Dissertations / Theses on the topic 'Private security services – England'

To see the other types of publications on this topic, follow the link: Private security services – England.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Private security services – England.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Liyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.

Full text
Abstract:
Abstract Ethernet based VPLS (Virtual Private LAN Service) is a transparent, protocol independent, multipoint L2VPN (Layer 2 Virtual Private Network) mechanism to interconnect remote customer sites over IP (Internet Protocol) or MPLS (Multiprotocol Label Switching) based provider networks. VPLS networks are now becoming attractive in many Enterprise applications, such as DCI (data center interconnect), voice over IP (VoIP) and videoconferencing services due to their simple, protocol-independent and cost efficient operation. However, these new VPLS applications demand additional requirements, such as elevated security, enhanced scalability, optimum utilization of network resources and further reduction in operational costs. Hence, the motivation of this thesis is to develop secure and scalable VPLS architectures for future communication networks. First, a scalable secure flat-VPLS architecture is proposed based on a Host Identity Protocol (HIP). It contains a session key-based security mechanism and an efficient broadcast mechanism that increase the forwarding and security plane scalability of VPLS networks. Second, a secure hierarchical-VPLS architecture is proposed to achieve control plane scalability. A novel encrypted label-based secure frame forwarding mechanism is designed to transport L2 frames over a hierarchical VPLS network. Third, a novel Distributed Spanning Tree Protocol (DSTP) is designed to maintain a loop free Ethernet network over a VPLS network. With DSTP it is proposed to run a modified STP (Spanning Tree Protocol) instance in each remote segment of the VPLS network. In addition, two Redundancy Identification Mechanisms (RIMs) termed Customer Associated RIMs (CARIM) and Provider Associated RIMs (PARIM) are used to mitigate the impact of invisible loops in the provider network. Lastly, a novel SDN (Software Defined Networking) based VPLS (Soft-VPLS) architecture is designed to overcome tunnel management limitations in legacy secure VPLS architectures. Moreover, three new mechanisms are proposed to improve the performance of legacy tunnel management functions: 1) A dynamic tunnel establishment mechanism, 2) a tunnel resumption mechanism and 3) a fast transmission mechanism. The proposed architecture utilizes a centralized controller to command VPLS tunnel establishment based on real-time network behavior. Hence, the results of the thesis will help for more secure, scalable and efficient system design and development of VPLS networks. It will also help to optimize the utilization of network resources and further reduction in operational costs of future VPLS networks
Tiivistelmä Ethernet-pohjainen VPLS (Virtual Private LAN Service) on läpinäkyvä, protokollasta riippumaton monipisteverkkomekanismi (Layer 2 Virtual Private Network, L2VPN), jolla yhdistetään asiakkaan etäkohteet IP (Internet Protocol)- tai MPLS (Multiprotocol Label Switching) -yhteyskäytäntöön pohjautuvien palveluntarjoajan verkkojen kautta. VPLS-verkoista on yksinkertaisen protokollasta riippumattoman ja kustannustehokkaan toimintatapansa ansiosta tullut kiinnostavia monien yrityssovellusten kannalta. Tällaisia sovelluksia ovat esimerkiksi DCI (Data Center Interconnect), VoIP (Voice over IP) ja videoneuvottelupalvelut. Uusilta VPLS-sovelluksilta vaaditaan kuitenkin uusia asioita, kuten parempaa tietoturvaa ja skaalautuvuutta, optimaalista verkkoresurssien hyödyntämistä ja käyttökustannusten pienentämistä entisestään. Tämän väitöskirjan tarkoituksena onkin kehittää turvallisia ja skaalautuvia VPLS-arkkitehtuureja tulevaisuuden tietoliikenneverkoille. Ensin väitöskirjassa esitellään skaalautuva ja turvallinen flat-VPLS-arkkitehtuuri, joka perustuu Host Identity Protocol (HIP) -protokollaan. Seuraavaksi käsitellään istuntoavaimiin perustuvaa tietoturvamekanismia ja tehokasta lähetysmekanismia, joka parantaa VPLS-verkkojen edelleenlähetyksen ja tietoturvatason skaalautuvuutta. Tämän jälkeen esitellään turvallinen, hierarkkinen VPLS-arkkitehtuuri, jolla saadaan aikaan ohjaustason skaalautuvuus. Väitöskirjassa kuvataan myös uusi salattu verkkotunnuksiin perustuva tietokehysten edelleenlähetysmekanismi, jolla L2-kehykset siirretään hierarkkisessa VPLS-verkossa. Lisäksi väitöskirjassa ehdotetaan uuden Distributed Spanning Tree Protocol (DSTP) -protokollan käyttämistä vapaan Ethernet-verkkosilmukan ylläpitämiseen VPLS-verkossa. DSTP:n avulla on mahdollista ajaa muokattu STP (Spanning Tree Protocol) -esiintymä jokaisessa VPLS-verkon etäsegmentissä. Väitöskirjassa esitetään myös kaksi Redundancy Identification Mechanism (RIM) -mekanismia, Customer Associated RIM (CARIM) ja Provider Associated RIM (PARIM), joilla pienennetään näkymättömien silmukoiden vaikutusta palveluntarjoajan verkossa. Viimeiseksi ehdotetaan uutta SDN (Software Defined Networking) -pohjaista VPLS-arkkitehtuuria (Soft-VPLS) vanhojen turvallisten VPLS-arkkitehtuurien tunnelinhallintaongelmien poistoon. Näiden lisäksi väitöskirjassa ehdotetaan kolmea uutta mekanismia, joilla voidaan parantaa vanhojen arkkitehtuurien tunnelinhallintatoimintoja: 1) dynaaminen tunnelinluontimekanismi, 2) tunnelin jatkomekanismi ja 3) nopea tiedonsiirtomekanismi. Ehdotetussa arkkitehtuurissa käytetään VPLS-tunnelin luomisen hallintaan keskitettyä ohjainta, joka perustuu reaaliaikaiseen verkon käyttäytymiseen. Tutkimuksen tulokset auttavat suunnittelemaan ja kehittämään turvallisempia, skaalautuvampia ja tehokkaampia VLPS järjestelmiä, sekä auttavat hyödyntämään tehokkaammin verkon resursseja ja madaltamaan verkon operatiivisia kustannuksia
APA, Harvard, Vancouver, ISO, and other styles
2

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Dae Woon. "Policing Private Security: A Comparative Study of Security Industry Regulation in Queensland and New South Wales." Thesis, Griffith University, 2015. http://hdl.handle.net/10072/365250.

Full text
Abstract:
Over the past 50 years, the private security industry has entered a remarkable mass-growth phase, which has by no means come to an end. However, this increasing prominence has coincided with an upsurge in the number of scandalous events and adverse incidents associated with security providers. These include long-term chronic problems with violence, insider crime, fraud in contracting, and poor service standards. In the space of five decades, the importance and expansion of the size and role of private security have led licensing authorities in many countries to introduce special legislation to govern its growth and development, and Australia is no exception. Since the 1980s, the security industry regulatory regime in Australia has undergone a wave of licensing reforms as a response to recurring and emerging issues. The present study covers the transitional period of the 1970s-2000s and assesses four phases of development pathways: the pre-reform era (1970s); the first phase of reform (1980s-90s); the second phase of reform (2000s); and the ‘unfinished business era’ (2000s-present). The objective of this study is to review the progression of industry-specific regulations in-depth, presenting an inventory of licensing framework across Queensland and New South Wales with cross-jurisdictional input.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Criminology and Criminal Justice
Arts, Education and Law
Full Text
APA, Harvard, Vancouver, ISO, and other styles
4

Hamilton, Sheilah Elizabeth. "Private security and government : a Hong Kong perspective, 1841-1941 /." Thesis, Click to view the E-thesis via HKUTO, 1999. http://sunzi.lib.hku.hk/hkuto/record/B42575102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Neple, Pernille. "The regulation of mercenary and private security-related activites under South African law compared to other legislations and conventions /." Link to online version, 2008. http://hdl.handle.net/10019/1603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Janaby, Mohamad. "The legal regime applicable to private military and security company personnel in armed conflicts." Thesis, University of Aberdeen, 2015. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=228981.

Full text
Abstract:
Private military and security companies (PMSCs) have been extensively used to provide military and security services in various armed conflicts. Aspects of their use have generated concerns that the personnel of these companies are no more than modern mercenaries. This thesis clarifies the legal regime applicable to such companies in armed conflicts. This regime includes both the legal status and legal regulation of PMSC personnel. The aim of this thesis is not to create a new status for PMSC personnel, but to clarify which of the existing legal statuses adopted by international humanitarian law (IHL) can apply to them. This status relies completely on the actors to whom these companies supply their services, and the sort of mission in which they are involved. This approach is not employed in the literature. Most attention has been paid to the use of PMSCs by States. This is not, however, the only scenario whereby PMSCs become engaged in armed conflicts. PMSCs provide their services to other actors such as the United Nations (UN), Non-Governmental Organisations (NGOs) and armed groups. Consequently, one definitive status cannot be applied in all situations. Different types of status can be applied in accordance with the nature of the particular PMSC involvement in armed conflicts. Accordingly, the three statuses established by IHL can apply to PMSC personnel; namely those of “mercenary”, “combatant” and “civilian”. Two environments classify the personnel of PMSCs as mercenaries; this is when they provide their services to a State party to an international armed conflict and to an armed group in non-international armed conflicts. Mercenary status is not applicable to the use of PMSCs in UN peacekeeping operations or providing protection to NGOs, because in both circumstances neither can be considered as a party to an armed conflict. PMSC personnel can be categorised as “combatants” when hired to provide their services to States and when they are used as UN peacekeepers. They are most likely to be classified as “civilians” if they are not “combatants”. There are two types of civilians; “civilians accompanying armed forces of a party to an armed conflict”, and “normal civilians”. The former categorisation only applies in international armed conflict, while the latter can apply to all other PMSC involvement in armed conflicts. Appropriate regulation of PMSCs depends on the legal status of their personnel. Therefore, this thesis asserts that IHL can regulate the activities of PMSCs. Additionally, international human rights law can apply to PMSCs and their personnel.
APA, Harvard, Vancouver, ISO, and other styles
7

Chapsos, I. "The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case study." Thesis, Coventry University, 2014. http://curve.coventry.ac.uk/open/items/4d43bb00-e16b-4326-aaa8-3ef5ec5026ac/1.

Full text
Abstract:
This thesis examines the expansion of private maritime security provision, its regulation and implications for national and global security. The main research question addressed is: How are private maritime security companies (PMSCs) regulated in the context of the contemporary trend towards international security privatisation? However, further questions stem from this: Is the complex framework of the PMSCs’ business model adequately regulated? To what extent could the existing practices and regulatory framework affect international security in governance and policy, strategic, social and commercial terms? Qualitative research methods were used, strongly supported by empirical data collection – available due to extensive professional experience and personal engagement of the author with the private maritime security industry. Using a case study of PMSCs’ operations off Somalia from 2005-2013, and a plethora of selected data from primary sources and semi-structured interviews, the paper argues that there is need for more effective regulation of PMSCs and the establishment of international standards. Following an analysis of the current conceptual framework of private security, focussing particularly on maritime security, in the context of contemporary academic literature and professional practice, the paper provides a detailed theoretical justification for the selection of the methodology used. After broadening and deepening the analysis of the privatisation of security ashore, the concerns raised are then transferred to the maritime domain. The situation becomes even more complicated in the high seas due to inconsistencies between flag states’ regulations, the unregulated vastness of the oceans and the reluctance of any international body (such as the IMO) to undertake the essential task of regulating PMSCs. Building on this, an analytical framework that enables the integration of maritime security and contemporary piracy into the contemporary paradigm of global security is developed. An historical overview of piracy then demonstrates that modern piracy is an ancient phenomenon with contemporary local characteristics. The maritime crime’s causal factors remain more or less the same throughout human history and, the paper argues, PMSCs serve as a short term response to address the symptoms rather than the root causes. Given that PMSCs have so far been used primarily as measures against Somali piracy, activities in this specific region provide an appropriate case study. The development of a typology of piracy offers a deeper understanding of the regional distinctiveness of the phenomenon, which is essential to acquiring a holistic picture of the operational environment in which PMSCs are deployed. The above considerations are used as a basis for analysing the complexities of the PMSCs’ business model, in legal, operational and ethical terms. The questionable practices involved in these are not fully regulated by national states. Hence, their contract and deployment raise ethical, legal and operational concerns. In the penultimate chapter, these are further assessed in terms of the extent to which the existing regulatory framework and PMSCs’ practices affect international security in governance and policy, strategic, social and commercial terms. The research indicates that states are increasingly outsourcing the monopoly they have exercised in security provision - a trend that has also expanded the private sector’s activities and business at sea. However, the lack of international laws and the consequent unstandardized plethora of flag states’ regulations has meant that the burgeoning private security services are dependent on the global market to regulate themselves. States’ reluctance and/or inability to regulate these companies has allowed controversial practices to persist and the lack of an international body responsible for their regulation and vetting on a worldwide basis has inevitable consequences in terms of global security. The overall outcome of this thesis is an elucidation of the potential implications of the privatisation of maritime security - both positive and negative. Most significantly, it suggests this could present a significant threat to international security in the near future.
APA, Harvard, Vancouver, ISO, and other styles
8

Collins, Kevin G. "America's mercenaries war by proxy /." Fort Leavenworth, KS : U.S. Army Command and General Staff College, 2006. http://handle.dtic.mil/100.2/ADA479409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ralby, Ian McDowell. "Private military and security companies in the uncharted spaces of the law." Thesis, University of Cambridge, 2012. https://www.repository.cam.ac.uk/handle/1810/252261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Storch, Thomas. "Private Sicherheitsdienste und Waffenrecht /." Frankfurt am Main [u.a.] : Lang, 2001. http://www.gbv.de/dms/sbb-berlin/323796885.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Penxa, Vuyelwa Toni. "The implementation of the statutory framework for skills development a case study of the private security sub-sector /." Thesis, Pretoria : [s.n.], 2009. http://upetd.up.ac.za/thesis/available/etd-09262009-094655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hillary, Gama Samuel Amule. "Mercenarism and the curbing of mercenary activity in Africa, 1990 to 2005 selected case studies /." Pretoria : [S.n.], 2010. http://upetd.up.ac.za/thesis/available/etd-03112010-124730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Roberts, Ruth. "The role of military companies in African conflicts." Thesis, Stellenbosch : University of Stellenbosch, 2007. http://hdl.handle.net/10019.1/2187.

Full text
Abstract:
Thesis (MA (Political Science))--University of Stellenbosch, 2007.
Private military companies (PMCs)are increasing becoming involved in modern conflicts providing specialised skills such as combat services, planning, intelligence, training, support and technical assistance. They provide an alternative to weak state governments as Western governments have become increasingly reluctant to commit their troops to be involved in the civil conflicts of the developing world. Supporters of the employment of private forces see them as an effective solution to this combination of need from conflict-ridden weak states and reluctance of Western governments and international organisations to intervene in these conflicts ...
APA, Harvard, Vancouver, ISO, and other styles
14

Holager, Emma. "The impact of the private security industry on peace-building efforts in Africa : an assessment of Executive Outcomes, MPRI and DynCorp." Thesis, Stellenbosch : University of Stellenbosch, 2011. http://hdl.handle.net/10019.1/6866.

Full text
Abstract:
Thesis (MA)--University of Stellenbosch, 2011.
ENGLISH ABSTRACT: The emergence and rapid growth of the private security industry in the 1990s followed from the downsizing of the armed forces in the aftermath of the Cold War and the development of new security threats which increased demand for military manpower and expertise. This has led to a redefinition of security strategies and the restructuring of armed forces by Western governments, which has resulted in the elimination of non-core activities from the functions of many armed forces. Recently it has been argued that the private security industry can challenge what previously was believed to be a primary responsibility of states, namely to take on peacebuilding initiatives and support to other peace operations. This study seeks to assess the impact of the private security industry in peacebuilding efforts in African conflicts. The study suggests that the private security industry have taken on a much stronger role in conflicts world wide since the 1990s, and that its activities have significantly changed. Companies such as MPRI and DynCorp have managed to keep close contact with their home governments, which arguably has been a crucial factor to their growing business. Furthermore, the private security industry have sought to distance itself from the negative connotations associated with mercenaries and the activities of companies such as Executive Outcomes in the 1990s, by avoiding operations involving elements of direct combat. This has been illustrated through the extensive case study of the activities of three private military and security companies: Executive Outcomes, MPRI and DynCorp. Furthermore, this thesis has confirmed an increased presence of the United States on the African continent post-9/11, illustrated by the presence of American-based private military and security companies which arguably are being used as proxies for US foreign policy purposes. Furthermore, this study has discussed the various implications the private security industry has on the traditional notion of the state’s monopoly on the legitimate use of force. This thesis has argued that the legitimate use to exercise violence is in the process of devolution from governments to other actors, which the extensive growth of the private security industry illustrates. Additionally, it has been argued that the privatisation of military and security services can harm the reliable delivery of essential services in conflict. Furthermore, the findings of this thesis has highlighted the dilemma that many countries do not want stricter regulation or elimination of the private security industry for the reason that these companies are viewed as valuable assets in fulfilling foreign policy objectives that for various reasons cannot be fulfilled by national armies.
AFRIKAANSE OPSOMMING: Die opkoms en vinnige groei van die privaatsekuriteitsbedryf in die 1990s was die gevolg van die afskaling van gewapende magte in die nasleep van die Koue Oorlog en die ontwikkeling van nuwe sekuriteitsbedreigings, wat die aanvraag na militêre arbeidskragte en kundigheid verhoog het. Dit het aanleiding gegee tot ’n herdefiniëring van sekuriteitstrategieë en die herstrukturering van gewapende magte deur Westerse regerings, met die gevolg dat niekernaktiwiteite van die funksies van talle gewapende magte uitgesluit is. Daar is onlangs aangevoer dat die privaatsekuriteitsbedryf aanspraak kan maak op ’n funksie wat voorheen as die primêre verantwoordelikheid van regerings beskou is, naamlik om vredesinisiatiewe en steun aan ander vredesverrigtinge te onderneem. Die doel van hierdie studie was om die impak van die privaatsekuriteitsbedryf in vredesinisiatiewe in Afrika-konflikte te assesseer. Daar word aan die hand gedoen dat die privaatsekuriteitsbedryf sedert die 1990’s ’n baie groter rol in wêreldwye konflikte gespeel het, en dat die aktiwiteite van hierdie bedryf aanmerklik verander het. Maatskappye soos MPRI en DynCorp was suksesvol daarin om nabye kontak met hul tuisregerings te behou, wat stellig ’n deurslaggewende faktor in hul groeiende besighede was. Voorts het die privaatsekuriteitsbedryf gepoog om hom te distansieer van die negatiewe konnotasies wat met huursoldate en die aktiwiteite van maatskappye soos Executive Outcomes in die 1990’s geassosieer is deur bedrywighede wat elemente van direkte stryd inhou, te vermy. Hierdie poging is geïllustreer deur die omvattende gevallestudie van die aktiwiteite van drie privaat militêre en sekuriteitsmaatskappye: EO, MPRI en DynCorp. Die bevindinge van die studie bevestig voorts die Verenigde State van Amerika (VSA) se toenemende teenwoordigheid op die Afrika-vasteland ná 9/11, wat duidelik blyk uit die teenwoordigheid van Amerikaansgebaseerde privaat militêre en sekuriteitsmaatskappye wat stellig as volmag gebruik word vir die VSA se buitelandsebeleidsdoelstellings. Die verskeie implikasies van die privaatsekuriteitsbedryf vir die tradisionele siening van die regerings se monopolie ten opsigte van die wettige gebruik van magte word ook in die studie bespreek. Daar word aangevoer dat die wettige gebruik van geweld in die proses van devolusie is vanaf regerings na ander rolspelers, wat deur die omvattende groei van die privaatsekuriteitsbedryf bevestig word. Daar word verder ook beweer dat die privatisering van militêre en sekuriteitsdienste die betroubare lewering van noodsaaklike dienste tydens konflik kan benadeel. Die studie se bevindinge werp ook lig op die dilemma dat talle lande strenger regulering of uitskakeling van die privaatsekuriteitsbedryf teëstaan omdat hierdie maatskappye beskou word as waardevolle bates in die bereiking van buitelandsebeleidsdoelwitte, wat vir verskeie redes nie deur nasionale leërs bereik kan word nie.
APA, Harvard, Vancouver, ISO, and other styles
15

Al, Mesaferi Saif. "Le contrat de sécurité privée en droit français et émirati." Thesis, Paris 1, 2018. http://www.theses.fr/2018PA01D014.

Full text
Abstract:
La question de la sécurité privée est un sujet d'actualité. Ce secteur en pleine expansion a fait l'objet de réglementations ces dernières décennies. Sa particularité tient en la privatisation d'un domaine régalien de l'intervention étatique. La sécurité privée pose ainsi la problématique du traitement de la mission de sécurité. Si le secteur privé investit de plus en plus le domaine de la sécurité, il se différencie du secteur public. La participation du secteur privé s'effectue par voie contractuelle qui obéit pour partie de ses aspects au droit commun, malgré l'objectif de maintien de l’ordre public
The issue of private security is a hot topic. This rapidly expanding sector has been the subject of regulations in recent decades. Its peculiarity lies in the privatization of a sovereign domain reserved for state intervention. Private security then poses the problem of processing the security mission. We note that the private sector is investing more and more in the field of security while differentiating itself from the public sector. The participation of the private sector is done by contract which obeys most of its aspects in common law
APA, Harvard, Vancouver, ISO, and other styles
16

Neple, Pernille. "The regulation of mercenary and private security-related activities under South African law compared to other legislations and conventions." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/1896.

Full text
Abstract:
Thesis (MA (Political Science))--Stellenbosch University, 2008.
Private Military and Security Companies (PMSCs) have become increasingly important actors since the end of the Cold War. They provide a wide range of services and are therefore difficult to classify. Many view them as new front companies for mercenaries, which this thesis argues is not the case. Few states have put in place legislation to deal with the problems caused by these companies, and they are therefore generally not accountable to states. This is problematic because their services are within an area where states have traditionally had monopoly. This thesis studies the new South African legislation, the Prohibition of Mercenary Activities and Regulation of Certain Activities in Country of Armed Conflict Act of 2006, which was put in place in order to ban mercenaries and regulate the services offered by the private military and security companies based in the country. By comparing it to the older South African legislation, the thesis evaluates the extent to which the new legislation has been able to close loopholes inherent in the old legislation. The new South African legislation is also compared to the international conventions which bans mercenaries. By banning these actors, South Africa is very much in line with the international community when it designed the conventions. However, PNSCs are not mercenaries. The thesis then compares the new South African legislation to the domestic regulation in place in the United States of America. It finds that despite having many of the same weaknesses as the South African legislation, it is more likely that the American regulation will be abided by than the South African. This is due to the positive relationship between the US government and American PMSCs, and the fact that the government is a major client of the companies. South Africa does not enjoy the same positive relationship with its companies. Finally, the new South African legislation is compared to the UK Green Paper of 2002, which presented options of how to deal with the companies. The ban on mercenaries put in place by the new South African legislation was discouraged in the Green Paper. The licensing regime (as in the USA) that was proposed by the Green Paper, however, is similar to the authorisation scheme established in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
17

Lopes, Cleber da Silva. "O controle da segurança privada no Brasil: um estudo das condições que geram controle de acordo com o interesse público." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/8/8131/tde-29102012-124601/.

Full text
Abstract:
Este estudo analisa o controle das empresas e profissionais de segurança privada no Brasil. A questão mais importante em relação ao controle da segurança privada é saber se é possível assegurar que o policiamento provido por esse setor seja executado de acordo com as regras públicas. A única forma de obter serviços aderentes a essas regras é fazer com que elas sejam levadas em consideração pelos profissionais que executam as atividades de policiamento privado. Estudiosos do policiamento concordam que os mecanismos mais capazes de produzir esses resultados estão localizados no interior das organizações. Levando isso em consideração, o objetivo desta tese de doutorado é entender as condições sob as quais as organizações de policiamento privado controlam seus funcionários de acordo com as normas públicas que regulam a prestação de serviços de segurança privada no Brasil. A hipótese que orienta o estudo é a de que esse controle ocorre quando as empresas de segurança percebem a existência de um ambiente institucional na qual os atores que exercem o controle externo da segurança privada (clientes, órgão regulador, Judiciário e mídia) são capazes de fazer com que comportamentos desviantes em relação às normas públicas sejam mais custosos para as empresas do que os investimentos necessários à estruturação de sistemas de controle interno aptos a prevenir tais comportamentos. Para avaliar essa hipótese foram realizados estudos de caso em quatro contratos de prestação de serviços de segurança, dois contratos para instituições financeiras e dois contratos para redes comerciais. A análise dos casos revelou que o modo como as empresas de segurança controlam internamente os seus funcionários é fortemente afetado apenas pelo controle externo realizado pelos clientes que contratam serviços de segurança no mercado. Quando os clientes remuneram contratos de prestação de serviços adequadamente e se interessam por condutas respeitosas, criam-se condições para a existência de sistemas de controle altamente estruturados e alinhados às regras públicas. O contrário também é verdade. Se os clientes não remuneram contratos adequadamente e desejam comportamentos desviantes em relação às normas públicas, o resultado tende a ser sistemas de controle interno com baixo grau de estruturação e alinhamento às regras públicas. Diante deste último cenário, a pesquisa mostrou que na maioria das situações os controles externos provenientes do órgão regulador, do Judiciário e da mídia não são capazes de atuar satisfatoriamente como última linha de defesa e correção de rumos. Esses achados apóiam as visões pessimistas presentes na literatura especializada, que vem sustentando a idéia de que existem déficits de governança e controle sobre as atividades de policiamento privado.
This work analyzes the control over Brazils private security companies and agents. The most important issue in relation to the control over private security is to know if it is possible to ensure that the policing provided by this sector is run in accordance with public rules. The only way to get security services following these rules is to ensure they are abided by the agents who perform private policing activities. Scholars of policing agree that the control mechanisms better able to produce these results are located within organizations. Taking this into consideration, the aim of this doctoral thesis is to understand the conditions under which private security companies control their employees in accordance with the public rules governing the provision of private security services in Brazil. The hypothesis that guides the study is that this control occurs when security companies realize the existence of an institutional environment in which those exerting external control over private security (customer, regulator, judiciary and media) capable of cause deviant behavior in relation to public standards are more costly for companies than the investment required to structuring internal control system able to prevent such behaviors. To evaluate this hypothesis four security services contracts underwent case studies, two from financial institutions and two contracts from department store chains. The analysis of the cases revealed that the way private security companies control internally their employees is strongly affected only by clients who hire these services. When clients adequately pay for a service contracted and they require proper care and respectful behavior, they create conditions for the existence of internal control systems highly structured and aligned to government rules. The opposite is also true. If clients do not pay for the contract properly and request a deviant behavior in relation to public standards, the result tends to be of internal control systems with a low degree of structure and alignment. In the face of this last scenario, the research showed that in most situations the external controls from the regulator, the judiciary and the media are not able to satisfactorily perform as a last line of defense and course corrections. These findings support the pessimistic views present in the literature, which have sustained the idea that there are governance deficits in activities of private policing.
APA, Harvard, Vancouver, ISO, and other styles
18

Aït, Youssef Driss. "Sécutrité privée et libertés." Thesis, Nice, 2015. http://www.theses.fr/2015NICE0034/document.

Full text
Abstract:
La sécurité privée a connu un développement économique relativement important dans les années 70. Cette montée en puissance incontrôlée a généré des faits graves impliquant des agents de sécurité privée. C'est à la suite de ces évènements que le législateur a été contraint de réguler une première fois cette activité par la loi du 12 juillet 1983. Cette loi reste 30 ans plus tard, la réglementation de référence pour le secteur. Aujourd’hui, les menaces pesant sur la société ont évolué pour devenir plus violentes. Par ailleurs, la puissance publique opère, faute de moyens financiers, un recentrage vers des missions dites plus prioritaires. Cela se traduit par le transfert de nouvelles responsabilités au secteur privé de la sécurité. Dès lors, la question de la préservation des libertés apparaît comme un sujet essentiel. En effet, certains agents disposent de pouvoirs potentiellement liberticides (des palpations de sécurité ou l’inspection et la fouille de bagages) à l’image des agents de sûreté aéroportuaire. Pour encadrer le développement de ce secteur, le législateur a créé une instance chargée du contrôler ces activités. Toutefois, l’encadrement de cette profession demeure insuffisant au regard des nouveaux transferts envisagés par la puissance publique. La professionnalisation par la formation des acteurs constitue, par conséquent, une garantie importante des libertés. C’est d’ailleurs pour cette raison que le législateur a décidé récemment d’inclure cette activité dans le livre VI du code de la sécurité intérieure. La sécurité privée participe, aujourd’hui, à des missions de sécurité intérieure aux côtés des forces de sécurité publique et ce dans le respect des libertés
The economic growth of the private security sector has been relatively important during the 70s. This rapid but uncontrolled development has however generated important problems implicating private security personnel. In order to respond to these problems, the legislator was forced to regulate the sector through the law of July 12th 1983. Thirty years later, the 1983 law remains the sector’s rules of reference. Today, threats on modern societies have evolved and become more violent. Furthermore, due to a lack of economic resources, public authorities have reduced the range of security mission they’ll undertake to focus solely on high priority issues. As a consequence, new responsibilities have been transferred to private security actors. In this context, the safeguard of individual liberties appears has an important topic. For example, private security agents operating at airports have been granted rights (body check and luggage searches) that interfere with people’s freedom. To regulate the sector’s development, the legislator has created a structure to control these activities. Despite this effort, regulations remains insufficient especially has more missions are transferred by the State to private security actors. As a result, reinforcing training programs for these private actors constitute an important step towards maintaining people’s rights. It is the reason behind the Legislator decision to include training programs in book VI of domestic security laws. Today, private security actors participate actively in domestic security missions alongside public security forces while respecting individual liberties
APA, Harvard, Vancouver, ISO, and other styles
19

Paulin, Cédric. "Vers une politique publique de la sécurité privée?Réguler la sécurité privée (1983-2014)." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLV077/document.

Full text
Abstract:
La création, en 2011-2012, du Conseil national des activités privées de sécurité (CNAPS), nouvelle agence parapublique chargée de la régulation et du contrôle de la sécurité privée réglementée, a été perçue, tant par les professionnels du secteur que par les autorités publiques et même politiques (« révolution du secteur trente ans après la loi de 1983 »), comme une réforme fondamentale répondant aux évolutions de la sécurité privée. Cette réforme, qui intervient 30 ans après la première loi, celle du 12 juillet 1983, dite fondatrice en matière de sécurité privée, n’en est-elle qu’un lointain avenant ? Elle nécessite de réinterroger, après les avoir d’abord construites, les deux termes de l’articulation entre l’Etat et la sécurité privée, à savoir la régulation de la sécurité privée et la coproduction public/privé de la sécurité, jusqu’à poser la question de l’existence d’une politique publique de la sécurité privée.Associée à la création de la Délégation interministérielle à la sécurité privée (DISP) en 2010, devenue Délégation aux coopérations de sécurité en 2014, la question du sens et de la portée de ces évolutions administratives se pose : pourquoi et comment l’Etat en est-il arrivé à mettre en place une nouvelle régulation de la sécurité privée ? Comment qualifier et caractériser cette « régulation » ? Quelle est sa nature et quels sont les premiers résultats ?Dans le cadre de l’analyse cognitive de l’action publique, le registre de la traduction sera un outil théorique utile pour comprendre les modalités d’avancée de ces réformes.Un prologue définissant la place du chercheur dans l’objet d’étude et un épilogue dépassant la chronologie de l’étude (post-2014) contextualisent un peu plus largement, enfin, cette analyse sociologique de l’action publique
The creation, in 2011-2012, of the National Council for Private Security Activities (CNAPS), a new parastatal agency in charge of regulating and controlling regulated private security, was perceived by professionals in the sector and By public and even political authorities ("the sector revolution thirty years after the 1983 Act"), as a fundamental reform for all the problems of the private security sector.Associated with the creation of the Interministerial Delegation for Private Security (DISP) in 2010, which became the Delegation for Security Cooperation in 2014, the question of the meaning and scope of these administrative developments arises: why and how the State managed to set up a new law enforcement for private security? How to describe and characterize this “law enforcement”? Which is its nature and what are the first results?The translation register, in a cognitive approach to public policy, will be a useful theoretical tool to understand the modalities of progress of these reforms.Is this reform, which takes place 30 years after the first law of 12 July 1983, the so-called founder in the field of private security, a distant endorsement? It needs to re-examine, after first constructing them, the two terms of the articulation between the State and private security, namely the public control of private security and public / private co-production of security up to raise the question of the existence of a public policy on private security.A prologue defining the place of the researcher in the object of study and an epilogue emerging from the chronology of the object (post-2014) contextualize a little more broadly, finally, this sociological analysis of public action
APA, Harvard, Vancouver, ISO, and other styles
20

Hayes, Read. "US store detectives : the relationship between individual characteristics and job performance." Thesis, University of Leicester, 2001. http://hdl.handle.net/2381/31257.

Full text
Abstract:
US retailers lose over $30 billion in merchandise annually. Merchants also suffer billions more in losses of cash, supplies, time, equipment, and growing civil liability costs. In order to control these losses, retail companies use a combination of people, programs, and systems. A review of the literature indicates specialised loss prevention employees are an important part of many asset protection programs.;A major interest of managers is improving the efficiency of their crime and loss control processes, including loss prevention store detective programs. Retail managers commonly use job performance reviews to gauge the individual efficacy of store detectives. In addition to job training, and job output supervision, research has indicated certain stable characteristics of individuals helps explain actual job performance, making pre-employment selection a critical part of process improvement. However, relatively little attention has been devoted to the selection of in-store detectives in the literature.;Qualitative research was used to identify critical job tasks in order to develop and validate a specialised job performance instrument. The preliminary research with subject matter experts indicated four distinct job roles of store detectives. This job analysis also resulted in a new job performance rating instrument later tested in the quantitative phase of the project.;Subsequently, a quantitative study of 201 US store detectives (using the performance instrument in a concurrent validity design) developed four distinct selection models designed to help explain role-specific job performance variance. Four hypothesis regarding the relationship between biographical data, personality traits, cognitive ability and the four measures of job performance were tested using multiple and logistic regression. The four resulting models explained between 13% and 23% of the variance in detective job performance measures.;Implications of the project's findings, and suggestions are also discussed in context t the current sample, as well as prior work in pre-employment selection research.
APA, Harvard, Vancouver, ISO, and other styles
21

Brereton, Catherine Margaret. "Mapping Grahamstown's security governance network : prospects and problems for democratic policing." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1006323.

Full text
Abstract:
The security of its citizens is often regarded as the democratic state's primary raison d'etre. However, with increasing crime and perceptions of insecurity among citizens, along with actual and perceived state policing inadequacies, citizens around the world have sought to make alternative arrangements for their security. The explosion of private alternatives to state policing has resulted in the need for the replacement of former static definitions of policing by more fluid understandings of what policing entails. Policing is no longer an activity undertaken exclusively by the 'state police.' Policing needs to be understood within a framework which recognises the existence of a variety of state, commercial, community groups and individuals which exist within loose and sometimes informal, sometimes formal, networks to provide for the security of citizens. Preceding the country's transition to democracy in 1994 'state' policing in South Africa was aimed at monitoring and suppressing the black population and as a result it conducted itself in a largely militaristic way. When the government of national unity assumed power in 1994 it was indisputable that the South African Police had to undergo major reform if it was to play an effective, co-operative and accountable role in a democratic South Africa. While state policing has unquestionably undergone enormous changes since the advent of democracy in 1994, so too has non-state policing. It is widely accepted that the dividing line between state and non-state policing in South Africa is increasingly blurred. Policing, by its very nature, holds the potential to threaten democracy. Consequently it is important that policing is democratically controlled. According to the Law Commission of Canada four values and principles - justice, equality, accountability, and efficiency - should support policing in a democracy. This thesis is a case study of policing in Grahamstown, a small city in South Africa's Eastern Cape province. It will be shown that the policing problem that currently plagues Grahamstown, and by extension South Africa, is not simply the result of a shortage of providers but rather a problem of co-coordinating and monitoring security governance to ensure that the city does not further develop into a society where the wealthy have greater access to security than the poor.
APA, Harvard, Vancouver, ISO, and other styles
22

Тищенко, К. О. "Державне регулювання діяльності приватних охоронних структур як фактор суспільного розвитку." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/34095.

Full text
Abstract:
На сучасному етапі розвитку держави та суспільства дуже актуальним, а, мабуть, і визначальним аспектом є державне регулювання діяльності недержавних охоронних структур. При цитуванні документа, використовуйте посилання http://essuir.sumdu.edu.ua/handle/123456789/34095
APA, Harvard, Vancouver, ISO, and other styles
23

Paoliello, Tomaz Oliveira [UNESP]. "O padrão de atuação das empresas de segurança privada: o caso de Angola." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/96028.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:27:59Z (GMT). No. of bitstreams: 0 Previous issue date: 2011Bitstream added on 2014-06-13T18:32:20Z : No. of bitstreams: 1 paoliello_to_me_mar.pdf: 427260 bytes, checksum: 8192f058d3716664b52425847d1d9b5e (MD5)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Nos dias de hoje, um dos fenômenos que chama atenção e suscita o debate no âmbito da disciplina de relações internacionais é a ascensão das chamadas empresas de segurança privada. A atual dissertação se dedica ao estudo da inserção de tais empresas no contexto angolano durante os anos 1990. Essa inserção é marcada por dois momentos, um primeiro, paradigmático para a literatura sobre o tema, trata da ação particular da empresa Executive Outcomes. Num segundo momento, abordamos o desenvolvimento de um mercado local para a segurança privada, construído por uma série de dispositivos que fazem do panorama angolano um modelo único e ainda pouco estudado. Angola foi um campo de teste para a atuação das empresas de segurança privada, mas acabou se transformando num caso excepcional, com uma série de empresas locais provendo a segurança para o país durante o conflito interno, e tornando-se fundamentais para o desenho de poder em Angola. Essa situação é derivada de uma série de especificidades da história angolana, notadamente a permanente violência, e a perpetuação da fragilidade do Estado. Desenvolvemos a discussão sobre o papel das empresas de segurança privada como novos atores no sistema internacional, e observamos o alcance das descobertas sobre tais empresas quando confrontadas com o caso de Angola
Nowadays, one of the phenomena that draws attention and raises the debate within the discipline of international relations is the rise of the so-called private security companies. The present dissertation studies the inclusion of such companies in the Angolan context during the 1990s. This inclusion is marked by two moments, the first one paradigmatic for the literature on the subject, the particular action of the company Executive Outcomes. Secondly, we discuss the development of a local market for private security, built by a series of devices that make the Angolan landscape a unique and poorly studied model. Angola was a testing ground for the actions of the private security companies, but turned out to be an exceptional case with a number of local companies providing security for the country during its own internal conflict, and making them fundamental for the design of Power in Angola. This situation is derived from a number of specific features of the Angolan history, especially the continued violence and the perpetuation of state fragility. We further explore the discussion on the role of private security companies as new actors in the international system, and observe the range of findings about these companies when confronted with the case of Angola
APA, Harvard, Vancouver, ISO, and other styles
24

Lopes, Cleber da Silva. "Como se vigia os vigias : o controle da Policia Federal sobre a segurança privada." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/281642.

Full text
Abstract:
Orientador: Andrei Koerner
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciencias Humanas
Made available in DSpace on 2018-08-10T21:44:23Z (GMT). No. of bitstreams: 1 Lopes_CleberdaSilva_M.pdf: 2526653 bytes, checksum: 008a185418187f4991c15c082e02c99e (MD5) Previous issue date: 2007
Resumo: A emergência da segurança privada e de organizações e agentes particulares que provêem policiamento de maneira informal colocaram novos problemas para a efetivação dos direitos civis na sociedade brasileira. O trabalho analisa o controle estatal sobre a segurança privada exercido pela Polícia Federal no período 1996-2006. Constata que nos últimos quatro anos ocorreram melhoras nos instrumentos legais que visam assegurar policiamento privado responsável publicamente, mas persistem regras deficientes e mecanismos frágeis para incentivar o controle interno e o controle externo da segurança privada. Verifica também melhoras na capacidade fiscalizadora da Polícia Federal sobre o universo legal da segurança privada, mas permanece baixa e limitada a sua capacidade para fiscalizar o universo informal dos provedores particulares de policiamento
Abstract: The private security emergency and of organizations and private agents that provide policing in an informal way they put new problems for the effectives of the civil rights in the Brazilian society. The work analyzes the state control on the private security exercised by the Federal Police in the period 1996-2006. The study verifies that in the last four years they happened improvements in the legal instruments that they seek to assure responsible policing openly, but they persist deficient rules and fragile mechanisms to motivate the internal control and the private security external control. It also verifies improvements in the capacity supervise of the Federal Police on the private security legal universe, but it stays low and limited his capacity to supervise the providers' peculiar of policing informal universe
Mestrado
Mestre em Ciência Política
APA, Harvard, Vancouver, ISO, and other styles
25

Oliveira, Aryeverton Fortes de. "Empresas de vigilância no sistema de prestação de serviços de segurança patrimonial privada: uma avaliação da estrutura de governança." Universidade de São Paulo, 2004. http://www.teses.usp.br/teses/disponiveis/11/11132/tde-26042005-142812/.

Full text
Abstract:
O principal objetivo desta tese foi identificar como empresas de vigilância patrimonial privada legalmente constituídas participam do sistema de prestação de serviços de segurança, estabelecendo mecanismos de incentivo, controle, treinamento e busca de informações para a promoção da qualidade dos serviços. A importância do estudo surge da necessidade de averiguar se empresas de vigilância, reguladas e fiscalizadas, podem promover a eficiência no sistema de prestação de serviços. Foram coletados dados secundários sobre o setor e, com base nos fundamentos teóricos da Nova Economia Institucional (NEI), foi aplicado questionário à amostra aleatória de empresas de segurança patrimonial na cidade de São Paulo. Essas informações foram analisadas com maior profundidade por meio de dois métodos multivariados, análise de correspondência e de conglomerados, para obter o perfil da segurança privada em São Paulo a partir do agrupamento das empresas com características semelhantes. Detectouse que a presença de assimetria de informações leva ao emprego de processos de filtragem, identificação de sinais de qualidade emitidos pelos trabalhadores, e a utilização de incentivos e monitoramento para assegurar o comportamento adequado. De maneira geral, houve distinção clara entre empresas que atendem o setor público, priorizando mais o preço que a qualidade dos serviços, e as que atendem clientes do setor privado, em que fatores de qualidade podem permitir a cobrança de preços maiores para os serviços. Embora a remuneração do vigilante aparenta ser superior à de ocupações alternativas no mercado, empresas diferiram na prática de remunerações, seguindo o interesse do contratante de serviços em pagar ou não pelo diferencial de qualidade. A idéia de salário de eficiência pode funcionar para algumas circunstâncias, mas a função de monitoramento do trabalhador é mantida intensa. A promoção da qualidade nesta forma de governança híbrida incluiria um esforço de controle sobre o trabalhador por parte do prestador de serviços, que confere menor capacidade adaptativa ao contratante sobre as atividades do vigilante. Conclui-se que a forma híbrida de governança, com a contratação da empresa de vigilância, pode promove a qualidade dos serviços ao garantir que pré-requisitos legais sejam respeitados na contratação, o treinamento e a reciclagem sejam oferecidos, os trabalhadores sejam selecionados e monitorados e a estrutura de incentivos via remunerações maiores que alternativas de mercado seja estabelecida. Contudo, verificou-se comportamentos particulares que impedem a generalização deste resultado para todos os casos, especialmente no caso de contratantes preferirem menores preços à maior qualidade, como contratantes do setor público.
The main objective of this thesis was to identify how firms in the security system services for private properties, which are legally constituted, participate of the security system services, establishing mechanisms for incentive, control and training of their employees, besides searching for information to promote the quality of its services. The importance of the study is related to the need to evaluate if monitoring firms, regulated and fiscalized, can promote efficiency in the service sector. Secondary data about the sector was collected and a questionnaire, based on the theoretical fundaments of the New Institutional Economics (NIE), was applied to a random sample of companies that provide security services for private properties in the city of Sao Paulo. This information was analyzed through two multivariate methods, analysis of correspondence and of conglomerates, to obtain a profile of the private insurance in Sao Paulo, based on a group of companies with similar characteristics. The study results indicated that information asymmetry lead to the employment of filtering, identification of the quality signs of the workers and the use of incentive for monitoring and assuring adequate behavior. In general, there was a clear distinction between the companies that provided services to the public sector and those that provide services for the private sector. The former seemed to prioritize prices instead of quality of the services, while the later could charge higher prices for high quality services. Although the remuneration of the security officer seems to be higher than those in other activities, companies differ with respect to remuneration, according to the interest of the customers in paying for differentiated services. The efficiency wage idea can work in some circumstances although the function of monitoring the worker is intense. Quality promotion in this form of hybrid governance includes efforts to control the employee by the service provider, improving the service quality as it guarantees legal requisites are in the contract that confers less adaptive capacity to the contractor over the activities of the security officers. It can be concluded that a hybrid governance, contracting the security firm, com promote service quality guaranteeing that legal pre-requisites are respected in hiring, training and recycling be provided, personnel be selected and monitored and the incentives above market value be established. However, specific behavior that prevent the generalization of these results for all cases was observed, specially in case where contractors preferred lower prices to higher quality, as in public sector contractors.
APA, Harvard, Vancouver, ISO, and other styles
26

Siddiqui, Muhammad Anas. "Cloud Computing : Evaluation, as a platform for Scania Architecture." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-18896.

Full text
Abstract:
Cloud computing has been given a great deal of attention during recent years. Almost all the technology market leaders and leading hosting service providers (like IBM, Microsoft and Verizon) have entered into the Cloud market as Cloud Providers. Cloud computing promises to provide highly available, secure, low cost, agile and highly scalable solution to the consumers. Scania is a global company and one of the world’s leading heavy vehicle manufacturers with 35,000+ employees. All the large organizations such as Scania, aim to constantly update themselves with the latest technology in order to meet their business requirements but, these organizations must always be convinced that there is a strong reason(s) to implement new technology. This research provides the method and criteria in relation to initiating Cloud computing. A number of Scania’s specific business requirements that it is possible to map to the Cloud are addressed in this thesis. The methodology of research is split in two parts. Firstly, the identification of business cases at Scania and their requirements with the Cloud and Secondly, the evaluation and comparison of the functionalities and capabilities of different vendors. The accumulated data is then compared and suitable vendors, according to those business requirements are suggested. This thesis also shares the experience of moving on premise applications to the Cloud. These are Scania specific applications which are currently being hosted in-house. The research also addresses the possibilities of portability between the Cloud providers. Although there is no standardization in relation to Cloud computing, some initiatives such as OpenStack are available and its current position and some application and data migration tools are also discussed. The thesis concludes with a general discussion, recommendations in relation to adapting Cloud computing and selecting the Cloud provider. This recommendation applies to every organization including Scania.
APA, Harvard, Vancouver, ISO, and other styles
27

Arroyo, Antonio. "Professionnalisation et développement professionnel : cas des agents de sécurité privée de la branche surveillance humaine en France." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMR088.

Full text
Abstract:
Ce travail de recherche porte sur l’étude de la tension entre le discours institutionnel sur la professionnalisation de la sécurité privée en France et le processus d’exercice et d’apprentissage du métier par les agents de sécurité. Différents facteurs indiquent les enjeux du projet institutionnel de professionnalisation et des dispositifs de formation. Le chercheur met en évidence, à partir d’une approche qualitative et multidimensionnelle, les intentions institutionnelles et l’écart existant entre le discours et la réalité. Sur le terrain, les agents de sécurité vivent mal leur entrée dans la profession et la réalisation de leur métier. Pour remplir les objectifs du contrat, ils construisent une norme informelle d’acceptation des risques, inductrice du processus d’apprentissage. L’action ainsi développée permet aux agents de sécurité d’apprendre au fil de l’activité. L’évolution rapide des attentes institutionnelles en matière de sécurité transforme les opérationnels et les interroge dans un nouveau rapport à l’action. Les réponses apportées exigent une approche globale de prévention et de gestion des risques sur les sites et les territoires (pour la plupart en présence du public). Un nouveau concept de coproduction de sécurité publique et privée apparaît et le discours institutionnel change alors d’aspect, mais la réalité opérationnelle reste décalée
This academic research task focuses on the tension between the institutional discourse on the professionalization of private security in France and on the learning and practice process of the profession by security agents. Different factors point to the issue of the institutional project of the professionalization and of the training systems. The researcher brings to light, with a qualitative and multidimentional approach, the institutional intentions and the gap between the displayed speech and reality. In the field, the security agents feel uncomfortable at the beginning of their profession, when they understand what their profession truly is. To fulfill the objectives of the contract, they build an informal standard risk of acceptance, the key-driver of the training process. The action thus developed allows the security agents to learn in the course of their activity. The swift evolution of institutional expectancies in security matters transforms the operators and calls them in a new relation to action. The answers given require a global approach to risk prevention and management on sites and territories (mostly with the public attending). A new concept of coproduction of private and public security is born and the institutional discourse then changes in appearance, but the operational reality remains ill-adjusted
APA, Harvard, Vancouver, ISO, and other styles
28

Eicher, Michael. "Protecting diplomats in Iraq what can the U.S. Department of State do to improve it's management and oversight of security contractors in Iraq? /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kanashiro, Marta Mourão 1974. "Sorria, voce esta sendo filmado : as cameras de monitoramento para segurança em São Paulo." [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/281523.

Full text
Abstract:
Orientador: Laymert Garcia dos Santos
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciencias Humanas
Made available in DSpace on 2018-08-06T03:18:07Z (GMT). No. of bitstreams: 1 Kanashiro_MartaMourao_M.pdf: 1988987 bytes, checksum: b6b82fb95441f45b67f0253e0d7f91e9 (MD5) Previous issue date: 2006
Resumo: Tendo em vista a proliferação de mecanismos de vigilância e controle nas sociedades contemporâneas ocidentais, esta dissertação busca refletir sobre as representações e discursos associados à inserção das câmeras de monitoramento para segurança no cotidiano brasileiro. A partir de um estudo de caso realizado na região central da cidade de São Paulo (Parque da Luz), do levantamento das proposições e normas legais que versam sobre o tema e do acompanhamento de publicações e feiras do setor de segurança eletrônica, procura-se fazer emergir tais discursos. A transformação da segurança em mercadoria e sua promoção por meio da idéia de prevenção ou antecipação são alguns dos aspectos percebidos na pesquisa como profundamente equacionados com essa prática. Baseando-se em aspectos como esses, argumenta-se que as câmeras de monitoramento participam de uma forma de exercício do poder na atualidade, que focaliza fluxos e mobilidade em detrimento do ¿indivíduo¿
Abstract: Considering the proliferation of surveillance and control mechanisms in the occidental contemporaneous societies, this dissertation aims at reflecting on the representations and discourses associated with the input of security camera monitoring system (CCTVs) in the Brazilian daily routine. Starting from a case study in the downtown area in São Paulo City (Parque da Luz), a survey of propositions and legal norms which deal with the subject, and going over publications and electronic security sector fairs, it aims at emerging these different discourses. The transformation of security into goods and its promotion by the idea of prevention or anticipation are some of the aspects focused on this research as deeply equated with this practice. Based on aspects like those, it is argued that the monitoring cameras are part of the current power practice, which focused on flows and mobility to the detriment of the "individual"
Mestrado
Mestre em Sociologia
APA, Harvard, Vancouver, ISO, and other styles
30

Bresson, Jonathan. "Le conflit, du face-à-face au corps à corps : une immersion comme agent de sécurité en établissements de nuit." Thesis, Rennes 2, 2018. http://www.theses.fr/2018REN20019.

Full text
Abstract:
Les violences corporelles émaillent le quotidien des agents de sécurité en établissements de nuit. Leurs rôles de "videur" et de "portier" visent à prévenir, traquer et gérer les conflits ; ils se structurent autour de la perspective de la brutalité physique et du risque de survenues de blessures graves. Les violences en établissements de nuit constituent une problématique mondiale invariablement criminologique, quasi absente de la recherche française. Le terrain de cette recherche originale est l’observation et l’analyse du conflit, du face-à-face au corps à corps, hors du lynchage et des violences intimes. L’immersion, par ethnographie énactive, est adaptée à l’étude de situations légalement risquées et propices à la mythification. De manière complémentaire, la sociologie d’E. Goffman fournit un point de départ intéressant pour analyser le maintien, la rupture, et le rétablissement des cadres, oscillant entre la situation et les éléments situés. L’étude démontre que le conflit face-à-face suit un processus échelonné, du heurt à la rixe, en passant par la bagarre, répondant du rituel d’interaction. Cet élément de désordre, dans la confusion parfois apparente, profondément enraciné dans la culture de la violence, qu’il structure en retour, reste ordonné en lui-même. Il est un élément organisateur de l’ordre social. L’appréhender restitue la notion de brutalité physique et questionne le seuil de définition de la violence. Cela nécessite d’interroger le sentiment d’agression et le passage à l’action, dans une dynamique situationniste et processuelle, où les déplacements, gestes et mouvements en eux-mêmes, sont des éléments clefs
Nightclub security officer’s daily job is punctuated by physical violence. Their roles as bouncer and doorman aim to prevent, track down and manage conflicts. Their professional activity is structured around the perspective of physical brutality and the risk of the occurrence of tragic events. The field work of this original research consists of the observation and analyze of conflicts: the face to face and hand to hand, excluding intimate violence and lynching. Violence in night spots constitue a worldwide criminological problem. However, it remains absent from French researches. Bodily immersion and observations by enactment ethnography are appropriate ways to study legally risky and mythologizing situations. E. Goffman’s sociology is an interesting starting point to analyze the conservation and the rupture of frames, swinging between the situation and the situated social performances. The study shows that the face to face conflict follows a graduated process: from clash to brawl, threw fight, being an interaction ritual. This disorder element, that sometimes seems confused, has its origins anchored in the violence culture which it structures in return. Conflict stays organized and is an organization element of the social order. Having an understanding of it brings back to the notion of physical brutality and questions the threshold of thedefinition of “violence”, the feeling of aggression and the “acting out” in a situationist and processual research dynamic in which moves, gestures and movement themselves become key elements
APA, Harvard, Vancouver, ISO, and other styles
31

Paoliello, Tomaz Oliveira. "O padrão de atuação das empresas de segurança privada : o caso de Angola /." São Paulo : [s.n.], 2011. http://hdl.handle.net/11449/96028.

Full text
Abstract:
Orientador: Reginaldo Mattar Nasser
Banca: Mônica Herz
Banca: Flávia de Campos Mello
O Programa de Pós-Graduação em Relações Internacionais é instituído em parceria com a Unesp/Unicamp/PUC-SP, em projeto subsidiado pela CAPES, intitulado "Programa San Tiago Dantas"
Resumo: Nos dias de hoje, um dos fenômenos que chama atenção e suscita o debate no âmbito da disciplina de relações internacionais é a ascensão das chamadas empresas de segurança privada. A atual dissertação se dedica ao estudo da inserção de tais empresas no contexto angolano durante os anos 1990. Essa inserção é marcada por dois momentos, um primeiro, paradigmático para a literatura sobre o tema, trata da ação particular da empresa Executive Outcomes. Num segundo momento, abordamos o desenvolvimento de um mercado local para a segurança privada, construído por uma série de dispositivos que fazem do panorama angolano um modelo único e ainda pouco estudado. Angola foi um campo de teste para a atuação das empresas de segurança privada, mas acabou se transformando num caso excepcional, com uma série de empresas locais provendo a segurança para o país durante o conflito interno, e tornando-se fundamentais para o desenho de poder em Angola. Essa situação é derivada de uma série de especificidades da história angolana, notadamente a permanente violência, e a perpetuação da fragilidade do Estado. Desenvolvemos a discussão sobre o papel das empresas de segurança privada como novos atores no sistema internacional, e observamos o alcance das descobertas sobre tais empresas quando confrontadas com o caso de Angola
Abstract: Nowadays, one of the phenomena that draws attention and raises the debate within the discipline of international relations is the rise of the so-called private security companies. The present dissertation studies the inclusion of such companies in the Angolan context during the 1990s. This inclusion is marked by two moments, the first one paradigmatic for the literature on the subject, the particular action of the company Executive Outcomes. Secondly, we discuss the development of a local market for private security, built by a series of devices that make the Angolan landscape a unique and poorly studied model. Angola was a testing ground for the actions of the private security companies, but turned out to be an exceptional case with a number of local companies providing security for the country during its own internal conflict, and making them fundamental for the design of Power in Angola. This situation is derived from a number of specific features of the Angolan history, especially the continued violence and the perpetuation of state fragility. We further explore the discussion on the role of private security companies as new actors in the international system, and observe the range of findings about these companies when confronted with the case of Angola
Mestre
APA, Harvard, Vancouver, ISO, and other styles
32

Kimbembe-Lemba, Aymar. "Le statut des salariés des sociétés militaires privés participant aux conflits armés." Thesis, Poitiers, 2012. http://www.theses.fr/2012POIT3012.

Full text
Abstract:
Il existe une distinction entre les civils et les membres des forces armées. Cette distinction est implicitement la question de fond de cette étude sur la détermination du statut juridique des salariés des sociétés militaires privées (SMP) participant aux conflits armés. Par ailleurs, la défense et la sécurité de l'État sont assurées par divers acteurs de statuts différents qui ont des rôles bien définis par un cadre juridique : les civils et les membres des forces armées. La distinction sus-évoquée ne se limite pas là, mais elle concerne aussi les seuls membres des forces armées car il existe une distinction interne et une autre externe. Tous les membres des forces armées n'ont pas droit au statut de combattant. En revanche, la négation du statut de combattant à certains militaires n'est que relative et elle n'influence pas leur droit au statut de prisonnier de guerre. Ces militaires sont différents des personnes employées en dehors des forces armées et mandatées par leur employeur pour fournir des prestations auprès des armées sur un théâtre d'opérations. Cette utilisation soulève plusieurs questions en DIH. Les SMP fournissent des prestations qui vont de la logistique à la participation directe aux hostilités. Cette participation directe ou indirecte aux hostilités débouche sur une « hémorragie de langage » pour qualifier les salariés des SMP de mercenaires, de nouveaux mercenaires, de « security contractors », des soldats à vendre, des combattants irréguliers, etc. Ainsi, les salariés de ces sociétés exercent-ils une activité de mercenariat ? Leurs sociétés-employeurs constituent-elles des sociétés de secours ?
A distinction is made between civilians and military personnel. This distinction is implicit in the substantive issue of this study on determining the legal status of employees of private military companies (PMCs) involved in armed conflicts. Moreover, the defense and State security are provided by various actors of different statuses that have defined roles for a legal framework. Civilians and members of the armed forces are indeed links in this chain. The distinction mentioned over is not confined there, but it is also about the only members of the armed forces because there is a distinction between internal and one external. All members of the armed forces are not entitled to combatant status. However, the denial of combatant status to certain military is only relative and does not affect their right to prisoner of war status. These soldiers are different from those employed outside the armed forces and mandated by their employer to provide benefits to the armies in a theater of operations. This use raises several issues in IHL. PMCs provide services that go from logistics to direct participation in hostilities. This direct or indirect participation in hostilities leads to a “hemorrhage of language” to describe employees of PMCs as mercenaries, new mercenaries, defense and security contractors, soldiers for sale, irregular combatants, etc. Thus, the employees of these companies undertake specific activities of mercenaries? Their companies-employers do they constitute relief societies ? Are they combatants, noncombatants or irregular combatants ? This is so prompt questions that this thesis attempts to answer
APA, Harvard, Vancouver, ISO, and other styles
33

Noumon, Allini Elie. "Caractérisation, évaluation et utilisation du jitter d'horloge comme source d'aléa dans la sécurité des données." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES019.

Full text
Abstract:
Cette thèse, financée par la DGA, est motivée par la problématique d’évaluation des TRNG pour des applications à très haut niveau de sécurité. Les standards actuels tels que AIS-31 n’étant pas suffisants pour ces types d’applications, la DGA propose une procédure complémentaire, validée sur les TRNG utilisant les oscillateurs en anneau (RO), qui vise à caractériser la source d’aléa des TRNG afin d’identifier les bruits électroniques présents dans celle-ci. Ces bruits se traduisent dans les circuits numériques par le jitter d’horloge générée dans les RO. Ils peuvent être caractérisés par leur densité spectrale de puissance reliée à la variance d’Allan temporelle qui permet, contrairement à la variance standard pourtant encore largement utilisée, de discriminer ces différents types de bruit (thermique, flicker principalement). Cette étude a servi de base à l’estimation de la part du jitter due au bruit thermique utilisé dans les modèles stochastiques décrivant la sortie des TRNG. Afin d’illustrer et de valider l’approche de certification DGA sur d’autres principes de TRNG que les RO, nous proposons une caractérisation de la PLL en tant que source d’aléa. Nous avons modélisé la PLL en termes de fonctions de transfert. Cette modélisation a conduit à l’identification de la source de bruit en sortie de la PLL, ainsi que de sa nature en fonction des paramètres physiques de la PLL. Cela a permis de proposer des recommandations quant au choix des paramètres afin de garantir une entropie maximale. Afin d’aider à la conception de ce type de TRNG, nous proposons également un outil de recherche des paramètres non physiques du générateur assurant le meilleur compromis sécurité/débit
This thesis, funded by the DGA, is motivated by the problem of evaluation of TRNG for applications with a very high level of security. As current standards such as AIS-31 are not sufficient for these types of applications, the DGA proposes a complementary procedure, validated on TRNG using ring oscillators (RO), which aims to characterize the source of randomness of TRNG in order to identify electronic noises present in it. These noises are manifested in the digital circuits by the clock jitter generated in the RO. They can be characterized by their power spectral density related to the time Allan variance which allows, unlike the standard variance which is still widely used, to discriminate these different types of noise (mainly thermal, flicker). This study was used as a basis for estimating the proportion of jitter due to thermal noise used in stochastic models describing the output of TRNG. In order to illustrate and validate the DGA certification approach on other principles of TRNG apart from RO, we propose a characterization of PLL as a source of randomness. We have modeled the PLL in terms of transfer functions. This modeling has led to the identification of the source of noise at the output of the PLL, as well as its nature as a function of the physical parameters of the PLL. This allowed us to propose recommendations on the choice of parameters to ensure maximum entropy. In order to help in the design of this type of TRNG, we also propose a tool to search for the non-physical parameters of the generator ensuring the best compromise between security and throughput
APA, Harvard, Vancouver, ISO, and other styles
34

CUSUMANO, Eugenio. "Power under contract : domestic political constraints and military privatization in the United States and the United Kingdom." Doctoral thesis, 2012. http://hdl.handle.net/1814/22690.

Full text
Abstract:
Defence date: 06 June 2012
Examining Board: Professor Pascal Vennesson, European University Institute (supervisor) Professor Deborah Avant, University of Denver Dr. Christopher Kinsey, King’s College London Professor Francesco Francioni, European University Institute.
PDF of thesis uploaded from the Library digital archive of EUI PhD theses
The increasing provision of military support functions such as logistics and armed security by private military and security companies (PMSCs) is often conceptualized as a functional response to new operational, financial and technological imperatives. The tendency to privatize military support functions, however, is also driven by domestic political factors. Drawing on neoclassical realism, I conceptualize the use of PMSCs as a strategy dictated by the need to circumvent the tightening hurdles to the conversion of societal resources into military power. Other things being equal, I argue that the tighter the constraints on the extraction and mobilization of societal resources, the higher the propensity to rely on the market as a complementary source of military power. I provide evidence for this theoretical connection by drawing a comparative analysis between military privatization in the U.S. and in the U.K. Specifically, I investigate in detail the tendency to resort to private military contractors during U.S. military operations in Iraq and U.K. military operations in Afghanistan. In both cases, the privatization of military support functions provided decision-makers with the possibility to circumvent existing constraints over the recruitment and deployment of active duty and reserve military forces. I then assess the explanatory power of my neoclassical realist explanation of military privatization against other theoretical perspectives, developing two competing explanations based on neorealism and organization theory. Although these theoretical perspectives offer valuable insights on the use of PMSCS, I show that due to its emphasis on domestic political constraints neoclassical realism proves better capable of shedding light on the privatization of military support and its variations across countries and over time.
APA, Harvard, Vancouver, ISO, and other styles
35

Clarke, Paul T. "Security assemblages: enclaving, private security, and new materialism in suburban Johannesburg." Thesis, 2016. http://hdl.handle.net/10539/20725.

Full text
Abstract:
A research report submitted in partial satisfaction of the requirements of the degree Master of Arts in Anthropology March 2016
This research report explores how private security is materially assembled in suburban Johannesburg. Based on ethnographic fieldwork within a private security company operating across the northern suburbs of Greater Johannesburg, it examines how the materiality of security is intimately intertwined with shaping the socio-spatial terrain of the city. Using a new materialist “assemblage” theory proposed by Jane Bennett, it contends although the materials of private security are designed to protect and exclude, they often work rather differently on the ground, resulting in strange new ways of seeing, moving, and relating in the city.
APA, Harvard, Vancouver, ISO, and other styles
36

Horn, Heather Elizabeth. "The management of security officer's performance within a private security company in Gauteng." Diss., 2019. http://hdl.handle.net/10500/25790.

Full text
Abstract:
This study was undertaken to investigate whether there is a performance management system within the security industry, applicable specifically to Security Officers. To investigate which performance factors, apply to security officers and how security officers perceived performance management. The management of Security Officers’ performance is an aspect of management which has not garnered much interest compared to other operational and management areas – hence the paucity of research on the performance management of security officers. They make a major contribution to the labour market with 7 949 security companies listed on the Private Security Industry Regulatory Authority (PSIRA) website, and 2 973 companies (37%) based in Gauteng alone. However, despite the high number of companies, the industry has attracted the least attention in terms of performance. The overall research purpose of this study was to explore the management of security officers’ performance in a private security company operating in South Africa,focussing specifically on a company based in the Gauteng Province. The scope of the study was aimed at investigating security officers’ perception of performance management and to link performance to actual job performance and security officers’ perceived work performance. The researcher also investigated whether biographical factors had an influence on security officers’ performance. A quantitative research methodology was utilised to conduct the study. The main research instruments were primary data, comprising a self-developed questionnaire and secondary data, comprising company records. The respondents consisted of security officers whom had been subjected to the Dependability and Safety Instrument (DSI) during the period 2013 to 2015, in the region, who were still employed at the company at the time of the study. The findings of the study identified 11 performance management factors and indicated links between self-reported and actual work performance. Biographical characteristics did not seem to influence the work performance of the security officers. However, the results did indicate that employees with less tenure were more prone to disciplinary action by the company and those with higher levels of education were prone to fewer disciplinary actions and dismissals based on AWOL. The study identified the areas that play a significant role in the management of security officers’ performance. The identification of performance management factors in the security industry and security officers’ perceptions about performance management should enable HR officers to develop and implement a performance management system that will contribute to better service delivery to both internal and external clients in this industry.
Business Management
M. Com. (Business Management)
APA, Harvard, Vancouver, ISO, and other styles
37

Siebrits, Louis Lourens. "Regulation of the private security industry." Thesis, 2001. http://hdl.handle.net/10500/1105.

Full text
Abstract:
The regulation of the private security industry has been an issue of debate for a number of years in South Africa, as well as in the rest of the world. The debate mainly centers around issues such as the need for regulation in this Industry and the objectives of regulation. This thesis argues that regulation is of utmost importance in this Industry and furthermore, that the objective ofregulation should be to set standards in the Industry. If this is the case, the protection of the public interest will be a natural result of regulating the standards. In addition, this thesis argues for the inclusion of the private investigator into the scope of regulation and suggests that this sector should ultimately be regulated through the means of separate legislation. This thesis furthermore provides two models for the regulation of the private security industry in South Africa. These models are described as the Semi-Integrated Wide Model (SIWM) and the Fully Integrated Wide Model (FIWM). These two models provide Government with the option of regulating the Industry without alienating the latter. Government will still have the ultimate responsibility for regulation, but will allow the Industry to be central in setting standards and requirements. In this way, the Industry will not regulate itself and Government will have the ultimate responsibility of protecting the interests of the public and the State
Police Practice
D. litt. et. Phil. (Police Science)
APA, Harvard, Vancouver, ISO, and other styles
38

Le, Roux Gabriël Jacobus. "A quantitative risk analysis model for private security managers." Thesis, 2004. http://hdl.handle.net/10500/1073.

Full text
Abstract:
An easy-to-use quantitative risk analysis model is developed for the private security industry in South Africa, which can be used as a suitable analysing tool in the hands of the private security manager. This model incorporate different concepts such as the probability, impact, cost of risk, degree of correction and the newly established human factor concept, which cannot be seen in isolation. This latter concept plays a major part in the overall risk quantification process in establishing a most accurate risk score rating. The human factor concept, also known as the "CHHP" approach, is the first concept, which will round the model of in an effective measuring way. Human factors such as (i) control measures (ii) human attitude towards the risk (iii) handling of the risk and (iv) understanding and implementation of policies and procedures are combined to form part of the total integrated quantitative risk analysis model, also known as the "TIQCAM"-model. The "TIQCAM"-model uses Excel spreadsheet format as the principal means to illustrate the total integration of all risk concepts and also providing the user of the model with a solid foundation in analyze physical and quantifiable security risks. This model will also enable the user to use it as a value-added service to their clients.
Criminology
D. Litt et Phil.(Police Science)
APA, Harvard, Vancouver, ISO, and other styles
39

Schneider, Gavriel. "The design and development of a best practice use-of-force training model for the private security industry." Thesis, 2012. http://hdl.handle.net/10500/23548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Van, Rooyen Bernadette. "Prevention mechanisms to minimise injuries on duty : perceptions of security officers in a private security company." Diss., 2017. http://hdl.handle.net/10500/24015.

Full text
Abstract:
The aim of the study was to determine the causes of IODs in the workplace and to identify possible preventative measures to reduce IODs. A literature review was conducted as part of the study, involving assessment of all related articles and books on the subject of IODs in the workplace. A qualitative research methodology was utilised to conduct the study. The main research instruments were four focus group interviews and eight individual interviews. The study concluded that employees experienced IODs in different ways, with most participants describing negative experiences such as physical pain, undue financial hardship, psychological trauma and lack of support from the employer. A minor percentage experienced IODs in a positive sense in that there is heightened safety awareness in the workplace after an IOD has occurred, and the adoption of a more cautious approach by employees when performing their duties. From a practical and organisational/managerial perspective, the adoption of effective training of security officers and adherence to organisational standard operating procedures will assist in reducing IODs in the workplace. Limitations of the study included the small sample size from the research population, perceived language barriers during the interview processes and non-participation and inputs from managers at the organisation. However, it is hoped that the study will form the basis for further research to broaden the field to include parastatal or public-service entities
Human Resource Management
M. Com. (Human Resource Management)
APA, Harvard, Vancouver, ISO, and other styles
41

Mbuvi, Charles. "The development and growth of the Kenyan private security sector : its role and impact on safety and security." Diss., 2015. http://hdl.handle.net/10500/19686.

Full text
Abstract:
This study aimed to analyse the development and growth of the Kenyan private security sector, and to establish its role and impact on safety and security. The study included determining the impact of the private security sector in Nairobi and the mobile patrol functions on safety and security in Kenya. Furthermore, to determine the impact of the Kenyan private security sector on loss prevention functions; reviewed how special events security and private investigation functions affect the safety and security of Kenyans; and also considered how in-house security functions of the private security sector further influence safety and security in Kenya. The researcher reviewed previous studies with a view to establish academic gaps which the present study sought to bridge. This study adopted a census survey design and employed quantitative research methods as the main approach to guide the study. The research targeted all of the private security firms in Kenya. There are 23 listed security firms under the Kenya Security Industry Association (KSIA) and 44 under the Protective Security Industry Association (PSIA) - a total of 67 security firms in Kenya. The research instrument used for data collection was a questionnaire to elicit the required information from the respondents. The respondents were either the Managing Director or Head of Security at these firms, since they have a broad knowledge about the business activities being conducted by the company. Most of them have been with the company for a significant number of years. Emanating from the research findings it is recommended that the security firms should better train the private security guards in order to enhance overall security being provided to clients. Security guards must be able to respond to different changes in their environment, which include action such as traffic movement; ensure the safety of people among and inside different localities; observing and handling the admittance and exit of individuals and cars and evaluating and monitoring individuals and coming up with a policy and legal framework for regulating and observing Private Security Company (PSC) activity. The study concludes that the private security sector in Kenya impacts on and influences overall safety and security. The study, therefore, finds that there has been growth and development of the private security sector in Kenya and it continues to do so currently. Finally, advances the view that a significant relationship does exist between the functions of the private security sector and the development of the private security sector in Kenya which have had an extensive influence on levels of safety and security in that country.
Criminology and Security Science
M. Tech. (Security Management)
APA, Harvard, Vancouver, ISO, and other styles
42

Kennedy, David. "Market strategies in the post-cold war era : private military companies and the neo-liberal peace." Phd thesis, 2006. http://hdl.handle.net/1885/151497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Waddington, Conway. "Privatised peacekeeping : a necessary evil?" Thesis, 2008. http://hdl.handle.net/10413/206.

Full text
Abstract:
The rise of the Private Military Industry has been cemented in modern global political reality, but where next will this multi-billion dollar industry go and what form will it take after the market boom of Iraq? Post-Colonial Africa is considered the birthplace of the modern mercenary and historically features prominently as a testament to the potential for immoral privately sponsored military activities within unstable states. Moreover, it is a rich market that the Private Military Industry is increasingly turning its attention to, albeit focussing on support functions for now, but a massive industry with a competitive and poorly regulated market environment will invariably begin to explore different avenues as competition grows. With market diversification grows the ethical risk of abuse. At the same time, peacekeeping efforts across the continent are hampered by numerous factors, not least of all a chronic lack of trained personnel. Could the legal and political legitimacy, not to mention the sustainable market environment sought by the PMI potentially exist in multilaterally sanctioned, privatised peacekeeping and peace support operations in Africa? Can the ethical challenges of mercenarism be suspended or even bypassed for the sake of expedient intervention in potential genocides, or be perhaps pragmatically accepted as an inevitable development that should be embraced rather than condemned, for strategic security reasons? Can the ethical condemnation of the proposed means of peace support be overridden by the potential ends generated by such a move? Is the world ready for privatised peacekeepers? This dissertation explores the ethical background to the privatisation of military operations and how these foreign policy trends and social perceptions of control of force impact on the notion of privatised peacekeeping, particularly in the context of operations in Africa. It investigates the philosophical implications of privatised peacekeeping by way of a constrained pragmatic form of consequentialist evaluation that warns against reckless expediency. Ultimately, this dissertation offers a more philosophically suitable argument to justify and control this seemingly inevitable next step in the trend of privatisation of force.
Thesis (M.A.)-University of KwaZulu-Natal, Pietermaritzburg, 2008.
APA, Harvard, Vancouver, ISO, and other styles
44

HOPPE, Carsten. "Passing the buck : state responsibility for the conduct of private military companies." Doctoral thesis, 2009. http://hdl.handle.net/1814/12984.

Full text
Abstract:
Defence date: 5 May 2009
Examining Board: Francesco Francioni (Supervisor, EUI); Natalino Ronzitti (LUISS Guido Carli, Roma); Martin Scheinin (EUI); Bruno Simma (International Court of Justice, The Hague)
PDF of thesis uploaded from the Library digital archive of EUI PhD theses
This thesis analyzes whether and how international law can ensure that states relying on Private Military or Security Companies [PMSCs/contractors] to provide certain coercive services in armed conflict or occupation, cannot escape their international obligations arising out of International Humanitarian Law [IHL] and Human Rights Law [HRL]. The study focuses on the most pervasive and dangerous services, namely combat, guarding and protection, and interrogation and detention. Based on a systematic comparative analysis I identify a gap between a state's responsibility for conduct of national soldiers and equivalent conduct of contractors it hires. I argue that this responsibility gap can be bridged by applying the specific norms of attribution qua membership in the armed forces to contractors providing coercive services. Moreover, positive obligations, contained in IHL and international and regional human rights documents, contribute to ensuring state responsibility, where problems such as the extraterritorial application of HRL documents can be overcome. The thesis is divided into 8 Chapters in three Parts. In Part I, Chapter 1 places the outsourcing of warfare by states in historical context. It illuminates the continuities and differences between different earlier forms of non-state provision of coercive services in armed conflicts and the modern phenomenon of PMSCs, and suggests that the attempts to ban "mercenarism" remain largely irrelevant to the modern contractor problem. Chapter 2 tracks the ascendance of military contracting since the end of the Cold War and the state of the industry, submits a typology of services provided by contractors, and delineates the coercive services to be studied. Part II subsequently introduces the norms of IHL and Human Rights threatened by these services, with Chapter 3 addressing combat, and guarding and protection services and Chapter 4 interrogation and detention services. Part III then tackles state responsibility for violations of negative and positive obligations of hiring states. Based on an analysis of the ILC Articles on State Responsibility, Chapter 5 outlines a responsibility gap between the attributability of violations of negative IHL or HRL obligations by a soldier of the national army of a state, as compared to equivalent conduct by military contractor personnel. In a second step, I evaluate the state responsibility provisions of IHL with a view to closing the apparent responsibility gap. Chapters 6 and 7 illustrate the positive obligations of hiring states with respect to contractors exercising coercive services under IHL and HRL even where their conduct is not attributable to the state, and reassess the responsibility gap. By way of conclusion, Chapter 8 provides further reflection of the conceptual aspects raised in the thesis, along with policy recommendations aimed at improving the responsibility and accountability of states relying on PMSCs in their war efforts.
APA, Harvard, Vancouver, ISO, and other styles
45

Schneider, Gavriel. "An examination of the required operational skills and training standards for a Close Protection Operative in South Africa." Thesis, 2005. http://hdl.handle.net/10500/734.

Full text
Abstract:
The aim of this study was to determine the current operational skills requirements for Close Protection Operatives (CPOs) in South Africa. Operational skills refer to those skills that are vital in order for a CPO to effectively protect a designated person (this person is referred to as the `Principal'). In order to determine any shortcomings in the Close Protection industry, twenty in-depth interviews were conducted with current operational CPOs. A detailed literature review was also done in order to create a solid platform for the research and to assist in the verification of the information. During the research, it was found that the task of providing Close Protection could be divided into various sub-categories. This was necessary in order to gain a rounded perspective of a CPO's roles and duties. CPO's tasks in their entirety had to be unpacked into their smaller sub-components. In fact there were many ways to subdivide the skills requirements and functions of CPOs. It was, however, found that the actual subdivisions were less important than the gaining of a comprehensive understanding of how all the aspects are interrelated and should function synergistically. The need for regulation of the South African Close Protection industry was identified as a major concern among all interview respondents. In order to determine the relevant factors involved in regulation, the way countries such as the United Kingdom (UK), Australia and Israel regulate their industries, was assessed. It was noted that the industry in South Africa is `partially regulated'. This means that there is some sort of registration process for CPOs but no comprehensive monitoring and enforcement of accepted minimum competency standards. Currently in South Africa private sector CPOs are rated on the same scale as security guards and must be registered as a Grade level C with the Private Security Industry Regulatory Authority (PSIRA). This is not an effective manner to regulate CPOs. CPOs should be viewed as professionals and specialists since their skills far exceed those of a security guard (Grade C). According to South Africa's Skills Development Plan all industries will fall under Sector Education and Training Authorities (SETAs). Close Protection is grouped under the Police, Private Security, Legal, Correctional Services and Justice Sector Education and Training Authority (POSLEC SETA). There is currently a South African Qualifications Authority (SAQA) Unit Standard for Close Protection (Protection of Designated Persons, Units Standard number: 11510). However, the research revealed that while the unit standard correctly outlines the operational skills requirements of CPOs there are no assessment guidelines or clearly defined minimum skills requirements. Before the unit standard can be effectively implemented, agreed industry minimum standards for the relevant skills divisions in Close Protection need to be identified and implemented. But currently there is some confusion regarding which body is responsible for, firstly developing acceptable unit standards; secondly, getting the industry as a whole to agree and accept such standards; thirdly, to see to it that training on those standards is provided; and finally the monitoring of these standards in practice. In this study various training related factors were identified and examined in order to assess whether the way CPOs are trained in South Africa is effective or not. Aspects such as the intensity, focus, duration and content were examined. In general it was found that it is important for the following to be implemented: 1. Effective screening and pre-training evaluation of potential trainees. 2. Training should be job orientated and focus on training CPOs for the functions that they will actually have to perform. 3. Training methodologies should focus on an outcomes based approach and utilise the fundamentals of adult based education. 4. Training should simulate reality including the related stress factors that are placed on operational CPOs such as lack of sleep and high levels of activity interspersed with boring waiting periods. 5. Ongoing training and re-training are vital components to a CPO maintaining operational competency. 6. Close Protection instructors need to have both an operational background and training in instructional methodologies before being considered competent. It is important that in the long term international recognition of South African Close Protection qualifications is achieved. This is essential since many South African CPOs operate internationally. Globalisation and improvements in technology have made it easier for international networking to take place. This has meant that clients are using CPOs in different countries and international comparisons are inevitable. If South African CPOs are to be considered `world class' then internationally recognised minimum standards need to be implemented for the South African Close Protection industry. The research indicated and highlighted various trends that may affect the Close Protection industry. The trends identified that seemed most relevant to the South African Close Protection industry were as follows: * Increased public awareness of international terrorism has resulted form acts such as the 9/11 attacks. This has made people more aware of the need for and benefits of security. Use of well trained CPOs is one of the ways that potential clients are able to minimise their exposure to any potential terrorist attack. * A CPO's ability to communicate and liaise with all relevant parties involved in the Close Protection environment is vital to the success of any operation. Therefore it is vital that these aspects receive the relevant focus during training. * The CPO needs to be well trained in use of unarmed combat and alternative weaponry. He/she can no longer rely on the use of a firearm as the primary force option. * A CPO needs to be able to adapt to many different situations. It is important that a CPO is trained to blend in and use the correct protocol in any given situation. The focus of operations should be on operating in a low profile manner to avoid unnecessary attention. * A CPO needs to be well trained in all aspects of planning and avoidance. The skills needed to proactively identify and avoid threats are vital to modern day operations. The CPO also needs to be quick thinking and adaptable in order to function effectively. * A CPO needs to have a working knowledge of all security related aspects that could enhance the safety of his/her Principal (i.e. multi-skilled). In addition to the above mentioned factors, other recommendations emanating from this study focused on minimum competency standards for the identified subdivisions of close protection. Examples of possible assessment guidelines and criteria were identified covering the following broad classifications: * Prior educational qualifications * Physical abilities * CPO skills * Prior experience in guarding * Firearm skills * Unarmed combat * Protective skills * First aid skills * Security knowledge * Advanced driver training * Protocol and etiquette * Management and business skills * Related skills
Criminology
(M.Tech (Security Management))
APA, Harvard, Vancouver, ISO, and other styles
46

(10716789), Biliangyu Wu. "ASSESSING AND IMPROVING SECURITY AWARENESS AND CONCERNS IN TELEWORKING." Thesis, 2021.

Find full text
Abstract:

The unexpected and unprecedented global pandemic of COVID-19 has brought dramatic changes to the whole world. As a result of social distancing instituted to slow the pandemic, teleworking has become the new norm in many organizations. The prevalence of teleworking has brought not only benefits to organizations, but also security risks. Although teleworking has existed for decades and many security related issues have been studied by previous research, the researcher didn’t find any studies that have assessed organization employee’s security awareness and concerns in teleworking. Considering the vital importance of human security awareness in protecting information security, it is necessary to learn the security awareness situation in teleworking. Furthermore, employees with low security awareness should be trained to improve the awareness level. Therefore, this research intends to examine the current teleworking security awareness and concerns in organizations by conducting a survey of workers. Through the survey answers, the researcher found that the security awareness varies in groups of teleworkers who are at different ages, from different industries and different-sized organizations. Meanwhile, the researcher also found that COVID-19 pandemic does not have much impact on people’s security concern in teleworking scenarios.

APA, Harvard, Vancouver, ISO, and other styles
47

Lubbe, Lindy-Lee. "A competency model for security officers : a qualitative design." Diss., 2010. http://hdl.handle.net/10500/4608.

Full text
Abstract:
Crime is rife in South Africa. Explanations abound for the high crime statistics, including the weakening of the family unit, the political history of South Africa, urbanisation and the fast growing urban neighbourhood, a weak criminal justice system and the abundant availability of firearms. In the quest to prevent crime, the private security industry has become a key performer in helping to deter and prevent crime and criminal activities. Yet there are no set criteria for selecting security officers against the backdrop of the high crime rates and a growing private security sector. Therefore the purpose was to develop a competency model for the selection of security officers for the safekeeping and protection of persons and property in the Thaba Tshwane area. I chose to do qualitative research using an interpretive approach in an attempt to understand the views of the participants concerning the work context and requirements of security officers. A grounded theory approach to the strategy of inquiry was employed as it was best suited to keeping the information that was gathered grounded in the participants’ own opinions. The focus of this research was on designing a competency model for security officers for selection purposes. Data were gathered through disciplinary records and open-ended structured interviews where the repertory grid and the behavioural event interview were applied.Eight subject matter experts, who included security officers, managers and a client working in the security industry, were used. The result of the study was a competency model of nine competencies and their definitions, which were grounded in the data and critical in functioning as an efficient security officer.
Industrial and Organisational Psychology
M.Com. (Industrial and Organisational Psychology)
APA, Harvard, Vancouver, ISO, and other styles
48

Radivoev, Joanita. "The retention of sales consultants in the security industry." Thesis, 2008. http://hdl.handle.net/10210/300.

Full text
Abstract:
Most organisations depend on their sales consultants to generate revenue. Sales consultants across industries normally work for commission, determined by the amount of business they bring in. A group of security companies are currently spending a considerable amount of money and other resources on the recruitment, selection and development of sales consultants. In the past 18 months, 39 sales consultants left the company after being employed on average for no longer than five months. Keeping the above in mind, it was necessary to establish exactly what caused the high turnover rate among sales consultants. By identifying these factors it would be possible for the organisation to eliminate the causes for high employee turnover and work towards promoting factors which would retain the sales consultants. An overview of different motivation theories was considered. Most of the theories consider motivation from a personal need satisfaction perspective, while Herzberg also considers the motivation through restructuring of the work environment. For this reason, Herzberg’s theory was found to be the more appropriate one for this study . Herzberg’s Motivation Hygiene (MH) Theory and other current literature on employee retention were used as a basis to investigate the high turnover rate of sales consultants at a group of security companies. ii The nominal group technique was used to determine whether certain intrinsic and extrinsic factors are influencing the retention of sales consultants. A study of the relevant literature revealed that employee motivation is at the heart of retention. Literature on employee retention state that retention should be seen as a process, which starts even before an employee joins the organisation. Organisations need to focus on scientific recruitment and selection in order to employ the right person for the position. Retention should then be managed by developing employees and by introducing the intrinsic and extrinsic factors as formulated in the Herzberg MH theory. The outcome of such an employee retention process will result in cost savings over a wide spectrum. The literature on retention is summarised in an employee retention model, which was used to make recommendations to the organisation. The findings indicate that various factors such as company policies on remuneration, and administration, remuneration structure, working conditions and job security are playing a role in the retention of the sales consultant. Based on the results of the empirical study, recommendations are made to the organisation in terms of retaining their sales consultants. This includes a commitment to retention from top management, creating attractive sales positions; improve opportunities for training and development and a revised remuneration structure for sales consultants. The problem areas were identified and should be addressed satisfactorily by following the proposed recommendations.
Prof. W. Backer
APA, Harvard, Vancouver, ISO, and other styles
49

Pillay, Krisandren. "The growth and regulation of the private security industry in India and South Africa." Thesis, 2020. http://hdl.handle.net/10500/26976.

Full text
Abstract:
The lack of scientific research covering the factors contributing to the growth and regulation of the private security industry (PSI) in India and South Africa gave rise to the study. The study used qualitative research methods, a case study design and documentary analysis techniques, including personal interviews supported by a qualitative questionnaire and e-mailing the questionnaires to participants, to achieve the purpose and objectives of the study. The researcher interviewed seven participants from India personally and eight responded to the qualitative questionnaire sent by e-mail. The researcher conducted eight one-on-one interviews with South African participants and eleven members responded to the qualitative questionnaire sent by e-mail. The researcher carried out a pilot study to identify any shortcomings in the qualitative questionnaire. The study examined various theories on regulations and regulatory frameworks and considered the theoretical aspects of regulating the private security industry. This study confirmed that private security is growing at a rapid pace in India and South Africa, and the common factors encouraging growth include socio-economic factors like rapid growth and infrastructure, increasing urbanisation, growth of the middle class, poverty and unemployment, illegal immigration, growth in private property and increase in personal wealth. Indian participants especially, felt strongly that an increase in terror attacks is a key factor contributing to the rapid growth of the PSI, whilst South African participants confirmed, a fear of political violence and being scared of civil unrest were reasons for the increased presence of the PSI in the country. The participants corroborated that statutory-based legislation imposed by the Private Security Agencies (Regulation) Act 2005 and the Private Security Industry Regulation Act 2001 is not wholly effective in regulating the PSI in India.
Ukusweleka kocwaningo lwesisayense olwengamela izinto ezinomthelela ekukhuleni kanye nemitheshwana yolawulo kwimboni yonogada bezokuvikeleka yangasese i-private security industry (PSI) eNdiya naseNingizimu Afrika kwenze ukuthi kube nalolu cwaningo. Ucwaningo lusebenzise izindlela ze-qualitative research methods, i-case study kanye nethekniki yohlaziyo lwamadokhumende, okubandakanya nama-interview nabantu ziqu, ngokusekelwa wuhla lwemibuzo ebhaliwe ye-qualitative kanye nohla lwemibuzo ebhaliwe (questionnaires) ethunyelwe nge-email kulabo ababambe iqhaza, ukufezekisa izinhloso nezinjongo zocwaningo. Umcwaningi wenze ama-interview nababambi qhaza abayisikhombisa ziqu baseNdiya kanti abayisishagalombili baphendule imibuzo yohla ebhaliwe ye-qualitative oluthunyelwe nge-email. Umcwaningi ubuye waba nama-interview okubhekana ubusu nobuso nababambi qhaza baseNingizimu Afrika abayisishagalombili, kwathi abayishumi nanye baphendula uhla lwemibuzo ebhaliwe ye-qualitative ethunyelwe nge-email. Kwenziwe ucwaningo lokulinga (pilot study) ukubheka ukuntengantenga kohla lwemibuzo ebhaliwe ye-qualitative. Lolu cwaningo luhlole amathiyori ahlukahlukene ngokwenziwa kwemithetho yolawulo kanye nohlaka lwemitheshwana yolawulo, kanye nokubonelela izingxenye zethiyori yemitheshwana yolawulo lwemboni yonogada bezokuvikeleka yangasese. Ucwaningo luqinisekise ukuthi imboni yonogada bangasese bezokuvikeleka ikhula ngokuyisimanga eNdiya kanye naseNingizimu Afrika, kanti okuyixhumanisayo nokufanayo, kubandakanya ukukhula kwezinto eziphathelene nabantu nezomnotho njengokukhula ngesivinini kwezingqalasizinda, ukuya kakhulu kwabantu ezindaweni zamadolobha, ukukhula kwe-middle class, inhlupheko nokusweleka kwemisebenzi, ukungena kakhulu kwabantu ababuya kwezinye izindawo ngokungemthetho (illegal migration), ukukhula kwempahla yangasese kanye nokwanda kokunotha kubantu. Ababambi qhaza baseNdiya bona banemizwa eqinile yokuthi uhlaselo lwamaphekulazikhuni (terror attacks) yinto enomthelela kakhulu ukukhuleni kwemboni ye-PSI. Ababambi qhaza baseNingizimu Afrika bona baqinise ukwesaba udlame lwezepolitiki kanye nokwesaba izivungu-vungu zovukelwano lwabantu, yikho okube yizizathu zokukhula kobukhona be-PSI ezweni. Ababambi qhaza baqinise ukuthi imithetho efakelwe ye-Private Security Agencies (Regulation) Act 2005 kanye nomthetho we-Private Security Industry Regulation Act 2001 ayisebenzi ngokufanele ukulawula kahle imboni ye-PSI eNdiya.
Esi sifundo sibe ngunozala wokunqongophala kophando lobunzululwazi malunga nezinto ezincedisa ekukhuleni nasekulawulweni korhwebo lokhuselo lwabucala, iprivate security industry (PSI), kwilizwe laseIndia naseMzantsi Afrika. Isifundo sisebenzise indlela yophando lomgangatho, uyilo lwenkqubo engumzekelo, uhlalutyo lwemibhalo, udliwano ndlebe lobuso ngobuso nabantu ngabantu, oku kuxhaswa luluhlu lwemibuzo olubhaliweyo noluthunyelwe kubathathi nxaxheba ngeimeyile ukuze kuphunyezwe iinjongo zesi sifundo. Umphandi udlane indlebe nabathathi nxaxheba abasixhenxe abavela eIndia kanti abasibhozo baphendule uluhlu lwemibuzo yomgangatho kwi-imeyile. Umphandi uqhube udliwano ndlebe ubuso ngobuso nabathathi nxaxheba abasibhozo eMzantsi Afrika kanti abalishumi elinanye bona baphendule uluhlu lwemibuzo yomgangatho kwi-imeyile. Kwaqhutywa isifundo sokutshayelela ngenjongo yokuqonda ukuba akukho zikhwasilima na kuluhlu lwemibuzo yomgangatho. Isifundo siphonononge iingcingane okanye iithiyori ezingemigaqo nezakhelo zemigaqo yolawulo kwaza kwaqatshelwa imiba yeengcingane emalunga nokulawulwa norhwebo lokhuseleko lwabucala. Esi sifundo singqine ukuba ukhuselo lwabucala lukhula ngesantya esikhawulezayo eIndia naseMzantsi Afrika, kwaye izinto ezikhuthaza oku kukhula ziquka imiba yezentlalo noqoqosho njengokwanda okukhawulezayo nezibonelelo, ukwanda kweendlela zokuphila budolophu, ukukhula kwezinga loluntu eliphakathi (middle class), ubuhlwempu nentswela ngqesho, ukufudukela kwamanye amazwe ngokungekho mthethweni, ukwanda kokufumaneka komhlaba wabucala nokwanda kobutyebi babantu. Abathathi nxaxheba baseIndia bathi bacinga ukuba ukwanda kohlaselo ngabagrogrisi kuphambili ekuncediseni ukukhula korhwebo lokhuselo lwabucala. AbaseMzantsi Afrika bona bangqina ukuba uloyiko lobundlobogela bezopolitiko nokoyika uvukelo mbuso zizizathu zokwanda kobukho borhwebo lokhuselo lwabucala kweli lizwe. Abathathi nxaxheba bavuma ukuba imigaqo esekelwe emthethweni nebethelelwa nguMthetho Wokhuselo Lwabucala wama-2005, iPrivate Security Agencies (Regulation) Act 2005 kunye nePrivate Security Industry Regulation Act 2001 ayisebenzi ngokufezekileyo ekulawuleni urhwebo lokhuselo lwabucala eIndia.
Criminology and Security Science
Ph. D. (Criminal Justice)
APA, Harvard, Vancouver, ISO, and other styles
50

Banda, Teboho Elliot. "The challenges facing private security companies in retaining clients : a case study in Gauteng shopping malls." Diss., 2018. http://hdl.handle.net/10500/24677.

Full text
Abstract:
The private security industry is tasked with protecting lives and property against an evolving array of personal and property threats. Rendering such services comes with many market related challenges for private security providers. These services are rendered to various types of clients like government departments, hospitals, universities and shopping malls amongst others. These clients have unique and different needs and expectations, therefore shopping malls as clients of the private security industry were selected for the purpose of this research. The qualitative research approach was used for this study wherein a questionnaire was used to obtain information from private security and shopping mall personnel working in shopping malls in Gauteng. The findings of this study reveals that there are indeed client retention challenges that are facing private security companies providing services to shopping malls. Based on the findings, recommendations for the private security providers and further research in shopping mall security management are made.
Security Risk Management
M.Tech. (Security Management)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography