Cover Image
市場調查報告書

國防安全保障、公共安全的中東、非洲各國市場

Global Homeland Security & Public Safety Market to 2022: Focus on Middle East & Africa

出版商 Homeland Security Research Corp. 商品編碼 336599
出版日期 內容資訊 英文 732 Pages; 291 Tables & Figures
商品交期: 最快1-2個工作天內
價格
Back to Top
國防安全保障、公共安全的中東、非洲各國市場 Global Homeland Security & Public Safety Market to 2022: Focus on Middle East & Africa
出版日期: 2015年08月04日 內容資訊: 英文 732 Pages; 291 Tables & Figures
簡介

中東、非洲各國的地緣政治學的環境迎接著巨大的變革時期。受到「阿拉伯的春天」,及支援伊朗的什葉派和遜尼派的糾紛,利比亞、伊拉克崩潰的政權和來自伊朗的現代武器的流出的影響,該地區恐怖行動活動活躍化,各國政府受到來自ISIS和什葉派組織、其他恐怖行動組織的恐怖行動攻擊威脅。近來的糾紛 (葉門、伊拉克、敘利亞、奈及利亞、以色列 (加沙地帶)、埃及 (西奈半島)) ,對於有兵力優勢的正規軍,叛亂軍方面 (蓋達、塔利班、ISIS、哈馬斯、真主黨、「自由敘利亞」運動等) 組合了自殺式炸彈恐怖攻擊、公開處刑、電腦空間、大眾媒體的「行銷」、地下武器等,以單純「有效的」策略對抗。

本報告提供中東、非洲各國的國防安全保障 (HLS) 及公共安全 (PS) 相關市場相關分析、市場整體結構和趨勢預測、經營模式、市場促進、阻礙因素等調查、考察、各國的詳細市場結構、趨勢,及各部門、各產品的詳細趨勢、市場機會等資訊彙整,為您概述為以下內容。

第1卷

第1章 摘要整理

市場背景情況與分析

第2章 市場背景情況

第3章 國防安全保障、公共安全產業

  • 市場趨勢的變化與預測 (總計22年份)
  • 景氣低迷的市場預測的影響
  • 國防安全保障、公共安全產業的全球化
  • 商務、產業活動的分類
  • 國防安全保障、公共安全的市場、對產業的影響要素
  • 供應商、政府間的關係性
  • 供應商、客戶間的關係性
  • 市場進入障礙
  • 產業的供給面、需求面的分析

第4章 國防安全保障、公共安全產業:經營模式與策略

  • 景氣趨勢的變化
  • 市場階層
  • 進入市場的方法
  • 打入市場策略
  • 價格彈性
  • 企業合併、收購 (M&A)

第5章 國防安全保障、公共安全市場分析

  • 市場實現因素與推動因素
  • 市場阻礙因素
  • 市場SWOT分析
  • 競爭分析

市場

第6章 伊拉克的國防安全保障、公共安全市場

  • 地緣政治學性的背景情況
  • 國內的恐怖行動活動、犯罪、自然災害
  • 國防安全保障、公共安全的管轄工作崗位
  • 國防安全保障、公共安全市場 (今後9年份)
    • 市場規模:變化與預測
    • 市場動態
    • 各資金來源的市場規模

第7章 以色列的國防安全保障、公共安全市場

第8章 科威特的國防安全保障、公共安全市場

第9章 奈及利亞的國防安全保障、公共安全市場

第10章 阿曼的國防安全保障、公共安全市場

第11章 沙烏地阿拉伯的國防安全保障、公共安全市場

第12章 土耳其的國防安全保障、公共安全市場

第13章 阿拉伯聯合大公國 (UAE) 的國防安全保障、公共安全市場

第2卷

附錄A:各產業市場背景情況

第1章 航空安全市場

  • 要點
  • 主要的結論
  • 市場背景情況
  • 市場分析
    • 推動因素
    • 阻礙因素
    • 商務機會與課題
    • SWOT分析
    • 競爭分析

第2章 國境安全市場

第3章 反恐、犯罪資訊市場

第4章 重要基礎設施安全市場

第5章 法律執行、警察現代化、初期應變人員市場

第6章 海上安全市場

第7章 地上交通機關安全市場

第8章 石油天然氣產業安全市場

第9章 公共活動安全市場

第10章 民間部門安全市場

第11章 安全城市市場

  • 安全城市 vs. 智慧城市
  • 分析的要點
  • SWOT分析
  • 競爭分析
  • 推動市場要素
  • 市場阻礙因素

第12章 駐外機構安全市場

第13章 自然災害緩和、復興用設備、系統市場

第3卷

附錄B:技術市場背景情況

第1章 巨量資料、內部安全市場

  • 市場、技術的背景情況
  • 巨量資料、安全技術
  • 國防安全保障技術及內部安全技術的應用領域
  • SWOT分析
  • 推動市場要素
  • 市場阻礙因素

第2章 生物武器、感染疾病偵測技術的市場

第3章 生物辨識 (生物識別) 市場

第4章 C2/C4ISR系統市場

第5章 化學物質、危險物品 (Hazmat)、核物質市場

第6章 雲端基礎、安全市場

第7章 通信設備、設備市場

第8章 反IED (簡易爆炸裝置) 技術市場

第9章 網路安全市場

第10章 CBRN (化學、生物、放射性物質、核子)、危險物質去污技術的市場

第11章 電子圍欄市場

第12章 爆炸物痕跡檢測 (ETD) 市場

第13章 侵入探測系統市場

第14章 緊急警報市場

第15章 金屬探測器市場

第16章 天災、人禍早期警戒、救助、修複用裝備市場

第17章 非殺傷武器市場

第18章 個人 (防彈、CBRNE) 防護衣市場

第19章 國防安全保障、公共安全用RFID (無線IC標籤) 市場

第20章 遠距型爆炸物、武器探測的市場

第21章 斷層攝影式爆炸物偵測系統 (EDS) 市場

第22章 車輛、貨櫃檢驗用入口網站市場

第23章 影片監測系統市場

第24章 影片分析系統市場

第25章 X光掃描爆炸物檢驗市場

分析方法、免責聲明、著作權

第26章 本報告的分析方法

  • 分析結構
  • 前提條件
  • 分析方法

第27章 免責聲明、著作權

圖表一覽

目錄

The Middle East and Africa geo-politics are going through major changes. Following the “Arab Spring”, the Iranian backed Shia - Sunnie conflict and the proliferation of modern terror weapons, acquired from Iran and failed regimes in Libya and Iraq, the ME&A countries are under a determined attack. The region's regimes very survival is threatened by a deadly combination of ISIS, Iranian-backed Shia terrorism and other ME&A terror organizations.

The 2014 & 2020 Middle East & Africa HLS & Public Safety Market [$B]

In recent ME&A conflicts (e.g., in Yemen, Iraq, Syria, Nigeria, Israel-Gaza, Egypt-Sinai), wherever regional governments' armed forces and internal security agencies had an overwhelming combat power, their adversaries (e.g., Al-Qaeda, Taliban, ISIS, Hamas, Hezbollah, ‘Free Syria' movements) resorted to simple and “effective” tactics, based on the use of suicide attacks, on-camera executions, cyberspace ,mass media “marketing” and subterranean warfare.

Sunni vs. Shia dominated Countries in the ME&A

The challenge posed by these insurgency tactics is a key factor to the Middle East and Africa security market growth where the region's governments take dramatic measures. These measures include the following:

  • 1. An “Invest Whatever It Take” policy to defeat foreign and homegrown insurgency to secure the regime (this is especially true for the GCC government's use of their petrodollars)
  • 2. Procurement of state of the art Intelligence systems such as UAVs, SIGINT & C-5ISR systems & services
  • 3. Support and fund foreign allies (e.g., Saudi funding of Egypt El-Sisi regime)
  • 4. Enlarge and equip special forces

According to the report, the Middle East & Africa market growth is boosted by the following drivers:

  • 1. The recent wave of ISIS and other insurgency across the Middle East and Africa
  • 2. The region's accelerated security forces and security agencies equipment procurement
  • 3. Premium ME&A prices of new equipment and services
  • 4. The high cost of foreign security services and security technology professionals
  • 5. Replacement and upgrades of outdated systems
  • 6. Growing aftersale revenues
  • 7. Major infrastructure expansion projects in the GCC States
  • 8. Cyber Security
  • 9. Police modernization
  • 10. New security related ICT technologies.
  • 11. Rapid growth of the region aviation sector
  • 12. Replacement and upgrades of outdated security-related systems

These lead the Middle East & Africa 2014 HLS & PS market of $ 33.5 billion to grow to $70.8 billion by 2022.

The report provides a wealth of information and presents a clear analysis of where the ME&A market is heading. The report is based on diverse aspects and understanding of the market.

The report examines each dollar spent in the market via 2 orthogonal money trails:

1. By 8 National Markets:

  • 1. Iraq
  • 2. Israel
  • 3. Kuwait
  • 4. Nigeria
  • 5. Oman
  • 6. Saudi Arabia
  • 7. Turkey
  • 8. U.A.E.

2. By 2 Funding Sources:

  • Government
  • Private sector

The Global Homeland Security & Public Safety Market - to 2022. Focus on Middle East & Africa report is a resource for executives with interests in the industry. It has been explicitly customized for decision makers to identify business opportunities, developing technologies, market trends and risks, as well as to benchmark business plans.

Questions answered in this 3 volume 732 page report include:

  • What will the Middle East & Africa national markets size be in 2015-2022?
  • What are the main Homeland Security & Public Safety technology trends?
  • Where and what are the market opportunities?
  • What are the HLS & Public Safety market drivers and inhibitors?
  • What are the challenges to the HLS & Public Safety market?

The Global Homeland Security & Public Safety Market - to 2022. Focus on Middle East & Africa report presents in 732 pages, 117 tables and 174 figures, analysis of current and pipeline technologies and vertical submarkets. The report is granulated into 2 funding source submarkets for each country, presents for each submarket 2011-2014 data, analyses and projects the 2015-2022 market.

It presents the HLS & PS:

  • Business opportunities and challenges
  • SWOT analysis
  • Market analysis (for each country and submarket)
  • National market backgrounds
  • Current and pipeline Homeland Security & Public Safety technologies in fields of:
    • 1. Security related Big Data
    • 2. Bio-Agents & Infectious Disease Detection
    • 3. Biometrics
    • 4. Security related C2/C4ISR Systems
    • 5. Chemical, Hazmat & Nuclear Detection
    • 6. Cloud Based Security
    • 7. Communication Systems & Devices
    • 8. Counter-IED Technologies
    • 9. Cybersecurity
    • 10. Decontamination of CBRN & Hazmat Incidents
    • 11. Electronic Fencing
    • 12. Explosives Trace Detection (ETD)
    • 13. Intrusion Detection Systems
    • 14. Mass Emergency Notification Systems
    • 15. Metal Detectors
    • 16. Natural & Manmade Disaster Early Warning, Rescue & Recovery Equipment
    • 17. Non-Lethal Weapons
    • 18. Personal (Ballistic & CBRNE) Protective Gear
    • 19. Security Related RFID
    • 20. Standoff Explosives & Weapon Detection
    • 21. Tomographic Explosive Detection Systems (EDS)
    • 22. Vehicle & Container Screening Portals
    • 23. Video Surveillance
    • 24. Video Analytics
    • 25. X-Ray Screening
  • Vertical Homeland Security & Public Safety sub-markets background:
    • 1. Aviation Security
    • 2. CBRN & Hazmat Security
    • 3. Land Border Security
    • 4. Counter-Terror & Counter-Crime Intelligence
    • 5. Critical Infrastructure Security
    • 6. Law Enforcement, Police Modernization & 1st Responders
    • 7. Maritime Security
    • 8. Land Transportation Security
    • 9. Oil-Gas Industry Security
    • 10. Public Events Security
    • 11. Private Sector Security
    • 12. Safe Cities
    • 13. Diplomatic Corp Security
    • 14. Natural Disasters Mitigation & Relief Equipment & Systems
    • 15. Other Vertical HLS & Public Safety Markets

Table of Contents

Volume - 1

1. Executive Summary

  • 1.1. Key Findings and Conclusions
  • 1.2. Middle East & Africa HLS & Public Safety Market

MARKET BACKGROUND & ANALYSIS

2. Market Background

  • 2.1. Geopolitical Outlook 2022
  • 2.2. Terror Threats Outlook

3. The Homeland Security & Public Safety Industry

  • 3.1. The Market Timeline - 2001-2022
  • 3.2. Economic Turmoil Effects on the Market Outlook
  • 3.3. The Globalization of the Homeland Security & Public Safety Business
  • 3.4. Classification of the Industry Business and Industrial Activities
  • 3.5. Forces that Shape the Public Safety and Homeland Security Industry & Markets
  • 3.6. Vendor - Government Relationship
  • 3.7. Vendor - Client Relationship
  • 3.8. Barriers to Market Entry
  • 3.9. The Industry Supply-Side & Demand-Side Analysis

4. Homeland Security & Public Safety Industry: Business Models & Strategies

  • 4.1. Variable Economic Conditions
  • 4.2. Market Tiers
  • 4.3. Defense Primes & Mega Corporations' Inroads into the Market
  • 4.4. Entry Strategies toward the Homeland Security & Public Safety Arena
  • 4.5. Homeland Security & Public Safety Price Elasticity
  • 4.6. Homeland Security & Public Safety Industry: Mergers and Acquisitions (M&A)

5. Homeland Security & Public Safety Market Analysis

  • 5.1. Homeland Security & Public Safety Market Enablers & Drivers
  • 5.2. Homeland Security & Public Safety Market Inhibitors
  • 5.3. Homeland Security & Public Safety Market SWOT Analysis
    • 5.3.1. Strengths
    • 5.3.2. Weaknesses
    • 5.3.3. Opportunities
    • 5.3.4. Threats
  • 5.4. Homeland Security & Public Safety Market Competitive Analysis

MARKET

6. Iraq Homeland Security & Public Safety Market

  • 6.1. Geopolitical Background
    • 6.1.1. Facts & Figures
    • 6.1.2. Economy
    • 6.1.3. Iraq Defense Forces
  • 6.2. Terror, Crime & Natural Disasters in Iraq
    • 6.2.1. Counterterrorism Efforts
    • 6.2.2. 2012 Terrorist Incidents
    • 6.2.3. Legislation & Law Enforcement
    • 6.2.4. Natural Disasters
  • 6.3. Iraq HLS & Public Safety Market - 2014-2022
    • 6.3.1. Market Size - Assessment and Forecast - 2011-2022
    • 6.3.2. Market Dynamics - 2011-2022
    • 6.3.3. Market by Funding Source - 2011-2022

7. Israel Homeland Security & Public Safety Market

  • 7.1. Geopolitical Background
    • 7.1.1. Facts & Figures
    • 7.1.2. Israel Economy
    • 7.1.3. Israel Security Market
    • 7.1.4. Israel Homeland Security Industry
    • 7.1.5. Israel Defense Forces
  • 7.2. Terror, Crime & Natural Disasters in Israel
    • 7.2.1. Continued Terrorist Threats
    • 7.2.2. 2012 Terrorist Incidents
    • 7.2.3. Legislation & Law Enforcement
    • 7.2.4. Natural Disasters
  • 7.3. Israel HLS & Public Safety Market - 2014-2022
    • 7.3.1. Market Size - Assessment and Forecast - 2011-2022
    • 7.3.2. Market Dynamics - 2011-2022
    • 7.3.3. Market by Funding Source - 2011-2022

8. Kuwait Homeland Security & Public Safety Market

  • 8.1. Geopolitical Background
    • 8.1.1. Facts & Figures
    • 8.1.2. Economy
  • 8.2. Security Market
    • 8.2.1. Kuwait Defense Forces
  • 8.3. Terror, Crime & Natural Disasters in Kuwait
    • 8.3.1. Terrorism in Kuwait
    • 8.3.2. Crime in Kuwait
    • 8.3.3. Natural Disasters in Kuwait
    • 8.3.4. Legislation & Law Enforcement
  • 8.4. Kuwait HLS & Public Safety Agencies
  • 8.5. Kuwait HLS & Public Safety Market - 2014-2022
    • 8.5.1. Market Size - Assessment and Forecast - 2011-2022
    • 8.5.2. Market Dynamics - 2011-2022
    • 8.5.3. Market by Funding Source - 2011-2022

9. Nigeria Homeland Security & Public Safety Market

  • 9.1. Geopolitical Background
    • 9.1.1. Facts & Figures
    • 9.1.2. Economy
    • 9.1.3. Nigeria Defense Forces
    • 9.1.4. Nigeria Security Market
    • 9.1.5. Nigeria Security Companies
  • 9.2. Terror, Crime & Natural Disasters in Nigeria
    • 9.2.1. Terror
    • 9.2.2. 2012 Terrorist Incidents
    • 9.2.3. Natural Disasters in Nigeria
    • 9.2.4. Legislation & Law Enforcement
  • 9.3. Nigeria HLS & Public Safety Agencies
  • 9.4. Nigeria HLS & Public Safety Market - 2014-2022
    • 9.4.1. Market Size - Assessment and Forecast - 2011-2022
    • 9.4.2. Market Dynamics - 2011-2022
    • 9.4.3. Market by Funding Source - 2011-2022

10. Oman Homeland Security & Public Safety Market

  • 10.1. Geopolitical Background
    • 10.1.1. Facts & Figures
    • 10.1.2. Economy
    • 10.1.3. Oman Defense Forces
  • 10.2. Terror, Crime & Natural Disasters in Oman
    • 10.2.1. Terror in Oman
    • 10.2.2. Natural Disasters in Oman
    • 10.2.3. Legislation & Law Enforcement in Oman
  • 10.3. Oman HLS & Public Safety Agencies
  • 10.4. Oman HLS & Public Safety Market - 2014-2022
    • 10.4.1. Market Size - Assessment and Forecast - 2011-2022
    • 10.4.2. Market Dynamics - 2011-2022
    • 10.4.3. Market by Funding Source - 2011-2022

11. Saudi Arabia Homeland Security & Public Safety Market

  • 11.1. Geopolitical Background
    • 11.1.1. Facts & Figures
    • 11.1.2. Economy
    • 11.1.3 . Saudi Arabia Defense Forces
  • 11.2. Terror, Crime & Natural Disasters in Saudi Arabia
    • 11.2.1. Terror in Saudi Arabia
    • 11.2.2. 2012 Terrorist Incidents
    • 11.2.3. Natural Disasters in Saudi Arabia
    • 11.2.4. Legislation & Law Enforcement
  • 11.3. Saudi Arabia HLS & Public Safety Agencies
    • 11.3.1. Ministry of Interior
    • 11.3.2. Saudi National Guard
    • 11.3.3. Paramilitary Security Forces
  • 11.4. Saudi Intelligence Community
    • 11.4.1. General Intelligence Presidency
    • 11.4.2. Saudi Civil Intelligence
  • 11.5. Saudi Arabia HLS & Public Safety Market - 2014-2022
    • 11.5.1. Market Size - Assessment and Forecast - 2011-2022
    • 11.5.2. Market Dynamics - 2011-2022
    • 11.5.3. Market by Funding Source - 2011-2022

12. Turkey Homeland Security & Public Safety Market

  • 12.1. Geopolitical Background
    • 12.1.1. Facts & Figures
    • 12.1.2. Economy
    • 12.1.3. Turkey's Security Market
    • 12.1.4. Turkey's Security Industry
    • 12.1.5. Turkey Defense Forces
  • 12.2. Terror, Crime & Natural Disasters in Turkey
    • 12.2.1. Terrorist Threats
    • 12.2.2. 2012 Terrorist Incidents
    • 12.2.3. Legislation & Law Enforcement
    • 12.2.4. Natural Disasters in Turkey
  • 12.3. Turkey HLS & Public Safety Agencies
  • 12.4. Turkey HLS & Public Safety Market - 2014-2022
    • 12.4.1. Market Size - Assessment and Forecast - 2011-2022
    • 12.4.2. Market Dynamics - 2011-2022
    • 12.4.3. Market by Funding Source - 2011-2022

13. United Arab Emirates Homeland Security & Public Safety Market

  • 13.1. Geopolitical Background
    • 13.1.1. Facts & Figures
    • 13.1.2. Economy
    • 13.1.3. UAE Security Market
    • 13.1.4. U.A.E. Defense Forces
  • 13.2. Terror, Crime & Natural Disasters in U.A.E.
    • 13.2.1. Counterterrorism Capacity
    • 13.2.2. Legislation & Law Enforcement
    • 13.2.3. Natural Disasters in United Arab Emirates
  • 13.3. U.A.E. HLS & Public Safety Agencies
  • 13.4. U.A.E. HLS & Public Safety Market - 2014-2022
    • 13.4.1. Market Size - Assessment and Forecast - 2011-2022
    • 13.4.2. Market Dynamics - 2011-2022
    • 13.4.3. Market by Funding Source - 2011-2022

Volume - 2

APPENDIX A: VERTICAL MARKETS BACKGROUND

1. Aviation Security Market

  • 1.1. Major Findings
  • 1.2. Major Conclusions
  • 1.3. Market Background
    • 1.3.1. Aviation Security Terror Threats
    • 1.3.2. Aviation Security Tactics
    • 1.3.3. Aviation Security Screening Technologies
      • 1.3.3.1. X-Ray Screening
      • 1.3.3.2. Explosive Detection Systems (EDS)
      • 1.3.3.3. Explosives Trace Detection (ETD)
      • 1.3.3.4. Biological, Radioactive and Nuclear Detection System
      • 1.3.3.5. Millimeter Wave Imaging Systems
      • 1.3.3.6. Canine Screening
    • 1.3.4. Aviation Security Market Demand Side
      • 1.3.4.1. Airports
      • 1.3.4.2. Airlines
      • 1.3.4.3. Freight Forwarders
      • 1.3.4.4. Customs
      • 1.3.4.5 . Security Service Providers
    • 1.3.5. Aviation Passenger Screening Technologies Outlook: 2014-2022
    • 1.3.6. Checked Baggage Screening Market
    • 1.3.7. Counter-MANPAD Market
    • 1.3.8. Air Cargo Screening Technologies & Markets
      • 1.3.8.1. Air Cargo Outlook
      • 1.3.8.2. Air Cargo Related Security Risks
      • 1.3.8.3. Air-Cargo Supply Chain Security
    • 1.3.9. Airport Perimeter Security Technologies & Markets
  • 1.4. Aviation Security Market Analysis
    • 1.4.1. Aviation Security Market Drivers
    • 1.4.2. Aviation Security Market Inhibitors
    • 1.4.3. Aviation Security Market Business Opportunities & Challenges
    • 1.4.4. Aviation Security Market SWOT Analysis
    • 1.4.5. Aviation Security Market Competitive Analysis

2. Land Border Security Market

  • 2.1. Major Findings
  • 2.2. Major Conclusions
  • 2.3. Market Background
  • 2.4. Global Land Border Security Market Analysis
    • 2.4.1. Land Border Security Market Drivers
    • 2.4.2. Land Border Security Market Inhibitors
    • 2.4.3. Land Border Security Market Business Opportunities & Challenges
    • 2.4.4. Land Border Security Market SWOT Analysis
    • 2.4.5. Land Border Security Market Competitive Analysis

3. Counter-Terror & Crime Intelligence Market

  • 3.1. Major Findings
  • 3.2. Major Conclusions
  • 3.3. Market Background
  • 3.4. Global Counter-Terror & Crime Intelligence Market Analysis
    • 3.4.1. Counter-Terror & Crime Intelligence Market Drivers
    • 3.4.2. Counter-Terror & Crime Intelligence Market Inhibitors
    • 3.4.3. Terror & Crime Intelligence Business Opportunities & Challenges
    • 3.4.4. Counter Terror & Crime Intelligence Market SWOT Analysis
    • 3.4.5. Counter Terror & Crime Intelligence Market Competitive Analysis

4. Critical Infrastructure Security Market

  • 4.1. Major Findings
  • 4.2. Market Background
    • 4.2.1. Critical Infrastructure Security: Threats
    • 4.2.2. Critical Infrastructure Security Tactics
    • 4.2.3. Critical Infrastructure Vulnerabilities
    • 4.2.4. Planning of Infrastructure Security
    • 4.2.5. Critical Infrastructure Strategy Outlook
    • 4.2.6. Information Sharing with the Private Sector
    • 4.2.7. Food and Agro-Terror Market Outlook
    • 4.2.8. Agro-Terror Mitigation Market Outlook
  • 4.3. Critical Infrastructure Security Market Analysis
    • 4.3.1. Critical Infrastructure Security Market Drivers
    • 4.3.2. Critical Infrastructure Security Market Inhibitors
    • 4.3.3. Critical Infrastructure Security Market SWOT Analysis
    • 4.3.4. Critical Infrastructure Security Market Competitive Analysis

5. Law Enforcement, Police Modernization & 1st Responder Market

  • 5.1. Law Enforcement, Police Modernization & 1st Responders: Market Background
    • 5.1.1. Law Enforcement Agencies and Police Modernization Funding
    • 5.1.2. Law Enforcement, Police Modernization & 1st Responder Business Opportunities
  • 5.2. Law Enforcement, Police Modernization & 1st Responder Market: SWOT Analysis
    • 5.2.1. Strengths
    • 5.2.2. Weaknesses
    • 5.2.3. Opportunities
    • 5.2.4. Threats
  • 5.3. Law Enforcement, Police Modernization & 1st Responder Market: Competitive Analysis
  • 5.4. Market Drivers
  • 5.5. Market Inhibitors

6. Maritime Security Market

  • 6.1. Major Findings
  • 6.2. Major Conclusions
  • 6.3. Market Background
    • 6.3.1. Maritime Security Infrastructure
    • 6.3.2. Port Critical Infrastructure Operations
  • 6.4. Maritime Security Market Analysis
    • 6.4.1. Maritime Security Market Drivers
    • 6.4.2. Maritime Security Market Inhibitors
    • 6.4.3. Maritime Security Market Business Opportunities & Challenges
    • 6.4.4. Maritime Security Market SWOT Analysis

7. Land Transportation Security Market

  • 7.1. Land Transportation Security: Market Background
    • 7.1.1. Mass transit security
    • 7.1.2. Land Transportation Security Market: Business Opportunities & Challenges
  • 7.2. The Land Transportation Security Industry SWOT Analysis
    • 7.2.1. Strengths
    • 7.2.2. Weaknesses
    • 7.2.3. Opportunities
    • 7.2.4. Threats
  • 7.3. Land Transportation Security Market: Competitive Analysis
  • 7.4. Market Drivers
  • 7.5. Market Inhibitors

8. Oil-Gas Industry Security Market

  • 8.1. Oil-Gas Industry Security: Market Background
  • 8.2. Threats to the Oil-Gas Industry Infrastructure
  • 8.3. The Oil-Gas Infrastructure Security Industry: SWOT Analysis
    • 8.3.1. Strengths
    • 8.3.2. Weaknesses
    • 8.3.3. Opportunities
    • 8.3.4. Threats
  • 8.4. Oil-Gas Industry Security Market: Competitive Analysis
  • 8.5. Market Drivers
  • 8.6. Market Inhibitors

9. Public Events Security Market

  • 9.1. Public Event Security Responsibilities
    • 9.1.1. Pre-Event Planning
    • 9.1.2. During the Event
    • 9.1.3. After the Event
  • 9.2. Public Events Security: Authorities
    • 9.2.1. Public Events Security: Responsible Bodies
    • 9.2.2. Public Events Security: Intelligence Market Background
    • 9.2.3. Public Events Security: The Private Sector Market Background
    • 9.2.4. Communication Interoperability Market Background
    • 9.2.5. Perimeter Security Market Background
    • 9.2.6. Public Events Infrastructure Security Market
    • 9.2.7. Public Events Emergency Services Market
    • 9.2.8. Public Events WMD and Hazmat Detection and Response Market Background
    • 9.2.9. Public Events Transportation Security Market Background
    • 9.2.10. Public Events Security Market: Business Opportunities & Challenges
  • 9.3. Public Events Security Market: SWOT Analysis
    • 9.3.1. Strengths
    • 9.3.2. Weaknesses
    • 9.3.3. Opportunities
    • 9.3.4. Threats
  • 9.4. Public Events Security Market: Competitive Analysis
  • 9.5. Market Drivers
  • 9.6. Market Inhibitors

10. Private Sector Security Market

  • 10.1. Major Findings
  • 10.2. Major Conclusions
  • 10.3. Market Background
    • 10.3.1. Commercial & Industrial Security Systems Business Opportunities & Challenges
  • 10.4. The Private Sector Security Market SWOT Analysis
    • 10.4.1. Strengths
    • 10.4.2. Weaknesses
    • 10.4.3. Opportunities
    • 10.4.4. Threats
  • 10.5. Private Sector Security Market: Competitive Analysis
  • 10.6. Market Drivers
  • 10.7. Market Inhibitors

11. Safe Cities Market

  • 11.1. Safe City vs. Smart City
    • 11.1.1. Smart Cities
    • 11.1.2. Safe Cities
    • 11.1.3. Safe City Surveillance Systems market
    • 11.1.4. Safe City Disaster Mitigation Process
    • 11.1.5. Safe City Architecture
    • 11.1.6. Safe City Event Awareness Process
    • 11.1.7. Safe City Planning
    • 11.1.8. Safe City Cost Allocation
    • 11.1.9. Safe City Communication Networks
  • 11.2. Major Findings
    • 11.2.1. Safe Cities Business Opportunities
  • 11.3. Safe Cities Market: SWOT Analysis
    • 11.3.1. Strengths
    • 11.3.2. Weaknesses
    • 11.3.3. Opportunities
    • 11.3.4. Threats
  • 11.4. Safe Cities Market: Competitive Analysis
  • 11.5. Market Drivers
  • 11.6. Market Inhibitors

12. Diplomatic Corp Security Market

  • 12.1. Market Background
    • 12.1.1. Personal Protection
    • 12.1.2. Protection of Facilities:
    • 12.1.3. Diplomatic Corp Security Market: Business Opportunities
  • 12.2. The Diplomatic Facilities Security Industry SWOT Analysis
    • 12.2.1. Strengths
    • 12.2.2. Weaknesses
    • 12.2.3. Opportunities
    • 12.2.4. Threats
  • 12.3. Diplomatic Corp Security Market: Competitive Analysis
  • 12.4. Market Drivers
  • 12.5. Market Inhibitors

13. Natural Disasters Mitigation & Relief Equipment & Systems Market

  • 13.1. Natural Disasters Mitigation & Relief Equipment & systems: market Background
    • 13.1.1. Natural Disasters Forecasting Market
    • 13.1.2. Natural Disasters Rescue & Recovery Equipment & systems: Background
    • 13.1.3. Cities Threatened by Major Damaging Natural Disasters
    • 13.1.4. Private Sector Business Involvement in Natural Disasters
    • 13.1.5. Natural Disasters Mitigation & Relief Equipment & Systems: Business Opportunities
  • 13.2. Natural Disasters Mitigation & Relief Equipment & Systems Market: SWOT Analysis
    • 13.2.1. Strengths
    • 13.2.2. Weaknesses
    • 13.2.3. Opportunities
    • 13.2.4. Threats
  • 13.3. Natural Disasters Mitigation & Relief Equipment & Systems Market: Competitive Analysis
  • 13.4. Market Drivers
  • 13.5. Market Inhibitors

Volume -3

APPENDIX B: TECHNOLOGY MARKETS BACKGROUND

1. Big Data HLS and Internal Security Market

  • 1.1. Market & Technology Background
  • 1.2. Big Data Security
    • 1.2.1. Access and Delivery Infrastructure
    • 1.2.2. Data Centric Access Control
    • 1.2.3. Access Control
    • 1.2.4. Access Control in Databases
    • 1.2.5. Encryption Prescribed Access Control
    • 1.2.6. Trusted Bootstrapping
    • 1.2.7. Big Data Security Analytics
  • 1.3. Big Data: HLS and Internal Security Applications
  • 1.4. Big Data Security Industry: SWOT Analysis
    • 1.4.1. Strengths
    • 1.4.2. Weaknesses
    • 1.4.3. Opportunities
    • 1.4.4. Threats
  • 1.5. Big Data Security Market Drivers
  • 1.6. Big Data Security Market Inhibitors

2. Bio-Agents & Infectious Disease Detection Homeland Security & Public Safety Market

  • 2.1. Market Background
  • 2.2. Bio-Detection Technologies
    • 2.2.1. Sampling the Environment
    • 2.2.2. Bio-Detectors in a Multitude of Ambient Settings
    • 2.2.3. Bio-Detection Triggering
    • 2.2.4. Sample Collection
    • 2.2.5. Bio-Particle Detectors
    • 2.2.6. Bio-Agent Identification
    • 2.2.7. National Biosurveillance Systems
  • 2.3. Bio-Agents & Infectious Disease Detection: Homeland Security & Public Safety Applications
  • 2.4. Bio-Agents & Infectious Disease Detection: Business Opportunities & Challenges
  • 2.5. Bio-Agents & Infectious Disease Detection Homeland Security & Public Safety Industry: SWOT Analysis
    • 2.5.1. Strengths
    • 2.5.2. Weaknesses
    • 2.5.3. Opportunities
    • 2.5.4. Threats
  • 2.6. Bio-Agents & Infectious Disease Detection Market Drivers
  • 2.7. Bio-Agents & Infectious Disease Detection Market Inhibitors

3. Biometrics Homeland Security & Public Safety Market

  • 3.1. Biometric Market & Technology background
  • 3.2. Multimodal Biometric Systems
  • 3.3. Homeland Security & Perimeter Security Applications
  • 3.4. Biometrics: Business Opportunities & Challenges
  • 3.5. Biometrics Homeland Security & Public Safety Industry: SWOT Analysis
    • 3.5.1. Strengths
    • 3.5.2. Weaknesses
    • 3.5.3. Opportunities
    • 3.5.4. Threats
  • 3.6. Biometrics Market Drivers
  • 3.7. Biometrics Market Inhibitors

4. C2/C4ISR Systems HLS & Public Safety Market

  • 4.1. Market & Technology Background
  • 4.2. C2/C4ISR Systems: Business Opportunities
  • 4.3. C2/C4ISR Systems HLS & Public Safety Industry: SWOT Analysis
    • 4.3.1. Strengths
    • 4.3.2. Weaknesses
    • 4.3.3. Opportunities
    • 4.3.4. Threats
  • 4.4. C2/C4ISR Systems Market Drivers
  • 4.5. C2/C4ISR Systems Market Inhibitors

5. Chemical, Hazmat & Nuclear Detection HLS & Public Safety Market

  • 5.1. Technology Background
    • 5.1.1. Chemical Agent Detection technologies
    • 5.1.2. Nuclear/Radiological Detection Technologies
      • 5.1.2.1. The Advanced Spectroscopic Portal (ASP)
      • 5.1.2.2. Human Portable Radiation Detection Systems (HPRDS) Program
      • 5.1.2.3. Nuclear- Radiological People Screening Portals
  • 5.2. Market Background
    • 5.2.1. Chemical Plant Security
    • 5.2.2. Nuclear/Radiological Detection Markets
  • 5.3. Chemical, Hazmat & Nuclear Detection: Business Opportunities & Challenges
  • 5.4. Chemical, Hazmat & Nuclear Detection HLS & Public Safety Industry: SWOT Analysis
    • 5.4.1. Strengths
    • 5.4.2. Weaknesses
    • 5.4.3. Opportunities
    • 5.4.4. Threats
  • 5.5. Chemical, Hazmat & Nuclear Detection Market Drivers
  • 5.6. Chemical, Hazmat & Nuclear Detection Market Inhibitors

6. Cloud Based Security HLS & Public Safety Market

  • 6.1. HLS and Public Security Cloud computing and Security
  • 6.2. Cloud Security Threats
  • 6.3. Cloud security
  • 6.4. Cloud Security Industry: SWOT Analysis
    • 6.4.1. Strengths
    • 6.4.2. Weaknesses
    • 6.4.3. Opportunities
    • 6.4.4. Threats
  • 6.5. Cloud Security Market Drivers
  • 6.6. Cloud Security Market Inhibitors

7. Communication Systems & Devices HLS & Public Safety Market

  • 7.1. Market & Technology Background
    • 7.1.1. Market Background
    • 7.1.2. Emergency Communication: Technology Background
  • 7.2. HLS & Public Safety Communication Equipment Market: Business Opportunities
    • 7.2.1. Managed Services for Shared/Core Services
    • 7.2.2. Migration from "Simple" to "Integrated" Networks
    • 7.2.3. Communication Systems & Devices: Business Opportunities
  • 7.3. Communication Systems & Devices Market Drivers
  • 7.4. Communication Systems & Devices Market Inhibitors

8. Counter-IED Technologies HLS & Public Safety Market

  • 8.1. Market & Technology Background
  • 8.2. Counter-IED Technologies: Business Opportunities & Challenges
    • 8.2.1. Maintenance and Upgrades (Particularly of Jammers, and Armored Trucks)
    • 8.2.2. Sensors and Other Electronic Systems Upgrade/s
    • 8.2.3. Standoff Suicide Bombers Detection
    • 8.2.4. Suicide Bombers Detonation Neutralization
    • 8.2.5. Standoff Detection of VBIED
    • 8.2.6. VBIED Detonation Neutralization
    • 8.2.7. Standoff Explosive Detection in Urban Environment
    • 8.2.8. Large Area IED Detection Coverage
    • 8.2.9. IED Placement Detection
    • 8.2.10. Active Armors for Vehicles
  • 8.3. Counter-IED Technologies HLS & Public Safety Industry: SWOT Analysis
    • 8.3.1. Strengths
    • 8.3.2. Weaknesses
    • 8.3.3. Opportunities
    • 8.3.4. Threats
  • 8.4. Counter-IED Technologies Market Drivers
  • 8.5. Counter-IED Technologies Market Inhibitors

9. Cybersecurity HLS & Public Safety Market

  • 9.1. Cyber Terror & Crime Mitigation Market & Technology Background
    • 9.1.1. Cyber Terror & Crime
    • 9.1.2. Cyber Warfare
    • 9.1.3. Denial of Service
    • 9.1.4. Deliberate Manipulation of Information
    • 9.1.5. Detection of Unauthorized Activity
    • 9.1.6. Anti-Malware Cyber-Security
    • 9.1.7. Privacy Enhanced Technologies (PETs)
  • 9.2. Key Cyber Security Vendors
  • 9.3. Cybersecurity: Business Opportunities
  • 9.4. Cybersecurity HLS & Public Safety Industry: SWOT Analysis
    • 9.4.1. Strengths
    • 9.4.2. Weaknesses
    • 9.4.3. Opportunities
    • 9.4.4. Threats
  • 9.5. Cybersecurity Market Drivers
  • 9.6. Cybersecurity Market Inhibitors

10. Decontamination of CBRN & Hazmat Incidents HLS & Public Safety Market

  • 10.1. CBRN & Hazmat Decontamination Technology Background
    • 10.1.1. Decontamination of CBRN & Hazmat incidents
    • 10.1.2. Decontamination Core Technologies
    • 10.1.3. The Decontamination Cycle
  • 10.2. Decontamination Strategy
  • 10.3. CBRN & Hazmat Decontamination Market Background
  • 10.4. The Decontamination Industry
  • 10.5. Decontamination of CBRN & Hazmat Incidents Market Drivers
  • 10.6. Decontamination of CBRN & Hazmat Incidents Market Inhibitors

11. Electronic Fencing HLS & Public Safety Market

  • 11.1. Electronic Fences Technologies
    • 11.1.1. Vibration Sensors Mounted on Fence
    • 11.1.2. Capacitance Sensors Fence
    • 11.1.3. Strain Sensitive Cables Fence
    • 11.1.4. Fiber Optic Fence
    • 11.1.5. Taut Wire Fence
    • 11.1.6. Ported Coax Buried Line Fence
    • 11.1.7. Buried Geophone Fence
  • 11.2. Electronic Fencing: Business Opportunities & Challenges
  • 11.3. Electronic Fencing HLS & Public Safety Industry: SWOT Analysis
    • 11.3.1. Strengths
    • 11.3.2. Weaknesses
    • 11.3.3. Opportunities
    • 11.3.4. Threats
  • 11.4. Electronic Fencing Market Drivers
  • 11.5. Electronic Fencing Market Inhibitors

12. Explosives Trace Detection (ETD) HLS & Public Safety Market

  • 12.1. Market & Technology Background
    • 12.1.1. ETD Technologies
    • 12.1.2. ETD Market Background
  • 12.2. Explosives Trace Detection (ETD): HLS & Public Safety Applications
    • 12.2.1. Explosives Detected by Explosives Trace Detection
    • 12.2.2. Explosives Trace Detection Configuration
    • 12.2.3. ETD Applications
  • 12.3. Explosives Trace Detection (ETD): Business Opportunities & Challenges
  • 12.4. Explosives Trace Detection (ETD) HLS & Public Safety Industry: SWOT Analysis
    • 12.4.1. Strengths
    • 12.4.2. Weaknesses
    • 12.4.3. Opportunities
    • 12.4.4. Threats
  • 12.5. Explosives Trace Detection (ETD) Market Drivers
  • 12.6. Explosives Trace Detection (ETD) Market Inhibitors

13. Intrusion Detection Systems HLS & Public Safety Market

  • 13.1. Market & Technology Background
    • 13.1.1. Passive Infrared (PIR) Motion Detection
    • 13.1.2. Access Control Systems
  • 13.2. Intrusion Detection Systems: Business Opportunities & Challenges
    • 13.2.1. Challenges
    • 13.2.2. Business Opportunities
  • 13.3. Intrusion Detection Systems HLS & Public Safety Industry: SWOT Analysis
    • 13.3.1. Strengths
    • 13.3.2. Weaknesses
    • 13.3.3. Opportunities
    • 13.3.4. Threats
  • 13.4. Intrusion Detection Systems Market Drivers
  • 13.5. Intrusion Detection Systems Market Inhibitors

14. Mass Emergency Notification HLS & Public Safety Market

  • 14.1. Mass Emergency Notification Technology Background
    • 14.1.1. Introduction
    • 14.1.2. Text Alert Systems
    • 14.1.3. Voice Alert Systems
    • 14.1.4. Siren Systems
    • 14.1.5. The U.S. Emergency Alert System (EAS)
    • 14.1.6. Cell broadcast Mass Emergency Notification
  • 14.2. Mass Emergency Notification: HLS & Public Safety Applications
  • 14.3. Mass Emergency Notification: Business Opportunities & Challenges
  • 14.4. Mass Emergency Notification HLS & Public Safety Industry: SWOT Analysis
    • 14.4.1. Strengths
    • 14.4.2. Weaknesses
    • 14.4.3. Opportunities
    • 14.4.4. Threats
  • 14.5. Mass Emergency Notification Market Drivers
  • 14.6. Mass Emergency Notification Market Inhibitors

15. Metal Detectors HLS & Public Safety Market

  • 15.1. Market & Technology Background
    • 15.1.1. Hand-Held Metal Detectors
      • 15.1.1.1. The Market
      • 15.1.1.2. Principles of Operation
      • 15.1.1.3. Technology & operational Essentials
      • 15.1.1.4. Hand-Held Metal Detectors - Technology Trends
    • 15.1.2. Metal Detection Portals
      • 15.1.2.1. The Market
      • 15.1.2.2 . Metal Detection Portals Technology
  • 15.2. Metal Detectors: Business Opportunities & Challenges
  • 15.3. Metal Detectors HLS & Public Safety Industry: SWOT Analysis
    • 15.3.1. Strengths
    • 15.3.2. Weaknesses
    • 15.3.3. Opportunities
    • 15.3.4. Threats
  • 15.4. Metal Detectors Market Drivers
  • 15.5. Metal Detectors Market Inhibitors

16. Natural & Manmade Disaster Early Warning, Rescue & Recovery Equipment Market - 2014-2022

  • 16.1. Market & Technology Background
  • 16.2. Training and Education Markets
  • 16.3. Emergency Medical Services (EMS)
  • 16.4. Emergency Management Software
  • 16.5. Natural & Manmade Disaster Early Warning, Rescue & Recovery Equipment HLS & Public Safety Industry: SWOT Analysis
    • 16.5.1. Strengths
    • 16.5.2. Weaknesses
    • 16.5.3. Opportunities
    • 16.5.4. Threats
  • 16.6. Natural & Manmade Disaster Early Warning, Rescue & Recovery Equipment Market Drivers
  • 16.7. Natural & Manmade Disaster Early Warning, Rescue & Recovery Equipment Market Inhibitors

17. Non-Lethal Weapons HLS & Public Safety Market

  • 17.1. Non-Lethal Weapons Technology Background
  • 17.2. Less-Lethal Weapons: Market Background
  • 17.3. Non-Lethal Weapons: HLS & Public Safety Applications
  • 17.4. Non-Lethal Weapons: Business Opportunities & Challenges
  • 17.5. Non-Lethal Weapons HLS & Public Safety Industry: SWOT Analysis
    • 17.5.1. Strengths
    • 17.5.2. Weaknesses
    • 17.5.3. Opportunities
    • 17.5.4. Threats
  • 17.6. Non-Lethal Weapons Market Drivers
  • 17.7. Non-Lethal Weapons Market Inhibitors

18. Personal (Ballistic & CBRNE) Protective Gear HLS & Public Safety Market

  • 18.1. Market & Technology Background
    • 18.1.1. Personal Body Armor
    • 18.1.2. Respiratory Protective Equipment
    • 18.1.3. CBRN and Hazmat Personal Protective Gear
  • 18.2. Personal (Ballistic & CBRNE) Protective Gear HLS & Public Safety Industry: SWOT Analysis
    • 18.2.1. Strengths
    • 18.2.2. Weaknesses
    • 18.2.3. Opportunities
    • 18.2.4. Threats
  • 18.3. Personal (Ballistic & CBRNE) Protective Gear Market Drivers
  • 18.4. Personal (Ballistic & CBRNE) Protective Gear Market Inhibitors

19. HLS and Public Security RFID Market - 2014-2022

  • 19.1. HLS & Public RFID and RFID Security: Market Background
    • 19.1.1. RFID-based e-ID Personal Documents Markets
    • 19.1.2. RFID-Based Systems "Registered Traveler" Programs
    • 19.1.3. E-Passport Programs
    • 19.1.4. HLS and Public Safety RFID-Based Systems Supply Chain Markets
  • 19.2. HLS and Public SecurityRFID and RFID Security:Technology Background
  • 19.3. RFID Systems Security
    • 19.3.1. Tag Data Security
    • 19.3.2. Reader Security
  • 19.4. RFID Market Drivers
  • 19.5. RFID Market Inhibitors

20. Standoff Explosives & Weapon Detection HLS and Public Security Market

  • 20.1. Market & Technology Background
    • 20.1.1. Suicide Bombers & Vehicle Borne IEDs
  • 20.2. Standoff Explosives & Weapon Detection: Business Opportunities & Challenges
    • 20.2.1. Business Opportunities
    • 20.2.2. PBIED & VBIED Detection: Technological Challenges
  • 20.3. Standoff Person-Borne and Vehicle-Borne Explosives & Weapon Detection SWOT Analysis
  • 20.4. Standoff Explosives & Weapon Detection: Market Drivers
  • 20.5. Standoff Explosives & Weapon Detection: Market Inhibitors

21. Tomographic Explosive Detection Systems (EDS) Market

  • 21.1. Explosive Detection Systems: Technology Background
    • 21.1.1. Explosive Detection Systems: Throughput
    • 21.1.2. EDS Principle of Operation
    • 21.1.3. Hybrid Tomographic EDS & 2D X-Ray Screening
    • 21.1.4. EDS Certification
    • 21.1.5. EDS Throughput vs. Price
    • 21.1.6. Aviation Security: EDS Checked Luggage Screening
  • 21.2. Aviation Security: EDS Market Background
  • 21.3. Aviation Security Explosive Detection Systems (EDS) Industry: SWOT Analysis
    • 21.3.1. Strengths
    • 21.3.2. Weaknesses
    • 21.3.3. Opportunities
    • 21.3.4. Threats
  • 21.4. Tomographic Explosive Detection Systems (EDS) Market Drivers
  • 21.5. Tomographic Explosive Detection Systems (EDS) Market Inhibitors

22. Vehicle & Container Screening Portals HLS & Public Safety Market

  • 22.1. Vehicle & Container Screening Portals Technologies
    • 22.1.1. Comparison of Container-Vehicle Screening Technologies
    • 22.1.2. X-Ray Container-Vehicle Screening Systems
    • 22.1.3. Dual Energy X-Ray Container-Vehicle Screening
    • 22.1.4. Dual-View X-Ray Container-vehicle Screening
    • 22.1.5. Backscatter X-Ray Container-vehicle Screening
    • 22.1.6. Gamma Ray Systems Container-vehicle Screening
    • 22.1.7. Linac Based X-Ray Container-vehicle Screening systems
    • 22.1.8. Neutron Activation Container-vehicle Screening Systems
  • 22.2. Vehicle & Container Screening Portals: Market Background
  • 22.3. Vehicle & Container Screening Portals Industry: SWOT Analysis
    • 22.3.1. Strengths
    • 22.3.2. Weaknesses
    • 22.3.3. Opportunities
    • 22.3.4. Threats
  • 22.4. Vehicle & Container Screening Portals: Market Drivers
  • 22.5. Vehicle & Container Screening Portals: Market Inhibitors

23. Video Surveillance HLS & Public Safety Market

  • 23.1. Market & Technology Background
  • 23.2. Video Surveillance: HLS & Public Safety Applications
  • 23.3. Video Surveillance: Business Opportunities & Challenges
  • 23.4. Video Surveillance HLS & Public Safety Industry: SWOT Analysis
    • 23.4.1. Strengths
    • 23.4.2. Weaknesses
    • 23.4.3. Opportunities
    • 23.4.4. Threats
  • 23.5. Video Surveillance Market Drivers
  • 23.6. Video Surveillance Market Inhibitors

24. Video Analytics HLS & Public Safety Market

  • 24.1. Market & Technology Background
  • 24.2. Video Analytics: HLS & Public Safety Applications
  • 24.3. Video Analytics: Business Opportunities
  • 24.4. Video Analytics HLS & Public Safety Industry: SWOT Analysis
    • 24.4.1. Strengths
    • 24.4.2. Weaknesses
    • 24.4.3. Opportunities
    • 24.4.4. Threats
  • 24.5. Video Analytics Market Drivers
  • 24.6. Video Analytics Market Inhibitors

25. X-Ray Explosives Screening Market

  • 25.1. X-Ray Screening Technology Background
    • 25.1.1. 2D X-Ray, EDS and ETD Explosives Detection Technologies - Pros and Cons
    • 25.1.2. X-Ray Systems - Characteristics
    • 25.1.3. X-Ray Systems - Principles of Operation
    • 25.1.4. People Screening Backscatter AIT
  • 25.2. X-Ray Screening Market Background
  • 25.3. X-Ray Screening: Business Opportunities & Challenges
  • 25.4. X-Ray Screening HLS & Public Safety Industry: SWOT Analysis
    • 25.4.1. Strengths
    • 25.4.2. Weaknesses
    • 25.4.3. Opportunities
    • 25.4.4. Threats
  • 25.5. X-Ray Screening Market Drivers
  • 25.6. X-Ray Security Systems Market: Inhibitors

METHODOLOGY, DISCLAIMER & COPYRIGHT

26. The Report Research Methodology

  • 26.1. Report Structure
  • 26.2. Assumptions
  • 26.3. Research Methodology

27. Disclaimer & Copyright

List of Tables

Volume - 1

  • Table 1: Middle East & Africa HLS & Public Safety Market Size [$B] and CAGR [%] by Funding Source and Country - 2013, 2022
  • Table 2: Global Geopolitical Scenario 2022 Outlook
  • Table 3: 95 Homeland Security & Public Safety Industry, M&A Cases
  • Table 4: HLS & Public Security Market - Competitive Analysis
  • Table 5: Iraq Natural Disaster Statistics - 1980-2010
  • Table 6: Iraq HLS & Public Safety Market Size [$B] and Annual Growth Rates [%] - 2011-2022
  • Table 7: Iraq HLS & Public Safety Market [$B] by Funding Source - 2011-2022
  • Table 8: Iraq HLS & Public Safety Market Share [%] by Funding Source - 2011-2022
  • Table 9: Israel HLS & Public Safety Market Size [$B] and Annual Growth Rates [%] - 2011-2022
  • Table 10: Israel HLS & Public Safety Market [$B] by Funding Source - 2011-2022
  • Table 11: Israel HLS & Public Safety Market Share [%] by Funding Source - 2011-2022
  • Table 12: Kuwait Natural Disaster Statistics - 1980-2010
  • Table 13: Kuwait HLS & Public Safety Market Size [$B] and Annual Growth Rates [%] - 2011-2022
  • Table 14: Kuwait HLS & Public Safety Market [$B] by Funding Source - 2011-2022
  • Table 15: Kuwait HLS & Public Safety Market Share [%] by Funding Source - 2011-2022
  • Table 16: Nigeria Natural Disaster Statistics - 1980-2010
  • Table 17: Nigeria HLS & Public Safety Market Size [$B] and Annual Growth Rates [%] - 2011-2022
  • Table 18: Nigeria HLS & Public Safety Market [$B] by Funding Source - 2011-2022
  • Table 19: Nigeria HLS & Public Safety Market Share [%] by Funding Source - 2011-2022
  • Table 20: Oman Natural Disaster Statistics - 1980-2010
  • Table 21: Oman HLS & Public Safety Market Size [$B] and Annual Growth Rates [%] - 2011-2022
  • Table 22: Oman HLS & Public Safety Market [$B] by Funding Source - 2011-2022
  • Table 23: Oman HLS & Public Safety Market Share [%] by Funding Source - 2011-2022
  • Table 24: Saudi Arabia Natural Disaster Statistics - 1980-2010
  • Table 25: Saudi Arabia HLS & Public Safety Market Size [$B] and Annual Growth Rates [%] - 2011-2022
  • Table 26: Saudi Arabia HLS & Public Safety Market [$B] by Funding Source - 2011-2022
  • Table 27: Saudi Arabia HLS & Public Safety Market Share [%] by Funding Source - 2011-2022
  • Table 28: Turkey Natural Disaster Statistics - 1980-2010
  • Table 29: Turkey HLS & Public Safety Market Size [$B] and Annual Growth Rates [%] - 2011-2022
  • Table 30: Turkey HLS & Public Safety Market [$B] by Funding Source - 2011-2022
  • Table 31: Turkey HLS & Public Safety Market Share [%] by Funding Source - 2011-2022
  • Table 32: U.A.E. HLS & Public Safety Market Size [$B] and Annual Growth Rates [%] - 2011-2022
  • Table 33: U.A.E. HLS & Public Safety Market [$B] by Funding Source - 2011-2022
  • Table 34 : U.A.E. HLS & Public Safety Market Share [%] by Funding Source - 2011-2022

Volume 2

  • Table 1: Aviation Security Market: Business Opportunities
  • Table 2: Aviation Security Market SWOT Analysis
  • Table 3: Aviation Security Market - Competitive Analysis
  • Table 4: Land Border Security Market: Business Opportunities Sectors
  • Table 5: Land Border Security Market: SWOT Analysis
  • Table 6: Land Border Security Market - Competitive Analysis
  • Table 7: Counter Terror & Crime Intelligence Market: Business Opportunities
  • Table 8: Counter Terror & Crime Intelligence Market: SWOT Analysis
  • Table 9: Counter Terror & Crime Intelligence Market - Competitive Analysis
  • Table 10: Critical Infrastructure Security Market: Business Opportunities Sectors
  • Table 11: 15 Critical Infrastructure Security Sub-Market Growth Sectors
  • Table 12: Critical Infrastructure Security Market: SWOT Analysis
  • Table 13: Critical Infrastructure Security Market - Competitive Analysis
  • Table 14: Ranking of Manmade & Natural Disasters, Crime and Terror Threats as a Market Driver
  • Table 15: Law Enforcement, Police modernization & 1st Responder Market: Business Opportunities
  • Table 16: Law Enforcement & 1st Responder Market - Competitive Analysis
  • Table 17: Maritime Security Market: Business Opportunities
  • Table 18: Maritime Security Market SWOT Analysis
  • Table 19: Land Transportation Security Market: Business Opportunities Sectors
  • Table 20: Land Transportation Security Market - Competitive Analysis
  • Table 21: Oil & Gas Industry Security Market: Business Opportunities
  • Table 22: Oil-Gas Industry Security Market - Competitive Analysis
  • Table 23: Public Events Security Market: Business Opportunities Sectors
  • Table 24: Public Events Security Market - Competitive Analysis
  • Table 25: Commercial & Industrial Security Systems Market: Business Opportunities Sectors
  • Table 26: Private Sector Security Market - Competitive Analysis
  • Table 27: Safe Cities Market: Business Opportunities Sectors
  • Table 28: Safe Cities Market: Competitive Analysis
  • Table 29: The U.S. Embassy Security Funding Hike [$M] - 2012-2014
  • Table 30: Diplomatic Corp Security Market: Business Opportunities Sectors
  • Table 31: Diplomatic Corp Security Market: Competitive Analysis
  • Table 32: Natural Disasters; Search, Rescue and Recovery Equipment & Systems Market: Business Opportunities
  • Table 33 : Natural Disasters Mitigation & Relief Equipment & Systems Market: Competitive Analysis

Volume - 3

  • Table 1: The U.S. Bio-Response Status Evaluation
  • Table 2: Bio-Agents & Infectious Disease Detection Market: Business Opportunities
  • Table 3: Biometrics Market: Business Opportunities
  • Table 4: HLS & Public Safety C3I Business Opportunities
  • Table 5: Nuclear Figure Terror detection Roadmap
  • Table 6: Communication Systems & Devices Market: Business Opportunities
  • Table 7: Cybersecurity Market: Business Opportunities
  • Table 8: Electronic Fencing Market: Business Opportunities
  • Table 9: Explosives Trace Detection (ETD) Market: Business Opportunities
  • Table 10: Intrusion Detection Systems Market: Business Opportunities
  • Table 11: Notification Systems Technologies Characteristics
  • Table 12: Mass Emergency Notification Market: Business Opportunities
  • Table 13: Metal Detectors Market: Business Opportunities
  • Table 14: Natural Disaster Vulnerability Analysis Example
  • Table 15: Typical Goals of an EMS System: Daily vs. Disaster.
  • Table 16: Non-Lethal Weapons Counter-Personnel Means
  • Table 17: Electromagnetic NLW Technologies
  • Table 18: Mechanical & Kinetic, Acoustic, Ancillary and Chemical NLW Technologies
  • Table 19: Non-Lethal Weapons Market: Business Opportunities
  • Table 20: Characteristics of Active and Passive RFID Tags
  • Table 21: Passive RFID: Range and typical use by Tag Frequency
  • Table 22: RFID -Characteristics and Corresponding Applications by Frequency Band
  • Table 23: Comparison of Open Space Explosives & Weapon Detection Technologies
  • Table 24: Explosive Detection Systems vs. Other Luggage Screening Technologies
  • Table 25: Product Comparison of High-Volume EDS Machines
  • Table 26: Container-vehicle Screening - Technologies Comparison
  • Table 27: Video Surveillance Market: Business Opportunities
  • Table 28: Video Analytics Market: Business Opportunities
  • Table 29: EDS, ETD and 2D X-Ray Technologies - Pros and Cons
  • Table 30 : X-Ray Screening Market: Business Opportunities

List of Figures

Volume - 1

  • Figure 1: The Global Map of Islamic Population & Poorly Controlled Regions
  • Figure 2: 2003-2010 Terror Attacks by Geographical Region
  • Figure 3: The Five Generations of Terror
  • Figure 4: The Four Terror Threat Categories
  • Figure 5: Pre- and Post-Terror Attack Procurement Decision Making Scenarios
  • Figure 6: Government - Industry Homeland Security & Public Safety Life Cycle
  • Figure 7: Government - Private Sector Techno-Tactical Technology Assessment Process
  • Figure 8: Homeland Security & Public Safety Industry - Government Relationship
  • Figure 9: The Homeland Security & Public Safety Vendor - Client Inter-Relationship
  • Figure 10: Homeland Security & Public Safety Marketplace: Supply & Demand Relationship
  • Figure 11: HLS & PS Segments Products by Supply and Demand
  • Figure 12: A New Product- Technology Assesment Proccess
  • Figure 13: Ranking of Security, Natural Disasters, Crime & Terror Threats as Market Drivers
  • Figure 14: Iraq Homeland Security & Public Safety Market Size [$B] - 2011-2022
  • Figure 15: Iraq Homeland Security & Public Safety Market AGR [%] - 2011-2022
  • Figure 16: Iraq Homeland Security & Public Safety 2014-2022 Cumulative Market [$B] by Funding Source
  • Figure 17: Israel West Bank Separation Barrier
  • Figure 18: Israel Homeland Security & Public Safety Market Size [$B] - 2011-2022
  • Figure 19: Israel Homeland Security & Public Safety Market AGR [%] - 2011-2022
  • Figure 20: Israel Homeland Security & Public Safety 2014-2022 Cumulative Market [$B] by Funding Source
  • Figure 21: Kuwait Homeland Security & Public Safety Market Size [$B] - 2011-2022
  • Figure 22: Kuwait Homeland Security & Public Safety Market AGR [%] - 2011-2022
  • Figure 23: Kuwait Homeland Security & Public Safety 2014-2022 Cumulative Market [$B] by Funding Source
  • Figure 24: Nigeria Homeland Security & Public Safety Market Size [$B] - 2011-2022
  • Figure 25: Nigeria Homeland Security & Public Safety Market AGR [%] - 2011-2022
  • Figure 26: Nigeria Homeland Security & Public Safety 2014-2022 Cumulative Market [$B] by Funding Source
  • Figure 27: Oman Homeland Security & Public Safety Market Size [$B] - 2011-2022
  • Figure 28: Oman Homeland Security & Public Safety Market AGR [%] - 2011-2022
  • Figure 29: Oman Homeland Security & Public Safety 2014-2022 Cumulative Market [$B] by Funding Source
  • Figure 30: Three Tiers of Saudi Security Infrastructure
  • Figure 31: The Saudi Government Security Org. Chart
  • Figure 32: Structure of the Saudi General Intelligence Presidency
  • Figure 33: Saudi Arabia Homeland Security & Public Safety Market Size [$B] - 2011-2022
  • Figure 34: Saudi Arabia Homeland Security & Public Safety Market AGR [%] - 2011-2022
  • Figure 35: Saudi Arabia Homeland Security & Public Safety 2014-2022 Cumulative Market [$B] by Funding Source
  • Figure 36: Turkey HLS & Public Safety Agencies Organogram
  • Figure 37: Turkey Homeland Security & Public Safety Market Size [$B] - 2011-2022
  • Figure 38: Turkey Homeland Security & Public Safety Market AGR [%] - 2011-2022
  • Figure 39: Turkey Homeland Security & Public Safety 2014-2022 Cumulative Market [$B] by Funding Source
  • Figure 40: U.A.E. Homeland Security & Public Safety Market Size [$B] - 2011-2022
  • Figure 41: U.A.E. Homeland Security & Public Safety Market AGR [%] - 2011-2022
  • Figure 42 : U.A.E. Homeland Security & Public Safety 2014-2022 Cumulative Market [$B] by Funding Source

Volume - 2

  • Figure 1: Aviation Passenger Traffic Correlation with GDP Change - 1971-2011
  • Figure 2: Global Air Travel Growth -1980-2012
  • Figure 3: Boeing Global Air Traffic Forecast - 1991-2031
  • Figure 4: Global Air Travel Growth Forecast - 2012-2020
  • Figure 5: Airport Security Roadmap
  • Figure 6: Checked Luggage in-Line Screening Configuration
  • Figure 7: Aviation Security, 10 Layers of Security
  • Figure 8: Aircraft Security - Points of Potential Vulnerability
  • Figure 9: Airport Passengers Screening - Segments
  • Figure 10: Multi-Modal Third Generation People Screening Systems
  • Figure 11: Global Average Air Cargo Growth [Million Tons]: 2001-2020
  • Figure 12: Air Cargo Supply Chain
  • Figure 13: Airport Perimeter Security Systems
  • Figure 14: Land Border Security, Layers of Security
  • Figure 15: Land Border Security Threat Detection Scheme
  • Figure 16: The Intelligence Cycle
  • Figure 17: Critical Infrastructure Security, Layers of Security
  • Figure 18: Hierarchy of Critical Infrastructures
  • Figure 19: Critical Infrastructure Investment Priorities Scheme
  • Figure 20: A National Critical Infrastructure Security Infrastructure: Example the U.S.A.
  • Figure 21: Future 1st Responders Communications Services
  • Figure 22: First Responders' Mobile Devices Network
  • Figure 23: Maritime Security - Mixed Mode Approach
  • Figure 24: Maritime Supply Chain vs. Security Legislation
  • Figure 25: Maritime Security Infrastructure
  • Figure 26: Map and List of 154 Countries Committed to Implement the WCO Customs Security Practices
  • Figure 27: Partners Involved in Port Operations
  • Figure 28: Commercial & Industrial Security Systems, Layers of Security
  • Figure 29: Smart City Platform Services
  • Figure 30: Safe City vs. Smart City
  • Figure 31: Smart City vs. Safe City Overlapping Missions
  • Figure 32: Safe City Architecture & Functions
  • Figure 33: Safe City Natural and Man-Made disaster Mitigation Process
  • Figure 34: Safe City Architecture
  • Figure 35: Safe City: Event Awareness Process Flowchart
  • Figure 36: Elements and Stakeholders of a Safe City
  • Figure 37: Safe City Planning Matrix
  • Figure 38: Safe City Communication Topology
  • Figure 39: Safe City Wireless Point-to-Multipoint
  • Figure 40: An Embassy Compound Perimeter Security
  • Figure 41: Organization of the U.S. Diplomatic Security Agency
  • Figure 42: Major 2002-2009 Attacks on Diplomatic Corpus
  • Figure 43: Natural Disasters Impact
  • Figure 44: A Natural Disaster Activities Cycle
  • Figure 45: Japan Following the 2011 Earthquake Tsunami
  • Figure 46: 2000-2010 Number of Natural Disasters by Country
  • Figure 47: Number of Natural Disasters Reported by Year, by Cause - 1910-2010
  • Figure 48: Private & Public Sectors Natural Disasters Awareness Flowchart
  • Figure 49: 10 Largest Megacities and their Exposure to Natural Disasters
  • Figure 50: Private Sector Activities during 4 Stages of Disaster Mitigation
  • Figure 51: Private Sector Business Involvement in Natural Disasters
  • Figure 52: The U.S. growing > $ 1 Billion Natural Disasters - 1980-2011
  • Figure 53 : The 2012 $ Billion Climate Disasters

Volume - 3

  • Figure 1: Big Data Lifecycle & Ecosystem.
  • Figure 2: Joined Access & Delivery Infrastructure (FADI)
  • Figure 3: U.S. Bio-Security and Safety Agencies & Processes Roadmap
  • Figure 4: Airborne Bacterial Concentration Fluctuation in a Single Day
  • Figure 5: Cross-Section of Cascade Impactor: PIXE International Corporation
  • Figure 6: TSI's Model 3317 System with Concentrator, GPS Receiver & Wireless Data Radio
  • Figure 7: Bio-Detection Generic Architecture
  • Figure 8: National Biosurveillance Components
  • Figure 9: Bio-Detection Strategy
  • Figure 10: Bio-Detection Modalities
  • Figure 11: The global Bio-Detection Surveillance and Situational Awareness: Areas of Responsibility
  • Figure 12: Performance of Four Biometric Security Systems
  • Figure 13: Operation of a Generic Biometric System
  • Figure 14: Performance Criteria for Biometrics Security Technologies
  • Figure 15: A Border Security Command, Control & Communication System
  • Figure 16: Perimeter Security C3I System Topology
  • Figure 17: A Seaport Security C3I System Block diagram
  • Figure 18: Multi-Tiered Chemical, Hazmat & Nuclear Detection and Mitigation
  • Figure 19: Nuclear-Radiological Threats Weapon Sophistication vs. Consequence
  • Figure 20: A Simulation of the Impact of the Explosion of a 5000 Curie Co60 Dirty Bomb in Downtown Manhattan
  • Figure 21: The Global Nuclear-Radiological Terror Mitigation Infrastructure
  • Figure 22: The Three-Tiered Port of Entry Nuclear Threat Screening Architecture
  • Figure 23: C3I Communication Interoperability Roadmap
  • Figure 24: Present and Pipeline Emergency Communication: Technologies
  • Figure 25: A City Emergency Communication Topology
  • Figure 26: City Communication Network
  • Figure 27: Wireless Communication Point-to-Multipoint
  • Figure 28: Interoperable Communications Network
  • Figure 29: Public Safety Communication: Obstacles to Interoperability
  • Figure 30: IED Ready for Detonation
  • Figure 31: IED Food Chain and Its Relevant Time Frame
  • Figure 32: Counter-IED - Mixed Mode Approach
  • Figure 33: The European "Computer Emergency Response Teams & Command Centre" (CERTs .CERT/CCs)
  • Figure 34: Comparison in Weight of Pathogens between BW Agents and CW Agents [mg]
  • Figure 35: Closed Area (e.g., building) Decontamination Boundaries
  • Figure 36: Open Area Decontamination Boundaries
  • Figure 37: Decontamination Corridor
  • Figure 38: Decontamination Core Technologies Overview
  • Figure 39: The Decontamination Cycle
  • Figure 40: Decontamination Strategy: From Sample Collection to Decontamination Clearance
  • Figure 41: Basic Phases of Response and Recovery to a CBRN & HAZMAT Incident
  • Figure 42: The March 2011 Fukushima Nuclear Event
  • Figure 43: The Post Fukushima Meltdown Radioactive Cesium Blankets 8% of Japan.
  • Figure 44: The Bio Attack Response Timeline
  • Figure 45: U.S.-Mexico Barrier at Tijuana Pedestrian Border Crossing
  • Figure 46: Diagram of Physical Security Fence Functions
  • Figure 47: The U.S. DOD Security and Antiterrorism UFC Fence Application
  • Figure 48: Explosive Trace Detection: Principle of Operation
  • Figure 49: ETD Operational Workflow
  • Figure 50: Explosive Materials Classification
  • Figure 51: The Most Commonly Used Explosives Classification
  • Figure 52: Explosives Trace Detection Configuration: Hand Held ETD, Tabletop ETD, Vehicle Screening ETD, Boarding Card Screening ETD
  • Figure 53: Stand-Alone Checked Luggage ETD System
  • Figure 54: Multi-Modal Intrusion Detectors
  • Figure 55: Example of Intrusion Detection System Architecture
  • Figure 56: The U.S. Emergency Alert System
  • Figure 57: Multimodal Mass Emergency Notification
  • Figure 58: Hand-Held Weapon Detector - Proper Scanning Path
  • Figure 59: Single Zone Metal Detection Portal Technology
  • Figure 60: Metal Detection Portals Technologies
  • Figure 61: The U.S. Natural Disaster Hazard Map
  • Figure 62: Near Term Counter-Personnel NLW
  • Figure 63: Less-Lethal Weapons Clinical Effects
  • Figure 64: Mid-Term Counter-Personnel Non-Lethal Weapons
  • Figure 65: Far-Term Counter-Personnel Non-Lethal Weapons
  • Figure 66: Personal Body Armor
  • Figure 67: Respiratory Protective Equipment Segments
  • Figure 68: CBRN Personal Protective Gear
  • Figure 69: Illustrative RFID and E-Seal Reading in Maritime Supply Chain
  • Figure 70: Active (left) and Passive (right) Supply Chain RFID Tags and Readers
  • Figure 71: Suicide Attack Sequence
  • Figure 72: Evacuation Distance by Threat and Explosive Mass
  • Figure 73: Spectrum of Evolving Standoff People Screening Technologies
  • Figure 74: PBIED & VBIED Detection: Performance Criteria
  • Figure 75: Standoff Person-Borne and Vehicle-Borne Explosives & Weapon Detection SWOT Analysis
  • Figure 76: Whole-Object EDS Scheme
  • Figure 77: Tomographic EDS Principle of Operation
  • Figure 78: EDS Throughput [BPH] vs. System Price [$K]
  • Figure 79: Aviation Security: "100% EDS" Screening Flow Scheme
  • Figure 80: Aviation Security: Checked Luggage EDS Screening Configuration - 1
  • Figure 81: Coherent X-Ray Scheme
  • Figure 82: Container/Vehicle Screening Technologies
  • Figure 83: X-Ray Screening - Block Diagram
  • Figure 84: Dual Energy X-Ray
  • Figure 85: Dual View X-Ray - Principles of Operation
  • Figure 86: Backscatter X-Ray + Penetrating X-Ray
  • Figure 87: Gamma Ray Screening - Block Diagram
  • Figure 88: Linac Screening System Block Diagram
  • Figure 89: Pulsed Fast Neutron Activation Container/Vehicle Screening System Block Diagram
  • Figure 90: Video Surveillance Technologies Timeline
  • Figure 91: A Wireless Video Surveillance System
  • Figure 92: Video Analytics System: Block Diagram
  • Figure 93: Standoff Biometric People Screening Using Video Analytics
  • Figure 94: Video Analytics Architecture
  • Figure 95: Major Explosives Detection Technologies: Bulk vs. Trace
  • Figure 96: X-Ray Conveyor-Based Screening Systems - Principles of Operation
  • Figure 97: Multi-View Dual Energy X-Ray Screening
  • Figure 98: Backscatter People Screening Portal
  • Figure 99 : X-Ray Screening of Checked Luggage and Cabin Baggage as part of a Layered Aviation Security Infrastructure
Back to Top