To see the other types of publications on this topic, follow the link: Public Security Policy.

Dissertations / Theses on the topic 'Public Security Policy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Public Security Policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Stephens, Sukeena. "Perceptions of Homeland Security Policing in an Urban Midwestern Community." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6680.

Full text
Abstract:
Since the terrorist attacks on the United States of America on September 11, 2001, approach to policing has observably been shifted across the country. Utilizing a qualitative methodology, this study explored the perceptions of community members from a Chicago, Illinois community regarding the shift in policing style post 9/11. Cooley's theory of the looking glass self, coupled with a phenomenological approach to understand the deeper meaning associated with the perceptions of the residents and the shift in policing styles in Chicago communities. The data were obtained from participants who were at least 40 years old and held a residence for at least 3 years in the area prior to 9/11 and 3 to 5 years immediately after 9/11. The study included the use of a semi-structured interview guide and the findings were analyzed using inductive coding with thematic analysis. The findings indicated that residents of the community want a positive relationship with the police but perceive that they are viewed negatively by the police and that police fear them. Participants agreed that they recognized a shift in policing strategies and consistently noted a desire for police to return to community policing strategies that they perceive have been abandoned in favor of more militaristic approaches to law enforcement. The positive social change implications stemming from this study include recommendations to police executives to consider the strategic and tactical demilitarization of the police department and integrate community preferences in future decision making regarding critical standard operating procedures including stop and frisk policies, training initiatives, and zero tolerance declarations. Adherence to these recommendations may improve oversight of officers and improve relationships with the community.
APA, Harvard, Vancouver, ISO, and other styles
2

Huchim, Jennifer. "Policy Analysis of the Homeland Security Act of 2002." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10751639.

Full text
Abstract:
<p> Unaccompanied children arrive at the U.S. border in seek of refugee from the gang activity, abuse and/or poverty from their country of origin. The purpose of this thesis is to analyze the values, intentions, objectives and effects of the Homeland Security Act of 2002 with connection to unaccompanied children. There will be an analysis of how the Homeland Security Act of 2002 and other related policies have affected the care, processing, treatment and apprehension of unaccompanied children.</p><p>
APA, Harvard, Vancouver, ISO, and other styles
3

Gehring, James M. "Sports venue security: public policy options for SEAR 4–5 events." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42632.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Although the United States made considerable advances in improving sport venue security following 9/11, many sporting events remain vulnerable to attack. The perceived lack of threat to smaller venues, budget limitations and technical constraints are restricting the level of patron and vehicle screening at Special Event Assessment Rating (SEAR) 4–5 events. This thesis assesses the risk of attack by analyzing 21st century developments in explosive trace detection and closed-circuit television technologies, as well as trends surrounding the terrorist target value of SEAR 4–5 events. The research shows that these events have become viable, valuable terrorist targets because of increasing attendance and rapidly expanding exposure via cable television, satellite broadcasts, and the Internet. It identifies shortcomings of national protection doctrine and outlines potential cost-effective policy options to better support SEAR 4–5 sporting event venue security. Establishing a national doctrine, organizational support and training standards, along with deploying select surveillance and detection technologies, will bring untold benefits to the national protection mission.
APA, Harvard, Vancouver, ISO, and other styles
4

Nkwana, Hunadi Mapula. "A multisectoral public policy framework for food security in South Africa." Thesis, University of Pretoria, 2016. http://hdl.handle.net/2263/60514.

Full text
Abstract:
South Africa, the right to access to adequate food is entrenched in the Bill of Rights of the Constitution of the Republic of South Africa, 1996. The Government of South Africa has committed itself to promote and protect the right to access to adequate food, and to directly afford this right to people who are unable to enjoy it for reasons they cannot control. Access to adequate food is one of the pillars of food security, interrelated with food availability, food utilisation and stability of food supply. The approval of the National Policy on Food and Nutrition Security and the Household Food and Nutrition Security Strategy in 2013 by Cabinet indicates a commitment by government to promote the eradication of hunger and the achievement of food security. There is, however, fragmentation in the current and proposed institutional arrangements applicable to food security in the above-mentioned policy and the strategy. This thesis advocates for a coordinated approach in the implementation of the National Policy on Food and Nutrition Security, as the guiding framework for maximising synergy between government departments and civil society. The study investigates the extent to which the current policy context for food security in South Africa promotes multisectoral coordination, through an assessment of the relationship between the Department of Agriculture, Forestry and Fisheries, the Department of Basic Education, the Department of Trade and Industry and the Department of Social Development as lead departments for food security in the Integrated Food Security Strategy, 2002. The study follows a qualitative research approach, through the use of interviews, documents and archival records, in order to identify the challenges to multisectoral coordination in policy and programme implementation. The key findings of the study are that there is recognition by government of the multisectoral nature of food security, which necessitates collaboration between multiple role-players in all three spheres of government. The challenge, however, lies in the formulation of the National Policy on Food and Nutrition Security, as well as the implementation thereof. The lack of clearly defined indicators for monitoring and evaluation of the multiple pillars of food security present a challenge in policy formulation, implementation and evaluation. The assignment of a convening role for multisectoral platforms to a sector department is identified as a limitation to effective multisectoral coordination. The study identifies international benchmarks using Brazil and Ethiopia as case studies from which South Africa can learn, with regard to the implementation of the National Policy on Food and Nutrition Security. The research proposes a multisectoral public policy framework for food security in South Africa, in order to promote the coordination and collaboration of the various government departments that are responsible for implementing programmes applicable to food security. The framework highlights the importance of the participation of civil society, the private sector and non-governmental organisations in the implementation of a policy that aims to address the four pillars of food security.<br>Thesis (DAdmin)--University of Pretoria, 2016.<br>School of Public Management and Administration (SPMA)<br>DAdmin<br>Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
5

Larkin, Linda F. "Meanings of Security: A Constructivist Inquiry into the Context of Information Security Policy Development Post 9/11." VCU Scholars Compass, 2004. http://scholarscompass.vcu.edu/etd/1272.

Full text
Abstract:
Security is a term that appears to be used in a variety of ways and to have a number of meanings. In policy discussions, there may be reference to information security, national security, network security, online security, and other kinds of security. In an environment where technological innovation appears to be occurring at an ever increasing rate, policy makers look to technological experts for advice, and information security policy is developed, it seems to be important to consider these variations in meaning. This constructivist inquiry explores the context in which information security policy is developed and inquires into the meanings, assumptions, and values of those who engage in policy discourse. The guiding research question, "What is the meaning of security?" asks participants in federal and state government, colleges and universities, and the private and non-profit sectors about their understandings of security. The findings of this inquiry, presented in a narrative case study report, and the implications of this case study provide a richer understanding of the multiple meanings of security in the context in which information is selected and presented to policy makers, advice is given, and policy decisions are made. The multiple perspectives offered by diverse research participants offer valuable insights into the complex world in which information security policy development takes place. While the goal of this research is understanding, the use of thick description in the narrative may aid in the transferability necessary for the reader to make use of this research in other settings. Lessons learned are included, along with implications for policy makers and for future research.
APA, Harvard, Vancouver, ISO, and other styles
6

Hightower, Rudolph L. II. "National Security Policy Complexity: An Analysis of U.S. Defense Security Cooperation Program Effects on Political Terror." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1512058156407646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hayworth, Robert. "American National Security Strategy as it Pertains to the Afghanistan War." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4857.

Full text
Abstract:
Following 16 years of war in Afghanistan the number of U.S. military, Coalition forces and Afghan civilian fatalities has exceeded the number of Americans lost on 9/11 and has cost the United States nearly $841 billion dollars. The results are that Afghanistan remains in turmoil and that terrorist attacks, the reason for the invasion, continues. The question is should United States assess a different approach that would result in less blood and treasure being spent to address the need to mitigate terrorist threats. Guided by the analysis of conventional- centric and asymmetric-centric approaches to a counterterrorism strategy, this qualitative study focused on evaluating the effects of U.S. national strategy for the Afghanistan war between 2001 and 2016. A narrative inquiry was employed that used extensive in-depth interviews with five implementers and five recipients of the American strategy based in Afghanistan. The participants were recruited from the U.S. Special Forces community that implemented American strategy in Afghanistan, and from Afghans that experienced the American strategy firsthand. Data were analyzed by employing an inductive coding method. The literature review revealed an intention to use large military forces to conduct a conventional-centric counterterrorism strategy, but the narrative inquiry revealed a negative effect of the conventional-centric counterterrorism strategy. Though more research in this area is needed the implications from the findings for positive social change that an asymmetric-centric strategy could offer as a possible effective solution for countering terrorism. These recommendations may help national strategy developers develop a structure to develop future counterterrorism strategies.
APA, Harvard, Vancouver, ISO, and other styles
8

Howard, Melissa M. "Organization and reorganization as manifestation of public policy: national security emergency management." Diss., Virginia Tech, 1992. http://hdl.handle.net/10919/39684.

Full text
Abstract:
This dissertation discusses the administrative mechanisms used to execute the president's federal interagency program for national security emergency preparedness (NSEP). The research examines NSEP organizational history starting with its formal creation in 1933, and focusing on its most recent structure, the Federal Emergency Management Agency (during the 1978-1990 period). The dissertation explores formal organizations as manifestations of public policy. The critical events of recent NSEP history resulting in the redefinition of the public policy are the focus of this case study. The findings are: (1) that reorganization has been a significant aspect of NSEP history; (2) that the formal and informal relationship of an organization and its leadership with the White House constitute a critical aspect of organizational design; (3) that the task of coordination is a murky one rife with hazards; and (4) that the effectiveness of a reorganization can be undermined by its implementation.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
9

Narayanan, Anu. "The Emerging Smart Grid: Opportunities for Increased System Reliability and Potential Security Risks." Research Showcase @ CMU, 2012. http://repository.cmu.edu/dissertations/138.

Full text
Abstract:
The drive to make the aging electric grid more efficient, reliable, and clean has been at the heart of the “smart grid” mission. Additionally, provisions of the 2007 Energy Independence and Security Act (EISA) and the 2009 American Recovery and Reinvestment Act (ARRA) have led to smart grid investments in the United States. Smart grid upgrades have included the installation of new technologies at all levels of the electric power delivery system. At the distribution system level modernization has included upgrades to communication systems, distribution automation, local control and protection systems, and advanced metering infrastructure (AMI). Chapter 2 of this thesis aims to use elements of the emerging smart grid at the distribution system level to alleviate the effects of a widespread and long-duration power blackout. Despite continuing efforts to make the electric grid robust, some risk remains of widespread and extended power outages caused by extreme weather, human error, or premeditated terrorist attack. Chapter 2 applies the concept of survivability to the case of ensuring the continued provision of a subset of socially critical services during such blackouts. A load cycling based methodology is proposed, and an associated economic analysis indicates that the cost of implementing the proposed scheme constitutes less than 1% of median annual household income for a range of assumed outage probabilities, distributed generation resource availabilities, and financing options. While the technical elements of proposed scheme are largely feasible, a few policy changes are identified as necessary for successful implementation of the scheme. The latter half of this thesis focuses on one potential security risk posed by the large-scale deployment of smart meters. Smart meters constitute one component of advanced metering infrastructure (AMI), a key element of the smart grid. Chapter 3 describes a few documented smart meter hacking strategies and motivates the following question: What, if any, are the implications of smart meter hacking for the bulk power grid? To help answer this question Chapter 4 focuses on one specific attack type with the potential for causing widespread disruption to electric service – the cycling of a large number of consumer loads using the remote connect/disconnect switch on several smart meters. Results from simulations performed on two IEEE test networks (the 9 and 39-bus dynamic test cases) indicate that it is improbable that the mere toggling of customer loads could destabilize the bulk power grid because the fraction of system load that needs to be cycled to induce instability is likely to be prohibitively large.
APA, Harvard, Vancouver, ISO, and other styles
10

Moberger, Elin. "Free Movement of Goods : Article 36 TFEU and Mandatory Requirements Justification under Public Policy and Public Security." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-76477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kereki, László. "Applying the multiple public good model for establishing a security policy for Hungary. /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA349559.

Full text
Abstract:
Thesis (M.S. in International Resource Planning and Management) Naval Postgraduate School, June 1998.<br>"June 1998." Thesis advisor(s): Katsuaki L. Terasawa. Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
12

Kereki, Laszlo. "Applying the multiple public good model for establishing a security policy for Hungary." Thesis, Monterey, California. Naval Postgraduate School, 1998. http://hdl.handle.net/10945/7978.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This study was written with an aim to suggest a security policy approach for Hungary after becoming a member of NATO. The formulation of the country's security policy started with examination of security threats in general and analysis of Hungary's close security environment in particular. The analysis revealed that the threat of large scale military aggression has disappeared. However, other types of security challenges--economic crises, ethnic hostilities, environmental pollution, proliferation of weapons of mass destruction--prevailed, and the military concerns of security has decreased in importance. The issues of globalization, and diversification of threat perception could be addressed by cultivating a portfolio of security provisions. The multiple public good model suggested by Mark A. Boyer, an associate professor of political science at University of Connecticut, for analyzing defense alliances was an appropriate approach to formulation of Hungary's security policy. Based on the results from the threat assessment and the suggestions of the multiple good model, Hungary's security policy was introduced as a portfolio of defense provisions which in turn was Hungary's contribution to the Alliance. The evidence of contribution to the collective defense was seen through an examination of Hungary's path toward acceptance into NATO and an analysis of domestic stakeholders. The suggested portfolio contained three particularly Important fields: economic cooperation as a means of spreading security eastward, handling the questions of ethnic minorities in neighboring countries, and modernization of the Hungarian Defense Force.
APA, Harvard, Vancouver, ISO, and other styles
13

Pedersen, Christian E. Payne Michael A. Gagner Cari. "A Security Strategy for the United States of America." Thesis, Pepperdine University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1594924.

Full text
Abstract:
<p> This thesis was written as to meet the requirements and specifications of the Pepperdine School of Public Policy National Security capstone course SPP 607.01. Written in the spirit of the official National Security Strategies created by each Presidential administration, this document looks to analyze policy concerns of the United States, surrounding the Russian Federation. Despite the seemingly endless points of contention between both nations where there interests conflict, there are an abundance of opportunities where both nations&rsquo; interests align. It is within these concurrent interests that opportunities arise for coordination and cooperation. Policy makers whom adopt a realistic understanding of the Russian Federation, can pragmatically craft policy to advance American interests in the region and more readily protect the Security of the United States.</p>
APA, Harvard, Vancouver, ISO, and other styles
14

Flowers, Jim David. "Explaining policy differences as a function of diverse governance institutions." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54971.

Full text
Abstract:
This study asks the question: “How does the structure of cybersecurity policy relate to differences in structure of policy governance of universities and colleges?” The study has three objectives. First, the study seeks to add to the body of knowledge concerning the relationship between the structure of cybersecurity policy processes and the security policies developed by those processes. Second, the study seeks to demonstrate the usefulness of the Institutional Grammar Tool, Rules Configurations, and other methods employed to analyze institutional configurations. Third, the study seeks to provide pragmatic suggestions for cybersecurity practitioners to systematically identify deficiencies in policy structure that contribute to less than optimum outcomes. Research on this question is necessary as no integrative framework exists for describing or predicting how organizations adopt and implement cyber security policy. The study proposes such a framework by integrating an ideal model for cyber security governance with the principles of the Institutional Analysis and Design framework (IAD). Four research universities of the University System of Georgia are subjected to a cross-case comparison of information security policies. Interviews and policy documents provide a database of institutional statements that are analyzed using IAD methods and tools. Prior research suggests that elements of policy structure, such as how the policy fits the organization’s objectives and culture, are linked to policy effectiveness. Research also suggests that how those elements of policy structure reflect external threats and organizational factors are determined by how the cybersecurity policy development is integrated into the governance of university wide policy. In addition to demonstrating the utility of an integrated approach to studying the problem of creating effective policy, findings demonstrate how a well-integrated cybersecurity governance structure provides better fit, constructs policies of appropriate scope, and is more likely to include the components of governance necessary for policy effectiveness. Findings also suggest that policy form, the readability of policy, may be improved if the documents are analyzed using the institutional grammar tools suggested by the IAD and if collaboration with users and managers to construct policy is encouraged. The capability of the methods employed by the study to identify deficiencies in cyber security governance structure that are manifested in less effective policy outcomes may aid policy makers as they strive to develop policy solutions to an ever changing security threat
APA, Harvard, Vancouver, ISO, and other styles
15

Jain, Chaya Rani. "The Post-9/11 Federal Homeland Security Paradigm and the Adoptive Capacity of Public Administration Theory and Practice." VCU Scholars Compass, 2006. http://scholarscompass.vcu.edu/etd/1427.

Full text
Abstract:
The September 11, 2001 terrorist attacks redefined the federal approach to disaster planning. Prior to 9/11, disaster and emergency management meant preparedness for and response to natural and man-made emergencies such as floods, hurricanes, fires, and civil discord. The post-9/11 paradigm shift, a multi-pronged approach called "homeland security" strategy, now incorporates a multitude of man- and nature-made disasters to include border and transportation security; emergency preparedness, response and recovery against chemical, biological, radiological and nuclear threats; as well as information analysis and infrastructure protection. These new priorities were communicated to the state and local governments. The purpose of this descriptive, cross-sectional study is two-fold: to analyze the post-9/11 federal homeland security (FHS) priorities' acceptance among the Virginia's local public emergency-management practitioners; and, explore the factors that explain the degree of adoption. The degree to which Virginia localities have adopted the FHS priorities is investigated through an opinion survey of Virginia's local practitioners. The survey is designed to shed light upon two key research questions: (1) Have the priorities of the new federal homeland security strategy been accepted as the local priorities? (2) Is population a factor whether or not the federal HS priorities were accepted? It is hypothesized that (1) localities have paralleled the federal government in expanding their approach to disaster management; and, that (2) larger localities (population greater than 50,000) have done so to a greater extent than the small ones (population up to 50,000). Each research hypothesis is tested through operationalization of five federal HS priorities. This study's survey instrument replicates California's August 2002 survey questionnaire, administered less than a year from the terrorist attacks. While California findings show local practitioner's acceptance of the federal priorities in general, crime and economic concerns reported to be the officials' top two concerns over the homeland security-related threats. This study also explores the probable theoretical explanation of the overall FHS priorities acceptance or lack thereof, by analyzing the two likely explanatory concepts: path dependence and bureaucratic management. It is hoped that operationalization of these explanatory models will facilitate the development of future surveys to allow for a greater understanding of local responses.The questionnaire was mailed to Virginia's all 141 local practitioners to collect their perceptions regarding the FHS strategy's five priorities: (1) homeland security as the primary mission for local emergency management; (2) increased level of HS-related planning and preparedness; (3) increased intergovernmental cooperation; (4) increased citizen participation; and, (5) increase in HS-related spending. The findings were used in evaluating: (a) the localities' acceptance of the federal priorities; and (b) localities' comparison based on the two populations groups: small (up to 50,000) and large (over 50,000). Because California's survey instrument was replicated to determine Virginia officials' perceptions, a comparison of Virginia and California officials' opinions was conducted to compare similarities and differences between the two states over a three-year gap. The overall findings of this study will help expand the existing knowledge concerning localities and homeland security. They will also help with policy decisions at state and local levels, particularly in matching homeland security needs with scarce federal resources. While the evolution of homeland security and emergency management policies before and after 9/11 suggest that path dependence and bureaucratic management played a critical role in persuading the localities to follow federal policies and guidelines, the survey questions do not directly answer why the new FHS priorities were accepted. Future researchers may benefit by modifying the existing survey instrument by adding a couple of questions to get at the "why" question more effectively. For example, practitioners may be asked the degree of their compliance to federal requirements.
APA, Harvard, Vancouver, ISO, and other styles
16

Smith, Kane. "A Multi-Objective Framework for Information Security Public Policy: The Case of Health Informatics." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5320.

Full text
Abstract:
Detailed holistic patient data is critical for healthcare organizations to better serve their patient populations. This information allows healthcare organizations to create a detailed and holistic record of a patient’s health. However, this large aggregation of personally identifiable patient data raises serious privacy and security concerns amongst patients. For this reason, patient concerns around the privacy and security of information retained by healthcare organizations must be addressed through the development of effective public policy. This research, therefore argues that any decision making process aimed at developing public policy dealing with patient data privacy and security concerns should not only address regulatory concerns, but also patient-centric values. To accomplish this task, multi-objective decision analytic techniques, with Nissenbaum’s (2004) contextual integrity as a normative framework are used. This is done to elicit patient-centric preferences to assist organizations and governmental institutions alike in dealing with their privacy and security concerns around patient data stored by Healthcare Systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Disraelly, Deena S. (Deena Sara) 1974. "Public-private partnerships : security and emergency response collaboration in a new threat environment." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34783.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program; and, (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2004.<br>Includes bibliographical references (leaves 218-225).<br>September 11th, 2001 marks the worst terrorist action to occur on United States soil and opens a new period in history in which indiscriminate terrorist acts are possible, if not probable. Many of these possible acts, as well as the actions to prevent and recover, will have an impact on the supply chain and services in ways that we cannot yet understand. Previous research has focused on theft prevention and the disruptions such thefts might cause, and very little research on the supply chain impacts of September 11th exist. What is clear, however, is that as government agencies include the creation of public-private partnerships as well as the introduction of new technology, increasing inventory, and building system resilience, among others. Limited examples of public-private partnerships for security exist, however, there are several examples of partnerships for emergency response. Since both emergency response partnerships and security collaboratives share the same objective - to protect and secure the personnel, facilities, and supply chain - this thesis investigates emergency response, early detection, and propose new policies and regulations and the threat of international terrorism continues, corporate America needs to find a method for securing their operations. These methods may post-September 11th security examples to determine the key factors in establishing successful public-private partnerships. The learnings indicate collaborative partnerships and emergency response cooperatives are the most commonly used for promoting security and that motivation, cooperative goals, communication and trust are the most important factors to creating successful partnerships. Other factors vary by level of importance depending<br>(cont.) on the type of partnership. Public regulation requires private cooperation in order to succeed. Similarly, private sector security relies on public sector concurrence. The greater the recognized interdependence between the public and private sector, the more likely the partnership is to succeed. Recommendations include introductory steps to creating such partnerships, as well as proposed actions which both sectors should consider to ensure partnership success.<br>by Deena S. Disraelly.<br>M.Eng.in Logistics<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
18

Hendron, Frank E. "The sacrifices of civil liberties for security in schools| The correlates of parent's attitudes." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10145329.

Full text
Abstract:
<p> While there is considerable research on active shooters, civil liberties, and security in school, there is only limited research that focused upon the parent&rsquo;s perceptions. Parent&rsquo;s perceptions affect children&rsquo;s success in learning and influence children&rsquo;s perceptions on feeling safe in school. The purpose of this study is to use a quantitative correlational study to evaluate the parent&rsquo;s perceptions as they relate to sacrificing civil liberties for increased school security. A specific focus is upon parents with children in high schools within the United States. The theoretical basis for this study is the decision making theory which assumes rational behavior. The study required the creation, validation, and testing for reliability of the sacrificing civil liberties for security survey instrument. The sampling of 254 parents from throughout the United States was completed utilizing a web-based survey. The results of this study identified a significant relationship between every subscale of sacrificing civil liberties (SCL) and both predictors Trust in Government (TIG) and Right Wing Authoritarianism (RWA). No relationship was found between educational levels and SCL. A relationship with the predictor age was found with the SCL subscales active monitoring and passive monitoring. Finally, a relationship with the predictor gender was found with the SCL subscale active monitoring. These findings indicate that parents are willing to sacrifice some of their children&rsquo;s civil liberties within certain constraints. Based upon the results of this study, a conclusion can be drawn that parent&rsquo;s perceptions are influenced by many of the predictors. The largest relationship was with the predictors TIG and RWA. School officials, law enforcement, and government officials can use these results to assess the acceptability of their actions of increased security while carefully limiting the impact upon student&rsquo;s civil liberties.</p>
APA, Harvard, Vancouver, ISO, and other styles
19

von, Bleichert Peter. "Port Security: The Terrorist Naval Mine/Underwater Improvised Explosive Device Threat." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/901.

Full text
Abstract:
Terrorist naval mines/underwater improvised explosive devices (M/UWIEDs) are a threat to U.S. maritime ports, and could cause economic damage, panic, and mass casualties. The purpose of this case study was to examine this threat and propose reforms that improve port security management. The study aligned with the mission area analysis objective of identifying and assessing potential terrorist threats in order to preempt and prevent attacks. Von Bertalanffy's general systems theory was the framework for research questions, which focused on improvements in port security management to mitigate the threat of terrorist M/UWIEDs. Data collection included a document content analysis of open source/nonclassified crime reports, government threat assessments, and legislation; physical artifacts (port infrastructure) information; policy papers; maps, satellite imagery, and navigational charts; peer-reviewed academic literature; and direct observation of 2 California-based maritime ports and an inspection of their physical artifacts. Data were organized by general themes; coded axially and selectively; and analyzed by phrases, topics, and words associated with minelaying, mine countermeasures, and port security. Key findings were that, since 9/11, overall port security has improved, although there has been little progress in countering the threat presented by M/UWIEDs. Further, vulnerabilities exist that terrorists who seek to commit an M/UWIED attack or campaign could misuse. The findings from this study contribute to positive social change by providing data to key stakeholders responsible for counterterrorism, mine warfare, and port security, thereby contributing to overall U.S. homeland security.
APA, Harvard, Vancouver, ISO, and other styles
20

Johansson, Matilda, and Annelie Nordin. "Policy Reform in Egypt? : A case study." Thesis, Umeå universitet, Statsvetenskapliga institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-91335.

Full text
Abstract:
This paper studies the police reform in Egypt in the light of the revolution 2011. The ousting of the authoritarian president Hosni Mubarak was the beginning of the transition towards democracy. Within 15 months both parliamentary and presidential election had taken place. The political leaders were new and the transitional process had begun however the institutions where still the same and one feature of the revolution was to reform the police since the police was hated as the oppressive power it was. Transition from totalitarian regime to democracy is more than elections it is about reforming the institutions and especially the security sector hence they often play a significant role in oppressing the citizens in an authoritarian state. The police in Egypt used repressive methods to control the citizens. Therefore it is interesting to investigate whether the police are beginning to transform along the principles of democratic policing, a specific part of security sector reform focusing on the reformation of the police. The notion of human security with the people at the centre lay as a foundation of the theoretical framework. The material consists of in- depth interviews with leaders and active people in the civil society and their view regarding police work and police reform after the revolution. The conclusions drawn from the study is that the police lack capacity, understanding and training to reform. The reformation has to be influenced by political will from legislative and institutional level as well from the police officers themselves. There are challenges if a reform of the police will be successful and some of them are connected with national and international circumstances.
APA, Harvard, Vancouver, ISO, and other styles
21

Titus, Jr Alfred Stanford. "Realigning Community Policing in a Homeland Security Era." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4106.

Full text
Abstract:
The priority shift from community policing to homeland security in local police departments in the United States has threatened the relationships and successes established by community policing, though little empirical research explored the relationship between funding and implementation of homeland security versus community policing objectives among local law enforcement agencies. Using Karl Popper's conceptualization of the liberal democracy as the framework, the purpose of this descriptive study was to examine how trends in funding and implementation of both community policing and homeland security objectives changed among American law enforcement agencies between 1993 and 2013. Data were acquired from the Law Enforcement Management and Administrative Statistics dataset held by the Bureau of Justice Statistics for the years 1993 to 2013. The data included information from sample sizes that varied by year: 950 to 2,503 American law enforcement agencies with over 100 sworn officers and a stratified random sample of 831 to 2,145 American law enforcement agencies with fewer than 100 sworn officers. Data were examined using descriptive statistics and findings indicate community policing began as the priority, was scaled back after the terrorist attacks of September 11, 2001, when homeland security became the priority, and today local police departments are using strategy integration to maintain national security, public safety, and community relations simultaneously. Positive social change implications stemming from this study include the conveyance that communities are still the priority in policing and recommendations to local police agencies to utilize strategy integration to maintain community policing, regardless of the priority.
APA, Harvard, Vancouver, ISO, and other styles
22

Caulfield, Thomas E. "Nonviolent Resistance to Security Policy in Nationalist Northern Ireland, 1970-1981." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6186.

Full text
Abstract:
Political division has plagued Northern Ireland since its partition from the rest of Ireland in the 1920s. Current literature recounts the role of nationalist actors in the violent struggle that erupted in 1969 initiating a 3-decade period of civil strife described as the Troubles. However, very little scholarly coverage exists providing details of nonviolent resistance on the part of some community members. The purpose of this interpretive phenomenological study was to examine the meanings and perceptions evoked from Irish nationalists from Belfast and Derry who chose to challenge security policies through nonviolent actions from 1970 through 1981. Using a chain sampling approach, 14 protesters volunteered to tell their stories. Benet's polarities of democracy unifying model was used as the theoretical framework for the study. The data collected were analyzed using the modified Stevick-Colaizzi-Keen method, which involved a synthesis of meanings generated from respondents. Data analysis revealed 4 major themes that underpinned informant experiences of protest: social identity, coping, perseverance, and empowerment. Data showed in many instances that more aggressive security tactics used against demonstrators incited more intense antistate activities. Public administrators, through a combination of written policy and security personnel training, should, therefore, address sociopolitical grievances in a manner that will promote mediation in an effort to avoid instigation of further and more physical protest actions. State officials, as well as elected legislators who write and analyze public policy, may incorporate the findings of this study to expediate the delivery of more democratic government services and to support and promote nonviolent active citizenry.
APA, Harvard, Vancouver, ISO, and other styles
23

Gonzalez, Manuel. "The Question of Homeland Security in Rural America." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2261.

Full text
Abstract:
Following the issuance of the National Preparedness Guidelines in 2009 by the Department of Homeland Security, it remains unknown whether homeland security programs have been consistently implemented in the nation's rural areas. Research findings have been inconsistent and inconclusive on the degree of implementation. Two problems may result from inadequate implementation of these programs: weakened national security from the failure to protect critical infrastructure in remote areas and a threat to public safety in rural towns. The purpose of this qualitative case study was to explore and describe the reasons for possible noncompliance through purposeful interviews with 10 law enforcement officials and emergency managers in selected Midwestern rural towns. The study's theoretical foundation was based on Putnam's theory of social capital, which holds that community cohesion develops in direct relation to the adaptation of social networks that promote mutual cooperation during times of need. The research centered on the question of how rural emergency managers and law enforcement officials justified noncompliance with the National Preparedness Guidelines of 2009. The interviews and materials were transcribed and analyzed with qualitative analytic software using open, axial, and selective coding to identify themes and patterns. The study's key findings disconfirmed conclusions reported in previous studies and confirmed compliance with the Guidelines in the studied rural towns. Implications for positive social change include informing policymakers, emergency managers, law enforcement officials, and researchers. Application of social capital principles in all the nation's remote areas may enhance national security and improve rural public safety.
APA, Harvard, Vancouver, ISO, and other styles
24

Nihart, Alison. "Developing a Cohesive Urban Agriculture Policy for Burlington, VT." ScholarWorks @ UVM, 2013. http://scholarworks.uvm.edu/graddis/761.

Full text
Abstract:
A growing interest in urban food production has prompted many North American cities to revise their municipal policies regarding agricultural activities. In March 2011, the City Council of Burlington, VT, created the Urban Agriculture Task Force to investigate and recommend policies to provide city officials with tools to effectively govern urban agriculture. In coordination with the Task Force as a community partner, I used a governance framework and participatory action research (PAR) to analyze: (1) the needs of local stakeholders, including urban agriculture practitioners, the general Burlington community, and government officials; (2) the policy tools available to the City of Burlington, including the direct provision of services, regulation, public information, and partnerships with other organizations; (3) the actors and relationships present in Burlington’s urban agriculture governance network; and (4) policy approaches used in other cities. Based on this analysis, over 50 policy recommendations were developed for the City of Burlington, ranging from ordinance revisions to the development of new urban agriculture initiatives. Key findings include that (1) a balance must be struck between stakeholder needs (e.g. practitioners desire that regulations be minimal, while municipal officials need measurable standards to ease implementation); (2) a legal basis for governing some aspects of urban agriculture, such as the humane treatment of livestock, is needed, but other aspects, such as managing neighbor conflicts or connecting people to available land, are not easily regulated and require innovative programming; and (3) the City has an opportunity to partner with other organizations that are better suited to provide technical expertise to practitioners. These recommendations lay the groundwork for the City to better govern and support current and future urban agriculture activities.
APA, Harvard, Vancouver, ISO, and other styles
25

Seed, Barbara. "Food security in Public Health and other government programs in British Columbia, Canada : a policy analysis." Thesis, City University London, 2011. http://openaccess.city.ac.uk/1173/.

Full text
Abstract:
Public Health has re-emerged as a driver of food security in British Columbia. Food security policy, programs and infrastructure have been integrated into the Public Health sector and other areas of government, including the adoption of food security as a Core Public Health program. This policy analysis of the integration merges findings from forty-eight key informant interviews conducted with government, Civil Society, and food supply representatives involved in the initiatives, along with relevant documents and participant/direct observations. Findings were analyzed according to “contextual”, “diagnostic”, “evaluative” and “strategic” categories from the Ritchie and Spencer framework for Applied Policy Research. While Civil Society was the driver for food security in British Columbia, Public Health was the driver for the integration of food security into the government. Public Health held most of the power, and often determined the agenda and the players involved. While many interviewees heralded the accomplishments of the incorporation of food security into Public Health, stakeholders also acknowledged the relative insignificance of the food security agenda in relation to other “weightier”, competing agendas. Conflict between stakeholders over approaches to food insecurity/hunger existed, and it was only weakly included in the agenda. Looking to consequences of the integration, food security increased in legitimacy within the Public Health sector over the research period. Interviewees described a clash of cultures between Public Health and Civil Society occurring partly as a result of Public Health’s limited food security mandate and inherent top down approach. Marginalization of the Civil Society voice at the provincial level was one of the negative consequences resulting from this integration. A social policy movement toward a new political paradigm - “regulatory pluralism” - calls for greater engagement of Civil Society, and for all sectors to work together toward common goals. This integration of food security into the government exemplifies an undertaking on the cutting edge in progress toward this shift. Recommendations for stakeholders in furthering food security within the government were identified. These include the development of food security policy alternatives for current government agendas in British Columbia, with a focus on health care funding, Aboriginal health and climate change.
APA, Harvard, Vancouver, ISO, and other styles
26

Taylor-King, Darlean. "Parental payment abuse within the Supplemental Security Income program." ScholarWorks, 2008. https://scholarworks.waldenu.edu/dissertations/642.

Full text
Abstract:
Management of Social Security Administration (SSA) has been challenged by the phenomena of overpayments with its Supplemental Security Income (SSI) program. Oversight authorities of SSA had expressed concerns about the overpayment abuse caused by parents as representative payees for disabled minor children. It was important to address this problem because the amount of overpayments prior to 1998 had caused integrity issues for management of SSA and increased federal debt from SSI claimants. The purpose of this study was to examine how management of SSA and the SSI program had responded to the concerns of the oversight authorities. Theoretical foundations for this study were based on systems concepts and theories as basic rationale for the examination of feedback from systems operation and for organizational learning about the phenomena of overpayments. This study employed a case study methodology using an approach that examined the SSI program and its operational procedures. The questions for this study involved inquiries into processes and procedures that were developed for improving payment accuracy of SSI claims. Data analysis was performed by comparing the change in overpayment amounts to the implementation of different technological and operational procedures for the SSI program over time using time series analysis. The results of this study suggested that technology that allows sharing communications between federal and state governmental organizations improved overpayment detection and collection for the SSI program. This sharing provided positive social change that could have implications for improved operational efficiency in many other social service programs in the United States.
APA, Harvard, Vancouver, ISO, and other styles
27

Moravits, William P. "Attack at Fort Hood: Experiences and Suggestions for Security." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4467.

Full text
Abstract:
In the past 8 years, at least 4 lone wolf terrorists have targeted military bases or recruiting centers in the United States and research suggests attack on the US military are increasing globally. The problem was that research had not addressed the lived experiences of survivors of lone wolf attacks or how they could inform procedures regarding a sense of security for military men and women. The purpose of this research was to establish a need to address threats to the security of the military from these attacks, to provide a rich description of survivors' experiences of the attack at Fort Hood, and to identify suggestions for improving military personnel's sense of security while on base. Using the community based approach to public health, the central research question asked how the lived experiences of survivors of the attack at Fort Hood could lead to an increased sense of security on base. This phenomenological research provided a detailed description of survivors' experiences and their reflections on improving military personnel's sense of security. The population consisted of the 31 soldiers injured in the attack. A purposeful sample was used to recruit 5 participants for researcher-constructed interviews. I analyzed data and used NVivo 11 for organization. The study revealed high levels of stress, hyperawareness, and significant negative changes in the lives of these soldiers. The finding suggest an increased show of force by police throughout the base, a designated office to anonymously report suspicious activity, and more training to help soldiers cope with the experiences of combat related trauma. The implications for social change include an increased sense of security for military personnel, better training for dealing with combat related trauma, and deterrents for future lone wolf attacks.
APA, Harvard, Vancouver, ISO, and other styles
28

Klem, Nicholas. "Elements Impacting the Integration of the National Network of Fusion Centers with the U.S. National Security Strategy." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4303.

Full text
Abstract:
The National Network of Fusion Centers (Network) represents one of the post-9/11 era organizational efforts to strengthen the security of the homeland through collaboration, analysis, and information sharing. These entities have been subjected to criticisms and have been noted in studies as being deficient in certain areas suggesting that the Network has been experiencing problems with integrating the U.S. national security strategy. Using the multiple streams framework, the purpose of this phenomenological study was to identify and understand elements that have been impacting the Network's integration with broader national security efforts as well as identify items contributing to negative perceptions of fusion centers. Data for this qualitative study were collected through interviews with 13 individuals working within the Network. Collected data elements were inductively coded and then analyzed, demonstrating the relevance of framework to this topic area. Research findings indicated that there were challenges with Network integration that were influenced by perceptions of problems/threats, views concerning a fusion center's primary stakeholder, and constraints related to existing organizational policy and mandates. Barriers to integration stemmed from differing priorities, ineffective marketing, policy requirements, relationships, and limited resources. Study recommendations included the development of a strategic engagement plan, alignment of priorities, and increases in federal funding and representation. The implications for positive social change of this study are associated with proving transparency on the Network, informing national security agencies and decision makers on issues impacting integration, and promoting operational efficiencies.
APA, Harvard, Vancouver, ISO, and other styles
29

Riester, Jessica Leigh Marks Gary. "Russian public opinion and its role in the security policy between Russia, the European Union, and NATO." Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2006. http://dc.lib.unc.edu/u?/etd,660.

Full text
Abstract:
Thesis (M.A.)--University of North Carolina at Chapel Hill, 2006.<br>Title from electronic title page (viewed Oct. 10, 2007). "... in partial fulfillment of the requirements for the degree of Master of Arts in the Department of Political Science." Discipline: Political Science; Department/School: Political Science.
APA, Harvard, Vancouver, ISO, and other styles
30

Kalibjian, Jeffrey R. "Accountable Security Architectures for Protecting Telemetry Data." International Foundation for Telemetering, 2001. http://hdl.handle.net/10150/606436.

Full text
Abstract:
International Telemetering Conference Proceedings / October 22-25, 2001 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>Today there are many security solutions available which can facilitate both protection and sharing of telemetry data. While the technologies behind these solutions are maturing [1] [2] [3], most products lack a consistent and coherent paradigm for enforcing who is able to access the secured data, what is done with it, and insuring it can be recovered if the person who secured it is disabled.
APA, Harvard, Vancouver, ISO, and other styles
31

Bagchi, Shantanu. "Essays on Population Aging and Social Security in the U.S." DigitalCommons@USU, 2011. https://digitalcommons.usu.edu/etd/895.

Full text
Abstract:
Over the past few decades, falling birth rates and increasing life expectancies have threatened the viability of social security programs all across the Organization for Economic Co-operation and Development (OECD). In this dissertation, I attempt to shed some light on the extent of the crisis that the social security program in the United States (U.S.) currently faces, and I also recommend one possible reform policy. In the first essay, I provide an alternative estimate of the impact of population aging on the future social security benefits in the U.S., while accounting for the household-level and macroeconomic adjustments to population aging. Using a general equilibrium life-cycle consumption model with endogenous retirement and incomplete private annuity markets, I find that once these adjustments are accounted for, population aging in the U.S. is likely to cause a significantly smaller decline in the future benefits as compared to the commonly reported estimates that suggest a 25-33% decline. I also find that ignoring either the household retirement mechanism or the aggregate factor price adjustment mechanism could lead to a roughly comparable overestimation of the decline in the future retirement benefits. In the second essay, I ask what should be the optimal or welfare-maximizing social security (OASI) tax rate in the U.S. under such demographic developments. I examine this question using a heterogeneous-agent general equilibrium model of life-cycle consumption and labor supply, where social security provides partial insurance against unfavorable efficiency realizations that occur before the agents enter the model. I first calibrate the model such that the current OASI tax rate in the U.S. maximizes social welfare under the current demographics, and then I incorporate empirically reasonable population projections into the calibrated model. Finally, I search for the tax rates that are optimal under such projections. I find that the tax rates that maximize welfare under such projections are about 2 to 5 percentage points higher than the current rate. I also find that a large part of the tax burden of population aging is picked up by the households with relatively favorable efficiency realizations. Finally, the model also predicts that population aging and the optimal tax response may imply a decline in the projected retirement benefits, but of a magnitude smaller than when the tax rate is held unchanged at the current level.
APA, Harvard, Vancouver, ISO, and other styles
32

DiGiulio, Laura. "Food Policy Councils: Does Organization Type Matter." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1492620713327182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Tollefson, Julie Jo. "Japan's Article 9 and Japanese Public Opinion: Implications for Japanese Defense Policy and Security in the Asia Pacific." Wright State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=wright1526812071227061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Reeser, Alexander B. "A Quantitative Analysis of the Influence of Food Availability on Obesity in the United States." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1277.

Full text
Abstract:
PURPOSE: This study is a quantitative analysis of the relationship between obesity and food availability in the United States. A vast amount of literature has been produced examining various food and socioeconomic variables for their effect on obesity rates; however, this is the first research project to use the USDA’s Food Environment Atlas in a nationwide quantitative study. METHODS: This study uses multivariate statistical analysis to study the effect of 24 variables identified in the 2015 USDA Food Environment Atlas on county-wide obesity rates. The primary regression of concern looks specifically at the effect five food availability variables (grocery stores, specialty food stores, SNAP stores, supercenters, and convenience stores) have on obesity rates. RESULTS: Grocery store and specialty food store density is negatively correlated to percent countywide obesity, while supercenter and SNAP store density is positively correlated to percent obesity. Convenience store density had virtually no effect on percent obesity. Potentially confounding variables such as density of recreational facilities and farmers’ markets were also negatively correlated with obesity. Additionally, density of fast-food and full-service restaurants were negatively correlated with obesity, while perpetual poverty was positively correlated to percent obesity. CONCLUSION: The analyses presented in this study suggest that greater availability of grocery stores and specialty food stores may help to curb rising obesity rates. Policy recommendation and considerations based on the results are discussed and explored for their potential utility in addressing the obesity epidemic confronting the United States.
APA, Harvard, Vancouver, ISO, and other styles
35

Wilhelm, Haley M. "Tipping the Scales: The Public Health Crisis in Mexico." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/scripps_theses/733.

Full text
Abstract:
Mexico is in the midst of a public health crisis. A country formerly plagued by malnutrition and malaria is now host to obesity, diabetes, and other nutrition-related issues. Despite public policy efforts by the Mexican government, rates of obesity and non-communicable diseases steadily rise. The persistence of the crisis is the result of legislation that does not properly address the crisis. The efforts made by the Mexican government only address the education of consumers and consumer protection. Policies are limited by corporate power and corporate influence throughout Mexico. The public health crisis is a result of underlying political economy issues. These issues include poverty, unemployment, migration, and in particular, the loss of farmers’ jobs in Mexico. Public policy functions to treat the symptoms of the public health crisis not fully acknowledging the root causes of the crisis. This thesis will attempt to assess the effectiveness of public policy as it exists in Mexico and address the ways in which the policies fail to challenge the foundational issues that are a result of neoliberal trade policy and corporate power.
APA, Harvard, Vancouver, ISO, and other styles
36

Laine, John Stanley. "Cultural Competence, Emergency Management, and Disaster Response and Recovery Efforts Among African Americans." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2189.

Full text
Abstract:
Natural disasters disrupt African American communities in the United States and can exacerbate the degree of poverty for individuals within these communities, necessitating greater aid from local, state, and federal governments. The purpose of this study was to investigate the role of cultural competence in disaster response serving African American communities. This research study focused on emergency manager's comprehension and education of cultural competence, what they recognized to be vital elements of a culturally competent emergency manager, and what the obstacles and components are to bring about the changes to the profession. This study used a qualitative case study design and a theoretical framework based on the Campinha-Bacote model for care for cultural competence. Study data from interviews with 15 emergency manager practitioners and African American disaster survivors were inductively coded and thematically analyzed. The study produced data regarding cultural competence, values, ethics, beliefs, and thought processes of the participants. The findings showed that the emergency managers and survivors had diverging or contrasting beliefs of the emergency managers' cultural competency levels; this difference in perception was the major theme of the study. The study also concluded that implementing the Campinha-Bacote model for Cultural Competence in the Delivery of Healthcare Services, emergency managers dramatically improve disaster response and recovery efforts not only to the African American community but other diverse minority communities as well. This study contributes to positive social change by helping U.S. emergency managers become more culturally competent and better equipped to serve diverse minority communities during a disaster.
APA, Harvard, Vancouver, ISO, and other styles
37

Emler, Jay Scott. "How to fund homeland security without federal dollars : state and local funding of homeland security initiatives in light of decreased support by the federal government /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FEmler.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security And Defense))--Naval Postgraduate School, September 2008.<br>Thesis Advisor(s): Bellavita, Christopher. "September 2008." Description based on title screen as viewed on November 3, 2008. Includes bibliographical references (p. 79-84). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
38

Dohy, Jennifer Marie. "The Impact of School Policing Practices on Student Behaviors in Ohio Public Schools." Cleveland State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=csu1463267974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Maldonado, Monique Marie. "Qualitative Case Study on F-35 Fighter Production Delays Affecting National Security Guidance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/589.

Full text
Abstract:
Approaching $400 billion for its establishment and production, the F-35 Joint Strike Fighter (JSF) is the Department of Defense's (DoD) largest acquisition program in U.S. history. Unfortunately, significant delays have immobilized the program's production rate, and little research has examined whether and how such delays directly affect national security. The purpose of this study was to determine whether and how production delays in the JSF program directly affect national security. The theoretical foundations for this qualitative case study were Condorcet's modernization theory and Giddens's globalization framework. Data were collected from interviews with 15 senior DoD civilian, military, and JSF officials and were coded and categorized to identify themes and patterns related to the source of production delays and reasons behind their persistence. Data were triangulated using archival records and government research documents. Key findings revealed concurrency issues, Helmet Mounted Display malfunctions, engine concerns, scheduling mishaps, national security vulnerabilities, and astronomical funding outside of the budget. Such factors were responsible for fighter program delays, which affect national security. The results are deemed significant, as the fighter has been a critical 'piece to the puzzle' in the national security strategy as well as other national defense guidance issues. These findings have implications for social change in that they may inform senior DoD officials of policy-related concerns due to continued delays and their impacts on national security interests. Additionally, the study identifies concerns related to sustaining international partnerships that have significant interests embedded into this program.
APA, Harvard, Vancouver, ISO, and other styles
40

Mehandru, Nikita. "Deconstructing the Third Rail: An Analysis of the Issue of Poverty in the United States Through the Lens of Social Security." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/cmc_theses/1086.

Full text
Abstract:
The ongoing debate over welfare in the United States is rooted in the long-standing tension between the nation’s commitment to providing for its most vulnerable and a deep-seated belief that such support can corrupt its recipients. Social Security has struck this balance and appeals to the masses with its pay-as-you-go system and universally distributed benefits. Yet, the solvency of Social Security is threatening the program that has attempted to guard against old age and disability for the last eighty years. This paper examines how the perception of poverty in the United States is a hindrance when tackling social welfare policies. Further, the failure of the Supreme Court to recognize economic security as a fundamental constitutional right and a lack of public support to contribute funds are added challenges in the implementation of social insurance and public assistance programs. The most promising solution to restore the short and long-term solvency of Social Security ultimately involves relaxing immigration laws to highly skilled workers and raising the retirement age for the rising generation.
APA, Harvard, Vancouver, ISO, and other styles
41

Saksena, Mita. "Framing Infectious Diseases and U.S. Public Opinion." FIU Digital Commons, 2011. http://digitalcommons.fiu.edu/etd/516.

Full text
Abstract:
The United States has been increasingly concerned with the transnational threat posed by infectious diseases. Effective policy implementation to contain the spread of these diseases requires active engagement and support of the American public. To influence American public opinion and enlist support for related domestic and foreign policies, both domestic agencies and international organizations have framed infectious diseases as security threats, human rights disasters, economic risks, and as medical dangers. This study investigates whether American attitudes and opinions about infectious diseases are influenced by how the issue is framed. It also asks which issue frame has been most influential in shaping public opinion about global infectious diseases when people are exposed to multiple frames. The impact of media frames on public perception of infectious diseases is examined through content analysis of newspaper reports. Stories on SARS, avian flu, and HIV/AIDS were sampled from coverage in The New York Times and The Washington Post between 1999 and 2007. Surveys of public opinion on infectious diseases in the same time period were also drawn from databases like Health Poll Search and iPoll. Statistical analysis tests the relationship between media framing of diseases and changes in public opinion. Results indicate that no one frame was persuasive across all diseases. The economic frame had a significant effect on public opinion about SARS, as did the biomedical frame in the case of avian flu. Both the security and human rights frames affected opinion and increased public support for policies intended to prevent or treat HIV/AIDS. The findings also address the debate on the role and importance of domestic public opinion as a factor in domestic and foreign policy decisions of governments in an increasingly interconnected world. The public is able to make reasonable evaluations of the frames and the domestic and foreign policy issues emphasized in the frames.
APA, Harvard, Vancouver, ISO, and other styles
42

Sousa, Marcos AurÃlio Macedo de. "Vozes e Documentos na ArticulaÃÃo CrÃtico-HermenÃutica do Bolsa FamÃlia com o Direito Humano e Social à AlimentaÃÃo." Universidade Federal do CearÃ, 2013. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=11964.

Full text
Abstract:
FundaÃÃo Cearense de Apoio ao Desenvolvimento Cientifico e TecnolÃgico<br>No contexto da configuraÃÃo polÃtica do direito humano e social à alimentaÃÃo no Brasil, buscamos neste estudo compreender interesses, valoraÃÃes e juÃzos presentes nas vozes de beneficiÃrias do Bolsa FamÃlia e nos textos oficiais desse programa (BF) â reconhecido como um dos mais abrangentes em matÃria de transferÃncia direta e condicionada de renda com foco na pobreza. A metodologia inscreve-se na tradiÃÃo da pesquisa qualitativa em saÃde, fundada em uma abordagem reflexiva e dialÃtica entrelaÃada com a hermenÃutica filosÃfica. Com base em entrevistas dialÃgicas junto a doze beneficiÃrias selecionadas conforme critÃrios baseados na moda da distribuiÃÃo das famÃlias inscritas em Sobral-CE â gÃnero: feminino, idade: 30-39 anos e dois filhos > 18 anos â, foram analisados criticamente discursos e prÃxis relacionados ao BF, tomando-os como dimensÃes do debate acerca dos objetivos prioritÃrios para definiÃÃo de polÃticas pÃblicas de alimentaÃÃo e nutriÃÃo. A partir das fontes documentais consultadas e das experiÃncias apreendidas no campo investigativo à interrogada a contribuiÃÃo atribuÃda ao BF na induÃÃo da trajetÃria oblÃqua da acomodaÃÃo sob a Ãgide da funcionalizaÃÃo da pobreza. TambÃm à questionada a aproximaÃÃo da mesma iniciativa estatal com a perspectiva de autonomia (financeira) sustentada, coerente com a premissa do capital humano ao prescrever a formataÃÃo de condutas orientadas por prÃxis higienistas de cuidado em saÃde e de pedagogia empreendedora, tendentes a reduzir a pessoa humana a um bem de capital. ConstruÃmos uma rede interpretativa constituÃda por eixos temÃticos estruturados em dimensÃes analÃticas desdobradas em categorias empÃricas. No cenÃrio investigado, verificamos a singularidade moral das categorias liberdade e empregabilidade para as titulares do cartÃo do BF e, por outro lado, a materializaÃÃo da lealdade como vÃnculo obrigacional forte e tenso na perspectiva da permanÃncia da hegemonia polÃtica do agente patrocinador sobre os beneficiÃrios, que devem obediÃncia e explicaÃÃes para fazer jus à transferÃncia regular de renda, tendendo por isso a assumir posiÃÃes polÃticas conservadoras. Adicionalmente, com esteio nas condicionalidades, esses sujeitos se revelam passÃveis de investimento e controle estatal sobre seus corpos e esferas das suas vidas privadas. A produÃÃo subjetiva apreendida nessa tese desvela a falsa dicotomia acomodaÃÃo/autonomia, apontando antes para comportamentos estereotipados e, sobretudo, ambÃguos, de modo a tornar insubsistente a reduÃÃo da complexidade de tais fenÃmenos a uma ou outra polaridade, e, nesse sentido, contraindicando argumentos de natureza maniqueÃstas ou qualquer abordagem linear que, notadamente por negligencia à dialÃtica dos processos simbÃlicos, exclua as contradiÃÃes e os paradoxos inerentes ao programa em questÃo.<br>In the context of the political configuration of the human and social right to food in Brazil, this study sought to understand interests, valuations and judgments present in the voices of beneficiaries of Bolsa Familia and the official texts of this program (PBF) - recognized as one of the most comprehensive programs in terms of direct and conditioned income transfer focusing on poverty. The methodology follows the tradition of qualitative health, based on a reflective and dialectical approach intertwined with the philosophical hermeneutics. Underpinned by dialogic interviews with twelve beneficiaries selected according to criteria based on the mode of the distribution of families enrolled in Sobral-CE â gender: female, age: 30-39 years and two children > 18 years old â were critically analyzed the discourses and praxis related the PBF, taking them as dimensions of the debate about the overriding objectives for setting of public policies regarding food and nutrition. From the documented sources consulted and the experiences learned in the investigative field is interrogated the contribution attributed to PBF in the induction of slant range of accommodation under the aegis of functionalization of poverty. It is also questioned the approach of the same state initiative with the prospect of (financial) autonomy sustained, consistent with the premise of human capital when prescribing the organization of behaviors driven by hygienist praxis concerning health care and entrepreneurial pedagogy, which tend to reduce the human being person to a capital asset. We have built a interpretative network consisting of thematic axis structured according to analytical dimensions split into empirical categories. In the scenario investigated, we have verified in one hand the moral uniqueness of the categories freedom and employability for the PBF cardholders. And on the other hand, the embodiment of loyalty as a strong and tense obligation bond in the view of the permanence of sponsoring agentsâ political hegemony towards the beneficiaries, who owe obedience and explanations to justify the regular income transfers, tending thus to assume conservative political positions. Additionally, with the conditionality mainstays, those subjects turn out to be liable for investment and state control over their bodies and areas of their private lives. The subjective production apprehended in this thesis reveals the false dichotomy accommodation/ autonomy, pointing then to stereotyped behaviors and especially ambiguous, so as to make ineffectual the reducing of the complexity of such phenomena to either one or the other polarity, and in this sense contraindicating arguments of Manichean view or any linear approach that notably due to negligence towards the dialectic of symbolic processes, exclude the contradictions and inherent paradoxes in the program in question.
APA, Harvard, Vancouver, ISO, and other styles
43

Rodriguez, Julio C. "Public Servants' Perceptions of the Cybersecurity Posture of the Local Government in Puerto Rico." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/6370.

Full text
Abstract:
The absence of legislation, the lack of a standard cybersecurity framework, and the failure to adopt a resilient cybersecurity posture can be detrimental to the availability, confidentiality, and integrity of municipal information systems. The purpose of this phenomenological study was to understand the cybersecurity posture of municipalities from the perception of public servants serving in information technology (IT) leadership roles in highly populated municipalities in the San Juan-Carolina-Caguas Metropolitan Statistical Area of Puerto Rico. The study was also used to address key factors influencing the cybersecurity posture of these municipalities. The theoretical framework was open system theory used in combination with a conceptual framework encompassing key dimensions influencing digital government. Data were collected using semistructured interviews with 10 public servants working in IT leadership positions in a municipal setting in Puerto Rico. Data analysis involved horizontalization, reduction, elimination, clustering, thematizing, validation, and development of individual and composite textural descriptions. Participants reported that the cybersecurity posture of their municipalities was resilient. Participants also reported that technological changes, politics, the economy, management support, and processes were key elements to achieve a resilient posture. Findings may be used to empower elected officials, policymakers, public servants, and practitioners to manage and improve elements affecting cybersecurity with the goal of achieving a resilient posture to deliver cybersecurity as a public good.
APA, Harvard, Vancouver, ISO, and other styles
44

Kraner, Mariah Ann. "Friends or Foes?: Examining Social Capital of International NGOs and Food Security Programs." PDXScholar, 2014. https://pdxscholar.library.pdx.edu/open_access_etds/1647.

Full text
Abstract:
Food insecurity and chronic hunger are devastating global problems currently facing more than a billion people. There are many actors involved in the response to stomp out world hunger, including International Non-Governmental Organizations (INGOs). These INGOs, however, work in tumultuous environments with limited resources. This dissertation examines the INGOs involved in the food security dilemma (N=51) to investigate how they use resources to reach hungry populations. It is hypothesized INGOs use a mix of material resources and social capital to enhance their organizational performance. However, little is known about the impact these resources have on reaching communities in need. Social network analysis is used to examine the connections between and among INGOs to create a measure of organizational social capital. In addition, material resources, such as human resources, revenue and volunteers are used to examine an organization's material capacity. Material and social resources are examined through a moderated regression analysis to evaluate how they interact, and if the promotion of both types of resources is beneficial to the INGOs and the communities they serve. With data from over 1186 projects globally, results are presented regarding the effectiveness of social capital and material resources in reaching the world's "bottom billion."
APA, Harvard, Vancouver, ISO, and other styles
45

Kayitare, Emmanuel. "Factors Affecting Rwandan Informal Sector Workers' Participation in Public Pension Schemes." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2551.

Full text
Abstract:
Social security is one of the key pillars of socioeconomic development in developing countries. Despite being an internationally recognized basic right and a key pillar of socioeconomic development, it does not protect the majority of the global workforce. Over 90% of workers in developing countries do not have social security coverage, the greatest percentage belonging to informal sector. In Rwanda, the national government has stepped up efforts to extend coverage to the wider population, but informal sector workers have not joined the existing pension scheme in significant numbers, and the reasons for which are unclear. Guided by Maloney's theory of voluntarism; the purpose of this phenomenological study was to examine the factors affecting the level of workers' participation in informal sector in pension scheme in Rwanda. This study was designed to provide new insights into the current social security situation of informal sector workers in Rwanda and to contribute to the knowledge base on social security and the informal sector. The research questions focused on awareness, income levels, and other factors that can address the social security needs of informal sector workers. Data were collected from 22 active workers from informal sector and 5 officials from ministries and agencies who were well-versed with social security issues. Data were analyzed via Moustakas's steps of epoche, phenomenological reduction, imaginative narration, and synthesis of texture and structure. The results revealed that low incomes, lack of awareness, poor benefit design, distrust of public schemes, and frustrating laws and procedures were hindering the increased public pension coverage of informal sector workers in Rwanda. These findings will help Rwandan policy makers to promote positive social change by informing policies that enhance social protection of workers in informal sector.
APA, Harvard, Vancouver, ISO, and other styles
46

Sari, Aurel. "The jurisdictional immunities of visiting forces under public international law : a case study of the European Security and Defence Policy." Thesis, University College London (University of London), 2008. http://discovery.ucl.ac.uk/15973/.

Full text
Abstract:
The purpose of this thesis is to identify the rules of public international law governing the jurisdictional immunities of the armed forces of one State present in the territory of another State with the latter’s consent. The thesis is divided into three main parts. The first part considers the general principles of international law governing the exercise of jurisdiction over visiting armed forces and describes the historical evolution of the jurisdictional immunities enjoyed by such forces. The second part examines the legal arrangements adopted by the European Union and its Member States in order to define the immunities of personnel acting in the context of the European Security and Defence Policy in the form of a case-study. The third part draws together and assesses the findings of the preceding-two parts. The jurisdictional immunities of visiting armed forces have received insufficient attention in the academic literature, and considerable ambiguities remain concerning the current position of customary international law in this area. The thesis argues that it is possible to identify a separate ‘law of visiting forces’ in customary international law, though it would go too far to consider this law a self-contained regime along the lines of the law of diplomatic immunity. Not only is the ‘law of visiting forces’ more rudimentary than the highly developed and detailed rules governing diplomatic relations, but a combination of factors has so far prevented the emergence of a uniform legal regime in this field. Instead, several distinct regimes governing the status of different types of visiting forces have developed in international practice, in particular the rules applied in peace support operations and those applied in the context of structured military cooperation between politically equal partners. Whenever possible, States and international organizations prefer to regulate the legal position of visiting armed forces by way of international agreements. Certain elements of these agreements have developed into norms of customary international law, yet the existence of significant variation in treaty practice means that the relevant legal arrangements have not passed into customary international law in toto.
APA, Harvard, Vancouver, ISO, and other styles
47

Jankowski, William M. "Maritime shipping container security and the Defense Transportation System : problems and policy in the 21st century /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FJankowski.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Anderson, Leigh R. "An Assessment of Intergovernmental Relationships between Native American Tribes, the States, and the Federal Government in Homeland Security and Emergency Management Policy." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1399292073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hosking, Jeff. "Campus security director perceptions concerning the influence of concealed carry firearms on safety at Wyoming public community colleges| A phenomenological study." Thesis, Colorado State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3624289.

Full text
Abstract:
<p> Firearm violence is occurring on America's higher education campuses killing not only students but faculty and employees as well (International Association of Campus Law Enforcement Administrators, 2008). Even in light of this bloodshed, there is little accurate information available about the role that firearms play in preventing or exacerbating campus violence (Miller, Hemenway, &amp; Weschsler, 2002). Wyoming community college campus security directors are specifically given the authority to allow, or not, concealed firearms on their campuses by state law (Wyoming Senate, 2011). The purpose of this qualitative phenomenological study is to explore the perceptions, attitudes, and understandings of campus security directors concerning concealed carry firearms on their campuses. </p><p> Using qualitative research methods, the study was conducted utilizing semi - structured interviews with the seven campus security directors for each of the Wyoming community college districts. Smith's (2012) interpretative phenomenological analysis qualitative method of inquiry guided the data analysis. In accordance with an interpretative phenomenological approach, data analysis was undertaken to examine for patterns, trends, and themes that emerged from the campus security directors' responses. The analysis used personal and in - depth detail derived from individual interviews to describe the perceptions, attitudes, and understandings of participants. Analysis of the data presented four super ordinate themes supported by fifteen subthemes. </p><p> This research yielded information concerning the possession of concealed carry firearms at Wyoming community college districts. Findings indicated that the unrestricted carry of concealed firearms would likely harm the overall safety of Wyoming community colleges. However, if proper vetting and training of persons carrying concealed firearms were to occur, campuses may be safer. Wyoming community college districts were considered safe places pursuant to participant responses, and no concealed firearms had been used in any Wyoming community college district to commit a violent crime. Campus security directors stated that possession of firearms by a victim would not have prevented any violent campus crime. </p><p> Campus security directors indicated that concealed carry firearms may be irrelevant to the safety of Wyoming community college districts. Rather it was the proactive stance and involvement of campus security officers that was important to campus firearm safety. The interview data yielded information and considerations for campus security directors, college administrators and all persons interested in firearm safety at Wyoming community colleges. This information may be used to assist in the crafting of sensible firearm policies at community colleges.</p>
APA, Harvard, Vancouver, ISO, and other styles
50

Rowe, Joshua Luke, and josh@email nu. "Improving internet usability - a framework for domain name policy evaluation." RMIT University. Business Information Technology, 2009. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20091111.101705.

Full text
Abstract:
A domain name is a unique alphanumeric designation that facilitates reference to sets of numbers which actually locate a particular computer on the Internet. Domain names are a fundamental part of the Internet's user interface. Improving the usability of the Internet depends upon effective domain name policy. This study is intended to contribute to improvement in Internet usability for the end users of domain names. Benefits of more usable domain names include: higher sales, customer satisfaction and productivity, and reduced support costs. Domain name policies worldwide vary considerably. Consequently, end users are inconvenienced by contradictory domain name policies, diminishing the predictability of an entity's domain name, and thus decreasing usability for end users. The study objective was to develop criteria with which policy makers can evaluate their domain name policies, in order to improve the usability of domain names for end users. The main research question posed was: What are the criteria for an effective domain name policy? The research methodology included a literature review, domain name policy examination and an ethnographic narrative. The literature review found existing research examining either domain names or usability in isolation. However, research examining the intersection of the two is scarce. The existing research describes domain names as part of the web user interface. In practical terms, this is about how people use domain names to access web sites, email addresses and other Internet resources. It was established that the predictability (and thus usability) of domain names relies on effective domain name policy. The non-standardised and widely delegated process of domain name policy development leads to unpredictable and inconsistent domain names. The narrative recollection presented the researcher's inside perspective on the domain name industry, with a focus on domain name usability. The researcher provided first-hand insights into the evolution of the industry and policy development process, from Australian and international perspectives. To address the problem of poor domain name usability, a framework for domain name policy evaluation is proposed. The framework extends the current research that treats domain names as a user interface by proposing criteria which address usability concerns. The framework allows policy makers to critically assess domain name policies with end users in mind. Examples of the criteria include: understanding who are its intended and untended users, and whether it's consistent with other domain names. The framework has the potential to set an international standard for the critical evaluation of domain name policy, and become the basis for further research. This study was developed from the researcher's perspective as a participant in the domain name industry. A secondary lens regarding the usability of domain names was then applied. This study has only scraped the surface in terms of how the research fields of domain names and usability may be considered together. The research methodology for this study was primarily qualitative and interpretive. A quantitative study of domain name policies globally could provide further insight into areas including: the differences in second level country code domain names, and language implications of domain names.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!