Articles de revues sur le sujet « Private security services – United States »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Private security services – United States ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Trounstine, Jessica. "The Privatization of Public Services in American Cities." Social Science History 39, no. 3 (2015): 371–85. http://dx.doi.org/10.1017/ssh.2015.61.
Texte intégralKhalyasov, Ilshat S., and Andrey G. Svetlakov. "TO THE QUESTION OF RUSSIAN AND FOREIGN EXPERIENCE OF COUNTERACTION CRIMINALIZATION IN THE MARKET OF SECURITY SERVICES." Today and Tomorrow of Russian Economy, no. 107-108 (2022): 63–73. http://dx.doi.org/10.26653/1993-4947-2022-107-108-05.
Texte intégralKarska, Elżbieta, and Karol Karski. "Introduction: The Use of Private Military and Security Companies by the United Nations." International Community Law Review 16, no. 4 (2014): 399–404. http://dx.doi.org/10.1163/18719732-12341286.
Texte intégralNalla, Mahesh K., Sheila R. Maxwell, and Chae M. Mamayek. "Legitimacy of Private Police in Developed, Emerging, and Transitional Economies." European Journal of Crime, Criminal Law and Criminal Justice 25, no. 1 (2017): 76–100. http://dx.doi.org/10.1163/15718174-25012107.
Texte intégralPatel, Mohasina. "Legal Basis for Information Security Risk Management." Uzbek Journal of Law and Digital Policy 2, no. 4 (2024): 8–16. http://dx.doi.org/10.59022/ujldp.214.
Texte intégralZACON, Corina. "Inițiativele Organizației Națiunilor Unite de reglementare a activităților companiilor militare și de securitate private." Studii Juridice Universitare 1 2021 (November 2, 2021): 203–8. https://doi.org/10.5281/zenodo.5639479.
Texte intégralGia Anisa and Fitria Widianingsih. "SolarWinds Attack: Stages, Implications, and Mitigation Strategies in the Cyber Age." Electronic Integrated Computer Algorithm Journal 2, no. 1 (2024): 47–52. http://dx.doi.org/10.62123/enigma.v2i1.31.
Texte intégralKuznetsov, E. A. "The Role of the Commercial Space Industry within the US National Security under the Trump Administration." Moscow University Bulletin of World Politics 13, no. 1 (2021): 85–119. http://dx.doi.org/10.48015/2076-7404-2021-13-1-85-119.
Texte intégralGULYAMOV, Said, and Ilyosbek ODILKHUJAEV. "LEGAL BASIS FOR INFORMATION SECURITY RISK MANAGEMENT IN THE NOTARIAL SECTOR." Young Scholar's Academic Journal III, no. 1 (2024): 6–11. https://doi.org/10.5281/zenodo.10616226.
Texte intégralKrahmann, Elke. "Choice, voice, and exit: Consumer power and the self-regulation of the private security industry." European Journal of International Security 1, no. 1 (2016): 27–48. http://dx.doi.org/10.1017/eis.2015.6.
Texte intégralSan Nicolas-Rocca, Tonia, and Richard J. Burkhard. "Information Security in Libraries." Information Technology and Libraries 38, no. 2 (2019): 58–71. http://dx.doi.org/10.6017/ital.v38i2.10973.
Texte intégralPradnyajaya, I. Kadek Wahyu, and Made Maharta Yasa. "LEGALITAS DAN TANGGUNG JAWAB PRIVATE MILITARY AND SECURITY COMPANY DALAM INVASI IRAK OLEH AMERIKA SERIKAT." Kertha Semaya : Journal Ilmu Hukum 10, no. 7 (2022): 1496. http://dx.doi.org/10.24843/ks.2022.v10.i07.p03.
Texte intégralDAVITTI, Daria. "The Rise of Private Military and Security Companies in European Union Migration Policies: Implications under the UNGPs." Business and Human Rights Journal 4, no. 1 (2018): 33–53. http://dx.doi.org/10.1017/bhj.2018.21.
Texte intégralKleyhons, Ferdinand. "Les Affreux en Irak. Die Teilprivatisierung des professionellen Blutvergießens in der heutigen Kriegsführung anhand des Beispiels des Irakkriegs." historia.scribere, no. 13 (June 22, 2021): 177. http://dx.doi.org/10.15203/historia.scribere.13.637.
Texte intégralKorol’kova, E. "Evolution of United States’ Private Military and Security Companies: The Case of Afghanistan 2001–2021." International Trends / Mezhdunarodnye protsessy 20, no. 1 (2022): 122–47. http://dx.doi.org/10.17994/it.2022.20.1.68.7.
Texte intégralKrahmann, Elke. "From performance to performativity: The legitimization of US security contracting and its consequences." Security Dialogue 48, no. 6 (2017): 541–59. http://dx.doi.org/10.1177/0967010617722650.
Texte intégralScheffler, Sarah, and Jonathan Mayer. "SoK: Content Moderation for End-to-End Encryption." Proceedings on Privacy Enhancing Technologies 2023, no. 2 (2023): 403–29. http://dx.doi.org/10.56553/popets-2023-0060.
Texte intégralBrandão, Luís T. A. N., Nicolas Christin, and George Danezis. "Toward Mending Two Nation-Scale Brokered Identification Systems." Proceedings on Privacy Enhancing Technologies 2015, no. 2 (2015): 135–55. http://dx.doi.org/10.1515/popets-2015-0022.
Texte intégralLuciano, Edimara, M. Adam Mahmood, and Parand Mansouri Rad. "Telemedicine adoption issues in the United States and Brazil: Perception of healthcare professionals." Health Informatics Journal 26, no. 4 (2020): 2344–61. http://dx.doi.org/10.1177/1460458220902957.
Texte intégralSchindler, Hans-Jakob, and Frederique Gautier. "Looting and Smuggling of Artifacts as a Strategy to Finance Terrorism Global Sanctions as a Disruptive and Preventive Tool." International Journal of Cultural Property 26, no. 3 (2019): 331–42. http://dx.doi.org/10.1017/s0940739119000225.
Texte intégralChudinova, K. "U.S.-Japan Economic Cooperation Under the Biden Administration." World Economy and International Relations 67, no. 12 (2023): 28–34. http://dx.doi.org/10.20542/0131-2227-2023-67-12-28-34.
Texte intégralSeraj, Sultan-Mahmood. "Post-Pandemic Telehealth: An Unhealthy Privacy Prescription." Global Privacy Law Review 3, Issue 4 (2022): 208–20. http://dx.doi.org/10.54648/gplr2022024.
Texte intégralPimentel, Cauê Rodrigues. "Entre o livre-mercado e o compromisso multilateral: opções de regulação internacional sobre empresas militares e de segurança privada/Between free-market and multilateral commitment: options on the international regulation of private military and security." Brazilian Journal of International Relations 4, no. 2 (2015): 273–99. http://dx.doi.org/10.36311/2237-7743.2015.v4n2.06.p273.
Texte intégralNeagu, Florentina Stefania, and Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt." Proceedings of the International Conference on Business Excellence 13, no. 1 (2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.
Texte intégralChiu, Dickson K. W., Yuexuan Wang, Patrick Hung, et al. "Governance of Cross-Organizational Healthcare Document Exchange through Watermarking Services and Alerts." International Journal of Systems and Service-Oriented Engineering 2, no. 4 (2011): 83–108. http://dx.doi.org/10.4018/jssoe.2011100105.
Texte intégralSrikanth, Kandragula. "Security and Privacy Challenges." Journal of Scientific and Engineering Research 6, no. 10 (2019): 315–17. https://doi.org/10.5281/zenodo.14050056.
Texte intégralLaurell, Asa Cristina, and Maria Elena Ortega. "The Free Trade Agreement and the Mexican Health Sector." International Journal of Health Services 22, no. 2 (1992): 331–37. http://dx.doi.org/10.2190/v2xg-18v2-5ux1-qgke.
Texte intégralBernard Omwansa Obae. "Assessing the impact of the constitution of Kenya 2010 on foreign direct investments: opportunities and challenges." Magna Scientia Advanced Research and Reviews 14, no. 1 (2025): 145–49. https://doi.org/10.30574/msarr.2025.14.1.0081.
Texte intégralAguila, Emma, Jaqueline L. Angel, and Kyriakos Markides. "OLD AND FORGOTTEN? CARE FOR ELDERS IN MEXICO AND THE U.S." Innovation in Aging 3, Supplement_1 (2019): S64—S65. http://dx.doi.org/10.1093/geroni/igz038.249.
Texte intégralSragow, Howard Michael, Eileen Bidell, Douglas Mager, and Shaun Grannis. "Universal Patient Identifier and Interoperability for Detection of Serious Drug Interactions: Retrospective Study." JMIR Medical Informatics 8, no. 11 (2020): e23353. http://dx.doi.org/10.2196/23353.
Texte intégralRodrigues, Gabriel Arquelau Pimenta, André Luiz Marques Serrano, Guilherme Fay Vergara, Robson de Oliveira Albuquerque, and Georges Daniel Amvame Nze. "Impact, Compliance, and Countermeasures in Relation to Data Breaches in Publicly Traded U.S. Companies." Future Internet 16, no. 6 (2024): 201. http://dx.doi.org/10.3390/fi16060201.
Texte intégralShakya, HS, and NP KC. "Family Planning and Health Commodities Security in Nepal." Nepal Journal of Medical Sciences 3, no. 1 (2014): 51–56. http://dx.doi.org/10.3126/njms.v3i1.10359.
Texte intégralAkoh Atadoga, Oluwatoyin Ajoke Farayola, Benjamin Samson Ayinla, Olukunle Oladipupo Amoo, Temitayo Oluwaseun Abrahams, and Femi Osasona. "A COMPARATIVE REVIEW OF DATA ENCRYPTION METHODS IN THE USA AND EUROPE." Computer Science & IT Research Journal 5, no. 2 (2024): 447–60. http://dx.doi.org/10.51594/csitrj.v5i2.815.
Texte intégralLanawaang, Yehuda, Tito Suryawijaya, Mahmud Mahmud, and Bolei Zhou. "Achieving Customer Satisfaction Drive-Thru Services through Digital Twins in America." International Journal of Digital Entrepreneurship and Business 5, no. 1 (2024): 1–15. http://dx.doi.org/10.52238/ideb.v5i1.148.
Texte intégralKelly, Christopher, Nikolaos Pitropakis, Alexios Mylonas, Sean McKeown, and William J. Buchanan. "A Comparative Analysis of Honeypots on Different Cloud Platforms." Sensors 21, no. 7 (2021): 2433. http://dx.doi.org/10.3390/s21072433.
Texte intégralCedrick Agorbia-Atta. "Setting new benchmarks for combating financial crimes and ensuring the safety and security of America's digital financial landscape." International Journal of Science and Research Archive 13, no. 1 (2024): 1291–98. http://dx.doi.org/10.30574/ijsra.2024.13.1.1738.
Texte intégralCOJAN, Nicușor. "Rolul guvernanţei în realizarea obiectivelor globale ale Organizației Națiunilor Unite." Gândirea Militară Românească 2022, no. 2 (2022): 88–105. http://dx.doi.org/10.55535/gmr.2022.2.06.
Texte intégralEsmaeilzadeh, Pouyan. "Patients' Perceptions of Different Information Exchange Mechanisms: An Exploratory Study in the United States." Methods of Information in Medicine 59, no. 04/05 (2020): 162–78. http://dx.doi.org/10.1055/s-0040-1721784.
Texte intégralLiang, Bryan. "Crisis on Campus: Student Access to Health Care." University of Michigan Journal of Law Reform, no. 43.3 (2010): 617. http://dx.doi.org/10.36646/mjlr.43.3.crisis.
Texte intégralZhou, Xuan, Zhihong Xu, and Ashlynn Kogut. "Research data management needs assessment for social sciences graduate students: A mixed methods study." PLOS ONE 18, no. 2 (2023): e0282152. http://dx.doi.org/10.1371/journal.pone.0282152.
Texte intégralTzafestas, Spyros. "Ethics and Law in the Internet of Things World." Smart Cities 1, no. 1 (2018): 98–120. http://dx.doi.org/10.3390/smartcities1010006.
Texte intégralNicole Wassenberg. "Transatlantic Trade and Investment Partnership (TTIP): The Possible Impact on the European Union and North America." Journal of Advance Research in Business Management and Accounting (ISSN: 2456-3544) 2, no. 8 (2016): 01–08. http://dx.doi.org/10.53555/nnbma.v2i8.92.
Texte intégralGlover, Lisa. "Creditworthy: A History of Consumer Surveillance and Financial Identity in America by Josh Lauer." Journal of Intellectual Freedom and Privacy 2, no. 3-4 (2018): 33. http://dx.doi.org/10.5860/jifp.v2i3-4.6482.
Texte intégralKislitsyn, S. "Partnership for Global Infrastructure and Investment: Goals and Development Prospects." World Economy and International Relations 67, no. 10 (2023): 30–39. http://dx.doi.org/10.20542/0131-2227-2023-67-10-30-39.
Texte intégralDalton, Michelle. "There is a Lack of Standardization in the Collection Development and Circulation Policies of Prison Library Services." Evidence Based Library and Information Practice 8, no. 2 (2013): 248. http://dx.doi.org/10.18438/b8r611.
Texte intégralDr., Madan Lal Bhasin. "Privacy Protection Legislative Scenario in Select Countries." International Journal of Management Sciences and Business Research 5, no. 10 (2016): 14–32. https://doi.org/10.5281/zenodo.3466150.
Texte intégralMrvić-Petrović, Nataša. "Criminal law approach to regulating non-consensual pornographic deepfake." Bezbednost, Beograd 66, no. 2 (2024): 5–23. http://dx.doi.org/10.5937/bezbednost2402005p.
Texte intégralVenkata Raja Ravi Kumar Gelle. "Revolutionizing U.S. Health Insurance: Leveraging Cloud Computing and Angular/React Development for Scalable, User-Centric Solutions." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 1194–202. https://doi.org/10.32628/cseit251112126.
Texte intégralChakraborty, Parama. "Identity as a Legal Concept & Economic Identity." Inverge Journal of Social Sciences 2, no. 2 (2023): 134–45. https://doi.org/10.63544/ijss.v2i2.33.
Texte intégralStackhouse-Lawson, Kim, and Logan Thompson. "80 Climate Change and the Beef Industry: A Rapid Expansion." Journal of Animal Science 100, Supplement_2 (2022): 32–33. http://dx.doi.org/10.1093/jas/skac064.053.
Texte intégral