Academic literature on the topic 'Prison security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Prison security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Prison security"
Woodall, James. "Health promotion co-existing in a high-security prison context: a documentary analysis." International Journal of Prisoner Health 16, no. 3 (2020): 237–47. http://dx.doi.org/10.1108/ijph-09-2019-0047.
Full textΜπαμπάσικας, Κωνσταντίνος. "Η επίδραση του τύπου φυλακής στην επιθετικότητα και την ψυχική υγεία των κρατουμένων στις ελληνικές φυλακές". Psychology: the Journal of the Hellenic Psychological Society 22, № 1 (2020): 77. http://dx.doi.org/10.12681/psy_hps.23249.
Full textOkazawa-Rey, Margo, and Gwyn Kirk. "Maximum Security." Freiburger Zeitschrift für GeschlechterStudien 26, no. 1-2020 (2020): 71–84. http://dx.doi.org/10.3224/fzg.v26i1.05.
Full textZahars, Vitolds, and Māris Stivrenieks. "THE SECURITY ASPECTS OF PRISONS." Administrative and Criminal Justice 1, no. 70 (2015): 35. http://dx.doi.org/10.17770/acj.v1i70.4323.
Full textKariuki, John Ngugi, Wokabi Mwangi, and Hadija Murenga. "Security Threats Posed by Contraband Cell Phones in Prisons: Prison Officers’ Perspectives." Advances in Social Sciences Research Journal 7, no. 7 (2020): 815–24. http://dx.doi.org/10.14738/assrj.77.8708.
Full textJURIK, NANCY C., and RUSSELL WINN. "Describing Correctional-Security Dropouts and Rejects." Criminal Justice and Behavior 14, no. 1 (1987): 5–25. http://dx.doi.org/10.1177/0093854887014001002.
Full textRobbins, Liz. "Medium Security Prison." Minnesota review 2017, no. 88 (2017): 20. http://dx.doi.org/10.1215/00265667-3786863.
Full textCamp, Scott D., and Dawn M. Daggett. "Quality of Operations at Private and Public Prisons: Using Trends in Inmate Misconduct to Compare Prisons." Justice Research and Policy 7, no. 1 (2005): 27–51. http://dx.doi.org/10.3818/jrp.7.1.2005.27.
Full textAllen, Scott A., and Raed Aburabi. "When security and medicine missions conflict: confidentiality in prison settings." International Journal of Prisoner Health 12, no. 2 (2016): 73–77. http://dx.doi.org/10.1108/ijph-03-2016-0007.
Full textCamp, Scott D., and Gerald G. Gaes. "Criminogenic Effects of the Prison Environment on Inmate Behavior: Some Experimental Evidence." Crime & Delinquency 51, no. 3 (2005): 425–42. http://dx.doi.org/10.1177/0011128704271471.
Full textDissertations / Theses on the topic "Prison security"
Chan, Hok-mo. "Medium security prison." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2595149x.
Full text陳學武 and Hok-mo Chan. "Medium security prison." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31982773.
Full textPrice, David Edward. "Security categorisation in the English prison system." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621015.
Full textForster, Rachel Laura. "Questions of value : taking museums into a high security prison." Thesis, University of Leeds, 2016. http://etheses.whiterose.ac.uk/13293/.
Full textMaglinger, Lee. "A Modified Therapeutic Community: Reducing Violence in a Medium Security Prison." TopSCHOLAR®, 2006. http://digitalcommons.wku.edu/theses/295.
Full textJohansson, Maria. "The Complexity of Treatment in a High Security Prison Setting : Limitations and Possibilities." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-21607.
Full textThinane, Tsekelo Shadrack. "The institutionalisation of effective rehabilitation programmes at Groenpunt Maximum Security Prison / T.S. Thinane." Thesis, North-West University, 2010. http://hdl.handle.net/10394/4834.
Full textMothamaha, Ezekiel Mafoka. "Ministry to political prisoners on Robben Island (1960 - 1990) : a Church History approach." Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/61192.
Full textLong, Joshua S. "Appropriate classification of prisoners: Balancing prison safety with the least restrictive placements of Ohio inmates." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1593267208117717.
Full textSouza, Isabel Cristina Baptista de. "O agente de segurança prisional e a ressocialização sob a perspectiva do preso e da lei: um estudo na unidade prisional de Catalão–GO." Universidade Federal de Goiás, 2015. http://repositorio.bc.ufg.br/tede/handle/tede/5559.
Full textBooks on the topic "Prison security"
Portlaoise Political Prisoners Relatives Action Committee. Portlaoise Prison: "for security reasons....". Portlaoise Prisoners Relatives Action Committee, 1985.
Find full textJohn, Woodcock. Report of the enquiry into the escape of six prisoners from the special security unit at Whitemoor Prison, Cambridgeshire, on Friday 9th September 1994. HMSO, 1994.
Find full textIsrael behind bars: Maximum security, maximum hope. Jacobs Media International Inc., 2005.
Find full textMartinez, Pablo. Texas prison housing configuration and the management of inmate security risks: Report to the governor and Legislature. Criminal Justice Policy Council, 1998.
Find full textBruton, James H. The big house: Life inside a supermax security prison. Voyageur Press, 2004.
Find full textBarker, Anthony. Political responsibility for UK prison security: Ministers escape again. University of Essex, Department of Government, 1996.
Find full textBritain, Great. Prison Security Act 1992: Elizabeth II. 1992. Chapter 25. HMSO, 1992.
Find full textJohn, Learmont. Review of Prison Service security in England and Wales and the escape from Parkhurst Prison on Tuesday, 3rd January 1995. HMSO, 1995.
Find full textPunishment and politics: The maximum security prison in New Zealand. Oxford University Press, 1989.
Find full textBook chapters on the topic "Prison security"
Cook, Kate, Mark James, and Richard Lee. "Prison Security Act 1992." In Core Statutes on Criminal Law. Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-1-137-54431-5_62.
Full textUrrutia-Moldes, Alberto. "The Security prison model." In Health and Well-Being in Prison Design. Routledge, 2022. http://dx.doi.org/10.4324/9781003167549-14.
Full textHill, Leslie B., and Benjamin Wright. "Considering the Correctional Context: Security Issues in Prison-Based Dog Training Programs." In Prison Dog Programs. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25618-0_6.
Full textHøidal, Are, and Nina Hanssen. "Dynamic Security, Contact Officers and the Principle of Normality." In The Norwegian Prison System. Routledge, 2022. http://dx.doi.org/10.4324/9781003195887-5.
Full textAoki, Masahiko. "Sugamo Prison and Anti-security Treaty Struggle." In Transboundary Game of Life. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2757-5_10.
Full textBennett, Jamie. "Searching, ‘State of Security’ and the Structuration of Prison Security." In Body Searches and Imprisonment. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-20451-7_3.
Full textDrake, Deborah H. "Demythologising the Prison and its Uses." In Prisons, Punishment and the Pursuit of Security. Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137004833_1.
Full textHe, Kui. "Study on Security and Stability of Prison Management." In Lecture Notes in Electrical Engineering. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4811-1_56.
Full textLiebling, Alison, Helen Arnold, and Christina Straub. "Prisons Research beyond the Conventional: Dialogue, ‘Creating Miracles’ and Staying Sane in a Maximum-Security Prison." In The Palgrave Handbook of Prison Ethnography. Palgrave Macmillan UK, 2015. http://dx.doi.org/10.1057/9781137403889_4.
Full textMillana, Luis. "Terrorism and Violence in Spanish Prisons: A Brief Glimpse into Prison Environment: Personal Experiences and Reflections." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77231-8_11.
Full textConference papers on the topic "Prison security"
Rok Hacin, Rok Hacin, Chuck Fileds, and Gorazd Meško. "Prison Staff - Prisoners Relations in Slovenian Prisons." In Twelfth Biennial International Conference Criminal Justice and Security in Central and Eastern Europe: From Common Sense to Evidence-based Policy–making. University of Maribor Pres, 2018. http://dx.doi.org/10.18690/978-961-286-174-2.19.
Full textChrist, Godwin, and Lavigne. "A prison guard Duress alarm location system." In Proceedings of IEEE International Carnahan Conference on Security Technology. IEEE, 1993. http://dx.doi.org/10.1109/ccst.1993.386816.
Full textde Moulpied, David S., Peter J. Rothschild, and Gerald J. Smith. "X-ray BodySearch eliminates strip search in Montana prison." In Enabling Technologies for Law Enforcement and Security, edited by A. Trent DePersia and John J. Pennella. SPIE, 1998. http://dx.doi.org/10.1117/12.334986.
Full textGoolsby, Tommy D. "Aqueous foam as a less-than-lethal technology for prison applications." In Enabling Technologies for Law Enforcement and Security, edited by John B. Alexander, Debra D. Spencer, Steve Schmit, and Basil J. Steele. SPIE, 1997. http://dx.doi.org/10.1117/12.265401.
Full textMilenkovska, Marija. "Research UtiliSation in the Prison Security Policymaking Process: The Macedonian Experience." In Twelfth Biennial International Conference Criminal Justice and Security in Central and Eastern Europe: From Common Sense to Evidence-based Policy–making. University of Maribor Pres, 2018. http://dx.doi.org/10.18690/978-961-286-174-2.17.
Full textPramerdorfer, C., M. Kampel, and R. Kreissl. "Behavior detection as a privacy-enhancing security technology in prison cells." In 9th International Conference on Imaging for Crime Detection and Prevention (ICDP-2019). Institution of Engineering and Technology, 2019. http://dx.doi.org/10.1049/cp.2019.1159.
Full textCronin, James G. R. "UCC enters Cork Prison: Transformative pedagogy through arts education." In Learning Connections 2019: Spaces, People, Practice. University College Cork||National Forum for the Enhancement of Teaching and Learning in Higher Education, 2019. http://dx.doi.org/10.33178/lc.2019.18.
Full textCaillat, Benjamin, Bob Gilbert, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna. "Prison: Tracking Process Interactions to Contain Malware." In 2015 IEEE 17th International Conference on High-Performance Computing and Communications; 2015 IEEE 7th International Symposium on Cyberspace Safety and Security; and 2015 IEEE 12th International Conference on Embedded Software and Systems. IEEE, 2015. http://dx.doi.org/10.1109/hpcc-css-icess.2015.297.
Full textHacin, Rok, Chuck Fields, and Gorazd Meško. "The Dual Nature of Legitimacy in the Prison Environment." In Twelfth Biennial International Conference Criminal Justice and Security in Central and Eastern Europe: From Common Sense to Evidence-based Policy–making. University of Maribor Pres, 2018. http://dx.doi.org/10.18690/978-961-286-174-2.18.
Full textZhou, Wan, Zhang Xuehua, Xiong Xin, and Wu Jiande. "The Application Research of Wireless Sensor Network in the Prison Monitoring System." In 2010 Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI). IEEE, 2010. http://dx.doi.org/10.1109/iitsi.2010.160.
Full textReports on the topic "Prison security"
Belporo, Lydie. Building Peace through DDR Programs: Lessons from Reintegrating Boko Haram Ex-Recruits in Cameroon. RESOLVE Network, 2021. http://dx.doi.org/10.37805/pn2021.19.lpbi.
Full textS. Abdellatif, Omar. Localizing Human Rights SDGs: Ghana in context. Raisina House, 2021. http://dx.doi.org/10.52008/gh2021sdg.
Full textBowen, Pauline, and Richard Kissel. Program review for information security management assistance (PRISMA). National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7358.
Full textTrujillo, Michael. Arctic Security: The Race for the Arctic Through the Prism of International Relations Theory. Portland State University Library, 2000. http://dx.doi.org/10.15760/etd.6699.
Full textBrock, Andrea, and Nathan Stephens-Griffin. Policing Environmental Injustice. Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/1968-2021.130.
Full textOssoff, Will, Naz Modirzadeh, and Dustin Lewis. Preparing for a Twenty-Four-Month Sprint: A Primer for Prospective and New Elected Members of the United Nations Security Council. Harvard Law School Program on International Law and Armed Conflict, 2020. http://dx.doi.org/10.54813/tzle1195.
Full textHicks, Jacqueline. Export of Digital Surveillance Technologies From China to Developing Countries. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.123.
Full textBöhm, Franziska, Ingrid Jerve Ramsøy, and Brigitte Suter. Norms and Values in Refugee Resettlement: A Literature Review of Resettlement to the EU. Malmö University, 2021. http://dx.doi.org/10.24834/isbn.9789178771776.
Full textIsrael, Alvaro, and John Merrill. Production of Seed Stocks for Sustainable Tank Cultivation of the Red Edible Seaweed Porphyra. United States Department of Agriculture, 2006. http://dx.doi.org/10.32747/2006.7696527.bard.
Full textGeothermal heating retrofit at the Utah State Prison Minimum Security Facility. Final report, March 1979-January 1986. Office of Scientific and Technical Information (OSTI), 1986. http://dx.doi.org/10.2172/5828185.
Full text