To see the other types of publications on this topic, follow the link: State Security Service.

Dissertations / Theses on the topic 'State Security Service'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'State Security Service.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Nilsson, Sebastian. "The Current State of DDoS Defense." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3933.

Full text
Abstract:
A DDoS attack is an attempt to bring down a machine connected to the Internet. This is done by having multiple computers repeatedly sending requests to tie up a server making it unable to answer legitimate requests. DDoS attacks are currently one of the biggest security threats on the internet according to security experts. We used a qualitative interview with experts in IT security to gather data to our research. We found that most companies are lacking both in knowledge and in their protection against DDoS attacks. The best way to minimize this threat would be to build a system with redundancy, do a risk analysis and revise security policies. Most of the technologies reviewed were found ineffective because of the massive amount of data amplification attacks can generate. Ingress filtering showed promising results in preventing DDoS attacks by blocking packages with spoofed IP addresses thus preventing amplification attacks.
APA, Harvard, Vancouver, ISO, and other styles
2

Tengeni, Tamsanqa Edgar. "The state of governmental relations with reference to decentralisation of public safety and security service delivery in the Free State / by Tamsanqa Edgar Tengeni." Thesis, North-West University, 2007. http://hdl.handle.net/10394/2539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Inbar, Reuven. "Relationship between participation in a service enrichment and fitness programme and physical performance of state security personnel in stressful situations." Thesis, Anglia Ruskin University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mungwashu, Sthembiso Handinawangu. "A learning state?: a case study of the post-1994 South African welfare regime." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1003113.

Full text
Abstract:
This thesis examines the processes of policymaking in South Africa, as expressed through the shifts in income maintenance policy. The thesis focuses on the processes leading to the establishment of the South African Social Security Agency (SASSA), as its case study. SASSA is the institutional framework for the delivery of social grants. Our intention is to test the efficacy of what we have called ‘state learning’ in the South African context. Therefore, the overall aim of the study is to assess the capacity of the ‘state to learn’ in the process of policymaking as expressed through the shifts in social grant administration and the institutional framework of social welfare in South Africa. The subsidiary goals of the research includes mapping changes in the system of social grants administration since 1994 in order to assess the sources of the shifts in its institutional framework; to assess processes and responses within the state that result in policy shifts and the extent to which these can be considered dimensions of state learning; to assess the power of ideas in the policymaking process and to assess the influence of non-state agencies/actors in policy contestation and learning processes. This is essential, because social policy, especially welfare policy research in post-apartheid South Africa, has focused on the economic value of policies and not the political processes in policymaking. For the framework of analysis the study draws on theories of learning, especially at the organizational or institutional level. We start from the perspective that policymaking and implementation cannot be reduced to a neatly ordered schema (Lamb: 1987:6). Further, that policy change and policymaking are “iterative, haphazard, and highly political processes, in which the apparently logical sequences of decision-making, may turn out to be the reverse” (Lamb, 1987:6). This is mainly because state building is a complex affair and a contested terrain; policy learning and making are neither benign nor do they involve the state working in isolation (Sabatier, 1998). To understand processes of policymaking in South Africa, we rely on content analysis of primary and secondary materials or documents and in-depth interviews with key informants involved in the policy process. The documentary sources include records of parliamentary debates, green and white papers on social welfare, ANC party documents, presidential task force reports, newspapers, magazines and court judgments. The study reveals that the establishment of SASSA lends itself to the idea of ‘state learning’. Learning is indicated in South Africa by the capacity and ability of the state to stimulate ideas, debate ideas to establish ideational matrixes as well as paradigms that have informed the development of policy, take ideas and implement them to try and solve mismatches between the intention of the state and the outcomes and the ability of the state to produce policy.
APA, Harvard, Vancouver, ISO, and other styles
5

Bernard, Duguet Nicolas. "Les directeurs de prison : discipline et régulation dans l'administration." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAD009.

Full text
Abstract:
Au cours du XXème siècle, l'identité professionnelle des directeurs de prison a connu une évolution rapide autant que radicale. La période qui s'ouvre au cours des années 1970 est particulièrement significative de cette mutation, elle est marquée par une crise de cette identité professionnelle amorçant aussi son processus de reformation. Pour saisir la logique de cette phase adaptation, il est possible de la resituer dans le cadre d'une analyse plus large à partir du concept de gouvernementalité. La gouvernementalité étant ici comprise dans deux de ses dimensions telles qu'elles ont été définies par Michel Foucault. D'abord comme période, celle de l'époque contemporaine qui débute à compter de la Révolution française. Ensuite comme technique de pouvoir, celle de la biopolitique qui se réalise au travers de la régulation. Dans ce cadre, l'étude de l'évolution de l'identité professionnelle des directeurs de prison dans et par la gouvernementalité permet de saisir les mécanismes qui conduisent, tant au sein de l'appareil administratif qu'au sein de la pénalité, à l'affaiblissement du pouvoir disciplinaire et à la montée en puissance de la régulation. Les directeurs de prison étant tour à tour objets et acteurs de ces deux arts de gouverner
During the 20thcentury, the professional identity of prison directors has undergone a rapid and radical evolution. This evolution was caused by questioning the role and the functioning of the penal prison in the development of liberalism. The period, beginning in the 1970's, inaugurates the mutation of the identity crises and its reformation. To be able to comprehend the logical development of this proces of adaptation, one most place it in theframework of governmentality. The « governmentality » in this case is seen in two of its dimensions as defined by Michel Foucault. Firstly, as a phase of the contempory period beginning at the French Revolution. Secondly, as a technique of authority : the biopolitics realized by a process of regulation. In this framework, a study of the evolution of the professional identity of prisons directors, in and by « governmentality », explains the mechanisms leading to the weakening of the disciplinary authority, and the increased power of regulation systems, both on administrative and penal levels. The prison directors become, in turns, either objects or actors of these two ways of governing
APA, Harvard, Vancouver, ISO, and other styles
6

Eicher, Michael. "Protecting diplomats in Iraq what can the U.S. Department of State do to improve it's management and oversight of security contractors in Iraq? /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mvé, ebang Bruno. "Politique étrangère et sécurité nationale d'un petit État : analyse de l'action du Gabon pour la paix et la sécurité en Afrique Centrale, une politique extérieure au service de la construction et de la préservation de l'intérieur." Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30018.

Full text
Abstract:
L’Afrique est la région du monde, dans laquelle, existe le plus grand nombre de crises armées sanglantes. Depuis les indépendances, cette région n’a jamais véritablement connu de paix et de sécurité dans toutes ses entités régionales. Dans ce sombre tableau africain, l’Afrique centrale occupe une place peu enviable. Abandonnée à son triste sort à la fin de la Guerre Froide, des pays, tel que le Gabon, décidèrent de particulièrement orienter leur politique étrangère dans le but d’aider les États en crises, de son environnement immédiat, à recouvrir une certaine stabilité mais surtout dans une logique de sécurisation nationale. Petit pays d’Afrique centrale, le Gabon ressent les effets de l’instabilité régionale persistante. Cet engagement gabonais pour la paix n’est pas né avec son accession à la souveraineté. Il s’est construit au fil des années. Son action pour sa construction et sa sécurité nationale n’a jamais eu pour but de reproduire, exactement, le même modèle de stabilité qu’il connait mais, uniquement, d’arriver aux silences des armes. Il est évident que comme tout engagement politique, l’action r gabonaise présente certaines limites et l’État devrait prendre des mesures pour que l’objectif de sécurité nationale soit atteint sans ambages. Néanmoins, l’action de tel pays est importante car en priorisant le dialogue, ils fournissent un travail de fourmis qui arrive, tout de même, à mettre un terme aux effusions de sang et à leur tendance au débordement
Africa is the region of the world, in which, exists the largest number of bloody armed crises. Since the independences, this region has never really known peace and security in all its regional entities. In this somber african board, Central Africa occupies an unenviable place. Abandoned in its sad fate at the end of the Cold War, countries, such as the Gabon, decided to direct particularly their foreign policy with the aim of helping states in crises, of its immediate environment, to cover a certain stability But especially in a logic of national reassurance. Small country of Central Africa, the Gabon feels the effects of the persistent regional instability. This Gabonese commitment for the peace was not born with its entry in the sovereignty. It built itself over the years. Its action for its building and national security has never aimed at reproducing exactly the same model of stability which it can but only arrive at the silence of weapons. It is obvious that as any political commitment, the gabonese regional action presents certain limits and the state should take measures aiming at a better international assertion. Nevertheless, the action of such country is important because by prioritizing the dialogue, they supply a painstaking job which manages, all the same, to put an end to the bloodsheds and to their tendency to the overflowing
APA, Harvard, Vancouver, ISO, and other styles
8

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Clipson, Edmund Bede. "Constructing an intelligence state : the colonial security services in Burma, 1930-1942." Thesis, University of Exeter, 2010. http://hdl.handle.net/10036/98382.

Full text
Abstract:
My doctoral research focuses on the development and operation of the intelligence services in British colonial Burma during the years 1930 to 1942. This involves an examination of the causes of intelligence development, its progress throughout 1930-1942, its rationale and modus operandi, and the pressures it faced. This time period permits us to assess how intelligence development was a product of the colonial government's response to the 1930 peasant uprising which came as such a shock to colonial security and how thereafter intelligence helped prevent popular hostility to the government from taking the form of an uprising. As a result, intelligence information was increasingly used to secure colonial power during the period of parliamentary reform in Burma in 1937. The thesis further examines the stresses that riots and strikes placed on colonial security in 1938, the so-called ‘year of revolution’ in Burma. The thesis then proceeds to consider how intelligence operated in the final years of colonial rule before the Japanese occupation of Burma in 1942. This study is significant not only because very little work on the colonial security services in Burma exists for the period under review, but also because it reveals that intelligence was crucial to colonial rule, underpinning the stability of the colonial state and informing its relationship with the indigenous population in what remained, in relative terms at least, a colonial backwater like Burma. The argument that intelligence was pivotal to colonial governmental stability in Burma because of its centrality to strategies of population control departs from conventional histories of Burma which have considered the colonial army to have been the predominant instrument of political control and the most significant factor in the relationship between the state and society in colonial Burma. Rather it will be argued here that the colonial state in Burma relied on a functioning intelligence bureau which collected information from local indigenous officials and informers and employed secret agents to work on its behalf. This information was collated into reports for the government which then became integral to policy formulation. The primary source base for this work includes British colonial material from government and private collections predominantly in the British library as well as government papers in the National Archives in Kew.
APA, Harvard, Vancouver, ISO, and other styles
10

Ješuta, Martin. "Analýza efektivity e-služeb veřejné správy ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-85134.

Full text
Abstract:
This paper has focus on czech e-government topic. Its background are strategic documents of the Czech Republic, international comparison, completed projects of e-government in Czech Republic and european framework for benchmarking e-government progress. The Methodology is built on this background, which is able to evaluate effectiveness of e-government services. Relevance of this methodology is verified by two pilot measurements.
APA, Harvard, Vancouver, ISO, and other styles
11

Guild, Jennifer. "Scripting quality of security service (QoSS) safeguard measures for the suggested INFOCON System /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FGuild%5FJennifer.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Newswander, Chad B. "Presidential Security: Bodies, Bubbles, & Bunkers." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/77042.

Full text
Abstract:
The purpose of this research is to show how the idea of presidential security is a construct that has taken on several different meanings and rationalities in the American context due to shifting power relations, new practices of presidential security, and the constant re-formulation of the friend/enemy distinction. The United States Service has had to continually think and re-think the concept of presidential security in order to provide suitable protection for the President of the United States. In creating these spaces of protection, the practices of the Secret Service have slowly contributed to re-constituting the sovereign to fit the agency's particular logics and rationalities. The capturing of the Chief Executive Officer does not only rest on disciplinary techniques that restrict, but are also founded on the truth production of the Secret Service: presidents begin to accept and internalize the modus operandi of the Secret Service. They begin to self-monitor their own desires and actions related to security concerns. The walls of protection are coupled with a conscious capitulation to accept the barriers of protection. The cage is no longer only imposed from without, but also emerges internally. By problematizing how this evolving security bubble encapsulates the president, this dissertation is able to examine how the Secret Service begins to reshape and reformulate key democratic governance values by protecting the public and private body of the president through a disciplinary apparatus that seeks to control and contain as well as display and deliberate. Democratic norms that privilege openness have to be challenged, if not curtailed, to adequately protect the Chief Executive Officer. Everyone and everything is a risk that must be inspected, catalogued, and watched, even the president cannot be trusted with his own safety. With its mission to protect, the Secret Service has constructed an organizational operation to ostracize the other, permanently put the president behind protective procedures, and present a pleasing public persona fitting to the status of the POTUS. These overt actions have allowed an administrative agency to redefine key democratic governance values. The agency has been able to delineate who is a suspicious other, justify the placement of barricades that separate the president from the people, instill a preventive/security ethos in the Office of the President, and display the president as the apex of a constitutional order. Because of its successes and failures, presidential protection has become normal, acceptable, legitimate, and absolutely necessary, which has provided the Service the ability to give shape to a particular rationality concerning what the president can and cannot do. This constitutive role of a public agency has had a dramatic impact on how the people come to experience and interact with the POTUS. The development of the Secret Service and its protective procedures, however, has been sporadic and tenuous. For the past 100 years, this emerging rationality was produced by a multitude of sources that have helped construct the idea and practice of presidential security. The subjects of insecurity and security mutually created the idea of POTUS endangerment and safety. Enemies of the state have helped mold state action while friends of the president have sought to project an image of presidential grandeur. In this context, the Service has had to secure territorial spaces in order to conceal and confuse threats while simultaneously having to display and disclose the presidential body to the public. The capacity to control threats and to coordinate the presidential spectacle has enabled the Service to direct the body and mind of the POTUS. With this disciplinary apparatus in place, the Secret Service is able to construct bubbles and bunkers that are designed to protect and trap the president's two bodies.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
13

Foss, Sean M. "The National Security Personnel System : Department of Defense civilian personnel structures and the U.S. legislative process /." Thesis, access full text online, 2004. http://theses.nps.navy.mil/04Jun%5FFoss.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Heravi, Benjamin. "State-Of-The-Art on eHealth@home System Architectures." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-42644.

Full text
Abstract:
With growing life expectancy and decreasing of fertility rates, demands of additional healthcare services is increasing day by day. This results in a rising need for additional healthcare services which leads to more medical care costs. Modern technology can play an important role to reduce the healthcare costs. In the new era of IoT, secure, fast, low energy consumption and reliable connectivity are necessary qualities to meet demands of health service. New protocols such as IEEE 802.11ax and the fifth generation of mobile broadband have a revolutionary impact over the wireless connectivity. At the same time, new technologies such as cloud computing and Close Loop Medication Management open a new horizon in the medical environment. This thesis studies different eHealth@home architectures in terms of their wireless communication technologies, data collection and data storage strategies. The functionality, benefits and gaps of current distance health monitoring architecture have been presented and discussed. Additionally, this thesis proposes solutions for the integration of new wireless technologies for massive device connectivity, low end-to-end latency, high security, Edge-Computing mechanism, Close Loop Medication Management and cloud services.
APA, Harvard, Vancouver, ISO, and other styles
15

Horn, John F. "IPSec-based dynamic security services for the MYSEA environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHorn.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
16

McGovern, Philip P. III. "Creation of a United States Emergency Medical Services Administration Within the Department of Homeland Security." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6833.

Full text
Abstract:
Approved for public release; distribution is unlimited
Federal administration of this nations emergency medical services (EMS) has come under increasing criticism, in a post- September 11 world, by many of its stakeholders and constituents. Critics accurately argue that the current construct of federal governance and oversight is impairing the disciplines shareholders from being able to prepare, train, respond and recover appropriately from natural and manmade catastrophic events both locally and nationally. Valid reasons exist to endorse consolidating all the various bodies of federal authority and management into a centric office, the United States Emergency Medical Services Administration (USEMSA). Many of the EMS non-municipal organizations are poorly represented on a national, state and local scale. This nations EMS competence and potential to respond efficiently and productively to any domestic or international catastrophic incident in normal and abnormal environments, regardless of whether the etiology is manmade or natural, requires a skilled, educated and well-equipped workforce. This thesis evaluates the federal EMS paradigm of the administration for EMS and its complex systems of care and transport and recommends the best model of federal oversight for EMS to meet the challenges set forth in the National Incident Management System, National Response Framework and National Strategy Security plans.
APA, Harvard, Vancouver, ISO, and other styles
17

Park, Meredith. "Customer satisfaction: a comparison of community college and department of employment security operated WIN Job Centers in Mississippi." Diss., Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-03262009-115600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Souza, Simone Moreira dos Santos. "Serviço social na Previdência : um estudo a partir da produção na área (2010-2014)." Universidade Federal de Sergipe, 2016. https://ri.ufs.br/handle/riufs/6213.

Full text
Abstract:
The present study is the product of developments generated in the research process on Social Work in Social Security from the production area in the period from 2010 to 2014. In this work, among other observations, it is clear that, as in that consolidates counter-reform Social Security in the 1990s and 2000s, there is a profound change in its administrative structure and significant changes in services, plans and benefits to the access criteria both in the general scheme as the Self, and it reduces the possibilities of access to rights historically achieved by the working class and this finding is perceived in social work through the production area. Regarding the Social Service, the Theoretical Matrix Methodology in Social Security 1994 emerges a counter to neoliberal ideas implemented in the country, the effective protection of workers' rights. The central question of this work is to demonstrate the understanding of the counter-reform welfare in the production of the Brazilian Social Service, especially in the examination of the production in post-graduate studies and national events of the area in the 2010-2014 period. They were found 59 papers published in Annals of the Brazilian Congress of Social Workers (CBAS) and National Meetings of Researchers in Social Service (ENPESS) and five dissertations available in Portal Capes, which revealed the existence of demands and challenges for the profession within the Social Security. They stand out as challenges of Social Work in Social Security: new demands, precarious working conditions, and changes in the profile of the working class, flexibility of labor and social security rights, focusing social political. It is noteworthy that direction the new evaluation model for granting the BPC to disabled people as a new demand of Social Work in Social Security. We conclude that the professionals working in social security policy face working conditions that move through the focus of trends, precariousness, depreciation and other situations that hurt the principles of ethical political project of Social Work. It is still some, the privatization scenario for Social Security reaches unerring frontally the Security Political.
O presente estudo é produto de desdobramentos gerados no processo de pesquisa sobre o Serviço Social na Previdência a partir da produção na área no período de 2010 a 2014. Nesse trabalho, entre outras observações, é possível constatar que, à medida que em que se consolida a contrarreforma da Previdência nas décadas de 1990 e 2000, há uma profunda alteração na sua estrutura administrativa e mudanças significativas nos serviços, planos e critérios de acesso aos benefícios tanto no Regime geral quanto no Próprio, e com isso reduz as possibilidades de acesso aos direitos historicamente conquistados pela classe trabalhadora e essa constatação é percebida no Serviço Social por meio da produção na área. No que tange ao Serviço Social, a Matriz Teórico Metodológica na Previdência de 1994 emerge numa contracorrente às ideias neoliberais implantadas no país, na efetiva defesa dos direitos do trabalhador. A questão central deste trabalho é evidenciar a compreensão sobre a contrarreforma da previdência na produção do Serviço Social brasileiro, mormente no exame da produção em pós-graduação stricto sensu e em eventos nacionais da área, no período de 2010-2014. Foram localizados 59 trabalhos publicados em anais dos Congressos Brasileiros de Assistentes Sociais (CBAS) e Encontros Nacionais de Pesquisadores em Serviço Social (ENPESS) e cinco dissertações disponíveis no Portal da Capes, que evidenciaram a existência de demandas e desafios para a profissão no âmbito da Previdência Social. Destacam-se como desafios do Serviço Social na Previdência: novas demandas, precarização das condições de trabalho, mudanças no perfil da classe trabalhadora, flexibilização dos direitos trabalhistas e previdenciários, focalização das políticas sociais. Ressalta-se nessa direção o novo modelo de avaliação para a concessão do BPC para pessoas com deficiência como uma nova demanda do Serviço Social na Previdência. Conclui-se que os profissionais que atuam na política previdenciária enfrentam condições de trabalho que perpassam pelas tendências de focalização, precarização, desvalorização entre outras situações que ferem os princípios do projeto ético político do Serviço Social. Some-se ainda, o cenário de privatização da Seguridade Social que atinge frontalmente a Política da Previdência.
APA, Harvard, Vancouver, ISO, and other styles
19

Meyer, Aric Tobolowsky Peggy M. "FISA and warrantless wire-tapping does FISA conform to fourth amendment standards? /." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Skaarup, H. A. "An intelligence advantage, collective security benefits gained by Canada through the sharing of military intelligence with the United States of America." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq22780.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Jansen, van Rensburg Petrus Frederik Barend. "Covert action as an option in National Security Policy : a comparison between the United States of America and South Africa (1961-2003)." Diss., Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-06052007-080725/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Dan, Yufang. "SECURITY AND SELF-HEALABILITY ENFORCEMENT OF DYNAMIC COMPONENTS IN A SERVICE-ORIENTED SYSTEM." Phd thesis, INSA de Lyon, 2014. http://tel.archives-ouvertes.fr/tel-00994833.

Full text
Abstract:
Les architectures dynamiques orientées services ( D-SOA) se concentrent sur les interactions client-serveur à couplage faible, où les deux peuvent apparaître et disparaître à l'exécution. Notre objectif est de concevoir des systèmes de surveillance pour ces architectures. Comme les systèmes de surveillance classiques sont statiquement injectés dans les services surveillés, ils ne peuvent pas gérer correctement le cycle de vie des services d'exécution. En outre, quand un service est remplacé par un autre service, d'autres services peuvent toujours utiliser l'ancienne référence. Cette référence vers un service absent, lorsqu'elle est gardée en mémoire, peut induire des comportements non désirés. Cette thèse contribue à la conception d'un système de surveillance de l'utilisation des services, qui soit résistant à la dynamique de la plateforme et qui soit en mesure de faire face à l'utilisation des références obsolètes. Ce but est atteint en trois étapes. Tout d'abord, en considérant le caractère dynamique des systèmes SOA dans un environnement ouvert, nous concevons une approche de monitoring résistant au la dynamique de la plateforme. Nous identifions deux propriétés clés du système de surveillance à couplage faible: résilience à la dynamicité, c'est-à-dire qu'un moniteur d'interface et son état sont maintenus en mémoire et transférés à un nouveau service lors de la disparition d'un service utilisé, et exhaustivité, c'est-à-dire qu'un service surveillé ne peut pas contourner les observations du moniteur. Ensuite, pour éviter l'usage de références vers des services qui ne sont plus actifs, nous proposons un service de sécurité côté client (SSU Layer), qui permet de traiter ce problème de manière transparente. Si un service utilisé disparaît, la couche SSU peut soit substituer le service de manière transparente, soit lever une exception pour avertir explicitement le client. Cette couche SSU est basée sur une approche transactionnelle qui vise à préserver la cohérence des services actifs. Enfin, nous proposons d'intégrer les deux approches dans un nouveau système de surveillance (NewMS). Les NewMS hérite des principes des deux systèmes précédents: la résilience à la dynamicité, l'exhaustivité et la tolérance aux fautes. Il peut dynamiquement surveiller l'utilisation de services et traiter les références obsolètes de manière transparente. Ces trois propositions sont implémentées dans la plateforme OSGi. Nous avons développé une application simple qui simule un système de réservation de place, qui est monitoré par notre systèmes. Nous avons également proposé différentes spécifications pour ce système. Nos résultats démontrent que le coût d'observation de notre moniteur est proche du coût d'un monitor classique, ne prenant pas en compte les problématiques liées à la dynamique.
APA, Harvard, Vancouver, ISO, and other styles
23

Al, Mesaferi Saif. "Le contrat de sécurité privée en droit français et émirati." Thesis, Paris 1, 2018. http://www.theses.fr/2018PA01D014.

Full text
Abstract:
La question de la sécurité privée est un sujet d'actualité. Ce secteur en pleine expansion a fait l'objet de réglementations ces dernières décennies. Sa particularité tient en la privatisation d'un domaine régalien de l'intervention étatique. La sécurité privée pose ainsi la problématique du traitement de la mission de sécurité. Si le secteur privé investit de plus en plus le domaine de la sécurité, il se différencie du secteur public. La participation du secteur privé s'effectue par voie contractuelle qui obéit pour partie de ses aspects au droit commun, malgré l'objectif de maintien de l’ordre public
The issue of private security is a hot topic. This rapidly expanding sector has been the subject of regulations in recent decades. Its peculiarity lies in the privatization of a sovereign domain reserved for state intervention. Private security then poses the problem of processing the security mission. We note that the private sector is investing more and more in the field of security while differentiating itself from the public sector. The participation of the private sector is done by contract which obeys most of its aspects in common law
APA, Harvard, Vancouver, ISO, and other styles
24

Marvin, Christopher E. "802.16 OFDM rapidly deployed network for near-real-time collaboration of expert services in maritime security operations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FMarvin.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Alex Bordetsky. Includes bibliographical references (p.65-66). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
25

Lewis, Olivier Rémy Tristan David. "Explaining military, law enforcement and intelligence cooperation between Western states." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/16419.

Full text
Abstract:
This thesis answers the question “Why does security cooperation occur between Western states?”. The basic answer is: “Because most state actors do not want their states to integrate”. In other words, cooperation occurs as a coping mechanism, as an imperfect substitute for integration. But the thesis does not only investigate the reasons for cooperation, what Aristotle called the final cause. The thesis also examines the material, formal and efficient causes of cooperation. Such an unorthodox causal explanation of cooperation is based on a Critical Realist philosophy of social science. The application of this philosophy to the empirical study of International Relation is rare, making this thesis original. Beyond the philosophy of social science, the thesis' research design, many of the cases, and much of the data are also rarely used. The research design is an embedded multiple-case study. The states studied are the United States of America, France and Luxembourg. Within each state, the embedded subcases are three types of state security organisations: the armed forces, law enforcement and intelligence agencies. Rarely have these three types of security organisations been compared. Similarly, Luxembourg is seldom studied. Comparing different types of states and different types of state security organisations has not only allowed the main research question to be answered. It has also allowed temporal, spatial, national, and functional variation in cooperation to be identified and theorised. The empirical evidence studied includes participant observation (at the North Atlantic Treaty Organisation) and documents (e.g. state policy documents, annual reports by organisations, reports by parliaments and non-governmental organisations, autobiographies, books by investigative journalists, articles by newspapers and magazines). The thesis is also based on a score of elite interviews (e.g. with ambassadors, diplomatic liaisons, ministerial advisors, foreign ministry officers, military commanders, etc.), and the careful study of both declassified and classified archival records.
APA, Harvard, Vancouver, ISO, and other styles
26

Shackelford, Philip Clayton. "Fighting for Air: Cold War Reorganization and the U.S. Air Force Security Service, 1945-1952." Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1461432022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Doherty, Vincent J. "Metrics for success : using metrics in exercises to assess the preparedness of the fire service in Homeland Security." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://handle.dtic.mil/100.2/ADA424982.

Full text
Abstract:
Thesis (M.A.)--Naval Postgraduate School, 2004.
Title from title page of source document (viewed on April 23, 2008). "Approved for public release, distribution is unlimited." Includes bibliographical references (p. 73-74).
APA, Harvard, Vancouver, ISO, and other styles
28

Shackelford, Philip Clayton. "On the Wings of the Wind: The United States Air Force Security Service and Its Impact on Signals Intelligence in the Cold War." Kent State University Honors College / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ksuhonors1399284818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jankowski, Thaddeus K. Sr. "Planning for success: constructing a first responder planning methodology for homeland security." Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2275.

Full text
Abstract:
CHDS State/Local
Approved for public release, distribution is unlimited
The planning methodologies used today by most U.S. fire departments are excellent for traditional missions, but wholly inadequate for the threats posed by terrorism. Planning in the fire service and the rest of the first responder community historically has relied on a one-dimensional approach that uses a scenario-based planning (SBP) methodology. This thesis argues that the fire service and others in the first responder community will be able to contribute to homeland security missions much more effectively, and efficiently, by switching to specially adapted versions of capabilities-based planning. This thesis proposes a new integrated planning methodology that combines the planning strengths of scenariobased planning, threat-based planning, and capabilities-based planning. The new method identifies capabilities that could be used to manage and mitigate the consequences of the different types of contingencies within the various response spectrums. It allows an organization to perform analysis and efficiency studies to evaluate the different spectrums of contingencies against existing capabilities and create a menu of capabilities necessary for the first responder to respond to all its missions, including immediate threats and terrorism, in the most efficient and cost-effective manner.
Battalion Chief, Fire Department City of New York
APA, Harvard, Vancouver, ISO, and other styles
30

Lotrionte, Catherine B. "The missing piece why intelligence reform failed after 9/11 /." Connect to Electronic Thesis (ProQuest), 2008. http://0-gateway.proquest.com.library.lausys.georgetown.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3315459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Thornlow, Christopher C. "Fusing intelligence with law enforcement information : an analytic imperative." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FThornlow.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2005.
Thesis Advisor(s): Robert L. Simeral, Steven B. Ashby. Includes bibliographical references (p. 55-57) Also available online.
APA, Harvard, Vancouver, ISO, and other styles
32

Schickler, Bonnie M. "U.S. intelligence reform a bureaucratic politics approach." Master's thesis, University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4689.

Full text
Abstract:
This study investigates the current bureaucratic struggles that exist within the U.S. intelligence community as a result of the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004. The first part of this research examines the history of intelligence reform in the United States beginning with the National Security Act of 1947. The second part provides an in-depth discussion of the 2004 legislation as well as an examination of the main bureaucratic conflicts that have arisen between the Director of National Intelligence (DNI) and the rest of the U.S. intelligence community. This study used the bureaucratic politics model to explain the development of the current disagreements, the reasons behind the DNI's struggle for power, and the intelligence community's inability to adapt to the reform. This research determined that the current conflicts have occurred as a result of the unclear authorities issued to the DNI by IRTPA and have been further exacerbated by interest-driven intelligence agencies and a well-developed culture that has proven difficult to abandon. This research also provides insight into several alternative approaches that can be used to explain the current U.S. intelligence reform process. Additionally, recommendations were made for reducing the bureaucratic friction that currently exists within the intelligence community and to strengthen the overall authority of the Director of National Intelligence.
ID: 029049859; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (M.A.)--University of Central Florida, 2010.; Includes bibliographical references (p. 99-108).
M.A.
Masters
Department of Political Science
Sciences
APA, Harvard, Vancouver, ISO, and other styles
33

Lopes, Cleber da Silva. "Como se vigia os vigias : o controle da Policia Federal sobre a segurança privada." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/281642.

Full text
Abstract:
Orientador: Andrei Koerner
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciencias Humanas
Made available in DSpace on 2018-08-10T21:44:23Z (GMT). No. of bitstreams: 1 Lopes_CleberdaSilva_M.pdf: 2526653 bytes, checksum: 008a185418187f4991c15c082e02c99e (MD5) Previous issue date: 2007
Resumo: A emergência da segurança privada e de organizações e agentes particulares que provêem policiamento de maneira informal colocaram novos problemas para a efetivação dos direitos civis na sociedade brasileira. O trabalho analisa o controle estatal sobre a segurança privada exercido pela Polícia Federal no período 1996-2006. Constata que nos últimos quatro anos ocorreram melhoras nos instrumentos legais que visam assegurar policiamento privado responsável publicamente, mas persistem regras deficientes e mecanismos frágeis para incentivar o controle interno e o controle externo da segurança privada. Verifica também melhoras na capacidade fiscalizadora da Polícia Federal sobre o universo legal da segurança privada, mas permanece baixa e limitada a sua capacidade para fiscalizar o universo informal dos provedores particulares de policiamento
Abstract: The private security emergency and of organizations and private agents that provide policing in an informal way they put new problems for the effectives of the civil rights in the Brazilian society. The work analyzes the state control on the private security exercised by the Federal Police in the period 1996-2006. The study verifies that in the last four years they happened improvements in the legal instruments that they seek to assure responsible policing openly, but they persist deficient rules and fragile mechanisms to motivate the internal control and the private security external control. It also verifies improvements in the capacity supervise of the Federal Police on the private security legal universe, but it stays low and limited his capacity to supervise the providers' peculiar of policing informal universe
Mestrado
Mestre em Ciência Política
APA, Harvard, Vancouver, ISO, and other styles
34

Fernandes, Ananda Simões. "Burocratas da dor : as conexões repressivas entre os órgãos de informação das ditaduras brasileira e uruguaia (1973-1985)." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/182779.

Full text
Abstract:
Essa tese pretende demonstrar as conexões repressivas estabelecidas entre as ditaduras brasileira e uruguaia, por meio da colaboração entre os seus órgãos de informação, desde 1973, ano do golpe de Estado no Uruguai, até 1985, ano em que ambos os regimes se encerraram. Considerada de vital importância na concepção da Doutrina de Segurança Nacional, a informação, bem como sua produção, controle e difusão, adquiriu caráter ímpar nas ditaduras que se instalaram no Cone Sul nas décadas de 1960 e 1970, pois era percebida como instrumento de controle social. Nas premissas dessa doutrina, a violência, antes de ser repressiva, era preventiva, e os órgãos de informação das ditaduras desempenharam papel fundamental nessa execução. As ditaduras brasileira e uruguaia modificaram órgãos de informação e segurança já existentes, bem como criaram novos organismos que se adequassem à realidade das novas conjunturas. No Brasil, esse sistema ficou conhecido como “comunidade de informações”; já no Uruguai, eram denominados “serviços de inteligência”. Tinham por função a busca e coleta de informação, utilizando-se de diversos métodos sistemáticos, tais como suspeição, infiltração, interrogatório e tortura, levando à promoção do terrorismo de Estado nessas ditaduras. Para o desenvolvimento da presente tese, foram analisados vários documentos produzidos pelo complexo do sistema de informações das ditaduras brasileira e uruguaia. Um conjunto documental de grande relevância para essa pesquisa refere-se aos órgãos de inteligência e espionagem vinculados aos Ministérios das Relações Exteriores do Brasil e do Uruguai, assim como de suas embaixadas e consulados. A preocupação da ditadura brasileira com os brasileiros que estivessem fora do território nacional era tamanha que no ano de 1966 o ex-embaixador no Uruguai criou o Centro de Informações do Exterior, baseado na sua experiência de monitoramento aos exilados ali presentes. Somou-se a esse órgão a Divisão de Segurança e Informações do Ministério das Relações Exteriores, rearranjada em 1967, presente em todos os ministérios civis. No Uruguai, cabia principalmente ao Departamento II (Exterior) do Servicio de Información de Defensa a espionagem dos uruguaios que estivessem fora do país. A colaboração entre esses órgãos de informação, inteligência e espionagem das ditaduras brasileira e uruguaia foi abundante, e alguns casos foram analisados na presente tese. As conexões repressivas também operaram por outros caminhos. Destaca-se a preocupação que ambas as ditaduras possuíam em relação aos exilados, sendo que num primeiro momento o Uruguai converteu-se no santuário do asilo político para os brasileiros; num segundo momento, a dinâmica inverteu, e foram os uruguaios que passaram a buscar refúgio político no Brasil. Esses movimentos foram acompanhados de perto pelos dois governos. Nessa conexão, releva-se o papel do estado do Rio Grande do Sul, fronteira entre Brasil e Uruguai. Na Doutrina de Segurança Nacional, as fronteiras territoriais cederam espaço às “fronteiras ideológicas”, ou seja, na luta contra o “comunismo internacional” as fronteiras se desfariam. Nesse sentido, ressalta-se a montagem e a orquestração da chamada Operação Condor, realizando ações conjuntas entre os países do Cone Sul, inclusive entre Brasil e o Uruguai, como foi o caso que ficou conhecido como “sequestro dos uruguaios” e a suspeita, até hoje não eliminada, da morte do ex-presidente João Goulart.
This thesis aims to demonstrate the repressive connections established between the Brazilian and Uruguayan dictatorships, through collaboration among their information organs, from 1973, the year of the coup d'état in Uruguay, until 1985, the year in which both regimes ended. Considered of vital importance in the conception of the National Security Doctrine, information, as well as its production, control, and diffusion, acquired a unique character in the dictatorships that settled in the South Cone in the decades of 1960 and 1970 since it was perceived as an instrument of social control. Within the premises of this doctrine, violence, before being repressive, was preventive, and the informational organs of dictatorships played a fundamental role in this execution. The Brazilian and Uruguayan dictatorships modified existing information and security organs, as well as created new organizations to fit the reality of these new conjunctures. In Brazil, this system became known as an "information community"; already in Uruguay, it was called "intelligence services." Their function was to search for and collect information, using a variety of systematic methods, such as suspicion, infiltration, interrogation, and torture, leading to the promotion of State terrorism in these dictatorships. For the development of this thesis, several documents produced by the information system complex of the Brazilian and Uruguayan dictatorships were analyzed. Documents of great relevance for this research refers to the intelligence and espionage organs linked to the Ministries of Foreign Affairs of Brazil and Uruguay, as well as their embassies and consulates. The concern of the Brazilian dictatorship with the Brazilians who were outside the national territory was such that in 1966 the former ambassador in Uruguay created the Foreign Information Center based on his experience of monitoring the exiles. It was joined by the Security and Information Division of the Ministry of Foreign Affairs, rearranged in 1967, present in all civilian ministries. In Uruguay, it was primarily for Department II (Exterior) of the Defense Information Service to spy on Uruguayans who were out of the country. The collaboration between these organs of information, intelligence and espionage of the Brazilian and Uruguayan dictatorships was abundant, and some of those cases were analyzed in the present thesis. The repressive connections also operated in other ways. The concern that both dictatorships had about the exiles was emphasized. In a first moment, Uruguay became the sanctuary of the political asylum for the Brazilians; in a second moment, the dynamics reversed, and it was the Uruguayans who began to seek political refuge in Brazil. These movements were closely monitored by both governments. In this connection, the role of the state of Rio Grande do Sul, the border between Brazil and Uruguay stands out. In the National Security Doctrine, territorial boundaries gave way to "ideological frontiers," i.e., in the fight against "international communism" the borders would be misplaced. In this sense, the assembly and orchestration of the so-called Condor Operation is highlighted, carrying out joint actions between the countries of the Southern Cone, including between Brazil and Uruguay, as was the case known as "kidnapping of Uruguayans" and the suspicion, until today, not eliminated, of the death of former president João Goulart.
APA, Harvard, Vancouver, ISO, and other styles
35

Meyer, Aric. "FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards?" Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc9838/.

Full text
Abstract:
Electronic surveillance for foreign intelligence purposes was largely unregulated prior to 1978. The Foreign Intelligence Surveillance Act of 1978 (hereinafter "FISA") was enacted to implement a judicial authorization process for foreign intelligence electronic surveillance that would effectively balance competing needs for national security and civil liberty under the Fourth Amendment. This study examines the evolution of FISA and its effectiveness under the Fourth Amendment, as assessed by federal reviewing courts and scholars since the statute's enactment. The study concludes that the FISA electronic surveillance authorization process has been effective in providing a constitutional mechanism to obtain foreign intelligence information.
APA, Harvard, Vancouver, ISO, and other styles
36

Neple, Pernille. "The regulation of mercenary and private security-related activities under South African law compared to other legislations and conventions." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/1896.

Full text
Abstract:
Thesis (MA (Political Science))--Stellenbosch University, 2008.
Private Military and Security Companies (PMSCs) have become increasingly important actors since the end of the Cold War. They provide a wide range of services and are therefore difficult to classify. Many view them as new front companies for mercenaries, which this thesis argues is not the case. Few states have put in place legislation to deal with the problems caused by these companies, and they are therefore generally not accountable to states. This is problematic because their services are within an area where states have traditionally had monopoly. This thesis studies the new South African legislation, the Prohibition of Mercenary Activities and Regulation of Certain Activities in Country of Armed Conflict Act of 2006, which was put in place in order to ban mercenaries and regulate the services offered by the private military and security companies based in the country. By comparing it to the older South African legislation, the thesis evaluates the extent to which the new legislation has been able to close loopholes inherent in the old legislation. The new South African legislation is also compared to the international conventions which bans mercenaries. By banning these actors, South Africa is very much in line with the international community when it designed the conventions. However, PNSCs are not mercenaries. The thesis then compares the new South African legislation to the domestic regulation in place in the United States of America. It finds that despite having many of the same weaknesses as the South African legislation, it is more likely that the American regulation will be abided by than the South African. This is due to the positive relationship between the US government and American PMSCs, and the fact that the government is a major client of the companies. South Africa does not enjoy the same positive relationship with its companies. Finally, the new South African legislation is compared to the UK Green Paper of 2002, which presented options of how to deal with the companies. The ban on mercenaries put in place by the new South African legislation was discouraged in the Green Paper. The licensing regime (as in the USA) that was proposed by the Green Paper, however, is similar to the authorisation scheme established in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
37

Chagas, Eliana Ramos. "Precarização do trabalho e cobertura previdenciária no contexto brasileiro: um estudo teórico-bibliográfico exploratório." Universidade do Estado do Rio de Janeiro, 2009. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6688.

Full text
Abstract:
Este trabalho tem por objetivo trazer um estudo teórico-bibliográfico exploratório sobre a precarização do trabalho, dos direitos e da política previdenciária no contexto brasileiro. Baseado na teoria social de Marx, o esforço de análise parte do tratamento da figura do trabalho no que se refere à proteção social no decorrer do último século e na atualidade no cenário brasileiro. Busca também situar o processo de regulamentação das profissões como marca histórico-institucional da relação entre capital e trabalho, donde emerge inclusive a formulação da concepção de cidadania. Enfoca a questão da proteção social previdenciária em face da trajetória de conformação do mercado de trabalho brasileiro. Tal movimento induz à tentativa de reconstrução do processo de formação, de estruturação e recentemente de desestruturação do mercado de trabalho brasileiro, o qual, entende-se, tem suas raízes na formação social brasileira e na natureza das relações desenvolvidas entre capital e trabalho ao longo do último século. Verifica-se um adensamento das seqüelas sociais iniciadas no período e a redução das expectativas de consolidação da chamada sociedade salarial. Em tempos de Contra-Reforma, as drásticas alterações no mundo do trabalho e a flexibilização das relações de produção capitalistas se potencializam. Em relação à postura estatal, verifica-se ainda uma priorização dos interesses mercantis em detrimento das reais necessidades do Trabalho, o que se demonstra através dos Programas de Inclusão Previdenciária Plano Simplificado de Previdência e a cobertura ao Microempreendedor Individual -, como meio de resposta do Estado à questão da informalidade. As tendências identificadas a partir desta análise são de persistência e aprofundamento da precarização na cobertura, dada pela restrição ao acesso aos benefícios previdenciários, previstos em lei, que se traduz numa segmentação de direitos. O estudo realizado se consubstanciou em uma abordagem exploratória teórico-bibliográfica, onde se buscou estabelecer correlação entre o conteúdo bibliográfico, a legislação pertinente, dados estatísticos e outros documentos oficiais.
This work aims to bring a theoretical and exploratory literature on precarious employment, rights and welfare policy in the Brazilian context. Based on the social theory of Marx, the analytical effort begins with the treatment given to the figure of the work in relation to social protection in the course of the last century and today in Brazilian context. It also seeks to situate the process of regulation of professions as brand historical-institutional relationship between capital and labor, from which emerges including the formulation of the concept of citizenship . Focuses on the issue of social protection social security in the face of trajectory shaping the Brazilian labor market. This movement leads to attempt to reconstruct the process of formation, structuring and - recently - the destructuring of the Brazilian labor market which, it is understood, has its roots in Brazilian social formation and the nature of relationships developed between capital and labor over the last century. There is an intensification of social negative effects initiated in the period and reduced expectations consolidation of the so called salaried society. In times of Counter-Reformation, the drastic changes in the world of work and relaxation of capitalist production relations are intensified. Regarding posture of the government, there is also a priority of the mercantile interests in detriment of the real needs of the labor, which is shown through the Programs" Inclusion " Social Security - Simplified Pension Plan and the coverage to the Individual Micro Entrepreneur - as a means of State's response to the issue of informality. Trends identified from this analysis are persistence and deepening instability in the coverage given by the restriction of access to social security benefits provided by law, which expresses a segmentation of rights. The study is an exploratory approach embodied in theoretical literature, which sought to establish a correlation between the content literature, relevant legislation, statistical and other official documents.
APA, Harvard, Vancouver, ISO, and other styles
38

Gordon, Hultsjö Joel. "Den digitalt suveräna staten : En undersökning av inställningen till nationell datalagring av personuppgifter hos statliga myndigheter." Thesis, Uppsala universitet, Institutionen för ABM, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-448302.

Full text
Abstract:
The number of scandals during the past years regarding the use and misuse of digital storage of personal infor-mation in combination with the implementation of the General Data Protection Regulation (GDPR) within the EU member states, has resulted in a resurfaced discussion of sovereignty within the public sphere in relation to the storage of digital information. This master thesis examines the attitudes towards national data storage of personal data within twenty Swedish public agencies in the context of the analytical term Digital sovereignty.The thesis uses semi-structured interviews with employees working with data protection and qualitative con-tent analysis of internal documents connected to personal data management, in order to examine Swedish govern-ment agencies attitudes towards national data storage of personal information. The responses of the interviews and the internal policy documents in the area of personal data protections is viewed through the analytic term Digital sovereignty. The government agency the Swedish social security agency’s definition of Digital sovereignty is used in the thesis, which focuses on national governments ability to have control over both the technical and geograph-ical processing and storage of their citizen’s personal data.The thesis concludes that Swedish authorities takes the risk of transfer of personal data to third countries outside of the EU very seriously, while they also see the need to find legal ways to transfer personal data to these same countries. The thesis also concludes that Swedish government agencies try to avoid cloud services and are cautious in their use due to the implications they have for information and data security, while other research have shown that cloud services are used extensively within Swedish government agencies. The thesis also concludes that there is a lack of interest in national data storage of personal information within Swedish government, which can partially be attributed to the relationship between the General Data Protections Regulation and data storage regulation on a national level in Sweden. This leads to the final conclusion in this thesis, which is that there is some indication that the future of storage of personal data with the EU member states lies not in nationally managed cloud services, but rather in a federated cloud service on EU-level such as the currently ongoing project Gaia-X. This is a two years master's thesis in Archival science.
APA, Harvard, Vancouver, ISO, and other styles
39

Chinpanich, Vorapong. "Helpdesk Support Alert System." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2674.

Full text
Abstract:
The goal of this project was to implement the Helpdesk Support Alert System in the Data Center Services (DCS) of California State University, San Bernardino's (CSUSB's) Information Resource and Technology Division (IRT). DCS is responsible for ensuring uninterrupted operation of all CSUSB administrative computing systems. These responsibilities include user support, system maintenance, and system security. The DCS helpdesk cannot be staffed 24 hours a day; this application is designed to alert DCS technicians of emergencies when they are away from the helpdesk. The Helpdesk Support Alert System sends out an automated emergency alert in the form of a short text message to technicians' mobile phones. Technicians respond back to their main office by using the Wireless Application Protocol (WAP) capability of their mobile phones.
APA, Harvard, Vancouver, ISO, and other styles
40

Kuntz, Friederike. "Der Weg zum Irak-Krieg : Groupthink und die Entscheidungsprozesse der Bush-Regierung /." Wiesbaden : VS Verlag für Sozialwissenschaften, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016085183&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mariotti, Caterina. "Les services sociaux et de santé au regard des aides d’État." Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020013.

Full text
Abstract:
Le présent travail de recherche porte sur l’application du droit des aides d’État aux services sociaux et de santé. Cette interaction, qui s’inscrit dans le plus ample débat sur l’« infiltration » des « espaces sociaux nationaux » par le droit de l’Union européenne, attire toujours plus l’attention de la Commission et de la Cour de justice de l’UE, soulève de nouvelles questions et se caractérise par un degré considérable d’incertitude. Éclairer la façon dont le cadre juridique des « services d’intérêt économique général » (SIEG) est modulé et nuancé en relation aux services sociaux et de santé constitue l’objectif fondamental du présent projet. L’analyse va également au-delà des SIEG, en examinant les autres voies que le droit de l’Union offre pour réconcilier la règlementation des aides d’État et le soutien public au welfare. La recherche se penche d’abord sur la notion de « services sociaux et de santé » et sur le cadre juridique européen concernant ce secteur. Après avoir conclu que l’on peut raisonnablement s’attendre à ce que les services sociaux et de santé soient toujours plus fréquemment considérés comme des activités économiques relevant du champ d’application du droit des aides d’État, l’étude se concentre sur la façon dont la règlementation des aides a été appliquée dans les secteurs du logement social, des soins de santé et de la sécurité sociale. L’interaction entre droit des aides d’État et welfare est ensuite examinée à la lumière du cadre résultant du Traité de Lisbonne ; enfin, des hypothèses sont formulées au sujet des voies à suivre en vue de renforcer la capacité du droit des aides d’État à s’adapter aux particularités des services sociaux et de santé
The purpose of the present study is to explore the interaction between, on the one hand, EU State aid law and, on the other, social and health services. This issue – which falls within the wider debate on the “infiltration” of EU law into “national social spaces” – comes increasingly under the scrutiny of the Commission and of the EU Court of Justice (CJEU), raises new questions and is characterised by a significant degree of uncertainty. The primary objective of this research is to understand how the legal framework on services of general economic interest (SGEIs) concerning State aid is applied, and adjusted, in the field of social and health services. The analysis will however also look beyond SGEIs, investigating which other avenues are available under EU State aid law to allow public support in the welfare sector. The analysis begins by exploring the notion of “social and health services” and by outlining the EU legal framework concerning this area. After examining the concept of economic activity in EU law, it is concluded that it is likely that social and health services will increasingly be considered as activities falling within the scope of application of EU State aid law. The study then focuses on the way in which State aid law has been applied in the sectors of social housing, healthcare and social security. The overall picture is examined in light of the Lisbon Treaty and, finally, a reflection is carried out as to possible developments and actions with a view to strengthening the ability of EU State aid law to take into account the specific nature of welfare services
APA, Harvard, Vancouver, ISO, and other styles
42

Leite, Ariana Celis. "(Des)proteção previdenciária e saúde do trabalhador: formas de resistência coletiva." Pontifícia Universidade Católica de São Paulo, 2017. https://tede2.pucsp.br/handle/handle/20475.

Full text
Abstract:
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-10-04T13:29:36Z No. of bitstreams: 1 Ariana Celis Leite.pdf: 3039109 bytes, checksum: 5a5f5f06c38d4f6e6e4ffbbe9f09427a (MD5)
Made available in DSpace on 2017-10-04T13:29:37Z (GMT). No. of bitstreams: 1 Ariana Celis Leite.pdf: 3039109 bytes, checksum: 5a5f5f06c38d4f6e6e4ffbbe9f09427a (MD5) Previous issue date: 2017-09-04
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
The aim of this dissertation was to analyze the forms of collective resistance of workers at the University of São Paulo (USP) through the Union of Workers of the University of São Paulo (SINTUSP) in the face of the dismantling of social security, and specifically to analyze the strategies Benefits of the National Social Security Institute (INSS). Considering work as the founding category of the social being, we present the contradictions inherent in the capitalist mode of production and productive restructuring as a form of response to the crisis of capital. It was tried to problematize the relation labor, health of the worker and social security, as well as the social security policy in the government Dilma and Temer. It is a research of a qualitative nature, instrumentalized by a documentary survey and a semi-structured interview, through which, through the social theory of the Marxian legacy, we sought to grasp elements that would lead us to an understanding of the proposed research problem. The analysis of all news bulletins published by SINTUSP in 2016 and the interview with the directors of the union allowed us to infer that the current rectory of USP follows the dictates of neoliberalism, precarizing, flexibilizing and outsourcing how much work can And, as a consequence, sickening the workers. SINTUSP's trajectory of struggles and political interventions was shown and the analysis of the bulletins was able to situate the political, economic, social and cultural issues experienced by the contemporaneous workers. The research resulted in the understanding that only through the political organization of workers and collective strategies of resistance to the dismantling of the Brazilian social security system will it be possible to reverse the current illness of the workers
A presente dissertação tem como objetivo analisar as formas de resistência coletiva dos trabalhadores da Universidade de São Paulo (USP) através do Sindicato dos Trabalhadores da Universidade de São Paulo (SINTUSP) frente o desmonte da seguridade social e, especificamente, analisar as estratégias diante das negativas do benefício auxílio-doença do Instituto Nacional do Seguro Social (INSS). Considerando o trabalho enquanto categoria fundante do ser social, são apresentadas as contradições inerentes ao modo de produção capitalista e a reestruturação produtiva como forma de resposta para a crise do capital. Esta dissertação busca problematizar a relação entre trabalho, saúde do trabalhador e previdência social, bem como a política previdenciária no governo Dilma e Temer. Trata-se de pesquisa de natureza qualitativa, instrumentalizada por levantamento documental e entrevista semiestruturada, por meio da qual procurou, mediada pela teoria social do legado marxiano, apreender elementos que conduzissem à compreensão do problema de pesquisa proposto. A análise de todos os boletins/ jornais publicados pelo SINTUSP no ano de 2016 e a realização de entrevistas com os diretores do sindicato possibilitou inferir que a atual reitoria da USP segue os ditames do neoliberalismo, precarizando, flexibilizando e terceirizando o quanto pode o trabalho e, como consequência, adoecendo os trabalhadores. Aborda-se a trajetória de lutas e de intervenções políticas do SINTUSP, sendo que a análise dos boletins pôde situar as questões políticas, econômicas, sociais e culturais vivenciadas pelos trabalhadores na contemporaneidade. A pesquisa resultou na compreensão de que somente através da organização política dos trabalhadores e de estratégias coletivas de resistência ao desmonte do sistema previdenciário brasileiro será possível reverter o atual quadro de adoecimento dos trabalhadores
APA, Harvard, Vancouver, ISO, and other styles
43

Mireval, Damien. "Armées, sécurité et rébellions : le rôle du renseignement et des actions spéciales dans les guerres du Tchad (1969-1990)." Thesis, Bordeaux 3, 2018. http://www.theses.fr/2018BOR30025.

Full text
Abstract:
Au Tchad, le triptyque « armées, sécurité et rébellions » est indissociable, tant il mêle des acteurs armés qui ont dominé la scène nationale depuis l’indépendance du pays en 1960. L’entrelacs des intérêts et des combats a aussi provoqué l’implication d’intervenants extérieurs nombreux, la France et la Libye en premier lieu. Tous ont participé à cette séquence historique, de 1969 à 1990, dominée par l'émergence d'une rébellion, le Front de libération nationale du Tchad (FROLINAT), qui finira par s'emparer du pouvoir et engendrer une guerre civile suivie d'une guerre de libération des provinces du Nord. La France s’engage au Tchad en 1969 dans sa première véritable guerre depuis l’indépendance de l’Algérie, et dès lors restera actrice du destin de ce pays, sous tous les régimes successifs, de Tombalbaye au régime d’Hissène Habré. Elle cherche à conserver son appréciation autonome de situation, et renseigner sur les groupes rebelles du Tchad, la Jamariyya libyenne, voire ses propres alliés, afin de donner à ses décideurs politiques et militaires des clés de compréhension et d’action. Dans cette guerre d’un genre nouveau et méconnu des citoyens français, le renseignement et les actions spéciales constituent des armes fondamentales au cœur des engagements opérationnels, de l’évolution des différents types de capteurs, et des tensions interservices entre le SDECE/DGSE et les autres services chargés de renseignement. Parce qu'elle veut conserver son rang en Afrique notamment dans la bande sahélo-saharienne, concurrencée par les Etats-Unis, défiante vis-à-vis de la Libye et de l'Union soviétique; parce qu'elle est très impliquée dans les affaires intérieures du Tchad, parfois avec excès; et enfin parce que ses adversaires la contraignent à une adaptation permanente de posture et de capacités militaires, la France va faire du Tchad son point focal en Afrique, le laboratoire de ses futurs engagements, à la frontière entre légalité et légitimité, entre actions conventionnelles et spéciales, entre raison d'Etat et diplomatie
In Chad, the triptych « armed forces, security and rebellion » is inextricably linked, so much it mixes armed players that dominated the scene since the independence in 1960. The interlacing of interests and fights also led to the involvement of external players, making Chad an enduring challenge for France, Libya, United-States and many others. Those countries, along with local players, participated to this historical sequence, 1969-1990, dominated by the apparition of the FROLINAT’ rebellion, that will finally seize power and generate a civil war followed by a liberation war of the Northern provinces. Thus France will commit itself in Chad in 1969, in its first real African war since the independence of Algeria, and by then will remain actress of Chad’s destiny whatever the political system is, from Tombalbaye to Hissène Habré’s reign. France will try to keep its autonomous situation awareness and collect intelligence on the Chadian rebel groups, the Jamariyya, or even its own allies, in order to provide to the political and military decision-makers some keys for understanding and acting. In this new type of warfare, unknown by the French population, intelligence and special actions manage to be fundamental weapons at the core of operational commitment, sensors evolutions, and interagency tensions between the SDECE/DGSE and the other intelligence services. Because France wants to keep its rank in Africa, especially in the Sahelian strip, challenged by the United-States, defying Libya and hampered by the Soviet Union; because it is deeply committed in the internal affairs of Chad, sometimes too deeply; and finally because its adversaries do compel it to an everlasting adaptation of its posture and military capabilities, France will make Chad its focal point in Africa, the laboratory of its future deployments, at the edge between legacy and legitimacy, between conventional and special actions, between raison d’Etat and diplomacy
APA, Harvard, Vancouver, ISO, and other styles
44

Paoliello, Tomaz Oliveira. "O padrão de atuação das empresas de segurança privada : o caso de Angola /." São Paulo : [s.n.], 2011. http://hdl.handle.net/11449/96028.

Full text
Abstract:
Orientador: Reginaldo Mattar Nasser
Banca: Mônica Herz
Banca: Flávia de Campos Mello
O Programa de Pós-Graduação em Relações Internacionais é instituído em parceria com a Unesp/Unicamp/PUC-SP, em projeto subsidiado pela CAPES, intitulado "Programa San Tiago Dantas"
Resumo: Nos dias de hoje, um dos fenômenos que chama atenção e suscita o debate no âmbito da disciplina de relações internacionais é a ascensão das chamadas empresas de segurança privada. A atual dissertação se dedica ao estudo da inserção de tais empresas no contexto angolano durante os anos 1990. Essa inserção é marcada por dois momentos, um primeiro, paradigmático para a literatura sobre o tema, trata da ação particular da empresa Executive Outcomes. Num segundo momento, abordamos o desenvolvimento de um mercado local para a segurança privada, construído por uma série de dispositivos que fazem do panorama angolano um modelo único e ainda pouco estudado. Angola foi um campo de teste para a atuação das empresas de segurança privada, mas acabou se transformando num caso excepcional, com uma série de empresas locais provendo a segurança para o país durante o conflito interno, e tornando-se fundamentais para o desenho de poder em Angola. Essa situação é derivada de uma série de especificidades da história angolana, notadamente a permanente violência, e a perpetuação da fragilidade do Estado. Desenvolvemos a discussão sobre o papel das empresas de segurança privada como novos atores no sistema internacional, e observamos o alcance das descobertas sobre tais empresas quando confrontadas com o caso de Angola
Abstract: Nowadays, one of the phenomena that draws attention and raises the debate within the discipline of international relations is the rise of the so-called private security companies. The present dissertation studies the inclusion of such companies in the Angolan context during the 1990s. This inclusion is marked by two moments, the first one paradigmatic for the literature on the subject, the particular action of the company Executive Outcomes. Secondly, we discuss the development of a local market for private security, built by a series of devices that make the Angolan landscape a unique and poorly studied model. Angola was a testing ground for the actions of the private security companies, but turned out to be an exceptional case with a number of local companies providing security for the country during its own internal conflict, and making them fundamental for the design of Power in Angola. This situation is derived from a number of specific features of the Angolan history, especially the continued violence and the perpetuation of state fragility. We further explore the discussion on the role of private security companies as new actors in the international system, and observe the range of findings about these companies when confronted with the case of Angola
Mestre
APA, Harvard, Vancouver, ISO, and other styles
45

Barazi, Mervan. "La particularité de l'application du droit de la concurrence dans le secteur des assurances." Thesis, La Rochelle, 2017. http://www.theses.fr/2017LAROD002/document.

Full text
Abstract:
Le secteur des assurances est protéiforme : il comprend plusieurs opérateurs dont l’intégration dans le paysage économique et juridique s’est accentuée ces dernières années et ne cesse de s’imposer. Les compagnies d'assurance déploient elles-mêmes des activités d’assurance multiples. Depuis les années cinquante les différents régimes d’assurances maladie, vieillesse, chômage – obligatoires, complémentaires – sont exploités par certains organismes assureurs (mutuelles et institutions de prévoyance). Ces organismes développent leurs activités sur des marchés dont le caractère économique n’est pas toujours évident. Si les assurances vie par exemple, ne soulèvent guère de difficulté d’insertion sur un marché concurrentiel, peut-on en revanche considérer que les régimes complémentaires et légaux d’assurance maladie opèrent sur un marché économique ? Cette question conduit à s’interroger sur la soumission du secteur des assurances au droit de la concurrence et son éventuelle unicité de régime. Deux points sont étudiés, en premier lieu, il s’agit de confronter le secteur des assurances à la vision extensive des autorités européenne et nationale sur les critères d’applicabilité du droit de la concurrence. Cette approche est vérifiée auprès de tous les opérateurs proposant des produits et services qualifiés d'assurance. En second lieu, sont examinées l'application du droit de la concurrence au secteur des assurances et leurs exemptions spécifiques. Cette étude prend en compte l’ensemble du droit de la concurrence : pratiques anticoncurrentielles, droit des concentrations économiques et aides d’État. Elle s’appuie essentiellement sur le droit européen et français de la concurrence
The insurance industry is protean : it includes several operators whose integration into the economic and legal landscape has intensified in recent years and continues to impose itself. Insurance companies themselves deploy multiple insurance activities. Since the 1950s, some insurers have exploited differents insurance schemes such as, health, old age, unemployment (whether compulsory or complementary). These organizations develop their activities in markets whose economic character is not always the most obvious. If life insurance, for example, does not present any difficulty in entering a competitive market, can we also consider that the supplementary and statutory health insurance schemes operate similarly in an economic market ? This question leads up to wonder about the submission of the insurance sector to competition law and its possible uniqueness of regime. Two points are studied, firstly, the question of confronting the insurance sector with the extensive vision of the European and national authorities. Secondly, an examination of the application of competition law to the insurance sector and the justification for different treatment. This study takes into account the whole of competition law : antitrust practices, economic concentrations and state aids. It is essentially based on European and French competition law
APA, Harvard, Vancouver, ISO, and other styles
46

Todd, Maurice L. "Rhetoric or reality : US counterinsurgency policy reconsidered." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/6431.

Full text
Abstract:
This study explores the foundations of US counterinsurgency policy and doctrine in order to better understand the main historical influences on that policy and doctrine and how those influences have informed the current US approach to counterinsurgency. The results of this study indicate the US experience in counterinsurgency during the Greek Civil War and the Huk Rebellion in the Philippines had a significant influence on the development of US counterinsurgency policy and doctrine following World War II through the Kennedy presidency. In addition, despite a major diversion from the lessons of Greece and the Philippines during the Vietnam War, the lessons were re-institutionalized in US counterinsurgency policy and doctrine following the war and continue to have significant influence today, though in a highly sanitized and, therefore, misleading form. As a result, a major disconnect has developed between the “rhetoric and reality” of US counterinsurgency policy. This disconnect has resulted from the fact that many references that provide a more complete and accurate picture of the actual policies and actions taken to successfully defeat the insurgencies have remained out of the reach of non-government researchers and the general public. Accordingly, many subsequent studies of counterinsurgency overlook, or only provide a cursory treatment of, aspects that may have had a critical impact on the success of past US counterinsurgency operations. One such aspect is the role of US direct intervention in the internal affairs of a supported country. Another is the role of covert action operations in support of counterinsurgency operations. As a result, the counterinsurgency policies and doctrines that have been developed over the years are largely based on false assumptions, a flawed understanding of the facts, and a misunderstanding of the contexts concerning the cases because of misleading, or at least seriously incomplete, portrayals of the counterinsurgency operations.
APA, Harvard, Vancouver, ISO, and other styles
47

Marcondes, Rafael Marchetti. "A tributação da contraprestação paga pelo uso da imagem de artistas e esportistas." Pontifícia Universidade Católica de São Paulo, 2016. https://tede2.pucsp.br/handle/handle/7020.

Full text
Abstract:
Made available in DSpace on 2016-04-26T20:24:14Z (GMT). No. of bitstreams: 1 Rafael Marchetti Marcondes.pdf: 1161112 bytes, checksum: 4745ef914408134f883713606c3519d9 (MD5) Previous issue date: 2016-02-23
This work aims to examine taxation on compensation received by entertainers and sportspeople for the license granted to third parties to use their image rights. Current legislation approaches the matter in a generic way, either equating the use of an image right to a simple obligation to use or to an obligation to give or even not specifically regulating the subject. Therefore, we will present an investigative method by means of which it is possible to consistently decide whether or not to levy taxes in such operations. The proposal herein is to start examining the transaction concerning the use of an image by identifying the main activity agreed in order to subsequently evaluate if such rendering implies an obligation whose legal nature is either to do or to give. The conclusion for charging or not the various taxes will result from the comparison between each tax s material aspect and the legal nature of the analyzed obligation. Notwithstanding, we aim to previously define the characteristic features of personality rights, especially image rights, in order to be able to indicate the constitutional protection provided to the image in its several aspects: social image, sole external image and group external image, differentiating them from arena rights. The purpose is also to analyze distinctive features of the image, which make it a sole and unique right, as well as its legal nature from the several theories developed by the doctrine so as to define the parameters of the image. It is only after the abovementioned definition that this work will effectively examine the compensation gained by the image rights holder. The identification of the main activities involved and their legal nature will allow one to decide on the subsumption of facts concerning the use of the images of entertainers and sportspeople to the following taxes: Municipal Tax on Services (ISS), State Tax on Distribution of Goods, Transport and Communication Services (ICMS), Income Tax (IR), Social Contribution on Net Profits (CSL), Contribution for the Social Integration Program (PIS) and Contribution for the Financing of Social Security (COFINS), Contribution for Economic Intervention Royalties (CIDE-royalties) and Import and Export Duty. By examining the taxation by Income Tax, we will also analyze the possibility of entertainers and sportspeople to constitute legal entities aiming to exploit personal rights and the situations in which it is accepted to disregard the corporate entity. Finally, the paper will address the taxation regime applicable to international transactions comprising the use of the image of those entertainers and sportspeople, in situations which the purpose is an obligation to do and in those in which the purpose is an obligation to give, in compliance with OECD Model Convention and the treaties signed by Brazil in order to avoid double taxation
O trabalho tem por objetivo examinar a tributação da contraprestação recebida por artistas e esportistas em decorrência da licença concedida a terceiros para o uso do direito sobre a sua imagem. Como a legislação existente trata do assunto de forma genérica, ora equiparando a sua utilização a uma obrigação de fazer, ora a uma obrigação de dar, ou mesmo não regulando especificamente a matéria, apresentamos um método investigativo pelo qual é possível concluir com consistência pela incidência ou pela não incidência dos tributos nessas operações. A proposta aqui trazida é a de se examinarem os negócios que envolvam a utilização da imagem a partir da identificação da atividade-fim contratada, para, posteriormente, avaliar se tal prestação consiste em uma obrigação cuja natureza jurídica é de um fazer ou de um dar. A conclusão pela cobrança ou não das espécies tributárias decorrerá do confronto da materialidade de cada uma delas com a natureza jurídica da obrigação analisada. Antes, porém, vamos fixar os traços característicos dos direitos da personalidade e, em especial, do direito de imagem, passando a apontar a tutela constitucional conferida à imagem nas suas diferentes vertentes: atributo, retrato e retrato em obras coletivas, diferenciando-as do direito de arena. Também serão analisados os traços caracterizadores da imagem, que a tornam um direito único e singular, bem como a sua natureza jurídica a partir das diversas teorias desenvolvidas pela doutrina, a fim de delinear os contornos da imagem. Somente após isso é que o estudo passará efetivamente a examinar a contraprestação auferida pelo detentor da imagem, com base na identificação das atividades-fim envolvidas e sua natureza jurídica para concluir pela sujeição ou não dos fatos envolvendo o uso da imagem de artistas e esportistas ao ISS, ao ICMS, ao IR, à CSL, ao PIS e à COFINS, à CIDEroyalties, ao Imposto de Importação e ao de Exportação. Ao se examinar a tributação pelo IR, também será analisada a possibilidade de artistas e esportistas constituírem pessoas jurídicas com a finalidade de explorar direitos personalíssimos e as situações em que se admite a desconsideração da personalidade jurídica. Por fim, o estudo abordará o regime jurídico tributário aplicável às transações internacionais envolvendo o uso da imagem de artistas e esportistas, nas situações em que o fim pretendido é um fazer e naquelas em que ele consiste em um dar, diante do disposto na Convenção Modelo OCDE e nos tratados firmados pelo Brasil para evitar a dupla tributação da renda
APA, Harvard, Vancouver, ISO, and other styles
48

Berrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.

Full text
Abstract:
Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters’ (GCHQ) mass shadowing sharing plan to America’s Russian inspiration, SORM. Some countries are following the United States’ poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation’s strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today’s blurred privacy expectations.
B.S.
Bachelors
Health and Public Affairs
Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
49

Hannant, Larry. "The origins of state security screening in Canada." Thesis, 1993. http://hdl.handle.net/2429/1830.

Full text
Abstract:
Describing Canada's security intelligence practice, historians have identified 1945as a watershed. In September of that year Igor Gouzenko defected from the embassy of the Soviet Union in Ottawa, carrying with him evidence that the Soviets operated an espionage ring in this country. According to historical canon, Gouzenko's defection and the investigations which resulted from it forced the Canadian government to initiate a security screening program for civil servants and armed forces personnel. This program was an attempt to discern the political opinions, behaviour and trustworthiness of people in positions of trust both inside the state and outside. This thesis rewrites the conventional history of state security screening in Canada. By reexamining existing evidence and making use of records uncovered through the Access to Information Act, this work demonstrates that security screening of civil servants, military personnel and naturalization applicants began in the years between the First and Second World Wars. Revising the point at which security screening began also forces a reevaluation of the motivation for security screening. Security screening was not launched to detect and neutralize foreign espionage agents. Rather, it was borne out of a deep fear of communists among the Canadian people. Concern about internal dissent, not about foreign spying, was responsible for this new security intelligence development. This work also reexamines the Canadian government's supervision of its primary security intelligence agency, the Royal Canadian Mounted Police. Contrary to the widely held view that the Canadian cabinet initiated and supervised the screening system, this thesis shows that the RCMP operated a program for at least fifteen years without political authorization and guidance. In doing so, it committed acts which can only be regarded as civil liberties violations. Nevertheless, abuses were relatively minor. One reason why they were was the dubious legality of the program. Carrying out a program which lacked political approval, the RCMP kept a tight rein on the security screening system, fearing a controversy which could be embarrassing and damaging to its own security intelligence capacity.
APA, Harvard, Vancouver, ISO, and other styles
50

Vávrová, Terezie. "Německé vyrovnávání se s komunistickou minulostí na příkladě koncepce tzv. Gauckova úřadu." Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-298500.

Full text
Abstract:
The diploma thesis "The German way of putting up with the communist past in view of the Office for study of STASI dossiers" deals with balancing the communist past in Germany, it analyses the Office for study of STASI dossiers' (Gauck office) conception. The question of balancing the past is in German milieu oriented primarily towards the National Socialist era. In case of the Communist past Gauck office arose in 1992. This institution looks after the chancery of communist State security, simultaneously gives information from the dossiers to victims of the former regime. Balancing with totalitarian past is not a single- but a continual process and the Gauck office should reach the point by analyzing of materials it holds. Exceptionality of this institution lies in the fact that it serves as a model for other middle European countries. This project will focus on an analysis of historical preconditions for genesis of this institute. Also, it won't avoid the political debates influencing the final shape of Gauck office, including the future of its incorporating into the National Chancery.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography