Academic literature on the topic 'Prison security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Prison security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Prison security"

1

Woodall, James. "Health promotion co-existing in a high-security prison context: a documentary analysis." International Journal of Prisoner Health 16, no. 3 (2020): 237–47. http://dx.doi.org/10.1108/ijph-09-2019-0047.

Full text
Abstract:
Purpose There is interest in promoting health in prison from governmental levels, but, to date, understanding how best to do this is unclear. This paper argues that nuanced understanding of context is required to understand health promotion in prison. The purpose of the paper is to examine the potential for empowerment, a cornerstone of health promotion practice, in high-security prison establishments. Design/methodology/approach Independent prison inspections, conducted by Her Majesty’s Inspectorate of Prisons for England and Wales, form a critical element in how prisons are assessed. Documentary analysis was undertaken on all eight high-security prison reports using framework analysis. Findings Analysis revealed elements of prison life which were disempowering and antithetical to health promotion. While security imperatives were paramount, there were examples where this was disproportionate and disempowered individuals. The data show examples where, even in these high-security contexts, empowerment can be fostered. These were exemplified in relation to peer approaches designed to improve health and where prisoners felt part of democratic processes where they could influence change. Practical implications Both in the UK and internationally, there is a growing rhetoric for delivering effective health promotion interventions in prison, but limited understanding about how to operationalise this. This paper gives insight into how this could be done in a high-security prison environment. Originality/value This is the first paper which looks at the potential for health promotion to be embedded in high-security prisons. It demonstrates features of prison life which act to disempower and also support individuals to take greater control over their health.
APA, Harvard, Vancouver, ISO, and other styles
2

Μπαμπάσικας, Κωνσταντίνος. "Η επίδραση του τύπου φυλακής στην επιθετικότητα και την ψυχική υγεία των κρατουμένων στις ελληνικές φυλακές". Psychology: the Journal of the Hellenic Psychological Society 22, № 1 (2020): 77. http://dx.doi.org/10.12681/psy_hps.23249.

Full text
Abstract:
Prisons differ in the degree of autonomy they provide to inmates. The objective of this study is to measure the impact of the prison environment, as reflected in the prison types, on prisoners’ self-reported aggression and mental health. This question becomes even more relevant since the recent bill opposing the set-up of a Type-C maximum security prison in Greece. The hypothesis is that the greater the degree of "security" (i.e., closed and judicial prisons being of a higher level of security compared with rural), the more likely the prisoners will be to exhibit aggression or poorer mental health. To test this hypothesis, a Multivariate Analysis of Covariance was used with prisoners’ age and imprisonment years as covariates. Prison type had a statistically significant effect on hostility and verbal aggression (with the highest levels recorded in the judicial prisons) and on depression (with lower levels in the rural prisons). In contrast, the effect of prison type on anger-physical aggression and anxiety was not significant. The results underline the importance of the prison environment and the needfor further strengthening of the rural prisons that will help minimize the physical and psychological risks for the inmates.
APA, Harvard, Vancouver, ISO, and other styles
3

Okazawa-Rey, Margo, and Gwyn Kirk. "Maximum Security." Freiburger Zeitschrift für GeschlechterStudien 26, no. 1-2020 (2020): 71–84. http://dx.doi.org/10.3224/fzg.v26i1.05.

Full text
Abstract:
Okazawa-Rey and Kirk argue that the term maximum security, used in the context of the prison system, is an oxymoron. Jails, prisons, and other ‘correctional’ facilities provide no real security for communities, guards and other prison officials, or inmates. Imprisoning two million people, building more prisons, identifying poor and working-class youth of colour as ‘gang members,’ and criminalizing poor Black and Latina women does not increase security. Rather, the idea of security must be redefined in sharp contrast to everyday notions of personal security that are based on the protection of material possessions by locks and physical force, as well as prevailing definitions of national and international security based on a militarization that includes the police, border patrols, and armed forces such as the Navy, Army, Marines, and Air Force. To achieve genuine security, we must address the major sources of insecurity: economic, social, and political inequalities among and within nations and communities. The continual objectification of ‘others’ is a central mechanism underlying systems of oppression—and insecurity—based on class, race, gender, nation, and other significant lines of difference.
APA, Harvard, Vancouver, ISO, and other styles
4

Zahars, Vitolds, and Māris Stivrenieks. "THE SECURITY ASPECTS OF PRISONS." Administrative and Criminal Justice 1, no. 70 (2015): 35. http://dx.doi.org/10.17770/acj.v1i70.4323.

Full text
Abstract:
Nowadays the prisons management and process control are based not only to physical security of prisons (premises, buildings, engineering equipment and technological equipment), but more to dynamic security (positive relationship between prison staff and inmates, based to rigidity and equity). The article reflects the results of the research about custodial sentence enforcement aspects of security in Latvian prisons. In this research are highlighted specificities of custodial sentence enforcement aspects of security in imprisonment places from point of view of rights of the custodial sentence enforcement law and practice. In this research are identified issues of the problem and suggested possible solutions. Within the framework of the research the norms of the Sentence Execution Code of Latvia, Prisons Administration Act and Regulations No.423 of the Cabinet of Ministers of May 30, 2006 – Internal rules of Penitentiary institutions, have been analyzed based on the safety aspects of the prison and its compliance with the requirements of generally accepted human rights, the Council of Europe and international norms and standards. Within the research the scientific literature and viewpoints from legal experts have been collected and analyzed. The aim of the research is to show, that the safety aspects of the prisons are insufficiently and inaccurately regulated and requires a deeper analysis. On the bases of this research were developed series of recommendations for prison staff to comply with the safety aspects of prisons as well as the necessity to make amendments in norms of the Sentence Execution Code of Latvia, Prisons Administration Act and Regulations No.423 of the Cabinet of Ministers of May 30, 2006 – Internal rules of Penitentiary institutions.
APA, Harvard, Vancouver, ISO, and other styles
5

Kariuki, John Ngugi, Wokabi Mwangi, and Hadija Murenga. "Security Threats Posed by Contraband Cell Phones in Prisons: Prison Officers’ Perspectives." Advances in Social Sciences Research Journal 7, no. 7 (2020): 815–24. http://dx.doi.org/10.14738/assrj.77.8708.

Full text
Abstract:
In the recent past, cell phones have emerged to be among the leading outlawed contemporary contrabands in correctional facilities around the globe. Although official statistics on the number of contraband cell phones globally remains elusive, searches by prison officials project a worrisome trend. At Naivasha Maximum Prison, it is estimated that 30% of the inmates possess one cell phone. Existing studies are more inclined to how phones are smuggled, who smuggle them and their impact on rehabilitation of offenders. Limited studies have been carried out to examine the security threats posed by smuggling and use of cell phones into the prisons. One school of thought argues that cell phones are smuggled into prisons and used by inmates for a good course including communicating with their significant others and for leisure. The other school of thought argues that they are used to commit crimes and thus a source of insecurity to officers, inmates and the members of public. This paper is guided by three specific objectives; to examine security threats prison officers are prone to due to smuggling and use of cell phones at the prison; to examine security threats inmates are prone to due to smuggling and use of cell phones at the prison and finally to examine security threats members of public are prone to due to smuggling and use of cell phones at the prison. The study employed descriptive research design. The unit of analysis was an individual prison officer. A sample size of 182 respondents was drawn from a population of 507 junior prison officers using simple random sampling technique. Primary data was collected through questionnaires. The results of this study indicated that prison officers are prone to physical injuries (38.92%), ambushes during escorts (29.94%) and espionage (20.35%). Inmates were prone to physical attacks (46.78%), electronic fraud (26.28%) and exploitation (21.79%). Members of public were prone to electronic fraud (74.40%) and kidnappings (40.47%). This current study concluded that cell phones in prison facilities pose significant security threats to prison officers, inmates and the members of public. These security threats are therefore of national concern. This study will add to existing body of knowledge on prisons and address policy gaps that exists in controlling cell phones in prison facilities.
APA, Harvard, Vancouver, ISO, and other styles
6

JURIK, NANCY C., and RUSSELL WINN. "Describing Correctional-Security Dropouts and Rejects." Criminal Justice and Behavior 14, no. 1 (1987): 5–25. http://dx.doi.org/10.1177/0093854887014001002.

Full text
Abstract:
High turnover among correctional workers is a chronic problem in today's prisons. Despite the concern surrounding this issue, there is little empirical research that deals with the instability of prison staffs. This article attempts to identify the major predictors of correctional officer turnover in one minimum-medium security prison in the western United States. Multivariate discriminant analyses suggest that three factors are of primary importance in distinguishing continuing from terminating officers—race, opportunities to influence institutional policy decisions, and most important, satisfaction with perceived working conditions. The findings suggest that the development of individual personality profiles may lead correctional administrators to overlook the role of prison organizational environments in contributing to security staff turnover.
APA, Harvard, Vancouver, ISO, and other styles
7

Robbins, Liz. "Medium Security Prison." Minnesota review 2017, no. 88 (2017): 20. http://dx.doi.org/10.1215/00265667-3786863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Camp, Scott D., and Dawn M. Daggett. "Quality of Operations at Private and Public Prisons: Using Trends in Inmate Misconduct to Compare Prisons." Justice Research and Policy 7, no. 1 (2005): 27–51. http://dx.doi.org/10.3818/jrp.7.1.2005.27.

Full text
Abstract:
A model-based approach was used to develop performance measures from inmate misconduct data to compare public and private prisons. The performance measures indicated the impact of different prisons upon raising or lowering the probability of inmate misconduct. Data for all misconduct and for two categories of misconduct, violent and drug, were generated for the 36-month period between January 1999 and December 2001 for all prisons within the Federal Bureau of Prisons (BOP) and one low-security private prison under contract to BOP. The private prison performed within the lower range of performance for low-security prisons within BOP.
APA, Harvard, Vancouver, ISO, and other styles
9

Allen, Scott A., and Raed Aburabi. "When security and medicine missions conflict: confidentiality in prison settings." International Journal of Prisoner Health 12, no. 2 (2016): 73–77. http://dx.doi.org/10.1108/ijph-03-2016-0007.

Full text
Abstract:
Purpose – It is a simple fact that prisons cannot exist – practically, legally, ethically or morally – without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach – At times, what is required to serve the patient’s best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings – In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value – The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.
APA, Harvard, Vancouver, ISO, and other styles
10

Camp, Scott D., and Gerald G. Gaes. "Criminogenic Effects of the Prison Environment on Inmate Behavior: Some Experimental Evidence." Crime & Delinquency 51, no. 3 (2005): 425–42. http://dx.doi.org/10.1177/0011128704271471.

Full text
Abstract:
The current study analyzed a subset of the experimental data collected by Berk, Ladd, Graziano, and Baek (2003) to test whether different intensities of incarceration make inmates more criminal while incarcerated. There were 561 male inmates whose equivalent classification scores indicated they had the same level of risk to commit institutional misconduct at the time they were incarcerated. One half of these inmates were sent to the lowest security-level prisons in California, and the other one half were sent to prisons one step down from the highest security level in California. If prisons are criminogenic, then the probability of misconduct should vary with the security level to which the inmates were assigned. Instead, inmates were equally likely to commit misconduct in prison regardless of whether they were assigned to a Level I (lowest security level) or a Level III prison.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Prison security"

1

Chan, Hok-mo. "Medium security prison." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2595149x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

陳學武 and Hok-mo Chan. "Medium security prison." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31982773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Price, David Edward. "Security categorisation in the English prison system." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Forster, Rachel Laura. "Questions of value : taking museums into a high security prison." Thesis, University of Leeds, 2016. http://etheses.whiterose.ac.uk/13293/.

Full text
Abstract:
This research was developed as part of an AHRC Collaborative Doctoral Award, between the University of Leeds and Leeds Museums and Galleries. The central area for investigation was to establish the value to be gained from providing prisoners in a high security prison access to museum objects and activities inspired by them. The project itself was delivered to a group of prisoners in HMP Wakefield in 2012 over a twelve-week period. The four-stage project provided opportunities for different forms of interaction with the museum objects and culminated in a final exhibition of work created by the prisoner participants during the project. Throughout the project the findings were positive. They offer strong support to the idea that high security prisons can be viewed as a community in their own right where positive relationships can be established and negative stereotypes broken down. When looked at collectively, the findings indicate that participation in the project made both an immediate and longer-term impact on the wellbeing of those who participated. In some cases this also linked to a reduction in the fears associated with feeling institutionalised.
APA, Harvard, Vancouver, ISO, and other styles
5

Maglinger, Lee. "A Modified Therapeutic Community: Reducing Violence in a Medium Security Prison." TopSCHOLAR®, 2006. http://digitalcommons.wku.edu/theses/295.

Full text
Abstract:
This study explores the impact a modified therapeutic community has on institutional disorder. Treatment programs are normally evaluated by their ability to prevent recidivism and relapse. This study examines the efficacy of a modified therapeutic community in reducing the number and severity of write-ups of its clients in a medium security male prison. The study describes research findings regarding the relationship between the write-ups of clients in a modified therapeutic community compared with the write-ups of inmates in a non-treatment unit. To carry out this study, the author reviewed the write-up records from the treatment program and a non-treatment unit for the period of March 2001 through October 2005. The results of this study indicated that the write-ups of the modified therapeutic community clients, as a whole, were less severe as compared to the general population clients residing in a similar dorm. They were also proportionally less specifically violent. The implication of this research for corrections administration was also discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Johansson, Maria. "The Complexity of Treatment in a High Security Prison Setting : Limitations and Possibilities." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-21607.

Full text
Abstract:
For those individuals who committed serious crimes, treatment often shows lack of positive effects in terms of social, psychological and behavioral change (Latessa, Cullen &amp; Gendreau, 2002). Not only is the treatment high in cost, but sometimes also results in negative outcomes through the deterioration of an individual’s behavior, as well as their social and psychological function. Due to the goals and values in society, there is a requirement that the human services and treatment organizations can provide a concise image regarding the extent of given interventions but also whether their efficient in terms of improving the individuals’ over all wellbeing. The overall aim with this study is to investigate how treatment within prison settings is distributed in terms of promoting positive changing processes through daily around-the-clock activities. This study has a qualitative approach where the data has been conducted through interviews with the staff at T-unit, Kumla prison. The result shows that the treatment is practiced in accordance with the risk, need and responsivity model. However, there is a lack of interaction between the prison officer’s and the inmate’s which prevent the specific treatment to connect with the daily activities which in turn prevent a positive socialization process to occur.<br>För de personer som har begått allvarliga brott, visar behandling ofta på föga effekter i form av sociala, psykologiska och beteendemässiga förändringar (Latessa, Cullen &amp; Gendreau, 2002). Behandlingen innebär inte enbart höga ekonomiska kostnader men resulterar också ibland i negativa resultat genom en försämring av en individs beteende i form av dennes sociala och psykologiska funktion. På grund av de mål och värden som finns i samhället, finns det krav på att människobehandlande organisationer ska tillhandahålla en koncis bild gällande omfattningen av deras insatser men även huruvida dessa insatser är effektiva i form av att förbättra enskilda individers mående. Det övergripande syftet med denna studie är att undersöka hur behandling, genom en dygnet runt process i en anstaltsmiljö, bedrivs för att främja positiva förändringsprocesser. Denna studie har en kvalitativ ansats där intervjuer har genomförts med personalen på T-huset, Kumla anstalt. Resultatet visar att behandlingen utövas i enlighet med risk, behov och responsivitetsmodellen. Dock finns det en brist på interaktion mellan kriminalvårdarna och de intagna vilket hindrar den specifika behandlingen från att knyta an till de dagliga aktiviteterna vilket i sin tur hindrar en positiv socialisationsprocess.
APA, Harvard, Vancouver, ISO, and other styles
7

Thinane, Tsekelo Shadrack. "The institutionalisation of effective rehabilitation programmes at Groenpunt Maximum Security Prison / T.S. Thinane." Thesis, North-West University, 2010. http://hdl.handle.net/10394/4834.

Full text
Abstract:
One of the biggest challenges facing the South African prison system today is the phenomenon of recidivism (repeat offences). In ninety four percent of all cases offenders re-engage in criminal activities after they have been released from prison. This means that the majority of prisons in South Africa are ineffective in terms of rehabilitating offenders during their time in prison. The contribution of this research revolves around an analysis of the rehabilitation arrangements that are prescribed by the DCS to all Government correctional institutions (prisons). The Groenpunt maximum security prison is used as a case study to establish why rehabilitation is ineffective and to identify ways and means to reduce recidivism. In this regard the rehabilitation arrangements at Groenpunt maximum security prison is measured against the prescribed governmental rehabilitation arrangements. The following main findings (problem areas) emerged out of this research: • At Groenpunt maximum security prison the prescribed governmental prescriptions for rehabilitation are not being adhered to; and • Participation in rehabilitation programmes is not compulsory for offenders at Groenpunt maximum security prison. The above trends render rehabilitation ineffective and stimulate recidivism upon release. In order to rectify the above situation the research highlights specific shortcomings in the rehabilitation arrangements of Groenpunt maximum security prison that needs to be rectified in order to reduce recidivism. This boils down to the development of an individual needs based approach to rehabilitation and making participation in rehabilitation programmes compulsory for all offenders. It is further envisaged that the recommendations relating to Groenpunt maximum security prison can also be applied to other prisons in order to reduce the rate of recidivism in all South African prisons.<br>Thesis (M. Development and Management)--North-West University, Vaal Triangle Campus, 2010.
APA, Harvard, Vancouver, ISO, and other styles
8

Mothamaha, Ezekiel Mafoka. "Ministry to political prisoners on Robben Island (1960 - 1990) : a Church History approach." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/61192.

Full text
Abstract:
I have read many articles and seen many stories about Robben Island. What I find lacking in these articles and stories is the role played by the church in relation to ministry to political prisoners. Given my own experience as a political prisoner on Robben Island, I am of the view that this subject should be explored and told. As implied in the title, this study will focus on the period covering three decades (1960- 1970, 1971-1980 and 1981-1990). These periods will be considered separately and collectively. Background A brief background information about Robben Island as a maximum security prison will be provided here. Furthermore, the categories and affiliations of political prisoners are explained. Lastly, detail relating to existence of different religions is discussed. Problem Statement The role played by the church in ministry to political prisoners on Robben Island between 1960 and 1990. Methodology This study makes use of oral history by way of interviews and other sources such as questionnaires, records, etc. to generate data from, among, others: 1. Political prisoners incarcerated during the period stated above. 2. Chaplain(s) who served during this period. 3. Prison Official(s) who served during this period Archived material relating to ministry to political prisoners covering this period will be inspected. Findings In the introduction of his book The Changing Shape of Church History, Justo L. González (2002:1) starts by asking the question: "where is the cutting edge of church history?" My expectation is that the findings of this study, as they are stated here, would illustrate the cutting edge of the church history on Robben Island.<br>Dissertation (MA)--University of Pretoria, 2016.<br>Church History and Church Policy<br>MA<br>Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
9

Long, Joshua S. "Appropriate classification of prisoners: Balancing prison safety with the least restrictive placements of Ohio inmates." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1593267208117717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Souza, Isabel Cristina Baptista de. "O agente de segurança prisional e a ressocialização sob a perspectiva do preso e da lei: um estudo na unidade prisional de Catalão–GO." Universidade Federal de Goiás, 2015. http://repositorio.bc.ufg.br/tede/handle/tede/5559.

Full text
Abstract:
Submitted by Marlene Santos (marlene.bc.ufg@gmail.com) on 2016-05-12T19:19:55Z No. of bitstreams: 2 Dissertação - Isabel Cristina Baptista de Souza.pdf: 1042980 bytes, checksum: 94b3ab1f539189ff0580de3b8b8412b6 (MD5) license_rdf: 19874 bytes, checksum: 38cb62ef53e6f513db2fb7e337df6485 (MD5)<br>Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2016-05-13T11:36:10Z (GMT) No. of bitstreams: 2 Dissertação - Isabel Cristina Baptista de Souza.pdf: 1042980 bytes, checksum: 94b3ab1f539189ff0580de3b8b8412b6 (MD5) license_rdf: 19874 bytes, checksum: 38cb62ef53e6f513db2fb7e337df6485 (MD5)<br>Made available in DSpace on 2016-05-13T11:36:10Z (GMT). No. of bitstreams: 2 Dissertação - Isabel Cristina Baptista de Souza.pdf: 1042980 bytes, checksum: 94b3ab1f539189ff0580de3b8b8412b6 (MD5) license_rdf: 19874 bytes, checksum: 38cb62ef53e6f513db2fb7e337df6485 (MD5) Previous issue date: 2015-12-07<br>Fundação de Amparo à Pesquisa do Estado de Goiás - FAPEG<br>The rehabilitation process of the individual in conditions of deprivation of liberty involves several variables. In this context, it is worth mentioning the role played by the Prison Security Agents (PSA) in that it may or may not contribute to a greater or lesser degree of efficiency with the reintegration / rehabilitation of the prisoner. This work it is a case study in Prison Unit Catalan-GO (UPCat), which has the overall objective to analyze the ASP contribution in the rehabilitation process of the prisoner in light of the perception of the imprisoned, the PSA and law. The study is divided into three investigative steps. First, the profile sociodemographic, academic and labor of ASP's of UPCat was obtained through the application of a questionnaire consisting of thirty-four closed questions, which after being collected and tabulated were subjected to statistical analysis Microsoft Excel 2007® and the results were presented by graphs. But the details of the perception of the PSA regarding the rehabilitation of prisoners through its routine operations in UPCat was obtained through the application of a questionnaire, consisting of thirteen open questions answered for ten PSA, the universe of thirty-eight UPCat. In turn, to analyze the perception of the prisoner on the PSA contribution in his rehabilitation, it was decided to carry out focus group with eight prisoners in the closed regime. The data collected with the questionnaire addressed to the PSA and the focus group held with inmates were analyzed through Bardin content analysis separately with three themes in common: 1) Role of the Prison Security Agent; 2) Relationship of the Prison Security Agent with the inmate and; 3) socialization of the prisoner. It was found that contribute to the rehabilitation of the prisoner is not among the legal duties of the ASP's as well, both as PSA inmates do not realize any of the PSA contribution in rehabilitation of the prisoner. However, it was found that the respectful treatment contributes to more humane conditions in the execution of the sentence.<br>O processo de ressocialização do indivíduo em condições de privação da sua liberdade envolve diversas variáveis. Nesse contexto, merece destaque a função desempenhada pelo Agente de Segurança Prisional (ASP),na medida em que podem ou não contribuir com maior ou menor grau de eficiência com a reintegração/ressocialização do preso. O presente trabalho trata-se de um estudo de caso realizado na Unidade Prisional de Catalão-GO (UPCat), que tem por objetivo geral analisar a contribuição do ASP no processo de ressocialização do preso à luz da percepção do encarcerado, do ASP e da lei. O estudo encontra-se dividido em três etapas investigativas. Primeiramente, o perfil sociodemográfico, acadêmico e laboral dos ASP da UPCat foi obtido por intermédio da aplicação de um questionário composto por trinta e quatro perguntas fechadas, que após terem sido coletadas e tabuladas foram submetidas à análise estatísticaMicrosoft Excel 2007® e os resultados foram apresentados emgráficos. Já odetalhamento da percepção do ASP em relação àressocialização do preso por meio de sua atuação de rotina na UPCat foi obtido por intermédio da aplicação de um questionário, composto por treze perguntas abertas, respondido por dez ASP, do universo de trinta e oito da UPCat. Por sua vez, para analisar a percepção do preso sobre a contribuição do ASP em sua ressocialização, optou-se pela realizaçãogrupo focal com oito presos do regime fechado. Os dados coletados com a aplicação do questionário e do grupo focalforam analisados por meio da análise de conteúdo de Bardin, separadamente, com três eixos temáticos em comum: 1) Papel do Agente de Segurança Prisional; 2) Relação do Agente de Segurança Prisional com o preso e; 3) Ressocialização do preso. Ao final do estudo, verificou-se que contribuir com a ressocialização do preso não está entre as atribuições legais do ASP e que tanto os ASP quanto os presos não percebem nenhuma contribuição dos ASPna ressocialização. Todavia, verificou-se que o tratamento respeitoso contribui para condições mais humanitárias na execução da pena.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Prison security"

1

Parliament, Great Britain. Prison security bill. HMSO, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Portlaoise Political Prisoners Relatives Action Committee. Portlaoise Prison: "for security reasons....". Portlaoise Prisoners Relatives Action Committee, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

John, Woodcock. Report of the enquiry into the escape of six prisoners from the special security unit at Whitemoor Prison, Cambridgeshire, on Friday 9th September 1994. HMSO, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Israel behind bars: Maximum security, maximum hope. Jacobs Media International Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martinez, Pablo. Texas prison housing configuration and the management of inmate security risks: Report to the governor and Legislature. Criminal Justice Policy Council, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bruton, James H. The big house: Life inside a supermax security prison. Voyageur Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barker, Anthony. Political responsibility for UK prison security: Ministers escape again. University of Essex, Department of Government, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Britain, Great. Prison Security Act 1992: Elizabeth II. 1992. Chapter 25. HMSO, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

John, Learmont. Review of Prison Service security in England and Wales and the escape from Parkhurst Prison on Tuesday, 3rd January 1995. HMSO, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Punishment and politics: The maximum security prison in New Zealand. Oxford University Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Prison security"

1

Cook, Kate, Mark James, and Richard Lee. "Prison Security Act 1992." In Core Statutes on Criminal Law. Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-1-137-54431-5_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Urrutia-Moldes, Alberto. "The Security prison model." In Health and Well-Being in Prison Design. Routledge, 2022. http://dx.doi.org/10.4324/9781003167549-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hill, Leslie B., and Benjamin Wright. "Considering the Correctional Context: Security Issues in Prison-Based Dog Training Programs." In Prison Dog Programs. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25618-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Høidal, Are, and Nina Hanssen. "Dynamic Security, Contact Officers and the Principle of Normality." In The Norwegian Prison System. Routledge, 2022. http://dx.doi.org/10.4324/9781003195887-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aoki, Masahiko. "Sugamo Prison and Anti-security Treaty Struggle." In Transboundary Game of Life. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2757-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bennett, Jamie. "Searching, ‘State of Security’ and the Structuration of Prison Security." In Body Searches and Imprisonment. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-20451-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Drake, Deborah H. "Demythologising the Prison and its Uses." In Prisons, Punishment and the Pursuit of Security. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137004833_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

He, Kui. "Study on Security and Stability of Prison Management." In Lecture Notes in Electrical Engineering. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4811-1_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liebling, Alison, Helen Arnold, and Christina Straub. "Prisons Research beyond the Conventional: Dialogue, ‘Creating Miracles’ and Staying Sane in a Maximum-Security Prison." In The Palgrave Handbook of Prison Ethnography. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137403889_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Millana, Luis. "Terrorism and Violence in Spanish Prisons: A Brief Glimpse into Prison Environment: Personal Experiences and Reflections." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77231-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Prison security"

1

Rok Hacin, Rok Hacin, Chuck Fileds, and Gorazd Meško. "Prison Staff - Prisoners Relations in Slovenian Prisons." In Twelfth Biennial International Conference Criminal Justice and Security in Central and Eastern Europe: From Common Sense to Evidence-based Policy–making. University of Maribor Pres, 2018. http://dx.doi.org/10.18690/978-961-286-174-2.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Christ, Godwin, and Lavigne. "A prison guard Duress alarm location system." In Proceedings of IEEE International Carnahan Conference on Security Technology. IEEE, 1993. http://dx.doi.org/10.1109/ccst.1993.386816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

de Moulpied, David S., Peter J. Rothschild, and Gerald J. Smith. "X-ray BodySearch eliminates strip search in Montana prison." In Enabling Technologies for Law Enforcement and Security, edited by A. Trent DePersia and John J. Pennella. SPIE, 1998. http://dx.doi.org/10.1117/12.334986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goolsby, Tommy D. "Aqueous foam as a less-than-lethal technology for prison applications." In Enabling Technologies for Law Enforcement and Security, edited by John B. Alexander, Debra D. Spencer, Steve Schmit, and Basil J. Steele. SPIE, 1997. http://dx.doi.org/10.1117/12.265401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Milenkovska, Marija. "Research UtiliSation in the Prison Security Policymaking Process: The Macedonian Experience." In Twelfth Biennial International Conference Criminal Justice and Security in Central and Eastern Europe: From Common Sense to Evidence-based Policy–making. University of Maribor Pres, 2018. http://dx.doi.org/10.18690/978-961-286-174-2.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pramerdorfer, C., M. Kampel, and R. Kreissl. "Behavior detection as a privacy-enhancing security technology in prison cells." In 9th International Conference on Imaging for Crime Detection and Prevention (ICDP-2019). Institution of Engineering and Technology, 2019. http://dx.doi.org/10.1049/cp.2019.1159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cronin, James G. R. "UCC enters Cork Prison: Transformative pedagogy through arts education." In Learning Connections 2019: Spaces, People, Practice. University College Cork||National Forum for the Enhancement of Teaching and Learning in Higher Education, 2019. http://dx.doi.org/10.33178/lc.2019.18.

Full text
Abstract:
This paper makes explicit processes of collaboration in a learning community partnership between Cork Prison and University College Cork (UCC). Cork Prison is a closed, medium security prison for adult males. It is a committal prison for counties Cork, Kerry and Waterford. The learning partnership has two objectives: firstly, to foster critical thinking strategies influenced by UCC’s application of the Project Zero Classroom, Harvard Graduate School of Education; secondly, to support student voices by promoting conversations on creativity resulting in the production of artworks exhibited during summertime on Spike Island, Cork Harbour, communicating prison as community in society.
APA, Harvard, Vancouver, ISO, and other styles
8

Caillat, Benjamin, Bob Gilbert, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna. "Prison: Tracking Process Interactions to Contain Malware." In 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hacin, Rok, Chuck Fields, and Gorazd Meško. "The Dual Nature of Legitimacy in the Prison Environment." In Twelfth Biennial International Conference Criminal Justice and Security in Central and Eastern Europe: From Common Sense to Evidence-based Policy–making. University of Maribor Pres, 2018. http://dx.doi.org/10.18690/978-961-286-174-2.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Wan, Zhang Xuehua, Xiong Xin, and Wu Jiande. "The Application Research of Wireless Sensor Network in the Prison Monitoring System." In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI). IEEE, 2010. http://dx.doi.org/10.1109/iitsi.2010.160.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Prison security"

1

Belporo, Lydie. Building Peace through DDR Programs: Lessons from Reintegrating Boko Haram Ex-Recruits in Cameroon. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.19.lpbi.

Full text
Abstract:
In the countries of the Lake Chad Basin, Boko Haram’s emergence has created major new security challenges for the region’s governments. Cameroon’s Far North region, the most populous in the country, is at the heart of these security issues. Since late 2020, Boko Haram has intensified attacks in Far North localities with assassinations targeting civilians, kidnappings, and looting in small towns along the Nigerian border. In response, the Cameroonian government has pursued a hardline strategy and militarized the affected localities. In addition to arbitrary arrests, prolonged pre-trial detention, prison overcrowding, and the death penalty are all sources of concern. This policy note outlines core findings from a case study of the Boko Haram ex-associates reintegration process in Cameroon. The note examines how existing community norms or mechanisms might be as useful as more standard approaches to disarmament, demobilization, and reintegration (DDR) in addressing challenges presented by Boko Haram ex-associates in Cameroon.
APA, Harvard, Vancouver, ISO, and other styles
2

S. Abdellatif, Omar. Localizing Human Rights SDGs: Ghana in context. Raisina House, 2021. http://dx.doi.org/10.52008/gh2021sdg.

Full text
Abstract:
In September 2015, Ghana along all UN member states endorsed the Agenda 2030 Sustainable Development Goals (SDGs) as the cardinal agenda towards achieving a prosperous global future. The SDGs are strongly interdependent, making progress in all goals essential for a country’s achievement of sustainable development. While Ghana and other West African nations have exhibited significant economic and democratic development post-independence. The judiciary system and related legal frameworks, as well as the lack of rule law and political will for safeguarding the human rights of its citizens, falls short of considering violations against minorities. Will Ghana be able to localize human rights related SDGs, given that West African governments historically tended to promote internal security and stability at the expense of universal human rights? This paper focuses on evaluating the commitments made by Ghana towards achieving Agenda 2030, with a particular focus on the SDGs 10 and 16 relating to the promotion of reduced inequalities, peace, justice and accountable institutions. Moreover, this paper also analyzes legal instruments and state laws put in place post Ghana’s democratization in 1992 for the purpose of preventing discrimination and human rights violations in the nation. The article aims to highlight how Ghana’s post-independence political experience, the lack of rule of law, flaws in the judiciary system, and the weak public access to justice are obstacles to its effective localization of human rights SGDs. Those obstacles to Ghana’s compliance with SDGs 10 and 16 are outlined in this paper through a consideration of human rights violations faced by the Ghanaian Muslim and HIV minorities, poor prison conditions, limited public access to justice and the country’s failure to commit to international treaties on human rights. Keywords: Ghana, human rights, rule of law, security, Agenda 2030
APA, Harvard, Vancouver, ISO, and other styles
3

Bowen, Pauline, and Richard Kissel. Program review for information security management assistance (PRISMA). National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trujillo, Michael. Arctic Security: The Race for the Arctic Through the Prism of International Relations Theory. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.6699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brock, Andrea, and Nathan Stephens-Griffin. Policing Environmental Injustice. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/1968-2021.130.

Full text
Abstract:
Environmental justice (EJ) activists have long worked with abolitionists in their communities, critiquing the ways policing, prisons, and pollution are entangled and racially constituted (Braz and Gilmore 2006). Yet, much EJ scholarship reflects a liberal Western focus on a more equal distribution of harms, rather than challenging the underlying systems of exploitation these harms rest upon (Álvarez and Coolsaet 2020). This article argues that policing facilitates environmentally unjust developments that are inherently harmful to nature and society. Policing helps enforce a social order rooted in the ‘securing’ of property, hierarchy, and human-nature exploitation. Examining the colonial continuities of policing, we argue that EJ must challenge the assumed necessity of policing, overcome the mythology of the state as ‘arbiter of justice’, and work to create social conditions in which policing is unnecessary. This will help open space to question other related harmful hegemonic principles. Policing drives environmental injustice, so EJ must embrace abolition.
APA, Harvard, Vancouver, ISO, and other styles
6

Ossoff, Will, Naz Modirzadeh, and Dustin Lewis. Preparing for a Twenty-Four-Month Sprint: A Primer for Prospective and New Elected Members of the United Nations Security Council. Harvard Law School Program on International Law and Armed Conflict, 2020. http://dx.doi.org/10.54813/tzle1195.

Full text
Abstract:
Under the United Nations Charter, the U.N. Security Council has several important functions and powers, not least with regard to taking binding actions to maintain international peace and security. The ten elected members have the opportunity to influence this area and others during their two-year terms on the Council. In this paper, we aim to illustrate some of these opportunities, identify potential guidance from prior elected members’ experiences, and outline the key procedures that incoming elected members should be aware of as they prepare to join the Council. In doing so, we seek in part to summarize the current state of scholarship and policy analysis in an effort to make this material more accessible to States and, particularly, to States’ legal advisers. We drafted this paper with a view towards States that have been elected and are preparing to join the Council, as well as for those States that are considering bidding for a seat on the Council. As a starting point, it may be warranted to dedicate resources for personnel at home in the capital and at the Mission in New York to become deeply familiar with the language, structure, and content of the relevant provisions of the U.N. Charter. That is because it is through those provisions that Council members engage in the diverse forms of political contestation and cooperation at the center of the Council’s work. In both the Charter itself and the Council’s practices and procedures, there are structural impediments that may hinder the influence of elected members on the Security Council. These include the permanent members’ veto power over decisions on matters not characterized as procedural and the short preparation time for newly elected members. Nevertheless, elected members have found creative ways to have an impact. Many of the Council’s “procedures” — such as the “penholder” system for drafting resolutions — are informal practices that can be navigated by resourceful and well-prepared elected members. Mechanisms through which elected members can exert influence include the following: Drafting resolutions; Drafting Presidential Statements, which might serve as a prelude to future resolutions; Drafting Notes by the President, which can be used, among other things, to change Council working methods; Chairing subsidiary bodies, such as sanctions committees; Chairing the Presidency; Introducing new substantive topics onto the Council’s agenda; and Undertaking “Arria-formula” meetings, which allow for broader participation from outside the Council. Case studies help illustrate the types and degrees of impact that elected members can have through their own initiative. Examples include the following undertakings: Canada’s emphasis in 1999–2000 on civilian protection, which led to numerous resolutions and the establishment of civilian protection as a topic on which the Council remains “seized” and continues to have regular debates; Belgium’s effort in 2007 to clarify the Council’s strategy around addressing natural resources and armed conflict, which resulted in a Presidential Statement; Australia’s efforts in 2014 resulting in the placing of the North Korean human rights situation on the Council’s agenda for the first time; and Brazil’s “Responsibility while Protecting” 2011 concept note, which helped shape debate around the Responsibility to Protect concept. Elected members have also influenced Council processes by working together in diverse coalitions. Examples include the following instances: Egypt, Japan, New Zealand, Spain, and Uruguay drafted a resolution that was adopted in 2016 on the protection of health-care workers in armed conflict; Cote d’Ivoire, Kuwait, the Netherlands, and Sweden drafted a resolution that was adopted in 2018 condemning the use of famine as an instrument of warfare; Malaysia, New Zealand, Senegal, and Venezuela tabled a 2016 resolution, which was ultimately adopted, condemning Israeli settlements in Palestinian territory; and A group of successive elected members helped reform the process around the imposition of sanctions against al-Qaeda and associated entities (later including the Islamic State of Iraq and the Levant), including by establishing an Ombudsperson. Past elected members’ experiences may offer some specific pieces of guidance for new members preparing to take their seats on the Council. For example, prospective, new, and current members might seek to take the following measures: Increase the size of and support for the staff of the Mission to the U.N., both in New York and in home capitals; Deploy high-level officials to help gain support for initiatives; Partner with members of the P5 who are the informal “penholder” on certain topics, as this may offer more opportunities to draft resolutions; Build support for initiatives from U.N. Member States that do not currently sit on the Council; and Leave enough time to see initiatives through to completion and continue to follow up after leaving the Council.
APA, Harvard, Vancouver, ISO, and other styles
7

Hicks, Jacqueline. Export of Digital Surveillance Technologies From China to Developing Countries. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.123.

Full text
Abstract:
There is evidence to show that Chinese companies, with some state credit backing, are selling digital surveillance technologies to developing countries, which are then sometimes used in authoritarian practices. However, there is little direct evidence to show that surveillance technologies sold by Chinese companies have more authoritarian potential than the technologies sold by non-Chinese companies. Some researchers define “surveillance technologies” as including any form of digital infrastructure. There is data to show that developing country governments are contracting Chinese companies to build digital infrastructures. Other researchers define “surveillance technologies” as smart city projects. It is estimated that in 2019, Chinese smart city technologies have been purchased in over 100 countries worldwide. Other researchers look at more specific elements of smart cities: There are estimates that the “AI surveillance” components of smart cities have been purchased in 47-65 countries worldwide, and the “data integration” security platforms in at least 80 countries. None of these figures imply anything about how these technologies are used. The “dual use” nature of these technologies means that they can have both legitimate civilian and public safety uses as well as authoritarian control uses. There is evidence of some governments in Africa using Chinese surveillance technologies to spy on political opponents and arrest protesters. Some authors say that some Chinese smart city projects are actually not very effective, but still provide governments with a “security aesthetic”. Research also shows that Chinese smart city technologies have been sold mostly to illiberal regimes. However, in the wider context, there is also ample evidence of non-Chinese surveillance technologies contributing to authoritarian control in developing countries. There is also evidence that UK companies sell surveillance technologies to mostly illiberal regimes. Some reports consulted for this rapid review imply that Chinese surveillance technologies are more likely to be used for authoritarian control than those sold by non-Chinese companies. This analysis is largely based on circumstantial rather than direct evidence. They rely on prior judgements, which are themselves subject to ongoing enquiry in the literature: Almost all of the reports consulted for this rapid review say that the most important factor determining whether governments in developing countries will deploy a particular technology for repressive purposes is the quality of governance in the country. No reports were found in the literature reviewed of Chinese state pressure on developing countries to adopt surveillance technologies, and there were some anecdotal reports of officials in developing countries saying they did not come under any pressure to buy from Chinese companies.
APA, Harvard, Vancouver, ISO, and other styles
8

Böhm, Franziska, Ingrid Jerve Ramsøy, and Brigitte Suter. Norms and Values in Refugee Resettlement: A Literature Review of Resettlement to the EU. Malmö University, 2021. http://dx.doi.org/10.24834/isbn.9789178771776.

Full text
Abstract:
As a result of the refugee reception crisis in 2015 the advocacy for increasing resettlement numbers in the overall refugee protection framework has gained momentum, as has research on resettlement to the EU. While the UNHCR purports resettlement as a durable solution for the international protection of refugees, resettlement programmes to the European Union are seen as a pillar of the external dimension of the EU’s asylum and migration policies and management. This paper presents and discusses the literature regarding the value transmissions taking place within these programmes. It reviews literature on the European resettlement process – ranging from the selection of refugees to be resettled, the information and training they receive prior to travelling to their new country of residence, their reception upon arrival, their placement and dispersal in the receiving state, as well as programs of private and community sponsorship. The literature shows that even if resettlement can be considered an external dimension of European migration policy, this process does not end at the border. Rather, resettlement entails particular forms of reception, placement and dispersal as well as integration practices that refugees are confronted with once they arrive in their resettlement country. These practices should thus be understood in the context of the resettlement regime as a whole. In this paper we map out where and how values (here understood as ideas about how something should be) and norms (expectations or rules that are socially enforced) are transmitted within this regime. ‘Value transmission’ is here understood in a broad sense, taking into account the values that are directly transmitted through information and education programmes, as well as those informing practices and actors’ decisions. Identifying how norms and values figure in the resettlement regime aid us in further understanding decision making processes, policy making, and the on-the-ground work of practitioners that influence refugees’ lives. An important finding in this literature review is that vulnerability is a central notion in international refugee protection, and even more so in resettlement. Ideas and practices regarding vulnerability are, throughout the resettlement regime, in continuous tension with those of security, integration, and of refugees’ own agency. The literature review and our discussion serve as a point of departure for developing further investigations into the external dimension of value transmission, which in turn can add insights into the role of norms and values in the making and un-making of (external) boundaries/borders.
APA, Harvard, Vancouver, ISO, and other styles
9

Israel, Alvaro, and John Merrill. Production of Seed Stocks for Sustainable Tank Cultivation of the Red Edible Seaweed Porphyra. United States Department of Agriculture, 2006. http://dx.doi.org/10.32747/2006.7696527.bard.

Full text
Abstract:
Porphyra species (commonly known as ‘nori’ or ‘purple laver’) are edible red seaweeds rich in proteins, vitamins and other highly valued biogenic compounds. For years Porphyra has been cultured using seeded nets extended in the open sea, and its biomass consumed primarily in the Far East. While demands for international markets have increased steadily at an average of 20% per year, supplies are on the verge and not expected to meet future demands. Alternatively, land-based cultivation of seaweed has become attractive in the mariculture industry since (1) important growth parameters can be controlled, (2) is environmentally friendly and (3) perfectly matches with integrated aquaculture leading to sustainable, high quality products. During the last few years a tank cultivation technology for Porphyra has been developed at the Israeli institution. This technology is based on indoor production of asexual spores and their subsequent growth to 1-2 mm seedlings. The seedlings are then transferred to outdoor tanks and ponds when seawater temperatures drop to 20 °C, or below, and days become shorter during winter time. However, the current technology efficiently serves only about 100 m2 of ponds during one growth season. In order to produce seedlings in sufficient amounts, it is critical to address both technical and biological aspects of seedling production, securing optimal up-scale to commercial-size cultivation farms. We hypothesize that massive production of spores is related to thalli origin, thalli age and sporulation triggers, and that seedling survival and their subsequent growth potential is determined by the seawater quality and overall indoor growth conditions imposed. A series of bio-reactors were constructed and tested in which spore release and spore growth were separately studied. The main assessment criteria for optimal viability of the seedlings will be by determining their electron transport rate using PAM fluorometry and by subsequent growth and biomass yields in outdoor ponds. Altogether the project showed (1), controlled sporulation is possible in big outdoor/growth chamber settings provided initial stock material (small frozen seedlings) is at hand, (2), contamination problems can be almost completely avoided if stock material is properly handled (clean as possible and partially dehydrated prior to freezing), (3), spore release can significantly be enhance using high nutrient levels during thawing for P. yezoensis and P. haitanensis, but not for P. rosengurttii, (4), PAM fluorometry is an efficient tool to estimate growth capacity in both seedlings and juvenile thalli. The BARD funding also served to explore other aspects of Porphyra biology and cultivation. For example, the taxonomical status of Porphyra strains used in this study was defined (see appendix), and the potential use of this seaweed in bioremediation was well substantiated. In addition, BARD funding supported a number of opportunities and activities in the Israeli lab, direct or indirectly related to the initial objectives of the project such as: additional molecular work in other seaweeds, description of at least 2 new species for the Israeli Mediterranean, and continuous support for the writing of a book on Global Change and applied aspects of seaweeds. The technology for Porphyra cultivation in land-based ponds is readily available. This study corroborated previous know-how of Porphyra growth in tanks and ponds, and yet offers important improvements regarding seedling production and their handling for successful cultivation. This study supported various other activities opening additional important issues in the biology/cultivation/use of Porphyra and other seaweeds.
APA, Harvard, Vancouver, ISO, and other styles
10

Geothermal heating retrofit at the Utah State Prison Minimum Security Facility. Final report, March 1979-January 1986. Office of Scientific and Technical Information (OSTI), 1986. http://dx.doi.org/10.2172/5828185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography