To see the other types of publications on this topic, follow the link: Security policie.

Journal articles on the topic 'Security policie'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security policie.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

CUNHA, VIVANE MARTINS, JULIA SOMBERG ALVES, and LISANDRA ESPÍNDULA MOREIRA. "GENOCÍDIO NEGRO E SEGURANÇA PÚBLICA: POLÍTICA DE EXTERMÍNIO EM AÇÕES POLICIAIS." REVISTA PSICOLOGIA POLÍTICA 25 (2025): 1–19. https://doi.org/10.5935/2175-1390.v25e23714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Antonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Supriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.

Full text
Abstract:
Police transformation policy to carry out community security functions is very adaptive in addressing the changing times. The research aims to map the transformation and strengthening of police infrastructure in response to the era of digitalization. The research uses a qualitative type of research with a literature study approach and policy analysis programmed by the Police. The results showed that the transformation policy consisting of organizational transformation, operation transformation, public service transformation, and supervise transformation is needed by the Police, especially in t
APA, Harvard, Vancouver, ISO, and other styles
4

Pereira da Silva, Oziel. "POLICIAMENTO TURÍSTICO E POLÍCIA TURÍSTICA: FUNÇÕES, OBJETIVOS E SUAS COMPLEXIDADES." Revista Científica da Polícia Militar de Mato Grosso do Sul - RevPMMS 2, no. 1 (2025): 351–72. https://doi.org/10.62927/revpmms.v2i1.95.

Full text
Abstract:
ourist Policing is not anapproach exclusive to a single police unit, but rather a public security strategy aimed at areas with large flows of tourists, involving preventive and repressive actions, including the use of monitoring systems and signage. On the other hand, Tourist Police is a specialized unit dedicated to assisting tourists, with a focus on protection, security, and facilitation of their experience. In this context, to avoid conceptual or interpretive distortions, it is essential to define a unique identity for TouristPolice officers, as well as to appropriately direct the efforts
APA, Harvard, Vancouver, ISO, and other styles
5

Achmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.

Full text
Abstract:
This studywas conducted todetermine and analyze the implementation of the licensing policies and notices of community activities in Baubau City Police and communication factors, resources, disposition, and structure influence the implementation of the licensing policies and notices of community activities in Police Baubau. The results showed that the licensing policies and notices activities of people implemented by (a) Providea receipt notice (b) To coordinate with the responsible delivery of opinions in the Public (c) To coordinate with the leadership, the agency/institutionwhich is the goal
APA, Harvard, Vancouver, ISO, and other styles
6

Ryma, Abassi1 and Sihem Guemara El Fatmi2. "Executable Security Policies: Specification and Validation of Security Policies." International Journal of Wireless & Mobile Networks (IJWMN) 1, no. 1 (2022): 20. https://doi.org/10.5281/zenodo.6622372.

Full text
Abstract:
Security Policies constitute the core of network protection infrastructures. However, their development is a sensitive task because it can be in opposition with the security requirements (e.g. lack of rule or conflicting rules). A specification task seems to be indispensible in order to clarify the desired exigencies. A validation process for security policies becomes then necessary before their deployment to avoid resources network damages. Nowadays, there is no automated tool in the network security world allowing such task. Moreover, we have found that the theory developed for this aim in t
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Hae Kyoung. "The Impact of Police Organization Support on Public Policy: Focusing on Learning Organizations." Korean Society of Private Security 22, no. 3 (2023): 47–68. http://dx.doi.org/10.56603/jksps.2023.22.3.47.

Full text
Abstract:
People have a fear of crime because of constant crime in society. To promote the safety of these people, the police are presenting various security policies. The duty of the police is to protect the life, body and property of the people along with maintaining social order in the country.
 The security policy pursued by the police is influenced by various factors such as the external environment, the internal environment, and laws and systems. In previous studies on police security policy, the research on the internal environment and support of police organizations is somewhat limited, so
APA, Harvard, Vancouver, ISO, and other styles
8

Schneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (2000): 30–50. http://dx.doi.org/10.1145/353323.353382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Potter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Cho, Sang Hyun. "A Study on the Core Ideology and Organizational Citizenship behavior of Police Officers: Verification of the Moderating Effect of Public Service Motivation." Korean Association for Terrorism Studies 16, no. 4 (2023): 153–68. http://dx.doi.org/10.46350/kats.2023.16.4.153.

Full text
Abstract:
Under the goal of ‘competent and dignified police, a safe community trusted by the public,’ the police is implementing four major policies: securing reliable public security, establishing a solid safety system, pioneering future security, and establishing strict law and order. The success or failure of these police organizations can vary depending on the efforts of all police officers. The organizational citizenship behavior of police officers is explained as a factor that can improve the performance of organizational members, achieve organizational goals, and influence organizational innovati
APA, Harvard, Vancouver, ISO, and other styles
12

Gudelli, Venkata Ramana. "Data Encryption and IAM Policies: Best Practices for AWS Ecosystems." Cybersecurity and Network Defense Research 2, no. 2 (2022): 210–35. https://doi.org/10.5281/zenodo.15102702.

Full text
Abstract:
Securing sensitive data in AWS ecosystem remains a critical concern for enterprises as cloud adoption increases. The aim of this paper is to explore the best practises for data encryption Identity and Access Management (IAM) policies in AWS To ensure robust security postures against new evolving threats. As we provide an in-depth analysis of AWS-native encryption mechanism which includes AWS Key Management Service (KMS), envelope encryption, and hardware security modules (HSMs), and also examines the effectiveness in securing data confidentiality and integrity.
APA, Harvard, Vancouver, ISO, and other styles
13

Poincignon, Yann. "Defense Academy Excellence European Union Civilian Policing: Foreign Policy Action or Internal Security Tool." Connections: The Quarterly Journal 02, no. 2 (2003): 111–30. http://dx.doi.org/10.11610/connections.02.2.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sheptycki, J. "High Policing in the Security Control Society." Policing 1, no. 1 (2007): 70–79. http://dx.doi.org/10.1093/police/pam005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Full text
Abstract:
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 6
APA, Harvard, Vancouver, ISO, and other styles
16

Oleiniuc, Maria. "SPECIFIC FOOD SECURITY POLICIES." Journal of Social Sciences II (2) (June 15, 2019): 79–86. https://doi.org/10.5281/zenodo.3235244.

Full text
Abstract:
In this article, the author has analyzed what types of food security policies need to be develop and implement depending on the dimensions of food security in order to improve the situation of food security. Improving the current situation regarding the food security is a dilemma not only related to the national level of a country but also worldwide. The consequences of economic growth and the level of globalization for some countries have been quite impressive, especially for industrial countries, but not for developing and emerging countries. The European Community together with such organiz
APA, Harvard, Vancouver, ISO, and other styles
17

Choi, Junho, Chong Soo Cheung, Dongkwan Lee, Seol A. Kwon, and Jae Eun Lee. "Policy Directions for Securing Food Security by Applying Critical Infrastructure in the Field of Agriculture." Crisis and Emergency Management: Theory and Praxis 13, no. 8 (2023): 17–27. http://dx.doi.org/10.14251/jscm.2023.8.17.

Full text
Abstract:
This study aims to suggest policy directions to promote food security by applying the concept of critical infrastructure in Korea. It designates the agricultural sector for food security through the functions, systems, and facilities of critical infrastructure and presents policy directions. The results of the analysis show that the functions of critical infrastructure can be implemented by establishing a food security manual. Due to the lack of relevant manuals in Korea, it is necessary to strengthen the response system on a regular basis through the designation of a department dedicated to f
APA, Harvard, Vancouver, ISO, and other styles
18

Page-Poma, Fernanda, and Sofía Duarte. "The Struggle for Gender Equality: Policy Implementation in Argentina’s Security Forces." Social Politics: International Studies in Gender, State & Society 32, no. 1 (2025): 126–51. https://doi.org/10.1093/sp/jxae029.

Full text
Abstract:
Abstract It is now over a decade since the inception of gender equality policies in Argentina’s police and security institutions. In this study we scrutinize the implementation gaps of these policies through interviews, focus groups, and story completion methods at Argentina’s Gendarmerie. Our analysis focuses on three key policies aimed at fostering gender equality within federal police and security organizations transitioning toward more democratic and professional institutions: (1) prohibiting actions that hinder the inclusion of individuals with dependents, and pregnant or lactating women,
APA, Harvard, Vancouver, ISO, and other styles
19

Matvejevs, Aleksandrs. "Problems of Police Activity in Ensuring Public Order and Public Safety." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no. 21 (2021): 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.

Full text
Abstract:
The article addresses the issues concerning public order and public security. These two are the objects of the state administration that form separate legal institutes. The duties of the police include securing the rule of law, maintaining public order and security, preventing, detecting and investigating crimes. The police ensure safety of people and environment and prevent all violations of the law and disturbances by eliminating and investigating all such incidents. The tasks of the police are defined in the Police Act. The police cooperate with other authorities and local residents and com
APA, Harvard, Vancouver, ISO, and other styles
20

Elbably, Amar. "سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة". Security Policy Paper 2, № 2 (2021): 1–20. http://dx.doi.org/10.26735/hjoo8882.

Full text
Abstract:
يُسهِم‭ ‬التعاوُن‭ ‬الأمني‭ ‬الرقمي‭ ‬بين‭ ‬الدول‭ ‬إسهامًا‭ ‬كبيرًا‭ ‬في‭ ‬انحسار‭ ‬الجرائم‭ ‬المُنظَّمة‭ ‬والقضاء‭ ‬عليها،‭ ‬وبخاصَّةٍ‭ ‬الجرائم‭ ‬الإرهابيَّة،‭ ‬وهو‭ ‬ما‭ ‬يتطلَّب‭ ‬ضرورة‭ ‬تفاعُل‭ ‬الدول‭ ‬فيما‭ ‬بينها،‭ ‬وزيادة‭ ‬الجهود‭ ‬في‭ ‬سبيل‭ ‬تشجيع‭ ‬هذا‭ ‬التعاوُن‭ ‬وتفعيله،‭ ‬بإيجاد‭ ‬وسائل‭ ‬تعاونيَّة‭ ‬في‭ ‬المسائل‭ ‬الأمنيَّة‭ ‬الكفيلة‭ ‬بالوقاية‭ ‬من‭ ‬الجريمة‭ ‬وتَتَبُّع‭ ‬مرتكبيها‭ ‬حالَ‭ ‬وقوعها‭ ‬باستخدام‭ ‬شبكات‭ ‬مُؤَمَّنَة‭ ‬تسمح‭ ‬بنقل‭ ‬البيانات‭ ‬والمعلومات‭ ‬والتطبيقات‭ ‬بين‭ ‬الأجهزة‭ ‬المعنيَّة‭ ‬بأجهزة‭ ‬الشرطة‭ ‬العربيَّة،‭ ‬واستخدام‭ ‬التقنيات‭ ‬المُؤَمَّنَة‭
APA, Harvard, Vancouver, ISO, and other styles
21

Pangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.

Full text
Abstract:
AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care. The general framework and the requirements for medical database security are presented. The three prominent proposals for medical database security are discussed in some detail, together with specific proposals for medical database security. A number of parameters for a secure medical database development are presented and disc
APA, Harvard, Vancouver, ISO, and other styles
22

Basin, David, Vincent Jugé, Felix Klaedtke, and Eugen Zălinescu. "Enforceable Security Policies Revisited." ACM Transactions on Information and System Security 16, no. 1 (2013): 1–26. http://dx.doi.org/10.1145/2487222.2487225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Pernul, G., and A. M. Tjoa. "Security Policies for Databases." IFAC Proceedings Volumes 25, no. 30 (1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Cuppens, Frédéric, and Nora Cuppens-Boulahia. "Modeling contextual security policies." International Journal of Information Security 7, no. 4 (2007): 285–305. http://dx.doi.org/10.1007/s10207-007-0051-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ølnes, Jon. "Development of security policies." Computers & Security 13, no. 8 (1994): 628–36. http://dx.doi.org/10.1016/0167-4048(94)90042-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Suhaibah, Suhaibah, Armiwal Armiwal, and Mukallaf Mukallaf. "The Role of the Polri Intelligence in Securing the General Election and Institution of the Pidie District DPRK." Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences 4, no. 1 (2021): 626–31. http://dx.doi.org/10.33258/birci.v4i1.1645.

Full text
Abstract:
This research aims toknowingthe role of the Police Intelligence in securing the General Election and Inauguration of the Pidie Regency DPRK, the obstacles to the Intelligence of the Police in securing the General Election and the Inauguration of the DPRK and the efforts made to overcome the obstacles to the Police Intelligence in securing the General Election and Inauguration of the Pidie Regency DPRK In this study, the problem approach used was normative juridical and empirical juridical. Data collection was carried out by literature study and field studies. The data were analyzed qualitative
APA, Harvard, Vancouver, ISO, and other styles
27

Sampson, F., and J. McNeill. "Redefining the Gaps: Connecting Neighbourhood Safety to National Security." Policing 1, no. 4 (2007): 460–71. http://dx.doi.org/10.1093/police/pam068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Simmons, A. "Room, Stewart (2009). * BUTTERWORTHS DATA SECURITY: LAW AND PRACTICE." Policing 6, no. 1 (2011): 99–100. http://dx.doi.org/10.1093/police/par014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Sales, Eric Rodrigues De, and James Frade Araújo. "The impact of judiciary decisions on public security policies in Brazil." Forensic Research & Criminology International Journal 12, no. 1 (2024): 46–55. http://dx.doi.org/10.15406/frcij.2024.12.00397.

Full text
Abstract:
The principle of separation of powers is present in the Federal Constitution of Brazil, and states that the powers must be independent and harmonious with each other. When cases of judicialization of public policies occur, the Judiciary has its power expanded in matters that would be of primary competence of the Legislative and Executive powers. The purpose of this article is to carry out an analysis of two specific cases that occurred in Brazil in which a judicial decision has a direct impact on public security policies. The first case is a decision by the Superior Court of Justice - STJ that
APA, Harvard, Vancouver, ISO, and other styles
30

Murtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Full text
Abstract:
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
APA, Harvard, Vancouver, ISO, and other styles
31

Diógenes, José Lenho Silva, Suely Salgueiro Chacon, and Tayana Cibele Canafístula Torres. "Police Education and SDG 16: An Assessment of AESP in the Context of Ceará’s Public Security Policies." Revista de Gestão Social e Ambiental 19, no. 1 (2025): e010934. https://doi.org/10.24857/rgsa.v19n1-117.

Full text
Abstract:
Objective: This study analyzes the role of the State Public Security Academy (AESP) in implementing a multidisciplinary and humanistic police education model, focusing on SDG 16. Theoretical Framework: Drawing on an institutional perspective, the research examines AESP as a foundational agency within public security policies in Ceará. It discusses the shift from a “police training” paradigm to “police education,” articulating the concept of citizen security as an alternative to traditionally militaristic models. Method: This qualitative research comprises document analysis (normative framework
APA, Harvard, Vancouver, ISO, and other styles
32

de Rover, Cees. "Police and security forces." International Review of the Red Cross 81, no. 835 (1999): 637–47. http://dx.doi.org/10.1017/s1560775500059836.

Full text
Abstract:
Promouvoir l'enseignement du droit international humanitaire auprès des membres des forces armées a toujours été l'une des tâches prioritaires du CICR. Aujourd'hui cependant, les forces de police ou d'autres unités chargées de tâches similaires sont de plus en plus souvent engagées directement dans des opérations de maintien de l'ordre et de la sécurité, notamment dans des situations de troubles intérieurs, voire de conflit interne. Il est devenu important de s'assurer que les membres de ces unités connaissent quelques règies fondamentales en matière de protection de l'individu dans ces circon
APA, Harvard, Vancouver, ISO, and other styles
33

NAHORNA, Olena, and Karyna LAHUN. "SOCIAL PROTECTION AND SOCIAL SECURITY OF POLICE OFFICERS." Naukovyy Visnyk Dnipropetrovs kogo Derzhavnogo Universytety Vnutrishnikh Sprav, no. 1 (October 2, 2024): 90–95. http://dx.doi.org/10.31733/2078-3566-2023-5-90-95.

Full text
Abstract:
The article examines the social protection and social security of police officers who perform the dangerous and important work of ensuring public safety. The authors examine various aspects of the social protection of police officers, focusing on their rights, benefits and guarantees provided to ensure their welfare and safety. The article analyzes the social protection system for police officers, including support in case of injuries and disabilities, health insurance, pension system and other social benefits. The authors also explore the challenges faced by police officers in the field of we
APA, Harvard, Vancouver, ISO, and other styles
34

Jeon, Jun Ha, and Bo Sung Jung. "The Impact of Moral Alignment with Police on the Willingness to Participate in Community Policing Activities: Focusing on the Mediating Role of Trust in the Police." Korean Association of Public Safety and Criminal Justice 33, no. 4 (2024): 285–312. https://doi.org/10.21181/kjpc.2024.33.4.285.

Full text
Abstract:
Modern society increasingly recognizes the era of cooperative security, where citizens and the police jointly maintain public safety. Within this paradigm, the active and voluntary participation of citizens in policing activities play a pivotal role. Achieving effective cooperative security necessitates aligning the values of citizens and police, planning policies in congruence with shared objectives, and conducting police activities based on these shared values. As a representative philosophy related to this, the police academia emphasizes the importance of community policing, and empirical a
APA, Harvard, Vancouver, ISO, and other styles
35

Ramona Gusti, Wan Deni, Chairul Muriman Setyabudi, and Sutrisno Sutrisno. "Tanjung Priok Police Community Policing in the Security of Mbah Priok." AL-MANHAJ: Jurnal Hukum dan Pranata Sosial Islam 5, no. 1 (2023): 61–72. http://dx.doi.org/10.37680/almanhaj.v5i1.2117.

Full text
Abstract:
Haul Mbah Priok's activities have the potential to cause disturbances in Kamtibmas, especially during the Covid-19 pandemic. Police are expected to play an active role in preventing various forms of social problems, including problems that may arise at Haul Mbah Priok. This study aims to determine the relationship between the National Police and the Community in Securing Haul Mbah Priok during the Covid-19 pandemic by the Tanjung Priok Port Police. This research was conducted with a qualitative approach. Sources of data in this study include the Head of Tanjung Priok Port Police, Head of Binma
APA, Harvard, Vancouver, ISO, and other styles
36

Ali, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.

Full text
Abstract:
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages
APA, Harvard, Vancouver, ISO, and other styles
37

Chang, Il-sik. "Security Policy of POLICE according to Increase of Elder Crimes." J-Institute 2, no. 2 (2017): 1–6. http://dx.doi.org/10.22471/police.2017.2.2.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Prenzler, T. "Strike Force Piccadilly and ATM Security: A Follow-up Study." Policing 5, no. 3 (2011): 236–47. http://dx.doi.org/10.1093/police/par029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Deibert, Ronald J., and Rafal Rohozinski. "Risking Security: Policies and Paradoxes of Cyberspace Security." International Political Sociology 4, no. 1 (2010): 15–32. http://dx.doi.org/10.1111/j.1749-5687.2009.00088.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Anvar, Shathik J., and Prasad K. Krishna. "A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 4, no. 1 (2020): 155–71. https://doi.org/10.5281/zenodo.3928673.

Full text
Abstract:
Security was not a major concern of the past in Information Technology Organizations. But presently, due to the vast growth in fraud and hacking techniques, the security of organizations is a great concern. Organizations usually spend millions every year just to protect their environment and to maintain security. Yet, no company claims to be a hundred percent secure as fraudulent techniques are more tricky and latest. As the hackers are becoming hard and tricky, the major Information Technology (IT) Organizations are willing to pay a large sum of money for providers offering services of enterp
APA, Harvard, Vancouver, ISO, and other styles
41

Shebanow, Annie, Richard Perez, and Caroline Howard. "The Effect of Firewall Testing Types on Cloud Security Policies." International Journal of Strategic Information Technology and Applications 3, no. 3 (2012): 60–68. http://dx.doi.org/10.4018/jsita.2012070105.

Full text
Abstract:
An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solution
APA, Harvard, Vancouver, ISO, and other styles
42

Padot, Rebecca. "A higher education approach to active shooter incidents: Evidence from 40 United States university campuses." Journal of Emergency Management 22, no. 2 (2024): 169–80. http://dx.doi.org/10.5055/jem.0708.

Full text
Abstract:
In a post-9/11 environment with an increased United States (US) federal government emphasis on active shooter preparedness, this study seeks to understand how higher educational institutions have adapted to this changing policy environment. Furthermore, between 2000 and 2017, there were 15 active shooter incidents at US higher education institutions. This study provides data on how public and private higher education campuses are preparing for this increased active shooter threat. Interviews were conducted with higher education employees familiar with campus security policies from 40 higher ed
APA, Harvard, Vancouver, ISO, and other styles
43

Claudia Cifali, Ana, and Rodrigo Ghiringhelli De Azevedo. "Public Security, Criminal Policy and Sentencing in Brazil during the Lula and Dilma Governments, 2003-2014: Changes and Continuities." International Journal for Crime, Justice and Social Democracy 6, no. 1 (2017): 146–63. http://dx.doi.org/10.5204/ijcjsd.v6i1.392.

Full text
Abstract:
Since mid-1980s crime rates in Brazil started to increase with the transition from military dictatorship to democracy, a period marked by the rise of poverty and hyperinflation. Given levels of police corruption and protection of criminal gangs, trust in the criminal justice system was low, leading to a heightened dependence on private security, gated communities and the politicisation of law and order politics. An impressive punitive turn began at in the 1990s. This paper analysed penal policies under successive left-wing Lula and Dilma governments from 2003 to 2014. During this period the ri
APA, Harvard, Vancouver, ISO, and other styles
44

Siregar, Salwa Ramadhani, and Anajeng Esri Edhi Mahanani. "IMPLEMENTATION OF POLICE DISCRETION IN CRIMINAL LAW ENFORCEMENT IN ANARCHIC DEMONSTRATIONS." JARES (Journal of Academic Research and Sciences) 9, no. 1 (2024): 47–55. http://dx.doi.org/10.35457/jares.v9i1.2910.

Full text
Abstract:
Police discretion is the authority of members of the police to take a policy in certain situations that require their own judgment as long as it does not violate statutory provisions. It aims to guard, maintain order and ensure public security. However, policies issued often raise pros and cons, especially when enforcing criminal law in securing demonstrations. The community considers that the actions taken are a form of hindering the achievement of their aspirations. This condition eventually led to riots during demonstrations which could threaten the safety of the demonstrators, police offic
APA, Harvard, Vancouver, ISO, and other styles
45

Todorova, Antonia. "Turkish Security Discourses and Policies: The Kurdish Question." Information & Security: An International Journal 33, no. 1,2 (2015): 108–21. http://dx.doi.org/10.11610/isij.3305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Brock, Lothar, Anna Geis, Sabine Jaberg, et al. "Mythen der etablierten Sicherheitspolitik." Die Friedens-Warte 92, no. 3-4 (2019): 115. http://dx.doi.org/10.35998/fw-2019-0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Gyamfi, Gerald D. "Exploring the Challenges and Possibilities of Pan African International Police Cooperation." International Journal of Public Administration in the Digital Age 6, no. 4 (2019): 43–53. http://dx.doi.org/10.4018/ijpada.2019100104.

Full text
Abstract:
In the promotion of global peace and security, police cooperation is considered one of the major pillars. This exploratory qualitative study focuses on the possibilities and challenges that should be overcome in the quest to practicalize the implementation of security policies and other legal instruments relating to police cooperation and collaboration in Africa. Twenty-five top police officers and other security experts in Ghana were selected as participants using snowball approach. The participants were interviewed for their views on international police cooperation focusing on cooperation a
APA, Harvard, Vancouver, ISO, and other styles
48

Park, Suhyeon, Younhoon Cho, and Suhong Jeong. "Changes in Private Security with Changes in the PUBLIC SAFETY Environment." J-Institute 1, no. 2 (2016): 26–30. http://dx.doi.org/10.22471/police.2016.1.2.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hunton, P. "Cyber Crime and Security: A New Model of Law Enforcement Investigation." Policing 4, no. 4 (2010): 385–95. http://dx.doi.org/10.1093/police/paq038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Beroíza Valenzuela, Francisca Eunice. "Las Políticas de Seguridad Interna en Chile (1973-2000). Continuidades y readecuaciones en perspectiva históricaLas Políticas de Seguridad Interna en Chile (1973-2000). Continuidades y readecuaciones en perspectiva histórica." Revista Ciencias y Humanidades 9, no. 9 (2024): 31–56. https://doi.org/10.61497/5ptfem18.

Full text
Abstract:
The objective of this article is to analyze the internal security policies in Chile from 1973 to 2000. In that sense, the National Security Doctrine implemented during the military dictatorship of Augusto Pinochet Ugarte, and the public security policies and citizen security of the presidential terms of Patricio Aylwin and Eduardo Frei Ruiz Tagle. The internal security policies took place in a historical context in which various actors intervened, such as the police and the Chilean Army, which interacted dialectically with the governments and played a central role according to their institutio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!