Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Security policie.

Articles de revues sur le sujet « Security policie »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Security policie ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

CUNHA, VIVANE MARTINS, JULIA SOMBERG ALVES, and LISANDRA ESPÍNDULA MOREIRA. "GENOCÍDIO NEGRO E SEGURANÇA PÚBLICA: POLÍTICA DE EXTERMÍNIO EM AÇÕES POLICIAIS." REVISTA PSICOLOGIA POLÍTICA 25 (2025): 1–19. https://doi.org/10.5935/2175-1390.v25e23714.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Antonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Supriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.

Texte intégral
Résumé :
Police transformation policy to carry out community security functions is very adaptive in addressing the changing times. The research aims to map the transformation and strengthening of police infrastructure in response to the era of digitalization. The research uses a qualitative type of research with a literature study approach and policy analysis programmed by the Police. The results showed that the transformation policy consisting of organizational transformation, operation transformation, public service transformation, and supervise transformation is needed by the Police, especially in t
Styles APA, Harvard, Vancouver, ISO, etc.
4

Pereira da Silva, Oziel. "POLICIAMENTO TURÍSTICO E POLÍCIA TURÍSTICA: FUNÇÕES, OBJETIVOS E SUAS COMPLEXIDADES." Revista Científica da Polícia Militar de Mato Grosso do Sul - RevPMMS 2, no. 1 (2025): 351–72. https://doi.org/10.62927/revpmms.v2i1.95.

Texte intégral
Résumé :
ourist Policing is not anapproach exclusive to a single police unit, but rather a public security strategy aimed at areas with large flows of tourists, involving preventive and repressive actions, including the use of monitoring systems and signage. On the other hand, Tourist Police is a specialized unit dedicated to assisting tourists, with a focus on protection, security, and facilitation of their experience. In this context, to avoid conceptual or interpretive distortions, it is essential to define a unique identity for TouristPolice officers, as well as to appropriately direct the efforts
Styles APA, Harvard, Vancouver, ISO, etc.
5

Achmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.

Texte intégral
Résumé :
This studywas conducted todetermine and analyze the implementation of the licensing policies and notices of community activities in Baubau City Police and communication factors, resources, disposition, and structure influence the implementation of the licensing policies and notices of community activities in Police Baubau. The results showed that the licensing policies and notices activities of people implemented by (a) Providea receipt notice (b) To coordinate with the responsible delivery of opinions in the Public (c) To coordinate with the leadership, the agency/institutionwhich is the goal
Styles APA, Harvard, Vancouver, ISO, etc.
6

Ryma, Abassi1 and Sihem Guemara El Fatmi2. "Executable Security Policies: Specification and Validation of Security Policies." International Journal of Wireless & Mobile Networks (IJWMN) 1, no. 1 (2022): 20. https://doi.org/10.5281/zenodo.6622372.

Texte intégral
Résumé :
Security Policies constitute the core of network protection infrastructures. However, their development is a sensitive task because it can be in opposition with the security requirements (e.g. lack of rule or conflicting rules). A specification task seems to be indispensible in order to clarify the desired exigencies. A validation process for security policies becomes then necessary before their deployment to avoid resources network damages. Nowadays, there is no automated tool in the network security world allowing such task. Moreover, we have found that the theory developed for this aim in t
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kim, Hae Kyoung. "The Impact of Police Organization Support on Public Policy: Focusing on Learning Organizations." Korean Society of Private Security 22, no. 3 (2023): 47–68. http://dx.doi.org/10.56603/jksps.2023.22.3.47.

Texte intégral
Résumé :
People have a fear of crime because of constant crime in society. To promote the safety of these people, the police are presenting various security policies. The duty of the police is to protect the life, body and property of the people along with maintaining social order in the country.
 The security policy pursued by the police is influenced by various factors such as the external environment, the internal environment, and laws and systems. In previous studies on police security policy, the research on the internal environment and support of police organizations is somewhat limited, so
Styles APA, Harvard, Vancouver, ISO, etc.
8

Schneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (2000): 30–50. http://dx.doi.org/10.1145/353323.353382.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Potter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

McIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Cho, Sang Hyun. "A Study on the Core Ideology and Organizational Citizenship behavior of Police Officers: Verification of the Moderating Effect of Public Service Motivation." Korean Association for Terrorism Studies 16, no. 4 (2023): 153–68. http://dx.doi.org/10.46350/kats.2023.16.4.153.

Texte intégral
Résumé :
Under the goal of ‘competent and dignified police, a safe community trusted by the public,’ the police is implementing four major policies: securing reliable public security, establishing a solid safety system, pioneering future security, and establishing strict law and order. The success or failure of these police organizations can vary depending on the efforts of all police officers. The organizational citizenship behavior of police officers is explained as a factor that can improve the performance of organizational members, achieve organizational goals, and influence organizational innovati
Styles APA, Harvard, Vancouver, ISO, etc.
12

Gudelli, Venkata Ramana. "Data Encryption and IAM Policies: Best Practices for AWS Ecosystems." Cybersecurity and Network Defense Research 2, no. 2 (2022): 210–35. https://doi.org/10.5281/zenodo.15102702.

Texte intégral
Résumé :
Securing sensitive data in AWS ecosystem remains a critical concern for enterprises as cloud adoption increases. The aim of this paper is to explore the best practises for data encryption Identity and Access Management (IAM) policies in AWS To ensure robust security postures against new evolving threats. As we provide an in-depth analysis of AWS-native encryption mechanism which includes AWS Key Management Service (KMS), envelope encryption, and hardware security modules (HSMs), and also examines the effectiveness in securing data confidentiality and integrity.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Poincignon, Yann. "Defense Academy Excellence European Union Civilian Policing: Foreign Policy Action or Internal Security Tool." Connections: The Quarterly Journal 02, no. 2 (2003): 111–30. http://dx.doi.org/10.11610/connections.02.2.12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Sheptycki, J. "High Policing in the Security Control Society." Policing 1, no. 1 (2007): 70–79. http://dx.doi.org/10.1093/police/pam005.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Texte intégral
Résumé :
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 6
Styles APA, Harvard, Vancouver, ISO, etc.
16

Oleiniuc, Maria. "SPECIFIC FOOD SECURITY POLICIES." Journal of Social Sciences II (2) (June 15, 2019): 79–86. https://doi.org/10.5281/zenodo.3235244.

Texte intégral
Résumé :
In this article, the author has analyzed what types of food security policies need to be develop and implement depending on the dimensions of food security in order to improve the situation of food security. Improving the current situation regarding the food security is a dilemma not only related to the national level of a country but also worldwide. The consequences of economic growth and the level of globalization for some countries have been quite impressive, especially for industrial countries, but not for developing and emerging countries. The European Community together with such organiz
Styles APA, Harvard, Vancouver, ISO, etc.
17

Choi, Junho, Chong Soo Cheung, Dongkwan Lee, Seol A. Kwon, and Jae Eun Lee. "Policy Directions for Securing Food Security by Applying Critical Infrastructure in the Field of Agriculture." Crisis and Emergency Management: Theory and Praxis 13, no. 8 (2023): 17–27. http://dx.doi.org/10.14251/jscm.2023.8.17.

Texte intégral
Résumé :
This study aims to suggest policy directions to promote food security by applying the concept of critical infrastructure in Korea. It designates the agricultural sector for food security through the functions, systems, and facilities of critical infrastructure and presents policy directions. The results of the analysis show that the functions of critical infrastructure can be implemented by establishing a food security manual. Due to the lack of relevant manuals in Korea, it is necessary to strengthen the response system on a regular basis through the designation of a department dedicated to f
Styles APA, Harvard, Vancouver, ISO, etc.
18

Page-Poma, Fernanda, and Sofía Duarte. "The Struggle for Gender Equality: Policy Implementation in Argentina’s Security Forces." Social Politics: International Studies in Gender, State & Society 32, no. 1 (2025): 126–51. https://doi.org/10.1093/sp/jxae029.

Texte intégral
Résumé :
Abstract It is now over a decade since the inception of gender equality policies in Argentina’s police and security institutions. In this study we scrutinize the implementation gaps of these policies through interviews, focus groups, and story completion methods at Argentina’s Gendarmerie. Our analysis focuses on three key policies aimed at fostering gender equality within federal police and security organizations transitioning toward more democratic and professional institutions: (1) prohibiting actions that hinder the inclusion of individuals with dependents, and pregnant or lactating women,
Styles APA, Harvard, Vancouver, ISO, etc.
19

Matvejevs, Aleksandrs. "Problems of Police Activity in Ensuring Public Order and Public Safety." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no. 21 (2021): 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.

Texte intégral
Résumé :
The article addresses the issues concerning public order and public security. These two are the objects of the state administration that form separate legal institutes. The duties of the police include securing the rule of law, maintaining public order and security, preventing, detecting and investigating crimes. The police ensure safety of people and environment and prevent all violations of the law and disturbances by eliminating and investigating all such incidents. The tasks of the police are defined in the Police Act. The police cooperate with other authorities and local residents and com
Styles APA, Harvard, Vancouver, ISO, etc.
20

Elbably, Amar. "سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة". Security Policy Paper 2, № 2 (2021): 1–20. http://dx.doi.org/10.26735/hjoo8882.

Texte intégral
Résumé :
يُسهِم‭ ‬التعاوُن‭ ‬الأمني‭ ‬الرقمي‭ ‬بين‭ ‬الدول‭ ‬إسهامًا‭ ‬كبيرًا‭ ‬في‭ ‬انحسار‭ ‬الجرائم‭ ‬المُنظَّمة‭ ‬والقضاء‭ ‬عليها،‭ ‬وبخاصَّةٍ‭ ‬الجرائم‭ ‬الإرهابيَّة،‭ ‬وهو‭ ‬ما‭ ‬يتطلَّب‭ ‬ضرورة‭ ‬تفاعُل‭ ‬الدول‭ ‬فيما‭ ‬بينها،‭ ‬وزيادة‭ ‬الجهود‭ ‬في‭ ‬سبيل‭ ‬تشجيع‭ ‬هذا‭ ‬التعاوُن‭ ‬وتفعيله،‭ ‬بإيجاد‭ ‬وسائل‭ ‬تعاونيَّة‭ ‬في‭ ‬المسائل‭ ‬الأمنيَّة‭ ‬الكفيلة‭ ‬بالوقاية‭ ‬من‭ ‬الجريمة‭ ‬وتَتَبُّع‭ ‬مرتكبيها‭ ‬حالَ‭ ‬وقوعها‭ ‬باستخدام‭ ‬شبكات‭ ‬مُؤَمَّنَة‭ ‬تسمح‭ ‬بنقل‭ ‬البيانات‭ ‬والمعلومات‭ ‬والتطبيقات‭ ‬بين‭ ‬الأجهزة‭ ‬المعنيَّة‭ ‬بأجهزة‭ ‬الشرطة‭ ‬العربيَّة،‭ ‬واستخدام‭ ‬التقنيات‭ ‬المُؤَمَّنَة‭
Styles APA, Harvard, Vancouver, ISO, etc.
21

Pangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.

Texte intégral
Résumé :
AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care. The general framework and the requirements for medical database security are presented. The three prominent proposals for medical database security are discussed in some detail, together with specific proposals for medical database security. A number of parameters for a secure medical database development are presented and disc
Styles APA, Harvard, Vancouver, ISO, etc.
22

Basin, David, Vincent Jugé, Felix Klaedtke, and Eugen Zălinescu. "Enforceable Security Policies Revisited." ACM Transactions on Information and System Security 16, no. 1 (2013): 1–26. http://dx.doi.org/10.1145/2487222.2487225.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Pernul, G., and A. M. Tjoa. "Security Policies for Databases." IFAC Proceedings Volumes 25, no. 30 (1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Cuppens, Frédéric, and Nora Cuppens-Boulahia. "Modeling contextual security policies." International Journal of Information Security 7, no. 4 (2007): 285–305. http://dx.doi.org/10.1007/s10207-007-0051-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Ølnes, Jon. "Development of security policies." Computers & Security 13, no. 8 (1994): 628–36. http://dx.doi.org/10.1016/0167-4048(94)90042-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Suhaibah, Suhaibah, Armiwal Armiwal, and Mukallaf Mukallaf. "The Role of the Polri Intelligence in Securing the General Election and Institution of the Pidie District DPRK." Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences 4, no. 1 (2021): 626–31. http://dx.doi.org/10.33258/birci.v4i1.1645.

Texte intégral
Résumé :
This research aims toknowingthe role of the Police Intelligence in securing the General Election and Inauguration of the Pidie Regency DPRK, the obstacles to the Intelligence of the Police in securing the General Election and the Inauguration of the DPRK and the efforts made to overcome the obstacles to the Police Intelligence in securing the General Election and Inauguration of the Pidie Regency DPRK In this study, the problem approach used was normative juridical and empirical juridical. Data collection was carried out by literature study and field studies. The data were analyzed qualitative
Styles APA, Harvard, Vancouver, ISO, etc.
27

Sampson, F., and J. McNeill. "Redefining the Gaps: Connecting Neighbourhood Safety to National Security." Policing 1, no. 4 (2007): 460–71. http://dx.doi.org/10.1093/police/pam068.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Simmons, A. "Room, Stewart (2009). * BUTTERWORTHS DATA SECURITY: LAW AND PRACTICE." Policing 6, no. 1 (2011): 99–100. http://dx.doi.org/10.1093/police/par014.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Sales, Eric Rodrigues De, and James Frade Araújo. "The impact of judiciary decisions on public security policies in Brazil." Forensic Research & Criminology International Journal 12, no. 1 (2024): 46–55. http://dx.doi.org/10.15406/frcij.2024.12.00397.

Texte intégral
Résumé :
The principle of separation of powers is present in the Federal Constitution of Brazil, and states that the powers must be independent and harmonious with each other. When cases of judicialization of public policies occur, the Judiciary has its power expanded in matters that would be of primary competence of the Legislative and Executive powers. The purpose of this article is to carry out an analysis of two specific cases that occurred in Brazil in which a judicial decision has a direct impact on public security policies. The first case is a decision by the Superior Court of Justice - STJ that
Styles APA, Harvard, Vancouver, ISO, etc.
30

Murtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Texte intégral
Résumé :
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Diógenes, José Lenho Silva, Suely Salgueiro Chacon, and Tayana Cibele Canafístula Torres. "Police Education and SDG 16: An Assessment of AESP in the Context of Ceará’s Public Security Policies." Revista de Gestão Social e Ambiental 19, no. 1 (2025): e010934. https://doi.org/10.24857/rgsa.v19n1-117.

Texte intégral
Résumé :
Objective: This study analyzes the role of the State Public Security Academy (AESP) in implementing a multidisciplinary and humanistic police education model, focusing on SDG 16. Theoretical Framework: Drawing on an institutional perspective, the research examines AESP as a foundational agency within public security policies in Ceará. It discusses the shift from a “police training” paradigm to “police education,” articulating the concept of citizen security as an alternative to traditionally militaristic models. Method: This qualitative research comprises document analysis (normative framework
Styles APA, Harvard, Vancouver, ISO, etc.
32

de Rover, Cees. "Police and security forces." International Review of the Red Cross 81, no. 835 (1999): 637–47. http://dx.doi.org/10.1017/s1560775500059836.

Texte intégral
Résumé :
Promouvoir l'enseignement du droit international humanitaire auprès des membres des forces armées a toujours été l'une des tâches prioritaires du CICR. Aujourd'hui cependant, les forces de police ou d'autres unités chargées de tâches similaires sont de plus en plus souvent engagées directement dans des opérations de maintien de l'ordre et de la sécurité, notamment dans des situations de troubles intérieurs, voire de conflit interne. Il est devenu important de s'assurer que les membres de ces unités connaissent quelques règies fondamentales en matière de protection de l'individu dans ces circon
Styles APA, Harvard, Vancouver, ISO, etc.
33

NAHORNA, Olena, and Karyna LAHUN. "SOCIAL PROTECTION AND SOCIAL SECURITY OF POLICE OFFICERS." Naukovyy Visnyk Dnipropetrovs kogo Derzhavnogo Universytety Vnutrishnikh Sprav, no. 1 (October 2, 2024): 90–95. http://dx.doi.org/10.31733/2078-3566-2023-5-90-95.

Texte intégral
Résumé :
The article examines the social protection and social security of police officers who perform the dangerous and important work of ensuring public safety. The authors examine various aspects of the social protection of police officers, focusing on their rights, benefits and guarantees provided to ensure their welfare and safety. The article analyzes the social protection system for police officers, including support in case of injuries and disabilities, health insurance, pension system and other social benefits. The authors also explore the challenges faced by police officers in the field of we
Styles APA, Harvard, Vancouver, ISO, etc.
34

Jeon, Jun Ha, and Bo Sung Jung. "The Impact of Moral Alignment with Police on the Willingness to Participate in Community Policing Activities: Focusing on the Mediating Role of Trust in the Police." Korean Association of Public Safety and Criminal Justice 33, no. 4 (2024): 285–312. https://doi.org/10.21181/kjpc.2024.33.4.285.

Texte intégral
Résumé :
Modern society increasingly recognizes the era of cooperative security, where citizens and the police jointly maintain public safety. Within this paradigm, the active and voluntary participation of citizens in policing activities play a pivotal role. Achieving effective cooperative security necessitates aligning the values of citizens and police, planning policies in congruence with shared objectives, and conducting police activities based on these shared values. As a representative philosophy related to this, the police academia emphasizes the importance of community policing, and empirical a
Styles APA, Harvard, Vancouver, ISO, etc.
35

Ramona Gusti, Wan Deni, Chairul Muriman Setyabudi, and Sutrisno Sutrisno. "Tanjung Priok Police Community Policing in the Security of Mbah Priok." AL-MANHAJ: Jurnal Hukum dan Pranata Sosial Islam 5, no. 1 (2023): 61–72. http://dx.doi.org/10.37680/almanhaj.v5i1.2117.

Texte intégral
Résumé :
Haul Mbah Priok's activities have the potential to cause disturbances in Kamtibmas, especially during the Covid-19 pandemic. Police are expected to play an active role in preventing various forms of social problems, including problems that may arise at Haul Mbah Priok. This study aims to determine the relationship between the National Police and the Community in Securing Haul Mbah Priok during the Covid-19 pandemic by the Tanjung Priok Port Police. This research was conducted with a qualitative approach. Sources of data in this study include the Head of Tanjung Priok Port Police, Head of Binma
Styles APA, Harvard, Vancouver, ISO, etc.
36

Ali, Ahmadian Ramaki, and Ebrahimi Atani Reza. "Language-Based Security to Apply Computer Security." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2019): 37–47. https://doi.org/10.5281/zenodo.3370116.

Texte intégral
Résumé :
Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages
Styles APA, Harvard, Vancouver, ISO, etc.
37

Chang, Il-sik. "Security Policy of POLICE according to Increase of Elder Crimes." J-Institute 2, no. 2 (2017): 1–6. http://dx.doi.org/10.22471/police.2017.2.2.01.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Prenzler, T. "Strike Force Piccadilly and ATM Security: A Follow-up Study." Policing 5, no. 3 (2011): 236–47. http://dx.doi.org/10.1093/police/par029.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Deibert, Ronald J., and Rafal Rohozinski. "Risking Security: Policies and Paradoxes of Cyberspace Security." International Political Sociology 4, no. 1 (2010): 15–32. http://dx.doi.org/10.1111/j.1749-5687.2009.00088.x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Anvar, Shathik J., and Prasad K. Krishna. "A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions." International Journal of Case Studies in Business, IT, and Education (IJCSBE) 4, no. 1 (2020): 155–71. https://doi.org/10.5281/zenodo.3928673.

Texte intégral
Résumé :
Security was not a major concern of the past in Information Technology Organizations. But presently, due to the vast growth in fraud and hacking techniques, the security of organizations is a great concern. Organizations usually spend millions every year just to protect their environment and to maintain security. Yet, no company claims to be a hundred percent secure as fraudulent techniques are more tricky and latest. As the hackers are becoming hard and tricky, the major Information Technology (IT) Organizations are willing to pay a large sum of money for providers offering services of enterp
Styles APA, Harvard, Vancouver, ISO, etc.
41

Shebanow, Annie, Richard Perez, and Caroline Howard. "The Effect of Firewall Testing Types on Cloud Security Policies." International Journal of Strategic Information Technology and Applications 3, no. 3 (2012): 60–68. http://dx.doi.org/10.4018/jsita.2012070105.

Texte intégral
Résumé :
An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solution
Styles APA, Harvard, Vancouver, ISO, etc.
42

Padot, Rebecca. "A higher education approach to active shooter incidents: Evidence from 40 United States university campuses." Journal of Emergency Management 22, no. 2 (2024): 169–80. http://dx.doi.org/10.5055/jem.0708.

Texte intégral
Résumé :
In a post-9/11 environment with an increased United States (US) federal government emphasis on active shooter preparedness, this study seeks to understand how higher educational institutions have adapted to this changing policy environment. Furthermore, between 2000 and 2017, there were 15 active shooter incidents at US higher education institutions. This study provides data on how public and private higher education campuses are preparing for this increased active shooter threat. Interviews were conducted with higher education employees familiar with campus security policies from 40 higher ed
Styles APA, Harvard, Vancouver, ISO, etc.
43

Claudia Cifali, Ana, and Rodrigo Ghiringhelli De Azevedo. "Public Security, Criminal Policy and Sentencing in Brazil during the Lula and Dilma Governments, 2003-2014: Changes and Continuities." International Journal for Crime, Justice and Social Democracy 6, no. 1 (2017): 146–63. http://dx.doi.org/10.5204/ijcjsd.v6i1.392.

Texte intégral
Résumé :
Since mid-1980s crime rates in Brazil started to increase with the transition from military dictatorship to democracy, a period marked by the rise of poverty and hyperinflation. Given levels of police corruption and protection of criminal gangs, trust in the criminal justice system was low, leading to a heightened dependence on private security, gated communities and the politicisation of law and order politics. An impressive punitive turn began at in the 1990s. This paper analysed penal policies under successive left-wing Lula and Dilma governments from 2003 to 2014. During this period the ri
Styles APA, Harvard, Vancouver, ISO, etc.
44

Siregar, Salwa Ramadhani, and Anajeng Esri Edhi Mahanani. "IMPLEMENTATION OF POLICE DISCRETION IN CRIMINAL LAW ENFORCEMENT IN ANARCHIC DEMONSTRATIONS." JARES (Journal of Academic Research and Sciences) 9, no. 1 (2024): 47–55. http://dx.doi.org/10.35457/jares.v9i1.2910.

Texte intégral
Résumé :
Police discretion is the authority of members of the police to take a policy in certain situations that require their own judgment as long as it does not violate statutory provisions. It aims to guard, maintain order and ensure public security. However, policies issued often raise pros and cons, especially when enforcing criminal law in securing demonstrations. The community considers that the actions taken are a form of hindering the achievement of their aspirations. This condition eventually led to riots during demonstrations which could threaten the safety of the demonstrators, police offic
Styles APA, Harvard, Vancouver, ISO, etc.
45

Todorova, Antonia. "Turkish Security Discourses and Policies: The Kurdish Question." Information & Security: An International Journal 33, no. 1,2 (2015): 108–21. http://dx.doi.org/10.11610/isij.3305.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

Brock, Lothar, Anna Geis, Sabine Jaberg, et al. "Mythen der etablierten Sicherheitspolitik." Die Friedens-Warte 92, no. 3-4 (2019): 115. http://dx.doi.org/10.35998/fw-2019-0006.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Gyamfi, Gerald D. "Exploring the Challenges and Possibilities of Pan African International Police Cooperation." International Journal of Public Administration in the Digital Age 6, no. 4 (2019): 43–53. http://dx.doi.org/10.4018/ijpada.2019100104.

Texte intégral
Résumé :
In the promotion of global peace and security, police cooperation is considered one of the major pillars. This exploratory qualitative study focuses on the possibilities and challenges that should be overcome in the quest to practicalize the implementation of security policies and other legal instruments relating to police cooperation and collaboration in Africa. Twenty-five top police officers and other security experts in Ghana were selected as participants using snowball approach. The participants were interviewed for their views on international police cooperation focusing on cooperation a
Styles APA, Harvard, Vancouver, ISO, etc.
48

Park, Suhyeon, Younhoon Cho, and Suhong Jeong. "Changes in Private Security with Changes in the PUBLIC SAFETY Environment." J-Institute 1, no. 2 (2016): 26–30. http://dx.doi.org/10.22471/police.2016.1.2.26.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Hunton, P. "Cyber Crime and Security: A New Model of Law Enforcement Investigation." Policing 4, no. 4 (2010): 385–95. http://dx.doi.org/10.1093/police/paq038.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
50

Beroíza Valenzuela, Francisca Eunice. "Las Políticas de Seguridad Interna en Chile (1973-2000). Continuidades y readecuaciones en perspectiva históricaLas Políticas de Seguridad Interna en Chile (1973-2000). Continuidades y readecuaciones en perspectiva histórica." Revista Ciencias y Humanidades 9, no. 9 (2024): 31–56. https://doi.org/10.61497/5ptfem18.

Texte intégral
Résumé :
The objective of this article is to analyze the internal security policies in Chile from 1973 to 2000. In that sense, the National Security Doctrine implemented during the military dictatorship of Augusto Pinochet Ugarte, and the public security policies and citizen security of the presidential terms of Patricio Aylwin and Eduardo Frei Ruiz Tagle. The internal security policies took place in a historical context in which various actors intervened, such as the police and the Chilean Army, which interacted dialectically with the governments and played a central role according to their institutio
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!