Journal articles on the topic 'Security policie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security policie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
CUNHA, VIVANE MARTINS, JULIA SOMBERG ALVES, and LISANDRA ESPÍNDULA MOREIRA. "GENOCÍDIO NEGRO E SEGURANÇA PÚBLICA: POLÍTICA DE EXTERMÍNIO EM AÇÕES POLICIAIS." REVISTA PSICOLOGIA POLÍTICA 25 (2025): 1–19. https://doi.org/10.5935/2175-1390.v25e23714.
Full textAntonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Full textSupriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.
Full textPereira da Silva, Oziel. "POLICIAMENTO TURÍSTICO E POLÍCIA TURÍSTICA: FUNÇÕES, OBJETIVOS E SUAS COMPLEXIDADES." Revista Científica da Polícia Militar de Mato Grosso do Sul - RevPMMS 2, no. 1 (2025): 351–72. https://doi.org/10.62927/revpmms.v2i1.95.
Full textAchmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.
Full textRyma, Abassi1 and Sihem Guemara El Fatmi2. "Executable Security Policies: Specification and Validation of Security Policies." International Journal of Wireless & Mobile Networks (IJWMN) 1, no. 1 (2022): 20. https://doi.org/10.5281/zenodo.6622372.
Full textKim, Hae Kyoung. "The Impact of Police Organization Support on Public Policy: Focusing on Learning Organizations." Korean Society of Private Security 22, no. 3 (2023): 47–68. http://dx.doi.org/10.56603/jksps.2023.22.3.47.
Full textSchneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (2000): 30–50. http://dx.doi.org/10.1145/353323.353382.
Full textPotter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.
Full textMcIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.
Full textCho, Sang Hyun. "A Study on the Core Ideology and Organizational Citizenship behavior of Police Officers: Verification of the Moderating Effect of Public Service Motivation." Korean Association for Terrorism Studies 16, no. 4 (2023): 153–68. http://dx.doi.org/10.46350/kats.2023.16.4.153.
Full textGudelli, Venkata Ramana. "Data Encryption and IAM Policies: Best Practices for AWS Ecosystems." Cybersecurity and Network Defense Research 2, no. 2 (2022): 210–35. https://doi.org/10.5281/zenodo.15102702.
Full textPoincignon, Yann. "Defense Academy Excellence European Union Civilian Policing: Foreign Policy Action or Internal Security Tool." Connections: The Quarterly Journal 02, no. 2 (2003): 111–30. http://dx.doi.org/10.11610/connections.02.2.12.
Full textSheptycki, J. "High Policing in the Security Control Society." Policing 1, no. 1 (2007): 70–79. http://dx.doi.org/10.1093/police/pam005.
Full textHelmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Full textOleiniuc, Maria. "SPECIFIC FOOD SECURITY POLICIES." Journal of Social Sciences II (2) (June 15, 2019): 79–86. https://doi.org/10.5281/zenodo.3235244.
Full textChoi, Junho, Chong Soo Cheung, Dongkwan Lee, Seol A. Kwon, and Jae Eun Lee. "Policy Directions for Securing Food Security by Applying Critical Infrastructure in the Field of Agriculture." Crisis and Emergency Management: Theory and Praxis 13, no. 8 (2023): 17–27. http://dx.doi.org/10.14251/jscm.2023.8.17.
Full textPage-Poma, Fernanda, and Sofía Duarte. "The Struggle for Gender Equality: Policy Implementation in Argentina’s Security Forces." Social Politics: International Studies in Gender, State & Society 32, no. 1 (2025): 126–51. https://doi.org/10.1093/sp/jxae029.
Full textMatvejevs, Aleksandrs. "Problems of Police Activity in Ensuring Public Order and Public Safety." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no. 21 (2021): 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.
Full textElbably, Amar. "سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة". Security Policy Paper 2, № 2 (2021): 1–20. http://dx.doi.org/10.26735/hjoo8882.
Full textPangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.
Full textBasin, David, Vincent Jugé, Felix Klaedtke, and Eugen Zălinescu. "Enforceable Security Policies Revisited." ACM Transactions on Information and System Security 16, no. 1 (2013): 1–26. http://dx.doi.org/10.1145/2487222.2487225.
Full textPernul, G., and A. M. Tjoa. "Security Policies for Databases." IFAC Proceedings Volumes 25, no. 30 (1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.
Full textCuppens, Frédéric, and Nora Cuppens-Boulahia. "Modeling contextual security policies." International Journal of Information Security 7, no. 4 (2007): 285–305. http://dx.doi.org/10.1007/s10207-007-0051-9.
Full textØlnes, Jon. "Development of security policies." Computers & Security 13, no. 8 (1994): 628–36. http://dx.doi.org/10.1016/0167-4048(94)90042-6.
Full textSuhaibah, Suhaibah, Armiwal Armiwal, and Mukallaf Mukallaf. "The Role of the Polri Intelligence in Securing the General Election and Institution of the Pidie District DPRK." Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences 4, no. 1 (2021): 626–31. http://dx.doi.org/10.33258/birci.v4i1.1645.
Full textSampson, F., and J. McNeill. "Redefining the Gaps: Connecting Neighbourhood Safety to National Security." Policing 1, no. 4 (2007): 460–71. http://dx.doi.org/10.1093/police/pam068.
Full textSimmons, A. "Room, Stewart (2009). * BUTTERWORTHS DATA SECURITY: LAW AND PRACTICE." Policing 6, no. 1 (2011): 99–100. http://dx.doi.org/10.1093/police/par014.
Full textSales, Eric Rodrigues De, and James Frade Araújo. "The impact of judiciary decisions on public security policies in Brazil." Forensic Research & Criminology International Journal 12, no. 1 (2024): 46–55. http://dx.doi.org/10.15406/frcij.2024.12.00397.
Full textMurtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.
Full textDiógenes, José Lenho Silva, Suely Salgueiro Chacon, and Tayana Cibele Canafístula Torres. "Police Education and SDG 16: An Assessment of AESP in the Context of Ceará’s Public Security Policies." Revista de Gestão Social e Ambiental 19, no. 1 (2025): e010934. https://doi.org/10.24857/rgsa.v19n1-117.
Full textde Rover, Cees. "Police and security forces." International Review of the Red Cross 81, no. 835 (1999): 637–47. http://dx.doi.org/10.1017/s1560775500059836.
Full textNAHORNA, Olena, and Karyna LAHUN. "SOCIAL PROTECTION AND SOCIAL SECURITY OF POLICE OFFICERS." Naukovyy Visnyk Dnipropetrovs kogo Derzhavnogo Universytety Vnutrishnikh Sprav, no. 1 (October 2, 2024): 90–95. http://dx.doi.org/10.31733/2078-3566-2023-5-90-95.
Full textJeon, Jun Ha, and Bo Sung Jung. "The Impact of Moral Alignment with Police on the Willingness to Participate in Community Policing Activities: Focusing on the Mediating Role of Trust in the Police." Korean Association of Public Safety and Criminal Justice 33, no. 4 (2024): 285–312. https://doi.org/10.21181/kjpc.2024.33.4.285.
Full textRamona Gusti, Wan Deni, Chairul Muriman Setyabudi, and Sutrisno Sutrisno. "Tanjung Priok Police Community Policing in the Security of Mbah Priok." AL-MANHAJ: Jurnal Hukum dan Pranata Sosial Islam 5, no. 1 (2023): 61–72. http://dx.doi.org/10.37680/almanhaj.v5i1.2117.
Full textAli, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.
Full textChang, Il-sik. "Security Policy of POLICE according to Increase of Elder Crimes." J-Institute 2, no. 2 (2017): 1–6. http://dx.doi.org/10.22471/police.2017.2.2.01.
Full textPrenzler, T. "Strike Force Piccadilly and ATM Security: A Follow-up Study." Policing 5, no. 3 (2011): 236–47. http://dx.doi.org/10.1093/police/par029.
Full textDeibert, Ronald J., and Rafal Rohozinski. "Risking Security: Policies and Paradoxes of Cyberspace Security." International Political Sociology 4, no. 1 (2010): 15–32. http://dx.doi.org/10.1111/j.1749-5687.2009.00088.x.
Full textAnvar, Shathik J., and Prasad K. Krishna. "A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 4, no. 1 (2020): 155–71. https://doi.org/10.5281/zenodo.3928673.
Full textShebanow, Annie, Richard Perez, and Caroline Howard. "The Effect of Firewall Testing Types on Cloud Security Policies." International Journal of Strategic Information Technology and Applications 3, no. 3 (2012): 60–68. http://dx.doi.org/10.4018/jsita.2012070105.
Full textPadot, Rebecca. "A higher education approach to active shooter incidents: Evidence from 40 United States university campuses." Journal of Emergency Management 22, no. 2 (2024): 169–80. http://dx.doi.org/10.5055/jem.0708.
Full textClaudia Cifali, Ana, and Rodrigo Ghiringhelli De Azevedo. "Public Security, Criminal Policy and Sentencing in Brazil during the Lula and Dilma Governments, 2003-2014: Changes and Continuities." International Journal for Crime, Justice and Social Democracy 6, no. 1 (2017): 146–63. http://dx.doi.org/10.5204/ijcjsd.v6i1.392.
Full textSiregar, Salwa Ramadhani, and Anajeng Esri Edhi Mahanani. "IMPLEMENTATION OF POLICE DISCRETION IN CRIMINAL LAW ENFORCEMENT IN ANARCHIC DEMONSTRATIONS." JARES (Journal of Academic Research and Sciences) 9, no. 1 (2024): 47–55. http://dx.doi.org/10.35457/jares.v9i1.2910.
Full textTodorova, Antonia. "Turkish Security Discourses and Policies: The Kurdish Question." Information & Security: An International Journal 33, no. 1,2 (2015): 108–21. http://dx.doi.org/10.11610/isij.3305.
Full textBrock, Lothar, Anna Geis, Sabine Jaberg, et al. "Mythen der etablierten Sicherheitspolitik." Die Friedens-Warte 92, no. 3-4 (2019): 115. http://dx.doi.org/10.35998/fw-2019-0006.
Full textGyamfi, Gerald D. "Exploring the Challenges and Possibilities of Pan African International Police Cooperation." International Journal of Public Administration in the Digital Age 6, no. 4 (2019): 43–53. http://dx.doi.org/10.4018/ijpada.2019100104.
Full textPark, Suhyeon, Younhoon Cho, and Suhong Jeong. "Changes in Private Security with Changes in the PUBLIC SAFETY Environment." J-Institute 1, no. 2 (2016): 26–30. http://dx.doi.org/10.22471/police.2016.1.2.26.
Full textHunton, P. "Cyber Crime and Security: A New Model of Law Enforcement Investigation." Policing 4, no. 4 (2010): 385–95. http://dx.doi.org/10.1093/police/paq038.
Full textBeroíza Valenzuela, Francisca Eunice. "Las Políticas de Seguridad Interna en Chile (1973-2000). Continuidades y readecuaciones en perspectiva históricaLas Políticas de Seguridad Interna en Chile (1973-2000). Continuidades y readecuaciones en perspectiva histórica." Revista Ciencias y Humanidades 9, no. 9 (2024): 31–56. https://doi.org/10.61497/5ptfem18.
Full text