Abstract
This chapter traces the key jurisdictional and technological attributes involved in constructing security for the Brisbane 2014 Group of Twenty (G20), with a particular focus on emerging dynamics when translating policy from theory to practice. First, we discuss the security overlay as a planning process that sought to allocate jurisdictions and define associated roles and responsibilities among the various security actors. We unpack this ‘three-tier’ structure and reflect on its similarities and differences with recent previous mega-events such as the Toronto 2010 G20. Second, we look at the technologies used to ‘secure’ spaces, noting how the management of technology is leveraged as a way to potentially mediate tensions and conflict. The chapter concludes by reflecting on the overall tensions between ‘event’ and ‘security’, particularly in relation to ideas around ‘look and feel’.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.