Academic literature on the topic 'State Security Service'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'State Security Service.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "State Security Service"

1

Sundar, Priya, R. Raju, P. Mahalakshmi, and G. Lalitha. "Providing security for Web Service Composition using Finite State Machine." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (August 30, 2005): 435–44. http://dx.doi.org/10.24297/ijct.v4i2b1.3232.

Full text
Abstract:
The revolution impacted by Web Service as a solution to business and enterprise application integration throws light on the significance of security provided by Web Services during Web Service Composition. Satisfying the security requirements is truly a demanding task because of the dynamic and capricious nature of the Web. Web Service Composition associates web services to create high level business process that absolutely matches and conforms appropriately to the service requestor’s needs. It involves customizing services often by locating, assimilating and deploying elementary services. Our paper proposes a policy based system for granting security during the process of web service composition. Policies defined for effective and secure composition analyze and verify the conditions under which the task of the web service is allowed or rejected. To achieve this specification, we make use of Finite State Machine model which clearly portrays the business and flow logic. Nodes in the Finite State Machine represent rules. Upon efficacious fulfillment of policies which are defined in the node access points, transition between rules is stimulated. A service composition is said to be successfully incorporated only if there is complete absence of policy violations when combining the policies of elementary services. The simulated FSM which extracts the rules and policies of the web services and correctly matches and satisfies the policy constraints defined in the access points ensure providing security for the composite web service.
APA, Harvard, Vancouver, ISO, and other styles
2

Guracha, Adan Moro, and Felix Kiruthu. "Attitudes towards Outsourcing Security Services on Service Delivery in Commercial State Owned Enterprises in Nairobi City County, Kenya." International Journal of Current Aspects 3, no. III (June 5, 2019): 1–13. http://dx.doi.org/10.35942/ijcab.v3iiii.26.

Full text
Abstract:
Security service delivery in public sector is crucial as it entails protecting government personnel as well as property. Therefore, security is increasingly viewed as a key condition for economic growth and development. Lack or ineffective security service delivery weakens the performance of any organization. This study sought to determine if service delivery improves as a result of outsourcing of security services to commercial state owned enterprises in Kenya. Specifically, this research aimed at determining the effects of outsourcing cash protection, body guarding, property protection and information/data protection services on security service delivery of selected commercial state owned enterprises in Nairobi City County in Kenya. The study was guided by two theories; the Functionalist model and securitization theory. A descriptive research design was adopted. The target population for this study was a census of all the 29 selected commercial state owned enterprises. The study targeted security managers, assistant security managers and security staff, hence total target population was 958 respondents. The sample size was selected through purposive and random sampling techniques. The research used questionnaires to collect data. Descriptive statistics including frequencies, percentages, means and standard deviations were used. Further, inferential statistics including correlation and regression analysis were used to illustrate the relationship between the independent and the dependent variables. The study used a multiple regression model. The regression results indicated that, there is a positive and significant relationship between outsourcing cash protection security services and security service delivery of commercial state owned enterprises in Kenya (β=0.247, p=0.001); a positive and significant relationship between outsourcing bodyguard security services and security service delivery of commercial state owned enterprises in Kenya (β=0.271, p=0.000); a positive and significant relationship between outsourcing property guarding security services and security service delivery of commercial state owned enterprises in Kenya (β=0.289, p=0.033); and a positive and significant relationship between outsourcing information security services and security service delivery of commercial state owned enterprises in Kenya(β=0.389, p=0.015). From the findings, the study concluded that outsourcing security services has a significant influence on security service delivery of commercial state owned enterprises in Nairobi City County, Kenya. In particular, the study concluded that outsourcing cash protection, body guarding services, property guarding and information security services, had a positive and significant effect on security service delivery of commercial state owned enterprises in Kenya. The study recommended that commercial state owned enterprises should strengthen their cash protection security services, security officers should be trained on how to protect human life especially, the personnel that they are supposed to protect, private security companies should keep data on any property that enters and leaves the company’s premises, and that private data security officers should have access to IT skills. This is an open-access article, access, citation and distribution of this article is allowed with full recognition of the authors and the source. This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
APA, Harvard, Vancouver, ISO, and other styles
3

Borichev, Konstantin, and Mihail Pavlik. "The role of State Security bodies in countering terrorism." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2021, no. 1 (April 9, 2021): 94–103. http://dx.doi.org/10.35750/2071-8284-2021-1-94-103.

Full text
Abstract:
The article is devoted to the activities of the state security guard services of the Russian Federation in counteraction of terrorism. In particular, the main features and trends of modern terrorism are identified. The article analyzes the current legal acts in Russia that regulate activities of state security guard services, including their main tasks. The main legal definitions in the field of state security are studied. A retrospective analysis of the development of domestic special services in the field of state security was conducted. The main activities of the Federal security guard service of the Russian Federation in the fight against terrorism, as well as the powers in development and implementation of measures to prevent, detect and suppress terrorist activities, are considered. In particular, the complex of conservative, custodial, technical, operational, investigative and preventive activities, is carried out by the units of the Federal security guard service of the Russian Federation, on a permanent basis in the period of preparation and conduct of security measures in the places of permanent and temporary stay and sections of the route of state (movement) of the objects of state security to ensure the security of state security and counter the terrorist threat. On the basis of the analysis of the activities of state security services, options for increasing the efficiency of their work in the field of anti-terrorism are proposed in order to maximize the effectiveness of ensuring the security of state security objects.
APA, Harvard, Vancouver, ISO, and other styles
4

Otinashvili, Ramaz. "Security in Company Management." Works of Georgian Technical University, no. 2(520) (June 25, 2021): 67–75. http://dx.doi.org/10.36073/1512-0996-2021-2-67-75.

Full text
Abstract:
To neutralize the danger associated with business management there is a special security service in the management system of successful companies the structure of which depends on the nature and scale of the business. A medium-sized security service consists of four structural divisions: 1. Security; 2. Operative; 3. Analytical; 4. Technical. In each, depending on the specifics of the activity , up to 1 or 10 employees can be employed. Every business has its general and specific challenges. The main challenge still comes from direct competitors. Rivalry often transcends civilized boundaries and escalates into physical or other confrontation, especially if there is a new "player" in the segment. In the advanced countries of the West, in addition to state security institutions, there are private detective and detective organizations, news agencies, studying scientific and consulting centers, which provide various services on a fee-for-service basis. Coordination of state law enforcement agencies and private security structures is sophisticated. There is created a special body, if necessary and it harmonizes their activities. It would be nice to transfer this practice to Georgian conditions.
APA, Harvard, Vancouver, ISO, and other styles
5

Hordiienko, Serhii. "Powers of government agencies in ensuring the security of the state and directions of their improvement." Legal Ukraine, no. 10 (November 27, 2020): 6–17. http://dx.doi.org/10.37749/2308-9636-2020-10(214)-1.

Full text
Abstract:
The paper considers and systematizes the powers of the Verkhovna Rada of Ukraine, the President of Ukraine, the National Security Council of Ukraine, the Cabinet of Ministers of Ukraine, local authorities and the judiciary in modern conditions and attempts to improve them by systematizing legislation in the political, military, economic and judicial spheres. It is determined that the security of the state in the modern conditions of development of Ukrainian society is ensured not only by the Security Service of Ukraine, as stated in the legislation, but also by other authorities and management on which it directly depends: Verkhovna Rada, President, National Security and Defense Council, Ministry of Internal Affairs, Ministry of Economic Development, Trade and Agriculture of Ukraine; Ministry of Energy and Environmental Protection of Ukraine; Ministry of Foreign Affairs of Ukraine; Ministry of Finance of Ukraine; Ministry of Justice of Ukraine; State Tax Service of Ukraine; State Service of Ukraine for Ethnopolitics and Freedom of Conscience; State Customs Service of Ukraine; State Service of Geology and Subsoil of Ukraine; State Service of Ukraine for Emergencies; State Financial Monitoring Service of Ukraine; State Export Control Service of Ukraine; The State Fiscal Service of Ukraine and almost all other state institutions. However, their activities in this direction have their own specific features that need to be identified and enshrined in law. Key words: powers, Verkhovna Rada of Ukraine, President of Ukraine, National Security Council of Ukraine, Cabinet of Ministers of Ukraine, local authorities and judicial bodies, Constitution of Ukraine, Law of Ukraine «On the National Security and Defense Council of Ukraine».
APA, Harvard, Vancouver, ISO, and other styles
6

Barić, Nikica. "State Security of Socialist Republic of Croatia and events in Poland 1980-1982." Balcanica Posnaniensia. Acta et studia 28, no. 2 (December 31, 2021): 117–39. http://dx.doi.org/10.14746/bp.2021.28.23.

Full text
Abstract:
The Socialist Republic of Croatia, as one of republics of the Socialist Federative Republic of Yugoslavia, possessed its State Security Service (Služba državne sigurnosti, SDS), equivalent to similar political security services in other communist states. At the Yugoslav level there was also the Federal State Security Service. The State Security of Croatia dealt with both internal and external threats to the communist system and gathered intelligence information. In the early 1980s the State Security of Croatia gathered sizeable amount of information on the events connected with activities of „Solidarity” in the People’s Republic of Poland and the crisis that ultimately led to the imposition of state of war in Poland, as well as reaction to these events in Croatia. The main aim of this paper is to present State Security reports about with Poland in the period between 1980 and 1982.
APA, Harvard, Vancouver, ISO, and other styles
7

Kamiński, Mariusz Antoni. "Intelligence and counterintelligence in the structure of the state organs of the Republic of Estonia." De Securitate et Defensione. O Bezpieczeństwie i Obronności 5, no. 1 (October 10, 2019): 121–34. http://dx.doi.org/10.34739/dsd.2019.01.09.

Full text
Abstract:
The article presents an analysis of the legal status, organization and powers of the special services of the Republic of Estonia. The author presents the mission and tasks of the Estonian Internal Security Service (Kaitsepolitsei), the Estonian Foreign Intelligence Service (Välisluureamet) and the Military Intelligence Centre (Luurekeskus). The article show the historical aspect of the Estonian special services and their location in the structure of state organs responsible for national security. In addition, the author presents a surveillance system on the activities of intelligence and counterintelligence services.
APA, Harvard, Vancouver, ISO, and other styles
8

Mehta, Meera, Dinesh Mehta, and Jaladhi Vavaliya. "Urban drinking water security in Gujarat." Journal of Social and Economic Development 23, S1 (February 18, 2021): 166–80. http://dx.doi.org/10.1007/s40847-020-00122-0.

Full text
Abstract:
AbstractGujarat has made important strides to ensure that most parts of the state become water secure. In 2005, Gujarat was one of the few states that recognized that its urban areas were its ‘engines of growth’ and made significant investments in urban infrastructure. A state-wide water supply grid was constructed to transfer inter-basin water from perennial surface water sources to water-scarce areas. While these schemes have improved household-level access to municipal water supply, service levels have not improved. In this paper, we argue that along with infrastructure creation, there is a need to focus on monitoring, operation and maintenance of existing system and improving efficiency. We analyze information available from the performance assessment system (PAS) setup by the CEPT University for monitoring of urban services in India. It has annual information of water service delivery in all the urban areas of Gujarat from 2010. We assess urban drinking water supply on three key aspects: equity, service quality and financial sustainability. We also identify a few key intervention areas related to increased accountability, efficiency and equity in delivery of water supply services.
APA, Harvard, Vancouver, ISO, and other styles
9

Nielsen, Christian Axboe. "The Yugoslav State Security Service and the Bleiburg Commemorations." Politička misao 55, no. 2 (June 19, 2018): 50–70. http://dx.doi.org/10.20901/pm.55.2.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kondrashova, Nataliia. "LEGAL REGULATION OF DISCOVERY UKRAINE'S SECURITY SERVICE THREATS ECONOMIC SECURITY OF THE STATE." Entrepreneurship, Economy and Law, no. 7 (2019): 99–103. http://dx.doi.org/10.32849/2663-5313.2019.7.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "State Security Service"

1

Nilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.

Full text
Abstract:
A DDoS attack is an attempt to bring down a machine connected to the Internet. This is done by having multiple computers repeatedly sending requests to tie up a server making it unable to answer legitimate requests. DDoS attacks are currently one of the biggest security threats on the internet according to security experts. We used a qualitative interview with experts in IT security to gather data to our research. We found that most companies are lacking both in knowledge and in their protection against DDoS attacks. The best way to minimize this threat would be to build a system with redundancy, do a risk analysis and revise security policies. Most of the technologies reviewed were found ineffective because of the massive amount of data amplification attacks can generate. Ingress filtering showed promising results in preventing DDoS attacks by blocking packages with spoofed IP addresses thus preventing amplification attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Tengeni, Tamsanqa Edgar. "The state of governmental relations with reference to decentralisation of public safety and security service delivery in the Free State / by Tamsanqa Edgar Tengeni." Thesis, North-West University, 2007. http://hdl.handle.net/10394/2539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Inbar, Reuven. "Relationship between participation in a service enrichment and fitness programme and physical performance of state security personnel in stressful situations." Thesis, Anglia Ruskin University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mungwashu, Sthembiso Handinawangu. "A learning state?: a case study of the post-1994 South African welfare regime." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1003113.

Full text
Abstract:
This thesis examines the processes of policymaking in South Africa, as expressed through the shifts in income maintenance policy. The thesis focuses on the processes leading to the establishment of the South African Social Security Agency (SASSA), as its case study. SASSA is the institutional framework for the delivery of social grants. Our intention is to test the efficacy of what we have called ‘state learning’ in the South African context. Therefore, the overall aim of the study is to assess the capacity of the ‘state to learn’ in the process of policymaking as expressed through the shifts in social grant administration and the institutional framework of social welfare in South Africa. The subsidiary goals of the research includes mapping changes in the system of social grants administration since 1994 in order to assess the sources of the shifts in its institutional framework; to assess processes and responses within the state that result in policy shifts and the extent to which these can be considered dimensions of state learning; to assess the power of ideas in the policymaking process and to assess the influence of non-state agencies/actors in policy contestation and learning processes. This is essential, because social policy, especially welfare policy research in post-apartheid South Africa, has focused on the economic value of policies and not the political processes in policymaking. For the framework of analysis the study draws on theories of learning, especially at the organizational or institutional level. We start from the perspective that policymaking and implementation cannot be reduced to a neatly ordered schema (Lamb: 1987:6). Further, that policy change and policymaking are “iterative, haphazard, and highly political processes, in which the apparently logical sequences of decision-making, may turn out to be the reverse” (Lamb, 1987:6). This is mainly because state building is a complex affair and a contested terrain; policy learning and making are neither benign nor do they involve the state working in isolation (Sabatier, 1998). To understand processes of policymaking in South Africa, we rely on content analysis of primary and secondary materials or documents and in-depth interviews with key informants involved in the policy process. The documentary sources include records of parliamentary debates, green and white papers on social welfare, ANC party documents, presidential task force reports, newspapers, magazines and court judgments. The study reveals that the establishment of SASSA lends itself to the idea of ‘state learning’. Learning is indicated in South Africa by the capacity and ability of the state to stimulate ideas, debate ideas to establish ideational matrixes as well as paradigms that have informed the development of policy, take ideas and implement them to try and solve mismatches between the intention of the state and the outcomes and the ability of the state to produce policy.
APA, Harvard, Vancouver, ISO, and other styles
5

Bernard, Duguet Nicolas. "Les directeurs de prison : discipline et régulation dans l'administration." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAD009.

Full text
Abstract:
Au cours du XXème siècle, l'identité professionnelle des directeurs de prison a connu une évolution rapide autant que radicale. La période qui s'ouvre au cours des années 1970 est particulièrement significative de cette mutation, elle est marquée par une crise de cette identité professionnelle amorçant aussi son processus de reformation. Pour saisir la logique de cette phase adaptation, il est possible de la resituer dans le cadre d'une analyse plus large à partir du concept de gouvernementalité. La gouvernementalité étant ici comprise dans deux de ses dimensions telles qu'elles ont été définies par Michel Foucault. D'abord comme période, celle de l'époque contemporaine qui débute à compter de la Révolution française. Ensuite comme technique de pouvoir, celle de la biopolitique qui se réalise au travers de la régulation. Dans ce cadre, l'étude de l'évolution de l'identité professionnelle des directeurs de prison dans et par la gouvernementalité permet de saisir les mécanismes qui conduisent, tant au sein de l'appareil administratif qu'au sein de la pénalité, à l'affaiblissement du pouvoir disciplinaire et à la montée en puissance de la régulation. Les directeurs de prison étant tour à tour objets et acteurs de ces deux arts de gouverner
During the 20thcentury, the professional identity of prison directors has undergone a rapid and radical evolution. This evolution was caused by questioning the role and the functioning of the penal prison in the development of liberalism. The period, beginning in the 1970's, inaugurates the mutation of the identity crises and its reformation. To be able to comprehend the logical development of this proces of adaptation, one most place it in theframework of governmentality. The « governmentality » in this case is seen in two of its dimensions as defined by Michel Foucault. Firstly, as a phase of the contempory period beginning at the French Revolution. Secondly, as a technique of authority : the biopolitics realized by a process of regulation. In this framework, a study of the evolution of the professional identity of prisons directors, in and by « governmentality », explains the mechanisms leading to the weakening of the disciplinary authority, and the increased power of regulation systems, both on administrative and penal levels. The prison directors become, in turns, either objects or actors of these two ways of governing
APA, Harvard, Vancouver, ISO, and other styles
6

Eicher, Michael. "Protecting diplomats in Iraq what can the U.S. Department of State do to improve it's management and oversight of security contractors in Iraq? /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mvé, ebang Bruno. "Politique étrangère et sécurité nationale d'un petit État : analyse de l'action du Gabon pour la paix et la sécurité en Afrique Centrale, une politique extérieure au service de la construction et de la préservation de l'intérieur." Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30018.

Full text
Abstract:
L’Afrique est la région du monde, dans laquelle, existe le plus grand nombre de crises armées sanglantes. Depuis les indépendances, cette région n’a jamais véritablement connu de paix et de sécurité dans toutes ses entités régionales. Dans ce sombre tableau africain, l’Afrique centrale occupe une place peu enviable. Abandonnée à son triste sort à la fin de la Guerre Froide, des pays, tel que le Gabon, décidèrent de particulièrement orienter leur politique étrangère dans le but d’aider les États en crises, de son environnement immédiat, à recouvrir une certaine stabilité mais surtout dans une logique de sécurisation nationale. Petit pays d’Afrique centrale, le Gabon ressent les effets de l’instabilité régionale persistante. Cet engagement gabonais pour la paix n’est pas né avec son accession à la souveraineté. Il s’est construit au fil des années. Son action pour sa construction et sa sécurité nationale n’a jamais eu pour but de reproduire, exactement, le même modèle de stabilité qu’il connait mais, uniquement, d’arriver aux silences des armes. Il est évident que comme tout engagement politique, l’action r gabonaise présente certaines limites et l’État devrait prendre des mesures pour que l’objectif de sécurité nationale soit atteint sans ambages. Néanmoins, l’action de tel pays est importante car en priorisant le dialogue, ils fournissent un travail de fourmis qui arrive, tout de même, à mettre un terme aux effusions de sang et à leur tendance au débordement
Africa is the region of the world, in which, exists the largest number of bloody armed crises. Since the independences, this region has never really known peace and security in all its regional entities. In this somber african board, Central Africa occupies an unenviable place. Abandoned in its sad fate at the end of the Cold War, countries, such as the Gabon, decided to direct particularly their foreign policy with the aim of helping states in crises, of its immediate environment, to cover a certain stability But especially in a logic of national reassurance. Small country of Central Africa, the Gabon feels the effects of the persistent regional instability. This Gabonese commitment for the peace was not born with its entry in the sovereignty. It built itself over the years. Its action for its building and national security has never aimed at reproducing exactly the same model of stability which it can but only arrive at the silence of weapons. It is obvious that as any political commitment, the gabonese regional action presents certain limits and the state should take measures aiming at a better international assertion. Nevertheless, the action of such country is important because by prioritizing the dialogue, they supply a painstaking job which manages, all the same, to put an end to the bloodsheds and to their tendency to the overflowing
APA, Harvard, Vancouver, ISO, and other styles
8

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Clipson, Edmund Bede. "Constructing an intelligence state : the colonial security services in Burma, 1930-1942." Thesis, University of Exeter, 2010. http://hdl.handle.net/10036/98382.

Full text
Abstract:
My doctoral research focuses on the development and operation of the intelligence services in British colonial Burma during the years 1930 to 1942. This involves an examination of the causes of intelligence development, its progress throughout 1930-1942, its rationale and modus operandi, and the pressures it faced. This time period permits us to assess how intelligence development was a product of the colonial government's response to the 1930 peasant uprising which came as such a shock to colonial security and how thereafter intelligence helped prevent popular hostility to the government from taking the form of an uprising. As a result, intelligence information was increasingly used to secure colonial power during the period of parliamentary reform in Burma in 1937. The thesis further examines the stresses that riots and strikes placed on colonial security in 1938, the so-called ‘year of revolution’ in Burma. The thesis then proceeds to consider how intelligence operated in the final years of colonial rule before the Japanese occupation of Burma in 1942. This study is significant not only because very little work on the colonial security services in Burma exists for the period under review, but also because it reveals that intelligence was crucial to colonial rule, underpinning the stability of the colonial state and informing its relationship with the indigenous population in what remained, in relative terms at least, a colonial backwater like Burma. The argument that intelligence was pivotal to colonial governmental stability in Burma because of its centrality to strategies of population control departs from conventional histories of Burma which have considered the colonial army to have been the predominant instrument of political control and the most significant factor in the relationship between the state and society in colonial Burma. Rather it will be argued here that the colonial state in Burma relied on a functioning intelligence bureau which collected information from local indigenous officials and informers and employed secret agents to work on its behalf. This information was collated into reports for the government which then became integral to policy formulation. The primary source base for this work includes British colonial material from government and private collections predominantly in the British library as well as government papers in the National Archives in Kew.
APA, Harvard, Vancouver, ISO, and other styles
10

Ješuta, Martin. "Analýza efektivity e-služeb veřejné správy ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-85134.

Full text
Abstract:
This paper has focus on czech e-government topic. Its background are strategic documents of the Czech Republic, international comparison, completed projects of e-government in Czech Republic and european framework for benchmarking e-government progress. The Methodology is built on this background, which is able to evaluate effectiveness of e-government services. Relevance of this methodology is verified by two pilot measurements.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "State Security Service"

1

Omand, David. Securing the state: National security in contemporary times. Singapore: S. Rajaratnam School of International Studies, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peter, Gill. Policing politics: Security intelligence and the liberal democratic state. London: F. Cass, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Xuezhi. China's security state: Philosophy, evolution, and politics. Cambridge: Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The lesser terror: Soviet state security, 1939-1953. Westport, Conn: Praeger, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Parrish, Michael. The lesser terror: Soviet state security, 1939-1953. Westport, Conn: Praeger, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Milosavljević, Bogoljub. Secret files: Opening the files of state security services. Belgrade: Center for Antiwar Action, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Milosavljević, Bogoljub. Secret files: Opening the files of state security services. Belgrade: Center for Antiwar Action, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Harris, Shane. The watchers: The rise of America's surveillance state. New York: Penguin Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harris, Shane. The watchers: The rise of America's surveillance state. New York: Penguin Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Harris, Shane. The watchers: The rise of America's surveillance state. New York: Penguin Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "State Security Service"

1

Wang, XiaoFeng. "Memory and State Exhaustion Denial of Service." In Encyclopedia of Cryptography and Security, 773–74. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Srinivasan, Avinash, and Frank Ferrese. "Forensics-as-a-Service (FaaS) in the State-of-the-Art Cloud." In Security, Privacy, and Digital Forensics in the Cloud, 321–37. Singapore: John Wiley & Sons Singapore Pte. Ltd, 2019. http://dx.doi.org/10.1002/9781119053385.ch16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thurlow, Richard C. "The Security Service, the Communist Party of Great Britain and British Fascism, 1932–51." In British Fascism, the Labour Movement and the State, 27–45. London: Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1057/9780230522763_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Izvarina, Nataliya, and Darya Pilyuk. "USING CONTROL PROCEDURES IN THE BUSINESS SECURITY SYSTEM." In Business security management in modern conditions, 145–51. au: AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635bee2d1.66904868.

Full text
Abstract:
The article discusses the features of building a control system for the economic security of business. The authors formulate the tasks and functions of control as an effective system of the company that provides management and owners with timely, objective information about the state of its Affairs. Priority areas of the company's internal control service are presented.
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Ronghua, Qianxun Wang, and Liang Guo. "Research Towards Key Issues of API Security." In Communications in Computer and Information Science, 179–92. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_11.

Full text
Abstract:
AbstractWith the mass application of virtualization, micro-services, and cloud-native technologies, the interaction between service entities through APIs has become a norm. Many platforms are still maintaining a large number of old APIs due to business needs. At the same time, many new APIs are gradually going online. Both of these statuses put forward higher requirements for API security. Focusing on old APIs’ security protection and other issues, this article starts from the process of asset discovery, vulnerability detection, and security auditing. Aiming at the problem of API asset discovery, this article summarizes the technical methods of automatically clustering unowned API assets using the characteristics of various commonly used APIs. Aiming at new API vulnerability detection, a security analysis method based on finite state machine is proposed. For the first time, the cross-network communication taint propagation based on dynamic taint analysis technology and system-level simulation technology is realized, enabling sensitive data flow tracing in API communication become feasible. We designed a flowbased API security audit system to improve automated API protection. Finally, We analyzed technical opportunities and challenges of API security in detail and prospected for API security research’s next direction and development trend.
APA, Harvard, Vancouver, ISO, and other styles
6

Vedder, Klaus. "GSM: Security, Services, and the SIM." In State of the Art in Applied Cryptography, 224–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49248-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Accaoui Lorfing, Pascale. "Screening of Foreign Direct Investment and the States’ Security Interests in Light of the OECD, UNCTAD and Other International Guidelines." In Public Actors in International Investment Law, 179–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-58916-5_10.

Full text
Abstract:
AbstractThis chapter analyses the concept of the “national security interest”, which is widely recognised as allowing a state to determine which areas of its economy are restricted or prohibited to foreign investors. This chapter seeks to identify what constitutes a threat for a state and how that threat is managed both domestically and internationally. Despite the recognition of a state’s right to take measures it considers essential to its security, there are limits. The rules established by the Organisation for Economic Co-operation and Development (OECD) and the United Nations Conference on Trade and Development (UNCTAD) and other international instruments are non-binding but can serve as a guide for states in determining the limits of the national security approach. International investment agreements can restrict the right of states to take security-related measures. Finally, customary international law, in light of the good faith obligation, can serve as a basis for assessing measures taken by a state and pave the way for a better balance between the rights of a state and those of foreign investors.
APA, Harvard, Vancouver, ISO, and other styles
8

Reisner, Robert A. F. "Homeland Security Brings Ratepayer vs. Taxpayer to Center Stage." In Postal and Delivery Services: Delivering on Competition, 223–42. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-1-4615-0233-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Krasznahorkai, Kata. "‘The Reconstruction of the Past is the Task of Historians and not Agents’." In Cultural Inquiry, 29–36. Berlin: ICI Berlin Press, 2022. http://dx.doi.org/10.37050/ci-21_04.

Full text
Abstract:
State security archives in Eastern Europe are shedding new light on the operative practices of the secret services and their interaction with performance art. Surveillance, tracking, undermining, disruption, writing of reports, and measure plans were different operative methods to be carried out in continuous repetitive processes. This paper argues that, through these repetitive working processes, state security agencies were permanently engaged in different forms of reenactments: of orders, legends, report writing, and inventing measure plans. With this operative reenactment, state security agencies not only tried to track down facts but also created ‘fake facts’ serving their agenda. These `fake-facts` were then again repeated and reenacted by informants endlessly to be `effective` in the surveillance and elimination of performance art.
APA, Harvard, Vancouver, ISO, and other styles
10

Fleischer, Julia. "Federal Administration." In Public Administration in Germany, 61–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-53697-8_5.

Full text
Abstract:
AbstractThe federal administration is significantly small (around 10 percent of all public employees). This speciality of the German administrative system is based on the division of responsibilities: the central (federal) level drafts and adopts most of the laws and public programmes, and the state level (together with the municipal level) implements them. The administration of the federal level comprises the ministries, subordinated agencies for special and selected operational tasks (e.g. the authorisation of drugs, information security and registration of refugees) in distinct administrative sectors (e.g. foreign service, armed forces and federal police). The capacity for preparing and monitoring government bills and statutory instruments is well developed. Moreover, the instruments and tools of coordination are exemplary compared with other countries, although the recent digital turn has been adopted less advanced than elsewhere.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "State Security Service"

1

Ellis, Todd. "Security As a Service for Rail Applications." In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8027.

Full text
Abstract:
Abstract State-of-the-art rail systems require reliant, redundant and critical and secure communications. Data integrity is paramount when considering the criticality that the data payload remains secure for 24/7 year-round applications. With technologies such as Communications Based Train Control (CBTC) and Positive Train Control (PTC) being implemented, considerations for data integrity in these networks must include methods to avoid internal and external vulnerabilities. Unlike traditional encryption methodologies, newer techniques involve tunneling payloads across open or closed networks; this method could include public unsecured networks. By utilizing a unique security appliance tunneled to a remotely connected network operations center, it is possible for a rail system to subscribe to a service to obtain military-grade data security capabilities and distribute secured communications throughout their operational territories via low cost data networks. This “security as a service” concept is especially useful for landlord/tenant relationships that would have previously resulted in duplicative system elements. Security-as-a-service encryption methods commercially available for rail applications typically fall into one of three color-coded categories; green, red and gray. Green networks offer a single layer solution using NSA-approved cryptographic algorithms and are completely isolated from other methods. Red networks are highly secure, utilizing diverse layers of different algorithm types. Gray networks provide a secure gateway between red and green networks to effectively manage network and operational risks. In the case of large freight territories, security as a service can help reduce network costs while improving security. For passenger rail systems, communication-based signaling systems should be strongly protected against data vulnerabilities resulting from either unintentional or malicious access to critical networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Yuan, Fenglin, and Yusheng Kong. "An Empirical Study of State-Owned Capital Security Management: From the Perspective of Internal Control." In 2010 International Conference on Management and Service Science (MASS 2010). IEEE, 2010. http://dx.doi.org/10.1109/icmss.2010.5578269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mikhnev, Ilia Pavlovich, and Svetlana Vladimirovna Mikhneva. "Ensuring the security of critical information infrastructure: the powers of the federal government bodies of the Russian Federation." In International Research-to-practice conference. Publishing house Sreda, 2019. http://dx.doi.org/10.31483/r-32617.

Full text
Abstract:
The article discusses the competences and powers of the state authorities of the Russian Federation within their legal status in the field of ensuring the security of critical information infrastructure. Some functions and authorities in the field of information security have changed in a number of federal executive bodies. In particular, the Federal Security Service, on the basis of a presidential decree, is authorized to create a state system for detecting, preventing and eliminating the consequences of computer attacks on information resources of the Russian Federation. However, not all rights and obligations are enshrined; a number of powers cause the duality of the legal status of certain federal bodies of state power. The clarity and unambiguity of securing the rights and obligations of state bodies authorized in the field of information security are guarantees for effectively ensuring the security of important information infrastructure facilities.
APA, Harvard, Vancouver, ISO, and other styles
4

Fenglan Chen, Yongjun Shen, Guidong Zhang, and Xin Liu. "The network security situation predicting technology based on the small-world echo state network." In 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2013. http://dx.doi.org/10.1109/icsess.2013.6615328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tvaronavičienė, Manuela. "If Clustering Impacts Energy Security: Case of Service Sector in Selected Countries." In Contemporary Issues in Business, Management and Education. Vilnius Gediminas Technical University, 2017. http://dx.doi.org/10.3846/cbme.2017.021.

Full text
Abstract:
In the presented paper specific aspects of clusters’ role in energy security enhancement are being discussed. An assumption of role of clusters as driving force of smart growth with respective effect on service sector development is being raised and discussed. It is claimed, that smart growth will contribute to expansion of service sector; i.e. will accelerate the processes observed now. The analitical part of the paper is devoted to long range forecasting (until year 2050) of energy intensity of service sector in selected countries of different development. The aim of such forecasting is to reveal if energy intensities in service sector will diminish and converge as result of innovative processes affected by clustering of stakeholders, wich are business companies, universities, state and society. We claim that clustering of listed stakeholders through technology and consumption culture transfer affect energy intensity change trends in service sector and push it down. We argue that interrelationships among clusters, smart growth and energy security (through diminishing energy intensity in service sectors of differently developed countries) could be traced. We assume that indicated interrelationship does not depend on level of countries’ development; anyway less developed European countries benefit mire from clustering phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
6

Phakathi, Thulani, Francis Lugayizi, and Michael Esiefarienrhe. "Quality of Service-Aware Security Framework for Mobile Ad Hoc Networks using Optimized Link State Routing Protocol." In 7th International Conference on Computer Science, Engineering and Information Technology (CSEIT 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Retamosa, Marta, Ángel Millán, Juan Antonio García, and María Millán. "Internal branding at university: Do tenure and job security matter?" In Sixth International Conference on Higher Education Advances. Valencia: Universitat Politècnica de València, 2020. http://dx.doi.org/10.4995/head20.2020.11092.

Full text
Abstract:
Universities, as educational service providers, must pay attention to their employees who are pivotal in delivering and communicating brand promise and service quality to the stakeholders. While branding initiatives most frequently focus on external stakeholders, internal branding efforts establish systems/processes and consequent employees’ behaviour that are consistent with external branding efforts. With a sample of 753 faculty members and researchers from a Spanish public University, the study aims to establish if employee tenure and job security have a significant relationship with employees’ brand commitment and employees’ brand supporting behaviour. An analysis of variance was carried out for testing the hypothesis. Differences were found according to tenure in employees’ brand commitment while job security did not impact significantly on employees’ brand commitment. In addition, a positive and significant relationship were found between employees’ brand supporting behaviour and tenure, but not for job security. For business practitioners, this research state that it is essential for service companies, such as universities, to use differing approaches to employees according to their organisational tenure as an important managerial implication.
APA, Harvard, Vancouver, ISO, and other styles
8

Изварина, Наталия, Nataliya Izvarina, Анастасия Калинина, and Anastasiya Kalinina. "THE CONSTRUCTION OF THE SYSTEM OF INTERNAL AUDIT IN THE ECONOMIC SECURITY OF BUSINESS." In Modern problems of an economic safety, accounting and the right in the Russian Federation. AUS PUBLISHERS, 2018. http://dx.doi.org/10.26526/conferencearticle_5c50600fe5a814.80843632.

Full text
Abstract:
In the article the peculiarities of construction of the system of internal audit in the economic business security. The authors formulate the tasks of internal audit as an effective service of the company, providing management and owners with timely, objective information about the state of its Affairs. The basic procedures of internal audit in ensuring economic security of business necessary for the efficiency of protection mechanisms are proposed.
APA, Harvard, Vancouver, ISO, and other styles
9

Miladinović Drobnič, Snežana. "SAVREMENA USLUŽNA PRAVILA I VLADAVINA PRAVA." In XVII majsko savetovanje. Pravni fakultet Univerziteta u Kragujvcu, 2021. http://dx.doi.org/10.46793/uvp21.041m.

Full text
Abstract:
In this research study, the author is dealing with the contemporary service rules in the light of the idea of the rule of law. The rule of law, as Kosta Čavoški says, is "a meta-legal idea of a valid legal order that, through detailed and permanent legal restrictions of state power, appropriate properties of law and reliable institutional guarantees, most ensures human security and freedom." In this paper, the author is dealing with the concept of the rule of law and the principles on which it is based, and then analyzes the principles on which modern service rules are based. We have paid special attention to the service rules contained in the Services Directive and the Draft Common Frame of Reference for Private Law.
APA, Harvard, Vancouver, ISO, and other styles
10

LIU, JIE, and CHANG-CHEN GAO. "ANALYSIS OF GOVERNMENT PROVIDING PUBLIC EMPLOYMENT SERVICE UNDER THE NEW EMPLOYMENT PATTERN." In 2021 International Conference on Education, Humanity and Language, Art. Destech Publications, Inc., 2021. http://dx.doi.org/10.12783/dtssehs/ehla2021/35727.

Full text
Abstract:
Employment is the largest livelihood of more than 1.3 billion people and the most basic support for economic development. The Communist Party of China (CPC) Central Committee and the State Council insist on giving priority to employment in economic and social development, encourage the creation of a favorable environment for mass entrepreneurship and innovation, and maintain overall stability in China's employment situation, coupled with the new employment model of de-employerization and platformization along with the technological progress of the Internet and the upgrading of mass consumption. However, we should also see that there are still many difficulties and problems in the current economic and social development, the new employment form breaks the old industry and legal order under the interest relationship and management norms, the traditional employment groups, management means, labor law system, employment service management, social security policies and so on to form an impact. In order to alleviate the current situation, our country should actively explore the innovative mechanism of the government to provide public services to promote employment, and the author also puts forward some suggestions from the following aspects through his own research: first, to establish the diversified public employment service supply mechanism which is government-led, market and social supplement; from the above aspects, the quality and efficiency of the supply of public employment services under the new industry are improved from the above aspects.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "State Security Service"

1

Cantens, Thomas, and Gaël Raballand. Taxation and Customs Reforms in Fragile States: Between Bargaining and Enforcement. Institute of Development Studies (IDS), May 2021. http://dx.doi.org/10.19088/ictd.2021.009.

Full text
Abstract:
In the last decade, African authorities and the international community have called for support to increase taxation capacity in order to reduce reliance on aid flows. This commitment to support tax administrations was reflected in the 2015 Addis Tax Initiative (ATI), which advocated ‘to double assistance to developing countries in order to strengthen their tax systems and administrations’ by the year 2020 (IMF 2017: 6). Increasing domestic resource mobilisation is even more salient for state-building in fragile states, in terms of providing costly services to citizens, including security, across national territory. There is a rich literature (Acemoglu and Robinson 2012; Besley and Persson 2009) arguing that robust and inclusive fiscal institutions are essential for state-building and economic growth. This is not the situation in fragile states.
APA, Harvard, Vancouver, ISO, and other styles
2

Thomas, Jakana. Gendered Security Sector Reform: What Can We Learn from Women’s Participation in Community-Based Armed Groups? RESOLVE Network, February 2022. http://dx.doi.org/10.37805/pn2022.1.cbags.

Full text
Abstract:
West African women are frequently absent from discussions of community security, despite their substantial contributions to local defense. Women are often viewed primarily as beneficiaries of attempts to reduce local violence, such that their roles in community-based security are typically overlooked. Yet women’s participation in CBAGs holds important implications for the national security of conflict-affected states. Understanding women’s participation in community-based armed groups matters for successful demobilization, disarmament, and reintegration programs and for states’ implementation of the global Women, Peace, and Security agenda, particularly gendered security sector reform. That women have been active—and in some cases instrumental— in establishing and maintaining local security can serve as a point of reference for states seeking to integrate more women into security institutions. Moreover, since CBAG politics are often governed by local norms and practices, understanding how women have become integrated into these local security structures can suggest means of achieving gendered security sector reform that are consistent with and respectful of local customs. This policy note briefly outlines and expounds upon some of the main insights of the author’s recent study on women’s participation in West African CBAGs. It proposes a set of considerations for states and stakeholders to structure efforts around gendered security sector reform.
APA, Harvard, Vancouver, ISO, and other styles
3

Carlson, John. Nuclear verification in a Middle East WMD-Free Zone: Lessons from Past Verification Cases and Other Precedents. The United Nations Institute for Disarmament Research, January 2021. http://dx.doi.org/10.37559/wmdfz/21/nv/01.

Full text
Abstract:
Verification will be of critical importance to achieving and maintaining a Middle East zone free of weapons of mass destruction (ME WMD). Effective verification arrangements would serve a vital national security objective for each state in the region by reducing tensions, removing the motivation to proliferate, and mitigating the risk of a virtual nuclear arms race (or war). In view of the high levels of tension and mistrust within the zone, ensuring effective verification will be especially demanding. The paper examines specific elements of the future nuclear verification of the zone, including: Which states should be included? What prohibitions and obligations should apply in the zone and how would they be verified? How could elimination of nuclear weapons in the zone be achieved? On what basis would the zone treaty enter into force? The paper also examines a number of existing treaties and arrangements as well as the lessons learned from past verification cases which regional states can draw on in developing verification for a Middle East nuclear-weapon-free zone.
APA, Harvard, Vancouver, ISO, and other styles
4

Lambermont, Serge, and Niels De Boer. Unsettled Issues Concerning Automated Driving Services in the Smart City Infrastructure. SAE International, December 2021. http://dx.doi.org/10.4271/epr2021030.

Full text
Abstract:
Information and communication technology is fundamentally changing the way we live and operate in cities, such as instant access to events, transportation, bookings, payments, and other services. At the same time, three “megatrends” in the automotive industry—self-driving, electrification, and advanced manufacturing technology—are enabling the design of innovative, application-specific vehicles that capitalize on city connectivity. Applications could countless; however, they also need to be safe and securely integrated into a city’s physical and digital infrastructure, and into the overall urban ecosystem. Unsettled Issues Concerning Automated Driving Services in the Smart City Infrastructure examines the current state of the industry, the developments in automated driving and robotics, and how these new urban, self-driving city applications are different. It also analyzes higher level challenges for urban applications. Ultimately, this report includes several options for sharing lessons learned among different cities and their stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
5

Backstrom, Robert, and David Dini. Firefighter Safety and Photovoltaic Systems Summary. UL Firefighter Safety Research Institute, November 2011. http://dx.doi.org/10.54206/102376/kylj9621.

Full text
Abstract:
Under the United States Department of Homeland Security (DHS) Assistance to Firefighter Grant Fire Prevention and Safety Research Program, Underwriters Laboratories examined fire service concerns of photovoltaic (PV) systems. These concerns include firefighter vulnerability to electrical and casualty hazards when mitigating a fire involving photovoltaic (PV) modules systems. The need for this project is significant acknowledging the increasing use of photovoltaic systems, growing at a rate of 30% annually. As a result of greater utilization, traditional firefighter tactics for suppression, ventilation and overhaul have been complicated, leaving firefighters vulnerable to potentially unrecognized exposure. Though the electrical and fire hazards associated with electrical generation and distribution systems is well known, PV systems present unique safety considerations. A very limited body of knowledge and insufficient data exists to understand the risks to the extent that the fire service has been unable to develop safety solutions and respond in a safe manner. This fire research project developed the empirical data that is needed to quantify the hazards associated with PV installations. This data provides the foundation to modify current or develop new firefighting practices to reduce firefighter death and injury. A functioning PV array was constructed at Underwriters Laboratories in Northbrook, IL to serve as a test fixture. The main test array consisted of 26 PV framed modules rated 230 W each (5980 W total rated power). Multiple experiments were conducted to investigate the efficacy of power isolation techniques and the potential hazard from contact of typical firefighter tools with live electrical PV components. Existing fire test fixtures located at the Delaware County Emergency Services Training Center were modified to construct full scale representations of roof mounted PV systems. PV arrays were mounted above Class A roofs supported by wood trusses. Two series of experiments were conducted. The first series represented a room of content fire, extending into the attic space, breaching the roof and resulting in structural collapse. Three PV technologies were subjected to this fire condition – rack mounted metal framed, glass on polymer modules, building integrated PV shingles, and a flexible laminate attached to a standing metal seam roof. A second series of experiments was conducted on the metal frame technology. These experiments represented two fire scenarios, a room of content fire venting from a window and the ignition of debris accumulation under the array. The results of these experiments provide a technical basis for the fire service to examine their equipment, tactics, standard operating procedures and training content. Several tactical considerations were developed utilizing the data from the experiments to provide specific examples of potential electrical shock hazard from PV installations during and after a fire event.
APA, Harvard, Vancouver, ISO, and other styles
6

Backstrom, Robert, and David Backstrom. Firefighter Safety and Photovoltaic Installations Research Project. UL Firefighter Safety Research Institute, November 2011. http://dx.doi.org/10.54206/102376/viyv4379.

Full text
Abstract:
Under the United States Department of Homeland Security (DHS) Assistance to Firefighter Grant Fire Prevention and Safety Research Program, Underwriters Laboratories examined fire service concerns of photovoltaic (PV) systems. These concerns include firefighter vulnerability to electrical and casualty hazards when mitigating a fire involving photovoltaic (PV) modules systems. The need for this project is significant acknowledging the increasing use of photovoltaic systems, growing at a rate of 30% annually. As a result of greater utilization, traditional firefighter tactics for suppression, ventilation and overhaul have been complicated, leaving firefighters vulnerable to potentially unrecognized exposure. Though the electrical and fire hazards associated with electrical generation and distribution systems is well known, PV systems present unique safety considerations. A very limited body of knowledge and insufficient data exists to understand the risks to the extent that the fire service has been unable to develop safety solutions and respond in a safe manner. This fire research project developed the empirical data that is needed to quantify the hazards associated with PV installations. This data provides the foundation to modify current or develop new firefighting practices to reduce firefighter death and injury. A functioning PV array was constructed at Underwriters Laboratories in Northbrook, IL to serve as a test fixture. The main test array consisted of 26 PV framed modules rated 230 W each (5980 W total rated power). Multiple experiments were conducted to investigate the efficacy of power isolation techniques and the potential hazard from contact of typical firefighter tools with live electrical PV components. Existing fire test fixtures located at the Delaware County Emergency Services Training Center were modified to construct full scale representations of roof mounted PV systems. PV arrays were mounted above Class A roofs supported by wood trusses. Two series of experiments were conducted. The first series represented a room of content fire, extending into the attic space, breaching the roof and resulting in structural collapse. Three PV technologies were subjected to this fire condition – rack mounted metal framed, glass on polymer modules, building integrated PV shingles, and a flexible laminate attached to a standing metal seam roof. A second series of experiments was conducted on the metal frame technology. These experiments represented two fire scenarios, a room of content fire venting from a window and the ignition of debris accumulation under the array. The results of these experiments provide a technical basis for the fire service to examine their equipment, tactics, standard operating procedures and training content. Several tactical considerations were developed utilizing the data from the experiments to provide specific examples of potential electrical shock hazard from PV installations during and after a fire event.
APA, Harvard, Vancouver, ISO, and other styles
7

Lazonick, William, Philip Moss, and Joshua Weitz. The Unmaking of the Black Blue-Collar Middle Class. Institute for New Economic Thinking Working Paper Series, May 2021. http://dx.doi.org/10.36687/inetwp159.

Full text
Abstract:
In the decade after the Civil Rights Act of 1964, African Americans made historic gains in accessing employment opportunities in racially integrated workplaces in U.S. business firms and government agencies. In the previous working papers in this series, we have shown that in the 1960s and 1970s, Blacks without college degrees were gaining access to the American middle class by moving into well-paid unionized jobs in capital-intensive mass production industries. At that time, major U.S. companies paid these blue-collar workers middle-class wages, offered stable employment, and provided employees with health and retirement benefits. Of particular importance to Blacks was the opening up to them of unionized semiskilled operative and skilled craft jobs, for which in a number of industries, and particularly those in the automobile and electronic manufacturing sectors, there was strong demand. In addition, by the end of the 1970s, buoyed by affirmative action and the growth of public-service employment, Blacks were experiencing upward mobility through employment in government agencies at local, state, and federal levels as well as in civil-society organizations, largely funded by government, to operate social and community development programs aimed at urban areas where Blacks lived. By the end of the 1970s, there was an emergent blue-collar Black middle class in the United States. Most of these workers had no more than high-school educations but had sufficient earnings and benefits to provide their families with economic security, including realistic expectations that their children would have the opportunity to move up the economic ladder to join the ranks of the college-educated white-collar middle class. That is what had happened for whites in the post-World War II decades, and given the momentum provided by the dominant position of the United States in global manufacturing and the nation’s equal employment opportunity legislation, there was every reason to believe that Blacks would experience intergenerational upward mobility along a similar education-and-employment career path. That did not happen. Overall, the 1980s and 1990s were decades of economic growth in the United States. For the emerging blue-collar Black middle class, however, the experience was of job loss, economic insecurity, and downward mobility. As the twentieth century ended and the twenty-first century began, moreover, it became apparent that this downward spiral was not confined to Blacks. Whites with only high-school educations also saw their blue-collar employment opportunities disappear, accompanied by lower wages, fewer benefits, and less security for those who continued to find employment in these jobs. The distress experienced by white Americans with the decline of the blue-collar middle class follows the downward trajectory that has adversely affected the socioeconomic positions of the much more vulnerable blue-collar Black middle class from the early 1980s. In this paper, we document when, how, and why the unmaking of the blue-collar Black middle class occurred and intergenerational upward mobility of Blacks to the college-educated middle class was stifled. We focus on blue-collar layoffs and manufacturing-plant closings in an important sector for Black employment, the automobile industry from the early 1980s. We then document the adverse impact on Blacks that has occurred in government-sector employment in a financialized economy in which the dominant ideology is that concentration of income among the richest households promotes productive investment, with government spending only impeding that objective. Reduction of taxes primarily on the wealthy and the corporate sector, the ascendancy of political and economic beliefs that celebrate the efficiency and dynamism of “free market” business enterprise, and the denigration of the idea that government can solve social problems all combined to shrink government budgets, diminish regulatory enforcement, and scuttle initiatives that previously provided greater opportunity for African Americans in the government and civil-society sectors.
APA, Harvard, Vancouver, ISO, and other styles
8

Howard, Joanna. Vulnerability and Poverty During Covid-19: Religious Minorities in India. Institute of Development Studies (IDS), November 2021. http://dx.doi.org/10.19088/creid.2021.014.

Full text
Abstract:
The Covid-19 pandemic has had direct and indirect effects on religiously marginalised groups, exacerbating existing inequities and undermining the ambitions of Sustainable Development Goals (SDGs) to reach (and include) those ‘furthest behind’. Religious inequalities intersect with other inequalities to compound vulnerabilities, particularly the convergence of low socioeconomic status, gender inequality, and location-specific discrimination and insecurity, to shape how people are experiencing the pandemic. This policy briefing, written by Dr Joanna Howard (IDS) and a co-author (who must remain anonymous for reasons of personal security), draws on research with religious minorities living in urban slums in Tamil Nadu and Karnataka states in India. Findings show that religiously motivated discrimination reduced their access to employment and statutory services during the pandemic. Harassment and violence experienced by Muslims worsened; and loss of livelihoods, distress, and despair were also acutely experienced by dalit Hindus. Government response and protection towards lower caste and religious minorities has been insufficient.
APA, Harvard, Vancouver, ISO, and other styles
9

Kerber, Steve. Study of the Effectiveness of Fire Service Vertical Ventilation and Suppression Tactics in Single Family Homes. UL Firefighter Safety Research Institute, June 2013. http://dx.doi.org/10.54206/102376/iwzc6477.

Full text
Abstract:
Under the United States Department of Homeland Security (DHS) Assistance to Firefighter Grant Program, Underwriters Laboratories examined fire service ventilation and suppression practices as well as the impact of changes in modern house geometries. There has been a steady change in the residential fire environment over the past several decades. These changes include larger homes, more open floor plans and volumes, and increased synthetic fuel loads. This investigation examined the influence of these changes to the fire behavior and subsequent impact on firefighter tactics relative to horizontal and vertical ventilation and suppression. It is anticipated that the results of this investigation will be incorporated into improved firefighting tactics and decision making to reduce firefighter injuries and fatalities. Vertical ventilation has been used successfully but also resulted in firefighter fatalities in the past, as it is not easily coordinated with suppression and other fire ground tasks such as horizontal ventilation. It is not straightforward for firefighters to train on the effects of vertical ventilation since fire service training structures and props do not allow for ventilation-limited fire conditions with representative fuel loads and floor plans that will be encountered on the fire ground. Thus, guidance on the effectiveness of vertical ventilation comes from experience gained during real incidents, but under many different fire ground conditions. This has made it difficult to develop comprehensive guidance on the coordination of vertical ventilation with other firefighter tactics, and how these tactics may influence the fire dynamics in the burning home. The purpose of this study was to improve the understanding of the fire dynamics associated with the use of vertical ventilation so that it may be more effectively deployed on the fire ground. Two houses were constructed in the large fire facility of Underwriters Laboratories in Northbrook, IL. The first house was a one-story house (1200 ft, three bedrooms, one bathroom) with a total of 8 rooms. The second house was a two-story house (3200 ft, four bedrooms, two and a half bathrooms) with a total of 12 rooms. The second house featured a modern open floor plan, two-story great room and open foyer. A total of seventeen experiments were conducted varying the ventilation locations and the number of ventilation openings. Ventilation scenarios included ventilating the front door and a window near the seat of the fire (with modern and legacy furnishings) to link to the previous research on horizontal ventilation, opening the front door and ventilating over the fire and remote from the fire. Additional experiments examined controlling the front door, making different sized ventilation holes in the roof and the impact of exterior hose streams. The results from the experiments led to identification of tactical considerations for the fire service to integrate into their education and fire ground strategies and tactics where applicable.
APA, Harvard, Vancouver, ISO, and other styles
10

Kerber, Steve. Impact of Ventilation on Fire Behavior in Legacy and Contemporary Residential Construction. UL Firefighter Safety Research Institute, December 2014. http://dx.doi.org/10.54206/102376/gieq2593.

Full text
Abstract:
Under the United States Department of Homeland Security (DHS) Assistance to Firefighter Grant Program, Underwriters Laboratories examined fire service ventilation practices as well as the impact of changes in modern house geometries. There has been a steady change in the residential fire environment over the past several decades. These changes include larger homes, more open floor plans and volumes and increased synthetic fuel loads. This series of experiments examine this change in fire behavior and the impact on firefighter ventilation tactics. This fire research project developed the empirical data that is needed to quantify the fire behavior associated with these scenarios and result in immediately developing the necessary firefighting ventilation practices to reduce firefighter death and injury. Two houses were constructed in the large fire facility of Underwriters Laboratories in Northbrook, IL. The first of two houses constructed was a one-story, 1200 ft, 3 bedroom, bathroom house with 8 total rooms. The second house was a two-story 3200 ft, 4 bedroom, 2.5 bathroom house with 12 total rooms. The second house featured a modern open floor plan, two- story great room and open foyer. Fifteen experiments were conducted varying the ventilation locations and the number of ventilation openings. Ventilation scenarios included ventilating the front door only, opening the front door and a window near and remote from the seat of the fire, opening a window only and ventilating a higher opening in the two-story house. One scenario in each house was conducted in triplicate to examine repeatability. The results of these experiments provide knowledge for the fire service for them to examine their thought processes, standard operating procedures and training content. Several tactical considerations were developed utilizing the data from the experiments to provide specific examples of changes that can be adopted based on a departments current strategies and tactics.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography