Academic literature on the topic 'Department of Social Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Department of Social Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Department of Social Security"
Burgess, Keith, and David Clinton. "Operational strategy development: Department of social security." Public Money & Management 9, no. 4 (December 1989): 59–62. http://dx.doi.org/10.1080/09540968909387574.
Full textBullard, Timothy B., Gary Strack, and Kourtney Scharoun. "Emergency Department Security." Health Care Manager 21, no. 1 (September 2002): 65–73. http://dx.doi.org/10.1097/00126450-200209000-00006.
Full textHaddad, Marwan. "An Islamic perspective on food security management." Water Policy 14, S1 (March 1, 2012): 121–35. http://dx.doi.org/10.2166/wp.2012.006.
Full textSullivan, J. "R v DEPARTMENT OF SOCIAL SECURITY EX P. SCULLION." European Law Reports 4, no. 4 (July 1, 2000): 429–48. http://dx.doi.org/10.5235/elr.v4n4.429.
Full textKogetsidis, Harry. "Forecasting Payroll Costs for the Department of Social Security." OR Insight 20, no. 1 (January 2007): 30–39. http://dx.doi.org/10.1057/ori.2007.5.
Full textHong, Sa-Im. "A Study on the Reform of Social Security System for "Quality of Life"." Korean Journal of Policy Studies 10 (December 31, 1995): 251–64. http://dx.doi.org/10.52372/kjps10013.
Full textEvans, Michael. "The PRIME contract: The Department of Social Security and Trillium." Journal of Corporate Real Estate 2, no. 3 (July 2000): 208–20. http://dx.doi.org/10.1108/14630010010811356.
Full textGrover, Chris. "Advertising social security fraud." Benefits: A Journal of Poverty and Social Justice 13, no. 3 (October 2005): 199–205. http://dx.doi.org/10.51952/ncbb7067.
Full textAdler, Michael. "The slow road to tribunal reform." Benefits: A Journal of Poverty and Social Justice 12, no. 1 (February 2004): 13–20. http://dx.doi.org/10.51952/ciec5393.
Full textSong, Yang, Xingyang Zhang, and Xiaolei Zhao. "Research on the application of UAVs in the security of major events." BCP Social Sciences & Humanities 19 (August 30, 2022): 247–53. http://dx.doi.org/10.54691/bcpssh.v19i.1611.
Full textDissertations / Theses on the topic "Department of Social Security"
Leonhardi, Eric V., Mark Murphy, and Hannah Kim. "Analysis of Department of Defense social media policy and its impact on operational security." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45890.
Full textThe emergence and rapid adoption of social media by society has forced the Department of Defense (DOD) to adapt, and ultimately develop and incorporate, social media policy into its cybersecurity strategy. While social media has influenced DOD strategy, it has also had a direct impact on the organization’s operational security (OPSEC). DOD personnel using social media represent a potential OPSEC risk through the various ways and means in which they utilize social-networking platforms. In 2009, the DOD responded to this risk, in part, with a policy to regulate the use of social media. This project analyzes current DOD social media policy to determine how it can be changed to improve OPSEC. To address this issue, DOD social media policies from Army Cyber Command, Air Force Cyber Command, Fleet Cyber Command, and Marine Force Cyber Command were analyzed by performing an in-depth review and strengths, weaknesses, opportunities, and threats analysis.
Moore, James Nicholas. "An examination of a possible health education and lifestyles strategy for staff of the Department of Social Security (DSS) in South Australia /." Title page, contents and synopsis only, 1990. http://web4.library.adelaide.edu.au/theses/09MO/09mom822.pdf.
Full textFronczak, Dana. "Stunted growth| Institutional challenges to the Department of Homeland Security's maturation." Thesis, Duquesne University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1536209.
Full textScholars have proposed numerous explanations as to why the Department of Homeland Security has struggled to mature as an organization and effectively conduct its core mission. We propose an alternative viewpoint that the department lacks key legal authorities and necessitates key organizational transfer in order to rationalize its portfolio. We examine these points through review of legal authorities in select mission areas and through a resource analysis of activities conducted throughout the federal government to execute the homeland security mission. The analysis leads to specific recommendations for transfers and authorities and suggestions as to how the political environment might coalesce around engendering these changes.
Alakpa, George Edafese U. "Perceptions of military personnel| Analysis of the Department of Defense?s counter bioterrorism measures at the tactical level for the enhacement of civil security, leadership, management, and policy." Thesis, New Jersey City University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3730740.
Full textThe Department of Defense, at the time of this study, had over 38 combat Forward Operating Bases (FOB) with both U.S. military and non-military personnel residing and engaged in the mission. Also in these FOBs, are local nationals of the countries, who are employed to perform certain duties in these FOBs after having had certain security and medical background checks. However, while on military mission in Afghanistan and other Middle Eastern countries between 2009 and 2011, this researcher, observed and detected more than once, local nationals (LNs), Afghans, with certain infectious skin conditions working in the DIFACs (dining facilities) at major FOBs, serving food to soldiers inside the base. These LNs reside outside the FOB facility and gain entrance into the FOB daily, passing through already set security parameters put in place by the Department of Defense (DoD). There are Tactics, Techniques, and Procedures (TTP) to prevent or mitigate Person-borne Improvised Explosive Device (PBIED), Vehicle-borne Improvised Explosive Device (VBIED), and to also respond to, or recover from, Chemical, Biological, Radioactive, and Nuclear (CBRN) attacks on FOBs. Researcher is unaware of any TTP specific for HB-BA terrorist, capable of detecting, deterring or destroying a terrorist with bioagents breaching a combat post ECP; nor the training of soldiers of how to conduct a search on a bio-agent (BA) – or even what a bio-agent would look like if they found one. The purpose of this research was to determine whether there are current military counter bioterrorism measures in place to combat a human-borne with a bioagent (HB-BA) terrorist attempting to breach a combat FOB at the ECP, and how effective they are.
To accomplish this, a survey tool had to be developed and employed to determine the perceptions about the effectiveness of current ECP TTPs in detecting, deterring preventing, and mitigating a HBBA terrorist at the ECP, from military personnel. A survey tool (questionnaire) was developed, validated, and subjected to a reliability testing using Cronbach’s Alpha on a mix-method cross sectional survey, a pretest. Results showed a Cronbach’s Alpha of 0.82 and 0.89 for the survey’s two constructs. Also, 92.3% of respondents had recently been in combat deployment. All of them claimed that bioterrorism is very possible, but 61.5% believe it is either very possible or possible for a terrorist with a bioagent (BA) to successfully breach a FOB ECP. Only 3.8% felt that it would be impossible to breach the FOB ECP with a bioagent. Similarly, only 28% of respondents surveyed believe that current ECP TTPs are effective against a BA, 48% believe that current CBRN TTPs are either not effective, or somewhat effective, against BA at the ECP. In conclusion, the preliminary study, indicated that combat FOBs are vulnerable to breach by human-borne with BA terrorist at the ECP, as there exists no currently effective ECP TTP that could detect, deter or destroy a terrorist with a biological agent at a combat FOB ECP.
Chan, Chio Weng. "The impact of personal differences on the perception of public safety among citizens in Macao." Thesis, University of Macau, 2012. http://umaclib3.umac.mo/record=b2580065.
Full textRowlands, David, and n/a. "Agencification in the Australian Public Service: the case of Centrelink." University of Canberra. Management & Policy, 2002. http://erl.canberra.edu.au./public/adt-AUC20050819.113849.
Full textOpria, George R. Maraska Donald G. "An analysis of the use of the Social Security Number as Veteran Identification as it relates to identity theft a cost benefit analysis of transitioning the Department of Defense and Veterans Administration to a Military Identification Number /." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FOpria.pdf.
Full textThesis Advisor(s): William D. Hatch, William Gates. "March 2007." Includes bibliographical references (p. 73-76). Also available in print.
Maraska, Donald G. "An analysis of the use of the Social Security Number as Veteran Identification as it relates to identity theft : a cost benefit analysis of transitioning the Department of Defense and Veterans Administration to a Military Identification Number." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/3633.
Full textpayback period method, discounted payback period, benefit cost ratio, net present value, internal rate of return, and a probabilistic NPV were examined. Each methodâ s benefits and drawbacks are discussed and the findings are summarized. The CBA shows that the transition to a MIN is a cost effective solution with a Net Present Value that falls between $701 million and $554 million over a 10 year period.
Langkjaer, Jenny. "Övervakning för rikets säkerhet : Svensk säkerhetspolisiär övervakning av utländska personer och inhemsk politisk aktivitet, 1885–1922." Doctoral thesis, Stockholms universitet, Historiska institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-54782.
Full textSalters, Michael Jerome. "Computer virus security in the Department of the Navy." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23842.
Full textBooks on the topic "Department of Social Security"
Office, National Audit. Department of Social Security: Housing benefits. London: H.M.S.O., 1989.
Find full textOffice, National Audit. Department of Social Security: Resettlement Agency. London: H.M.S.O., 1992.
Find full textOffice, National Audit. Department of Social Security: Operational strategy. London: H.M.S.O., 1989.
Find full textGreat Britain. Department of Social Security. Social security research handbook. London: HMSO., 1991.
Find full textManagement, British Personnel. Department of Social Security: Local office addresses. London: British Personnel Management, 1991.
Find full textSecurity, Great Britain Department of Social. Opportunities in the Department of Social Security. London: Department of Social Security, 1990.
Find full textGreat Britain. Parliament. House of Commons. Committee of Public Accounts. Department of Social Security; appropriation accounts1991-92. London: HMSO, 1993.
Find full textOffice, National Audit. Appropriation Accounts 1998-99.: Department of Social Security. London: Stationery Office Books, 2000.
Find full textGreat Britain. Parliament. House of Lords. Select Committee on the Scrutiny of Delegated Powers. The Social Security (Incapacity forWork) Bill: With a memorandum from the Department of Social Security. London: HMSO, 1994.
Find full textGreat Britain. Parliament. House of Commons. Committee of Public Accounts. Department of Social Security: Support for lone parent families. London: H.M.S.O., 1990.
Find full textBook chapters on the topic "Department of Social Security"
Greer, Patricia. "The Department of Social Security and its Agencies." In Parliamentary Accountability, 191–202. London: Palgrave Macmillan UK, 1995. http://dx.doi.org/10.1007/978-1-349-13682-7_10.
Full textChen, Fang. "Human Resources and Social Security Department—Extra Compensation Payments." In Essential Knowledge and Legal Practices for Establishing and Operating Companies in China, 795–97. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2239-8_148.
Full textMautino, Kathrin. "Department of Homeland Security." In Encyclopedia of Immigrant Health, 535–36. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4419-5659-0_201.
Full textPugh, Elisabeth. "The children's department." In Social Work in Child Care, 96–111. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003370307-8.
Full textBencivenga, Jennifer. "Department of Homeland Security (DHS)." In Encyclopedia of Security and Emergency Management, 1–6. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_150-1.
Full textBencivenga, Jennifer. "Department of Homeland Security (DHS)." In Encyclopedia of Security and Emergency Management, 229–35. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_150.
Full textBwalya, Martin, Saidi Mkomwa, Reynolds Shula, Simon Lugandu, and Amir Kassam. "The future: towards agenda 2063." In Conservation agriculture in Africa: climate smart agricultural development, 469–73. Wallingford: CABI, 2022. http://dx.doi.org/10.1079/9781789245745.0030.
Full textAdams, Robert. "Social Security." In Social Policy for Social Work, 37–54. London: Macmillan Education UK, 2002. http://dx.doi.org/10.1007/978-0-230-80178-3_2.
Full textLowe, Rodney. "Social Security." In The Welfare State in Britain since 1945, 122–62. London: Macmillan Education UK, 1993. http://dx.doi.org/10.1007/978-1-349-22549-1_6.
Full textAlcock, Pete. "Social Security." In Social Policy in Britain, 17–33. London: Macmillan Education UK, 2008. http://dx.doi.org/10.1007/978-0-230-22916-7_2.
Full textConference papers on the topic "Department of Social Security"
Shi, Tuo, and Yutong Wu. "Research on the Deep Integration of 5G Technology and Social Security Management of Police Department." In ICCNS 2021: 2021 the 11th International Conference on Communication and Network Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3507509.3507522.
Full textTierney, Barbara G., and Corinne Bishop. "Dual-Campus Subject Librarians at University of Central Florida." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317186.
Full textAl-Hamad, Eiman Abdulla. "Qatar Meteorology Department Security Enhancement Recommendations." In Qatar Foundation Annual Research Conference Proceedings. Hamad bin Khalifa University Press (HBKU Press), 2018. http://dx.doi.org/10.5339/qfarc.2018.ictpd29.
Full textManjunath, VN, Anirudh Madhugiri, and KR Anil Kumar. "Penetration of Social Networking in the Society." In Department of Information Science and Technology. Singapore: Research Publishing Services, 2015. http://dx.doi.org/10.3850/978-981-09-4426-1_077.
Full textArias, Carlos Roberto, Jose Evelio Serrano, and Jorge Garcia. "Evaluation of social public policy: Department of social development in Honduras." In 2014 First International Conference on eDemocracy & eGovernment (ICEDEG). IEEE, 2014. http://dx.doi.org/10.1109/icedeg.2014.6819969.
Full textZhou, Yingzhen, and Jiangwei Li. "The Department-based Job Duties Analysis." In International Academic Workshop on Social Science (IAW-SC-13). Paris, France: Atlantis Press, 2013. http://dx.doi.org/10.2991/iaw-sc.2013.245.
Full textPatil, Ravirajkumar, E. Naresh, and B. P. Vijaya Kumar. "Data Storage and Security Techniques in Cloud Environment." In Department of Information Science and Technology. Singapore: Research Publishing Services, 2015. http://dx.doi.org/10.3850/978-981-09-4426-1_052.
Full textXuyi, Zhang, V. Haripriya, G. Sowmyashri, and S. Vadiraj. "Impact of E-Commerce: Security and its Solutions." In Department of Information Science and Technology. Singapore: Research Publishing Services, 2015. http://dx.doi.org/10.3850/978-981-09-4426-1_124.
Full text"Department of Homeland Security control systems security program - ICS-CERT Overview." In 2012 Integrated Communications, Navigation and Surveillance Conference (ICNS). IEEE, 2012. http://dx.doi.org/10.1109/icnsurv.2012.6218507.
Full textBaldwin, Jennifer, and Yvonne Coady. "Social security." In the 12th Annual Conference of the New Zealand Chapter of the ACM Special Interest Group. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2000756.2000759.
Full textReports on the topic "Department of Social Security"
Cover, M. E. Elimination of Social Security Numbers for Identification Within the Department of Defense. Fort Belvoir, VA: Defense Technical Information Center, February 2005. http://dx.doi.org/10.21236/ada499015.
Full textFeldstein, Martin, and Jeffrey Liebman. Social Security. Cambridge, MA: National Bureau of Economic Research, September 2001. http://dx.doi.org/10.3386/w8451.
Full textGeanakoplos, John, Olivia Mitchell, and Stephen Zeldes. Social Security Money's Worth. Cambridge, MA: National Bureau of Economic Research, May 2000. http://dx.doi.org/10.3386/w6722.
Full textCoile, Courtney, and Jonathan Gruber. Social Security and Retirement. Cambridge, MA: National Bureau of Economic Research, August 2000. http://dx.doi.org/10.3386/w7830.
Full textMulligan, Casey, Ricard Gil, and Xavier Sala-i-Martin. Social Security and Democracy. Cambridge, MA: National Bureau of Economic Research, May 2002. http://dx.doi.org/10.3386/w8958.
Full textBoldrin, Michele, Mariacristina De Nardi, and Larry Jones. Fertility and Social Security. Cambridge, MA: National Bureau of Economic Research, February 2005. http://dx.doi.org/10.3386/w11146.
Full textCaplin, Andrew, Eungik Lee, Søren Leth-Petersen, and Johan Sæverud. Communicating Social Security Reform. Cambridge, MA: National Bureau of Economic Research, November 2022. http://dx.doi.org/10.3386/w30645.
Full textHurst, Erik, and Paul Willen. Social Security and Unsecured Debt. Cambridge, MA: National Bureau of Economic Research, February 2004. http://dx.doi.org/10.3386/w10282.
Full textKotlikoff, Laurence, Kent Smetters, and Jan Walliser. Social Security: Privatization and Progressivity. Cambridge, MA: National Bureau of Economic Research, February 1998. http://dx.doi.org/10.3386/w6428.
Full textMulligan, Casey, and Xavier Sala-i-Martin. Gerontocracy, Retirement, and Social Security. Cambridge, MA: National Bureau of Economic Research, May 1999. http://dx.doi.org/10.3386/w7117.
Full text