer Firm, Shares Suspended,” Agence France-Presse, August 13, 1997.

209–10 [Chinese pharmaceutical manufacturers hire private investigators] Peter S. Goodman, “China’s Killer Headache,” Washington Post, August 30, 2002, p. A1.

210 [seeking whistle-blowers] “Protecting Your Business from Software Piracy and the Trouble It Brings,” Broward Daily Business Review, June 9, 2004.

211 [BSA lobbying in Asia] Bruce Einhorn, “China Learns to Say, ‘Stop, Thief!’ ” Business Week Online, February 11, 2003; Phusadee Arunmas, “Software Group Concerned about Thailand’s Intellectual Property Law,” Bangkok Post, May 23, 2003.

211 [Other industry groups] “Music Piracy: Serious, Violent, and Organised Crime,” IFPI report, January 2004; “The Pirates among Us,” CIO magazine, April 15, 2003; [MPA and IFPI in raid] “Hong Kong Court Sentences Disc Pirate Couple To 6 1/2 Years,” Consumer Electronics Daily, July 21, 2004; “BASCAP Operations Plan,” Business Action to Stop Counterfeiting and Piracy, November 9, 2004. Online at http://www.iccwbo.org/home/BASCAP/ BASCAP_Ops.pdf.; Lew Kontnik, “Counterfeits: The Cost of Combat,” Pharmaceutical Executive 23, no. 11, November 1, 2003.

212 [American Chemical Council working with DEA] Kevin G. Hall, “Cocaine War’s Neglected Front,” San Jose Mercury News, November 22, 2000, p. 11A.

Reporters in the Crossfire

213 [Sufi Mohammed Khan] “Pakistan 2000: Country Report,” Committee to Protect Journalists. Online at http://www.cpj.org/attacks00/asia00/Pakistan.html

213 [Georgy Gongadze] “Ukraine 2000: Country Report,” Committee to Protect Journalists, September 20, 2002. Online at http://www.cpj.org/attacks00/ europe00/Ukraine.html

213 [Tim Lopes] “Brazil: Police Arrest Suspect in Journalist’s Murder,” Committee to Protect Journalists. Online at http://www.cpj.org/news/2002/Brazil20sept02na.html

213 [Antonio Martinez Guttierez] Committee to Protect Journalists statement, March 27, 2001.

213–14 [Francisco Arratia; Jesus Blancornelas and Francisco Ortiz] Tim Gaynor, “Journalists under Fire in Mexico Border Drug War,” Reuters, February 14, 2005.

214 [ICIJ] International Consortium of Investigative Journalists (ICIJ), Making a Killing: The Business of War (Washington: Center for Public Integrity, 2003).

Small Battles, Large War

214–15 [Rise of the NGOs] Jessica Mathews, “Power Shift,” Foreign Affairs 76, no. 1 (January–February 1997): pp. 50–66. See also Keck and Sikkink, Activists Beyond Borders; Thomas Homer-Dixon, “The Rise of Complex Terrorism,” Foreign Policy, January–February 2002, pp. 52–62; Sebastian Mallaby, “NGOs: Fighting Poverty, Hurting the Poor,” Foreign Policy, September–October 2004, pp. 50–58.

215 [Nuns killed] [Mozambique] “Body of Brazilian Nun to Be Flown Home,” Associated Press, March 3, 2004. [Brazil] Michael Astor, “Brazilian Senate Commission Finds Wider Conspiracy in Killing of U.S. Nun,” Associated Press, March 30, 2005.

215–16 [Proselytizing] Steve Hargreaves, “Cross Purposes: Federally Funded Missionaries Threaten a Southeast Asian Culture,” Village Voice, January 29–February 4, 2003.

216 [U.S. evangelicals and feminists’ coalition against sex trade] Nina Shapiro, “The New Abolitionists,” Seattle Weekly, August 25–31, 2004; Jennifer Block, “Sex Trafficking: Why the Faith Trade Is Interested in the Sex Trade,” Conscience, summer–autumn 2004; “Odd Coalition Unites on Human Trafficking,” Associated Press, September 15, 2004.

CHAPTER 11: WHY WE ARE LOSING

Governments Are Failing

221 [Thailand] Anthony Davis, “Thai Drugs Smuggling Networks Reform,” Jane’s Intelligence Review 16, no. 12 (December 2004): p. 22.

221–22 [Mexico] Ginger Thompson and James C. McKinley Jr., “Mexico’s Drug Cartels Wage Fierce Battle for Their Turf,” New York Times, January 14, 2005.

222 [Truman/Reuter] Reuter and Truman, Chasing Dirty Money (Washington, DC: Institute for International Economics, 2004), p. 192; author interview with Ted Truman, Washington, February 7, 2005.

The Latest, Greatest Episode

222–23 [Salt trade] Mark Kurlansky, Salt: A World History (New York: Penguin, 2003).

The Network Transformation

224–26 [Networks] Phil Williams, “The Nature of Drug Trafficking Networks,” Current History, April 1998, pp. 154–59; Peter Klerks, “The Network Paradigm Applied To Criminal Organisations: Theoretical Nitpicking or a Relevant Doc-trine for Investigators? Recent Developments in the Netherlands,” Connections 24, no. 3 (2001): pp. 53–65; Kathleen M. Carley, Ju-Sung Lee, David Krackhardt, “Destabilizing Networks,” Connections 24, no. 3 (2001): pp. 79–92; Barry Wellman, “The Rise (and Possible Fall) of Networked Individualism,” Connections 24, no. 3 (2001): pp. 30–32; Gerben Bruinsma and Wim Bernasco, “Criminal Groups and Transnational Illegal Markets: A More Detailed Examination on the Basis of Social Network Theory,” Crime, Law and Social Change, no. 41, 2004, pp. 79–94; Jorg Raab and H. Brinton Milward, “Dark Networks as Problems,” Journal of Public Administration Research and Theory 13, no. 4 (2003): pp. 413–39.

226–28 [Networks] John Arquilla and David Ronfeld, eds., Networks and Netwars: The Future of Terror Crime and Militancy (Santa Monica, CA: Rand, 2001), especially Phil Williams, “Transnational Criminal Networks,” pp. 61ff, and also James Rauch and Alessandra Casella, eds., Networks and Markets (New York: Sage Publications, 2001).

An Unfair Fight?

231 National Commission on Terrorist Attacks upon the United States, The 9/11 Commission Report (New York: Norton, 2004). On bureaucracy, see discussion in chapter 9 above.

CHAPTER 12: WHAT TO DO?

Enhance, Develop, and Deploy Technology

243–44 [RFIDs, tags] Susan B. Schor, “RFID Tags May Not Reduce Drug Counterfeiting,” CRM News, online at http://www.crmbuyer.com/story/38179.html, November 15, 2004; Eric Chabrow, “Homeland Security to Test RFID Tags at U.S. Borders,” Security Pipeline, January 25, 2005; John Blau, “Prepare for the One-Cent RFID Tag,” Techworld, January 14, 2005; Stephen D. Nightingale, “State-of-Art Operations: New Technologies for Food Traceability, Package, and Product Markers,” Food Safety Magazine, August–September 2004; “Mobile Technologies Set to Revolutionise Manufacturing and Retail Sectors,” Tech-news, May 2004, online at http://securitysa.com/news.asp?pklNewsID =14249&pklIssueID =457&pklCategoryID=13

244 [Biometrics] Shane Harris, “Biometrics Need a Measure of Security,” GovExec.com, July 15, 2003; Greta Wodele, “Delays in Deploying Biometrics Aggravate Key Lawmakers,” GovExec.com, May 19, 2004; David McGlinchey, “Border Chief Touts Biometrics as Security Tool,” GovExec.com, September 23, 2004; “EU Biometric IDs on Track,” ComputerWeekly.com, December 3, 2004; Kevin Poulsen, “EU goes on Biometric LSD Trip,” The Register (UK), February 3, 2005.

244 [Backscatter portal, puffers, scanners] Ryan Singel, “New Screening Technology Is Nigh,” Wired News, online at www.wired.com, October 19, 2004; Matthew L. Wald, “New High-Tech Passports Raise Snooping Concerns,” New York Times, November 26, 2004; “The Evolution of the Photofit,” The Economist Technology Quarterly, December 4, 2004.

244–45 [Surveillance] See Robert O’Harrow Jr., No Place to Hide: Behind the Scenes of Our Emerging Surveillance Society (New York: Free Press, 2005); Patrick Radden Keefe, Chatter: Dispatches from the Secret World of Global Eavesdropping (New York: Random House, 2005); Jason Ackleson “Border Security Technologies: Local and Regional Implications,” Review of Policy Research 22, no. 2 (2005): p. 137ff. See also Matthew Brzezinski, Fortress America: On the Frontlines of Homeland Security—An Inside Look at the Coming Surveillance State (New York: Bantam Books, 2004).

245 [Anti–money laundering detection software] Jessica Pallay, “Brokers Will Spend Big on Anti–Money Laundering,” Wall Street & Technology Online, www.wallstreetandtech.com, May 1, 2003; Peggy Bresnick Kendler, “Executive Roundtable: Combating Money-Laundering,” Security Pipeline, January 30, 2005.

245 [Subcutaneous GPS chips in Brazil] David Rowan, “The Personal Microchip Is Being Touted as the Next-Generation Identity Card,” The Times (London), February 27, 2002.

245–46 [Anticocaine vaccine] David Finn, “Vaccine Aids Cocaine Addicts,” Financial Times, June 15, 2004.

246–47 [Debate on technology and rights] “Move Over, Big Brother,” The Economist Technology Quarterly, December 4, 2004; Amitai Etzioni, The Limits of Privacy (New York: Basic Books, 2000).

Defragment Government

247 [FBI computer problems] Dan Eggen, “Computer Woes Hinder FBI’s Work, Report Says,” Washington Post, February 4, 2005. The U.S. senator quoted is Patrick J. Leahy (D-VT).

248 [Bureaucratic problems at U.S. Department of Homeland Security] John Mintz, “Infighting Cited at Homeland Security: Squabbles Blamed for Reducing Effectiveness,” Washington Post, February 2, 2005. On the difficulties in establishing the Department of Homeland Security, see chapter 9.

248 [Waste and inefficiency in U.S. agencies in charge of port and airport security] Clark Kent Ervin, “Mission: Difficult, but Not Impossible,” New York Times, December 27, 2004; Editorial: “Follow the Port Security Money,” New York Times, February 28, 2005.

Give Government Goals It Can Achieve

251 [Decriminalization of soft drugs] Robert J. Macoun and Peter Reuter, Drug War Heresies: Learning from Other Vices, Times, and Places (New York: Cambdrige University Press, 2001); Ethan Nadelmann, “An End to Marijuana Prohibition,” National Review, September 9, 2004, p. 7.

253 [On better policies to manage illegal immigration] Gary Becker, “The Wise Way to Stem Illegal Immigration,” Business Week, April 26, 2004; Demetrios Papademetriou, “Responding To Clandestine Migration: Economic Migrants? Trends in Global Migration” (Toronto: Caledon Institute of Social Policy, June 2000); Demetrios Papademetriou, “The Shifting Expectations of Free Trade and Migration,” NAFTA’s Promise and Reality: Lessons from Mexico for the Hemisphere (Washington, DC: Carnegie Endowment for International Peace, 2003).

253–54 [Sweden’s approach to prostitution] “Swedish Message,” The Economist, September 4, 2004.

254 [Tom Ridge on complexity of task] Tom Ridge, “Global Security Depends on Joint Action,” Financial Times, January 13, 2005.

Political Will

258 [U.S. senator on legalizing drugs] Author interview, Washington, DC, August 28, 2004.