Journal articles on the topic 'Private security services – England'

To see the other types of publications on this topic, follow the link: Private security services – England.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Private security services – England.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Abd-Alrazaq, Alaa, Ali Abdallah Alalwan, Brian McMillan, Bridgette M. Bewick, Mowafa Househ, and Alaa T. AL-Zyadat. "Patients’ Adoption of Electronic Personal Health Records in England: Secondary Data Analysis." Journal of Medical Internet Research 22, no. 10 (October 7, 2020): e17499. http://dx.doi.org/10.2196/17499.

Full text
Abstract:
Background In England, almost all general practices (GPs) have implemented GP online services such as electronic personal health records (ePHRs) that allow people to schedule appointments, request repeat prescriptions, and access parts of their medical records. The overall adoption rate of GP online services has been low, reaching just 28% in October 2019. In a previous study, Abd-Alrazaq et al adopted a model to assess the factors that influence patients’ use of GP online services in England. According to the previous literature, the predictive power of the Abd-Alrazaq model could be improved by proposing new associations between the existing variables in the model. Objective This study aims to improve the predictive power of the Abd-Alrazaq model by proposing new relationships between the existing variables in the model. Methods The Abd-Alrazaq model was amended by proposing new direct, mediating, moderating, and moderated mediating effects. The amended model was examined using data from a previous study, which were collected by a cross-sectional survey of a convenience sample of 4 GPs in West Yorkshire, England. Structural equation modeling was used to examine the theoretical model and hypotheses. Results The new model accounted for 53% of the variance in performance expectancy (PE), 76% of the variance in behavioral intention (BI), and 49% of the variance in use behavior (UB). In addition to the significant associations found in the previous study, this study found that social influence (SI) and facilitating conditions (FCs) are associated with PE directly and BI indirectly through PE. The association between BI and UB was stronger for younger women with higher levels of education, income, and internet access. The indirect effects of effort expectancy (EE), perceived privacy and security (PPS), and SI on BI were statistically stronger for women without internet access, patients with internet access, and patients without internet access, respectively. The indirect effect of PPS on BI was stronger for patients with college education or diploma than for those with secondary school education and lower, whereas the indirect effect of EE on BI was stronger for patients with secondary school education or lower than for those with college education or a diploma. Conclusions The predictive power of the Abd-Alrazaq model improved by virtue of new significant associations that were not examined before in the context of ePHRs. Further studies are required to validate the new model in different contexts and to improve its predictive power by proposing new variables. The influential factors found in this study should be considered to improve patients’ use of ePHRs.
APA, Harvard, Vancouver, ISO, and other styles
2

Katusiime, B., P. Sarma, S. Corlett, and R. Cassidy. "My HIV Care – Preferences of people living with HIV for medicine-related support from community pharmacists." International Journal of Pharmacy Practice 30, Supplement_2 (November 30, 2022): ii26—ii27. http://dx.doi.org/10.1093/ijpp/riac089.030.

Full text
Abstract:
Abstract Introduction HIV is now a long-term condition, presenting new challenges for primary care providers. Hospital-based specialists have traditionally provided medicine-related support to people living with HIV (PLWH) within secondary care clinics,1 but with an aging population and rising polypharmacy2 other forms of support will be needed. Although community pharmacists (CPs) are already involved in sexual and reproductive health service delivery to varying magnitudes,3 it is unknown whether PLWH want them to be involved in their HIV treatment and medicine support. Aim To understand the pReferences and perceptions of PLWH towards CP involvement in their care. Methods An online survey, promoted to UK HIV charities and activists via social media (November 2021–July 2022), asked about pReferences for medicine-related support and the involvement of CPs in PLWH’s care. Questions explored factors that would influence use of CPs for all services. Views on sharing HIV diagnoses with CPs during medicine-related consultations were also obtained. Descriptive analysis was used. Institutional ethics approval was obtained. Results Approximately half (73/144) of those who accessed the survey fully completed it: 57.5% male; age 22-80 years. Of those who provided demographic data: 88.9%(n=48/54) were white; gay/lesbian (64.8%, n=35); University-level education (57.4%, n=31) and employed (55.6%, n=30). CPs were rated among the least helpful health professionals in terms of medicine support (2.7%, n=2) compared to general practitioners (13.7%, n=10), HIV clinic-based nurses (35.6%, n=26), specialist pharmacists (42.5%, n=31) or consultants (56.2%, n=41). Over half (56.1%, n=41) were unsure or did not want their CP to be involved in their HIV care. Patient autonomy/self-efficacy, mistrust, concerns around stigma and privacy/confidentiality of information shared in community pharmacy settings, and perceived lack of HIV-related knowledge among CPs influenced participants’ pReferences: “they don’t need to know or don’t have the understanding of HIV and HIV meds to correctly use this information. I check drug and treatment interactions or complications before procedures myself.” Many participants wanted more information on HIV-related drug interactions and less judgemental attitudes: "if they could be less racist and homophobic and normalise conversations about HIV.” Some participants wanted holistic supply of all their antiretroviral and non-HIV medicines from their community pharmacies. There was equal resistance from other participants: “I certainly wouldn’t want my HIV care to be done by a chemist...” Expectedly, more participants were willing to share information about their HIV status and antiretroviral drug history during private (39.7%, n= 29) compared to over-the-counter consultations (28.8%, n= 21). Reasons for sharing information with CPs were positive: “so that they fully understand my medical circumstances and help me accordingly” and “in case of interactions”. Discussion/Conclusion Whereas some PLWH want more involvement of CPs in their care, others are sceptical of their role in HIV, similar to other primary care providers.1 This study was limited to online respondents. Future research is needed to explore how to build confidence of PLWH in CPs with regards to their changing medicine support needs. Understanding training needs of CPs and promoting HIV-friendly community pharmacies will be key in supporting medicine needs of PLWH. References 1. Rai T et al. Experience of primary care for people with HIV: a mixed-method analysis. BJGP Open, 2019;3(4):1-14 2. Baylis A et al. The future of HIV services in England -shaping the response to changing needs. Kings Fund Report. 2017;1-100 3. Public Health England (The UK Health Security Agency). The pharmacy offer for sexual health, reproductive health and HIV - a resource for commissioners and providers, 2019;1-25
APA, Harvard, Vancouver, ISO, and other styles
3

Saltirovska, Zorica. "The Development of Private Security and the Dillemas Surrounding the Effects of Private Security Services." Security Dialogues /Безбедносни дијалози 2 (2016): 81–91. http://dx.doi.org/10.47054/sd1620081s.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Yang-hyun. "A Study on Work Scope of Private Security Guards in Multi-Family Housing." Korean Society of Private Security 21, no. 4 (October 31, 2022): 33–50. http://dx.doi.org/10.56603/jksps.2022.21.4.33.

Full text
Abstract:
『Security Services Industry Act』 strictly prohibits private security guards from performing tasks outside of guard services duties. However, in reality, private security guards in multi-family housing perform other tasks in addition to providing guard services. In order to resolve this gap between the system and reality, 『Multi-Family Housing Management Act』 was revised on October 20th, 2021 to provide exemptions in regard to applying 『Security Services Industry Act』 to private security guards in multi-family housing. According to this revision, multi-family housing residents cannot give illegal instructions or commands to private security guards. Despite various efforts such as the revision of related laws, the issue regarding the work scope of private security guards in multi-family housing is being raised repeatedly. This study provided further discussions related to the work scope of private security guards in multi-family housing, one year after the enforcement of the new system. Main conclusions of this study are as follows. Major points that need to be addressed when revising the laws related to the work scope of private security guards in multi-family housing were suggested. First, the gap between the law related to the work scope of private security guards in multi-family housing and reality was pointed out. Second, the need for the unification of regulations that are related to the tasks of private security guards in multi-family housing was pointed out. Third, the need for the change in public attitude of citizens regarding the role of private security guards in multi-family housing was pointed out.
APA, Harvard, Vancouver, ISO, and other styles
5

Pattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (May 19, 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.

Full text
Abstract:
AbstractThe cyber realm is increasingly vital to national security, but much of cybersecurity is provided privately. Private firms provide a range of roles, from purely defensive operations to more controversial ones, such as active-cyber defense (ACD) and ‘hacking back’. As with the outsourcing of traditional military and security services to private military and security companies (PMSCs), the reliance on private firms raises the ethical question of to what extent the private sector should be involved in providing security services. In this article, I consider this question. I argue that a moderately restrictive approach should be adopted, which holds that private firms can justifiably launch some cybersecurity services – defensive measures – but are not permitted to perform others – offensive measures.
APA, Harvard, Vancouver, ISO, and other styles
6

Khalyasov, Ilshat S., and Andrey G. Svetlakov. "TO THE QUESTION OF RUSSIAN AND FOREIGN EXPERIENCE OF COUNTERACTION CRIMINALIZATION IN THE MARKET OF SECURITY SERVICES." Today and Tomorrow of Russian Economy, no. 107-108 (2022): 63–73. http://dx.doi.org/10.26653/1993-4947-2022-107-108-05.

Full text
Abstract:
This article discusses the issues of decriminalization of the security services market, the author’s definition of this concept is proposed; the functions of private security companies in the implementation of public and private interests, the scheme of interaction between security officers, security companies, customer organizations and the state in the security services market are presented. The characteristic features of the implementation of security activities in Russia are considered, the powers of security officers are determined, including the protection of the life and health of citizens, the protection of objects and property, consulting, ensuring public order, conducting inspections while ensuring intra-object and access control. The analysis of foreign experience in the implementation of security services in the United States, Germany, Bulgaria and China, as well as the interaction of private security companies with private military companies. The level of salaries of security officers in Russia and foreign countries is presented.
APA, Harvard, Vancouver, ISO, and other styles
7

Avant, Deborah, and Kara Kingma Neu. "The Private Security Events Database." Journal of Conflict Resolution 63, no. 8 (January 30, 2019): 1986–2006. http://dx.doi.org/10.1177/0022002718824394.

Full text
Abstract:
Since the 1990s, the private provision of military and security services has become a common feature of local, national, and transnational politics. The prevalence of private security has generated important questions about its consequences, but data to answer these questions are sparse. In this article, we introduce the Private Security Events Database (PSED) that traces the involvement of private military and security companies (PMSCs) in events in Africa, Latin America, and Southeast Asia from 1990 to 2012. We describe the PSED project, highlight its descriptive findings, conduct a replication and reanalysis of Akcinaroglu and Radziszewski’s contract data in Africa, and compare the two databases’ coverage of Sierra Leone from 1991 to 1997. Our analysis demonstrates new insights into the relationship between PMSCs and civil war duration, confirming a correlation between PMSC presence and shorter conflicts, but questioning the logic Akcinaroglu and Radziszewski propose. It also points to a number of productive paths for future research.
APA, Harvard, Vancouver, ISO, and other styles
8

GABRIEL, Jacek, and Adam KOŁODZIEJCZYK. "PRIVATE SECURITY COMPANIES AND THE DEONTOLOGICAL CODES." National Security Studies 15, no. 1 (December 13, 2018): 195–210. http://dx.doi.org/10.37055/sbn/132157.

Full text
Abstract:
The article is an analysis of the private security companies’ activities, safeguarding people and property, in the context of compliance to ethical codes. The private security market in Poland was created last century in the eighties, and took over part of the tasks carried out thus far by the police and the army, which dealt with the protection of state institutions, and critical infrastructure of the country. The authors in their analysis point out that uniformed services, which previously dealt with protection, have had not only legal authorization in the implementation of such tasks, but also an extensive codes of honor, or ethical codes of conduct. Currently, there are few companies operating on the security market that have such codes of ethics. The authors suggest that the introduction of ethical (deontological) codes by private companies will increase the level of services provided, and contribute to the increase in the prestige of the protection profession.
APA, Harvard, Vancouver, ISO, and other styles
9

Trounstine, Jessica. "The Privatization of Public Services in American Cities." Social Science History 39, no. 3 (2015): 371–85. http://dx.doi.org/10.1017/ssh.2015.61.

Full text
Abstract:
In the United States, significant variation regarding the quality of public goods exists across local governments. In this article, I seek to explain these patterns. I argue that economically and racially homogenous communities are collectively willing to invest more resources in public goods relative to diverse communities. I provide evidence in support of this claim by analyzing the relationship between race and income diversity and the share of community security and education that is provided by private entities. I find that as racial diversity and income inequality increase, the share of private security guards and white children enrolled in private school is higher.
APA, Harvard, Vancouver, ISO, and other styles
10

Tzifakis, Nikolaos. "Contracting out to Private Military and Security Companies: The Market for Security Services." European View 11, no. 1 (June 2012): 125–26. http://dx.doi.org/10.1007/s12290-012-0197-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Csaba, Zágon, and Zsolt Lippai. "The Borderline between Private and Public Security." Academic and Applied Research in Military and Public Management Science 20, no. 3 (May 26, 2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.

Full text
Abstract:
A few years ago, a White Paper was published by the Confederation of European Security Services (CoESS) with the collaboration of the Institut National des Hautes Études de Sécurité (INHES) on the security market of the European Union. The authors identified several reasons why public and private security providers in the member states share the market and why they are bound to cooperate for the public good, that is, the security itself. However, the states’ law enforcement capacities cannot cover all security demands of the public due to the finite (mainly budgetary) resources that always set capacity limits hence congestions in the assignments of police services occur from time to time. Private security operatives fill into the supply gaps occurring in a fragmented security landscape in Europe. Due to the variables in the market share, countries made their patterns in public and private security components, the statutory frameworks, and the traditions concerning the role played by the commercial security sector in overall security provisions. Here a typology may be formed from the clusters of countries following alternative approaches, respectively. There is a border zone between the two sectors. The exclusive public security domain gives way to areas of common interest and moves on to where private security takes precedence, and public actors only play a supervisory role. This article examines the boundary zone in multiple approaches, attempting to stipulate the red line between the two security elements.
APA, Harvard, Vancouver, ISO, and other styles
12

Dworzecki, Jacek. "The Role and Place of Private Companies Offering People and Property Protection Services in the Slovak Internal Security System." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 3, 2018): 10–19. http://dx.doi.org/10.5604/01.3001.0012.4557.

Full text
Abstract:
The paper discusses the role and place of private companies offering services related to people and property protection in the Slovak internal security system. The paper outlines the Slovak system of internal security, its institutions, entities and formations and presents organizational and legal basis for functioning of private security entities in the Slovak Republic. Additionally, the paper presents procedures of applying for a license which entitles the holder to start a business in the security sector and to perform tasks written down in the catalogue of services for private security industry. The text is completed with statistics related to the activities of private security companies with respect to security and public order in Slovakia. The paper was prepared as a part of a research and innovation project within operational project Horizon (2020-FCT-2015, No: 700688) Understand the Dimensions of Organized Crime and Terrorist Networks for Developing Effective and Efficient Security Solutions for First-line-practitioners and Professionals.
APA, Harvard, Vancouver, ISO, and other styles
13

Sarkar, Jaydip, and Mary di Lustro. "Evolution of secure services for women in England." Advances in Psychiatric Treatment 17, no. 5 (September 2011): 323–31. http://dx.doi.org/10.1192/apt.bp.109.007773.

Full text
Abstract:
SummaryPatients detained at high and medium security reveal significant gender differences in the presentation of psychopathology, mental disorder and social and offending profiles. However, secure mental health services in England, like prisons, generally fail to recognise the core importance of the differing biopsychosocial development in women and the impact of life experiences on women's subsequent biopsychosocial functioning. As a consequence, women are often inadequately provided for in services dictated by the identified needs, risks and responsiveness of men. The lack of clinically appropriate facilities for women may account for the increased frequency with which women are readmitted to medium security and for their longer admissions to both high and medium secure care. New tertiary services are developing as a result of the lessons learnt while providing gender-blind care. However, further development is required to ensure that women receive services of the same quality, range and nature of those received by men.
APA, Harvard, Vancouver, ISO, and other styles
14

Moricova, Valeria, Monika Vaclavkova, Jana Studena, and Bo Wang. "A Software Tool to Support the Selection of Candidates in Private Security Services." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 102–9. http://dx.doi.org/10.26552/com.c.2018.2.102-109.

Full text
Abstract:
Nowadays the protection of life, health and property of individuals is in the centre of public interest. There is not a distinction between the provision of such protection by private or public sector. The private security services play an important role in protection of persons and property. The subjects of protection are not only people and property, but also sensitive information which is relevant for the state interest or business entities. Based on research, the private security services do not make a selection of employees systematically. One of the reasons is the absence of an analysis of candidates' personal competencies which should take into account the requirements of the protected subject. The aim of the article is therefore a software solution for modelling the personal competencies of applicants for the job in private security services.
APA, Harvard, Vancouver, ISO, and other styles
15

Janković, Bojan, and Vladimir Cvetković. "Attitudes of members of private security about the police." Bezbednost, Beograd 64, no. 2 (2022): 5–21. http://dx.doi.org/10.5937/bezbednost2202005j.

Full text
Abstract:
Scientific literature includes numerous studies of citizens' perceptions of the police. However, the question arises as to how the police are seen by members of priv ate security, who perform similar security tasks as police officers. The results of the survey, which involved 178 members of private security services, indicate that they have a high opinion of the police and its members. It is noticeable that older members of private security have a slightly better opinion of members of the police than their younger colleagues. This indicates that more work should be done with younger members of the private security, not only as part of the courses f or private security, but also later, during the service. There is certainly a need to insist more on joint trainings, both in order to increase trust and to get to know the procedures that the services are undertaking.
APA, Harvard, Vancouver, ISO, and other styles
16

Kubás, Jozef, Viktor Šoltés, and Katarína Repková Štofková. "SUPPORTING SMALL AND MEDIUM SIZED BUSINESSES IN SPECIFIC SERVICES WITHIN SLOVAKIA." CBU International Conference Proceedings 6 (September 25, 2018): 260–65. http://dx.doi.org/10.12955/cbup.v6.1166.

Full text
Abstract:
Providing private security is considered a specific type of business service, primarily carried out by small- and medium-sized enterprises. This specific type of business complements the state services in the field of internal security. State institutions support the creation of small- and medium-sized enterprises through targeted subsidies. The principal goal of this paper is to describe the business environment within Slovakia, focusing on small and medium enterprises providing services of private security. The secondary aim of the paper is to explain the support available for such business through subsidies from public authorities. The number of enterprises that provide services of private security, along with the number of their employees, is relevant. The outputs of the paper can be used as part of the analysis of the competitive environment by subsidy applicants who plan to operate in this specific area.
APA, Harvard, Vancouver, ISO, and other styles
17

NARVÁEZ GONZÁLEZ, Cristina, and Katharine VALENCIA. "Improving Human Rights in the Private Security Industry: Envisioning the Role of ICoCA in Latin America." Business and Human Rights Journal 4, no. 1 (January 2019): 79–107. http://dx.doi.org/10.1017/bhj.2018.24.

Full text
Abstract:
AbstractThe private security industry in Latin America has been associated with human rights abuses, particularly in the context of extractive operations. Most private security guards in the region are poorly trained and do not undergo adequate vetting. These factors combined with serious deficiencies in the rule of law across the region too often enable private security companies to effectively operate outside state control and engage in human rights abusive practices. This article argues that adoption of the International Code of Conduct for Private Security Providers (ICoC) by Latin American private security companies and states, coupled with civil society engagement with ICoC’s Association, may help reduce negative human rights impacts arising out of private security services within the extractive industry.
APA, Harvard, Vancouver, ISO, and other styles
18

Yan, Tian, Shan Zeng, Mengyao Qi, Qingbao Hu, and Fazhi Qi. "Cyber security detection and monitoring at IHEP private cloud for web services." EPJ Web of Conferences 214 (2019): 07016. http://dx.doi.org/10.1051/epjconf/201921407016.

Full text
Abstract:
To improve hardware utilization and save manpower in system maintenance, most of the web services in IHEP have been migrated to a private cloud build upon OpenStack. However, cyber security attacks becomes a serious threats to the cloud progressively. Therefore, a cyber security detection and monitoring system is deployed for this cloud platform. This system collects various security related logs as data sources, and processes them in a framework composed of open source data store, analysis and visualization tools. With this system, security incidents and events can be handled in time and rapid response can be taken to protect cloud platform against cyber security threats.
APA, Harvard, Vancouver, ISO, and other styles
19

Harkin, Diarmaid. "The uncertain commodity of ‘security’: Are private security companies ‘value for money’ for domestic violence services?" Journal of Criminology 54, no. 4 (October 11, 2021): 521–38. http://dx.doi.org/10.1177/26338076211046686.

Full text
Abstract:
Reflecting on Loader and White ’s (2018) suggestion that the labour of private security workers is difficult to ‘commodify’, this paper uses original empirical data to show that there are four elements to what private security workers ‘do’ for victims of domestic violence when contracted by domestic violence advocacy services: they provide (a) practical ‘target-hardening’ measures, (b) ‘expert’ advice on security, (c) forms of ‘security therapy’ as workers talk clients through their safety-based anxieties and (d) forms of ‘security theatre’ as workers provide the appearance of providing security despite the efficacy often being unclear or uncertain. Each of these elements have significant risks that can threaten the interests of victims and domestic violence services.
APA, Harvard, Vancouver, ISO, and other styles
20

Gerevich, János, and Imre Négyesi. "Network and Information Security of Cloud Computing Services." Hadtudományi Szemle 13, no. 2 (2020): 35–46. http://dx.doi.org/10.32563/hsz.2020.2.4.

Full text
Abstract:
The security of network and information systems has become a critical issue for both the public and private sectors in the last decade. This article reviews the current EU directive in this area, looking for safety and reliability requirements. Next, we get an overview of the different models of cloud computing services. Finally, the relationship between the identified security and reliability requirements and the cloud computing service models will be described.
APA, Harvard, Vancouver, ISO, and other styles
21

Завальний, М. В. "National, International and Legal Mechanisms of Control over the Activity of Non-Government Security Entities." Law and Safety 73, no. 2 (June 21, 2019): 31–36. http://dx.doi.org/10.32631/pb.2019.2.04.

Full text
Abstract:
The author of the article has studied the reasons for introducing a control mechanism over the activities of private security companies, which play an increasingly important role in the security sector worldwide. These companies by providing security services, directly influence the security, human rights and democratic order of the country. In this regard, it has been emphasized that the issues of legal regulation of the activities and responsibilities of private security companies are particularly important for society and the state. The importance of controlling private security companies and security services is conditioned by the particularities of the services provided by these entities. Private security companies in the course of their activities can apply physical force, special means (in some countries even firearms) to citizens, carry out their detention, which in turn can cause degrading treatment and physical suffering. Further privatization and outsourcing in the security sector has led to a significant expansion of this area and increased risks of human rights and freedoms’ violations. The author has stated that the purpose of control over the activity of non-government entities in the field of security and safety is to prevent deviations from the established order of state security and public order protection, prevention, detection and termination of actions that harm the protected state interests. The need to strengthen this control is due to two main aspects: 1) there is a need to raise the standards of corporate governance in the field of non-governmental protection of human rights; 2) there is a more general tendency to regulate the behavior of all business structures regarding human rights in all areas of their activities. The author has distinguished four possible ways to influence private security companies: national legal systems and courts; corporate norms; international and regional voluntary initiatives; international and legal regulation.
APA, Harvard, Vancouver, ISO, and other styles
22

Layard, Antonia. "Privatising land in England." Journal of Property, Planning and Environmental Law 11, no. 2 (July 8, 2019): 151–68. http://dx.doi.org/10.1108/jppel-03-2019-0009.

Full text
Abstract:
Purpose This paper aims to analyse the extent to which privatising – or denationalising land – has legal and policy effects. Design/methodology/approach It applies the law in context scholarship to the question of land privatisation. Findings Of all the recent privatisations in England, the most valuable, and yet least recorded, is of land. According to one estimate, two million hectares or 10 per cent of the Britain landmass, left the public sector for private ownership between 1979 and 2018. Privatisations include land that is sold, leased or where a public body changes its status. This paper aims to explore these privatisations, considering them as denationalisations, concluding that the effects are most significant in housing where the differences between social and private renting in relation to rents, the security of tenure and housing quality are striking. Moreover, although other public law restraints on the state-owned property are often limited, they are also still significant, facilitating scrutiny, particularly in combination with the public sector equality duty or site-specific duties for libraries, allotments or playing fields. All the sites disposed of to private developers, landlords and companies have lost these protections. Originality/value This is the first time this question has been considered in this way from a legal perspective.
APA, Harvard, Vancouver, ISO, and other styles
23

Østensen, Åse Gilje. "Implementers or Governors?" International Community Law Review 16, no. 4 (October 24, 2014): 423–42. http://dx.doi.org/10.1163/18719732-12341288.

Full text
Abstract:
This article explores the role of private security and military companies within the wider confinements of peace operations governance. To do so, the paper looks at the roles that pmscs play within two different us peace support initiatives as well as within un peace operations. Using theory lenses derived from the governance literature, the article finds that private military and security companies are already established actors within what it calls ‘the peace operations network’. By training forces, by building or reforming institutions, by supplying security and advisory services, or by being technological experts, private providers of military and security services carry out key tasks in the planning and implementation of peace operations. In the process, the paper argues, they ultimately exercise authority, make decisions and establish practices that often lay the foundations for the future management of security of local populations.
APA, Harvard, Vancouver, ISO, and other styles
24

Kuznetsov, E. A. "The Role of the Commercial Space Industry within the US National Security under the Trump Administration." Moscow University Bulletin of World Politics 13, no. 1 (April 7, 2021): 85–119. http://dx.doi.org/10.48015/2076-7404-2021-13-1-85-119.

Full text
Abstract:
The US space activities from their inception have been closely connected with the private sector. However, only in 2010s private space companies have come to play a prominent role not only on the global market of space services but in the field of international security as well. At the same time, this trend towards commercialization of outer space use and the growing role of the private space sector in ensuring national security is still understudied. This paper aims to partially fill this gap by assessing approaches to these issues adopted by the administration of D. Trump. In the first section the author notes that both conceptual and legal frameworks of private space activities lack clarity and proposes an operational definition of the phenomenon. The second section provides a brief overview of the key strategic policy documents of the Trump’s administration including those on commercial use of space in general and its implications for the US national security in particular. The third section identifies the trend towards the institutionalization of the US Space Forces as one of the priorities of the Trump’s administration military policy. The fourth section thoroughly examines key forms and areas of the public–private partnership in commercial use of space, including launch services, communication services, intelligence gathering, as well as production and maintenance of satellites. Finally, the fifth section assesses the prospects for private space activities given the current tightness of the space services market and growing competition. The author concludes that private space plays a subsidiary role within the US national security and is still heavily dependent on state support. Nevertheless, the scope of public–private cooperation is expanding and the models of interaction are changing. The Trump’s administration has contributed to the development of the industry through liberalization of regulations and involvement of private sector in the new large-scale projects, such as the Artemis program. The other important outcome of the space policy of the 45th President of the United States is anchoring of private space activities in the US national security strategy documents.
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Sang Su, and Sang Yeol Lee. "A Study on the Perception of University Students on the Importance of Private Security." Forum of Public Safety and Culture 19 (November 30, 2022): 63–81. http://dx.doi.org/10.52902/kjsc.2022.19.63.

Full text
Abstract:
Private security are evaluated to have positive effects not only in private areas such as personal and corporate protection and security, but also in public areas such as the state and local public organizations. The purpose of this study is to analyze the importance of private security perceived by university students and to seek ways to revitalize private security through these results. For the purpose of this study, a survey was conducted on the necessity of private security, the role and function of private security, and the professionalism of private security, targeting 177 college students located in the Seoul metropolitan area and Chungcheong buk Province. Based on the results of this analysis, I would like to make the following policy suggestions on the importance of private security. First, it is necessary to materialize the establishment of a cooperative system with public security (police). In order to establish a practical cooperative system with public security, a more fundamental solution to the problems and limitations of private security must be preceded. Second, it is necessary to prepare a plan to improve the professionalism of private security. In order to improve the professionalism of private security, above all, it is necessary to introduce a private security guard qualification system and establish a national qualification system that can verify the qualifications of private security. The introduction of such a certification system will improve the professionalism of private security, as well as improve the qualifications of private security and, in particular, improve the negative perception of private security from customers, citizens. Third, it is necessary to expand public security services through private security. In order to expand the public security service of private security, it is necessary to transfer a certain part of public security to private security, except for the legal part, and to prevent other crimes. At the same time, it is necessary to enhance the competitiveness of the private security industry by strengthening public relations activities for private security.
APA, Harvard, Vancouver, ISO, and other styles
26

Thomas, Stuart D. M., Mairead Dolan, Jenny Shaw, Samantha Thomas, Graham Thornicroft, and Morven Leese. "Redeveloping Secure Psychiatric Services for Women." Medicine, Science and the Law 45, no. 4 (October 2005): 331–39. http://dx.doi.org/10.1258/rsmmsl.45.4.331.

Full text
Abstract:
Historically, a substantial proportion of women have been unduly detained in conditions of high security in England due to the lack of suitable alternative facilities. There have been no studies that have comprehensively examined the individual needs of these women in relation to their placement needs. A cross sectional survey was undertaken of the individual and placement needs of all females detained in the three high security psychiatric hospitals (HSPHs) in England on 18th October 1999. Whilst there are clearly differences in accommodation needs among the women, those requiring lower secure services are significantly less likely to have needs in relation to violence (OR 0.29, 95% CI 0.14-0.62) and drugs (OR 0.29, 95% CI 0.12-0.67) when length of stay is taken into account. They also have lower security, treatment and dependency needs than women still requiring HSPH treatment. A significant reorganisation of services is required. There is a need to gain further understanding of the relationships between traumatic histories, clinical presentation and antisocial behaviour and how these impact on assessed risk, treatment and care needs and outcome. The special needs of these women should be considered a priority when developing treatment and care packages.
APA, Harvard, Vancouver, ISO, and other styles
27

Tian, Hong Fang, Yan Hua Liu, and Ying Hong Li. "Ethernet Private Line Access Design Scheme." Applied Mechanics and Materials 103 (September 2011): 578–82. http://dx.doi.org/10.4028/www.scientific.net/amm.103.578.

Full text
Abstract:
With the development of Internet, IP has already taken the leading position of any kind of terminal utilization. In order to satisfy consumers’ growing requirements of broadband services,and make up for insufficiency of IP MAN in business management efficiency, data throughput, stability, maintenance difficulty and so on, improve information security of banks and governments, the article introduces a method of achieving Ethernet private line access to improve the information security and the quality of service of big consumer.
APA, Harvard, Vancouver, ISO, and other styles
28

Kimani, John Kimani. "Perception on Private Securization on Service Delivery in Owned Businesses in Africa. A Critical Literature Review." Journal of International Relations and Policy 1, no. 1 (November 4, 2022): 47–59. http://dx.doi.org/10.47941/jirp.1109.

Full text
Abstract:
Purpose: Security service delivery in public sector is crucial as it entails protecting government personnel as well as property. Therefore, security is increasingly viewed as a key condition for economic growth and development. The overall objective of this study was to examine perception on private securization on service delivery in owned businesses in Africa. Methodology: The paper used a desk study review methodology where relevant empirical literature was reviewed to identify main themes and to extract knowledge gaps. Findings: The study concluded that outsourcing security services, frees up time required for recruiting personnel’s and managing them, which gives enough time to concentrate on the core services provided by the organization. This has significantly improved efficiency and enhanced better service delivery in outsourcing firms. In contrast, outsourcing of security services from advertisement process, to examining backgrounds and training is a laborious time-consuming exercise, which as a result also saves overall costs of this outsourced services. This process is usually better handled by the specialized companies than contracting organizations. Unique Contribution to Theory, Policy and Practice: It is recommended that it’s most appropriate for enterprises to strengthen their cash protection security services. This can be achieved through outsourcing of highly skilled security services from reputable security firms. The institutions should also provide regular trainings to the security officers on effective cash protection. Further, the study recommends that security officers should be trained on how to protect human life especially, the personnel that they are supposed to protect. The security officers should also make sure that they conduct thorough checkups on any persons accessing the company premises.
APA, Harvard, Vancouver, ISO, and other styles
29

Regényi, Kund, Nándor Jasenszky, and Zsolt Lippai. "The concept of security awareness, its development from the point of view of national security, counter-terrorism, and private security." Belügyi Szemle 70, no. 1. ksz. (March 17, 2022): 123–37. http://dx.doi.org/10.38146/bsz.spec.2022.1.7.

Full text
Abstract:
In their article, the authors present – using a comparative approach – the current issue of security awareness. In doing so, they start from the concept of security, then move on to the concept of security awareness, and outline the significant moments of its development concerning national security services. They then briefly flash police crime prevention and then move on to the security awareness presentation from a counterterrorism perspective. The article concludes with a presentation of the topic from a private security perspective and a case study from an international context. In the summary, the authors believe that, in addition to a similar methodology, national security, counterterrorism, and private security security awareness support and complement each other.
APA, Harvard, Vancouver, ISO, and other styles
30

Albrzykowska, Ewelina. "Protection of Judicial Facilities in the Republic of Poland: An Outline of the Problem." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 36, no. 36 (December 20, 2019): 9–28. http://dx.doi.org/10.5604/01.3001.0014.1290.

Full text
Abstract:
The aim of the article is to show the way of security agencies operation at the courts in Poland. Firstly, the author indicates the most important regulations regarding the protection of persons and services, as well as the most important rights and obligations of security officers in the general and then discussed principles of organization of protective actions in public buildings. Next, the author points out the rights and obligations of court security officers based on the regulations contained in the network and the scope of the terms of contract for protection services of selected courts in Poland. There are terms of security services in the courts of the Republic of Poland by private companies specializing in this field shortly characterized, as well as the principles of announcing a tender. This leads to the conclusion that private security agencies in Poland are very important for courts functioning, which really take into account the sense of security of all persons staying in the court.
APA, Harvard, Vancouver, ISO, and other styles
31

Lee, Jen-Chieh, and Tyrone T. Lin. "Decision Analysis on Sustainable Value: Comparison of the London and Taiwan Markets for Product Integration of Family Security Services and Residential Fire Insurance." Journal of Risk and Financial Management 13, no. 11 (October 30, 2020): 266. http://dx.doi.org/10.3390/jrfm13110266.

Full text
Abstract:
This paper explores a decision analysis on product integration of family security services and residential fire insurance in the London and Taiwan markets by using the proposed mathematical models for counting sustainable value. This paper shows the five main different results between London and Taiwan markets with ten different parameters of the family security market, to find out the optimal number of family security integrated services for each security company in London. The improvement of the risk aversion effect based on risk and financial management will enhance the market share of the private security industries in the London and Taiwan markets. The results of this research can serve as a reference for the decision-making of private security industries on product integration under sustainable value consideration. The research findings highlight the potential benefits for both the private security industry and the insurance industry in their design and negotiation for product integration to improve both of business operation and achieve corporate social responsibility goals to match the sustainability in the future.
APA, Harvard, Vancouver, ISO, and other styles
32

Avant, Deborah D. "Pragmatic Networks and Transnational Governance of Private Military and Security Services." International Studies Quarterly 60, no. 2 (February 18, 2016): 330–42. http://dx.doi.org/10.1093/isq/sqv018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Nebolsina, M. A. "Private Military and Security Companies (PMSCs) in the Modern International Processes." Journal of International Analytics 13, no. 2 (June 28, 2022): 107–33. http://dx.doi.org/10.46272/2587-8476-2022-13-2-107-133.

Full text
Abstract:
The period of rapid growth and development of the phenomenon, that is presently characterized as private military and security companies (PMSCs), coincided with the two processes of modern history of international relations: the end of the Cold War and the beginning of the U.S. Global War on Terror (GWOT) in Afghanistan. At the same time state attitude towards violence and transformation of warfare has been changing as well. Two diff erent approaches to the history of the private security market’ rise unveil the fact, that, in one way or another, the originators of the private security services were associated with the defense industry and armed forces. Non-state security actors look back on a history, that stretches to the middle and the second half of the 20th century – the period of national liberation movements across the world. Meanwhile, the 90-s of the 20th century marked the fast growth in the number of PMSCs and in the development and enlargement of the private security services’ market. Its growth is ongoing to date with gaining more new states that are interested in utilizing its capacity as an instrument of politics. Against the backdrop of the world political processes the private security market experienced technological growth and enhancement. Together with that, both the normative regulation and the approaches of the international community to the phenomenon of private military and security companies have been evolving and changing. Despite its functionality, fl exibility and technological advantages, the market of private security can challenge human rights as well as bare responsibility for the facts of corruption and improper fulfi llment of contractual obligations. Still the episodes of revealed grieve violations rarely reach courts, with infrequent cases of sentencing the perpetrators to punishment. These and other problems occurring in the private security industry require close attention by the states and international community, which has been making eff orts for elaboration of the applicable normative mechanisms to regulate private military and security activity for more than fi fteen years.
APA, Harvard, Vancouver, ISO, and other styles
34

Mekolela, Agosta Mecca, and Shadrack Bett. "Challenges Facing the Provision of Security Services by Private Security Firms; A Study of Juja Town, Kiambu County, Kenya." East African Journal of Business and Economics 5, no. 1 (November 8, 2022): 318–27. http://dx.doi.org/10.37284/eajbe.5.1.940.

Full text
Abstract:
Security is fundamental in all societies. It ensures that society thrives due to the assurance of the safety of lives and property. It is through security that people can invest in the community and develop the area. It is also worth noting that safety and security lie at the heart of the prosperity of any nation. Every citizen wants to feel secure and protected from any injury or risk. However, today security is faced with challenges in diverse aspects of people’s daily lives, and trust lies in the institutions mandated to keep people safe. In this new reality, governments are overstretched by providing security to the details of their citizen’s endeavours. That is why private securities are contracted to provide the needed security to fill the gaps. It is essential to underscore private security’s role in society further. The analysis directs us to Maslow’s hierarchy of needs, a theory that Abraham Maslow advanced in 1943. The theory opines that as people meet their basic needs, they tend to have an insatiable desire to ensure their satisfaction with higher needs concerning the hierarchy, as proposed by Maslow. Security is increasingly becoming a priority to many as time goes on. Private security has become popular today due to its flexibility and ability to cater to personalized demands. However, the sector faces many challenges, including mistrust from national law enforcement. The research considers the town of Juja in Kiambu County, Kenya, to highlight the challenges faced by private security apparatus in Kenya. The challenges discovered range from sectorial to societal. Proper reforms would be needed to improve the efficiency of private security in Kenya. Despite the challenges, years of operation have witnessed growth in the sector
APA, Harvard, Vancouver, ISO, and other styles
35

Harkin, Diarmaid, and Kate Fitz-Gibbon. "Private security companies and domestic violence: A welcome new development?" Criminology & Criminal Justice 17, no. 4 (October 16, 2016): 433–49. http://dx.doi.org/10.1177/1748895816673881.

Full text
Abstract:
Due to the poor reputation of the private security industry and the multiple lines of concerns raised by scholars over the potentially corrosive costs of commercial security provision, it is important to consider whether for-profit companies are a welcome addition to the network of actors who respond to the needs of domestic violence victims. Using the case study of ‘Protective Services’ in Victoria, Australia, who appear to be one of the first known instances of a private security company offering services to victims of domestic violence, we argue that there may be advantages for victims engaging with commercial providers and reasons for optimism that commercial outfits can improve feelings of safety for a particularly vulnerable and under-protected population.
APA, Harvard, Vancouver, ISO, and other styles
36

Wilkinson, Greg. "Mental Health Services Planning." Bulletin of the Royal College of Psychiatrists 9, no. 7 (July 1985): 138. http://dx.doi.org/10.1192/s0140078900022161.

Full text
Abstract:
A timely conference on Mental Health Services Planning, organized jointly by the Royal College of Psychiatrists and the Department of Health and Social Security, took place in London in March 1985. The conference concentrated on difficulties associated with the implementation of government policies for mental health service planning in England and Wales. Particular emphasis was given to the problems of transition from hospital-based services to community-based services.
APA, Harvard, Vancouver, ISO, and other styles
37

Buriakovska, Kateryna. "Human Rights Obligations of Private Security and Military Companies: A Review of the Current Legal Framework and Practices." Philosophy of law and general theory of law, no. 1 (December 21, 2021): 262–78. http://dx.doi.org/10.21564/2707-7039.1.247620.

Full text
Abstract:
The rapid growth in demand for private military and security services among states,international organizations and non-state actors has turned this activity into a powerful industry withmillions of people who perform – on a contractual basis and in exchange for monetary rewards – actions,which, however, often pose risks to the rights of others, local communities and nations around theworld. The author explains the urgency of the article by high-profile cases of possible participationof private military companies in the events of the occupation of Crimea and the armed conflict inDonbas, initiation of new legislation on military consulting in Ukraine and, at the same time, by themodest attention of Ukrainian jurisprudence to human rights obligations of companies providingsecurity services as non-governmental entities. The author examines the evolution of some approaches to the international legal regulation of private military and security activities and their compliance with modern approaches to humanrights. The author analyzes the features of corporate responsibility in the field of human rights ofprivate military and security companies, the content of which is embodied in the InternationalCode of Conduct for Private Security Providers (ICoC). The analysis compares the approaches ofthe International Code of Conduct for Private Security Providers and the UN Guiding Principleson Business and Human Rights.
APA, Harvard, Vancouver, ISO, and other styles
38

Quintella, José Pedro Guedes, and José Luis Felicio Carvalho. "Segurança Pública, Violência Urbana e Expansão do Setor de Segurança Privada no Município do Rio de Janeiro." Revista Produção e Desenvolvimento 3, no. 2 (August 1, 2017): 1–20. http://dx.doi.org/10.32358/rpd.2017.v3.223.

Full text
Abstract:
The research was guided by the purpose of identifying how, in the city of Rio de Janeiro, the lack of public security policies affect the private security sector. The referential theoretical framework embraced the themes of social and economic contextualization of private security, the institutionalization of private security and the problem of public security in the city of Rio de Janeiro. The empirical stage of the study included semi-structured interviews with key informants, three of whom were directors of different medium-sized companies in the private security sector located in the municipality, a high-ranking officer of the Military Police of Rio de Janeiro, and the president of a private organization which provides training services to civilians, military and police forces. The results confirms contradictory aspects of integration and imbalance between the private security sector and the public power, as well as raises unique issues, such as the causal relation between the media role in violence and the growth of the sector, and the antinomy between the amplification of the ostensible presence of the police force on the streets and the increase of the sense of insecurity that causes the growth of the demand for private security.
APA, Harvard, Vancouver, ISO, and other styles
39

Boros, Martin, Andrej Velas, Zuzana Zvakova, and Robert Mendel. "Impact of the global pandemic situation of COVID-19 on the growth of the economic level of private security services in the selected region." SHS Web of Conferences 129 (2021): 01003. http://dx.doi.org/10.1051/shsconf/202112901003.

Full text
Abstract:
Research background: The research presented in the article is focused on assessing the impact of measures implemented against the spread of COVID-19 in the conditions of the Slovak Republic. We will focus primarily on curfews, work at home and the like, which are directly related to private security services and have affected the company’s economic situation. An important factor influencing the economic level of society is also the ban on organizing sports events, at which private security services ensure the safety and protection of visitors, athletes and organizers. Purpose of the article: The aim of the article is to determine the degree of impact of the pandemic situation caused by COVID-19 on the economic level and profitability of the mentioned companies in the selected Slovak region by means of a multi-year financial analysis of private security services. Methods: The article will use several methods such as financial analysis, profitability analysis, comparison and other scientific methods such as forecasting the future situation in case they would take long-term anti-pandemic measures. Findings & Value added: The result of the research presented in the article will be an evaluation of the degree of impact on companies operating on the Slovak market in the field of security from the point of view of profitability due to the impossibility of performing employment. Among other things, the expected estimate of the time period that private security services can manage if they would last long-term compared to pandemic measures will be presented.
APA, Harvard, Vancouver, ISO, and other styles
40

Lee, Ju-lak, Seok Lee, and Jinsung Kim. "The State of Security Law Violations by the Private Security Businesses in Seoul and Countermeasures." Journal of Public Administration and Governance 4, no. 3 (August 5, 2014): 159. http://dx.doi.org/10.5296/jpag.v4i3.6155.

Full text
Abstract:
The private security industry in South Korea has grown rapidly since the cessation of the Korean War in 1953. The main duty of the private security officers in their beginning era was to simply protect the supplies of the U.S. military stationed in the country, but the number of people employed in the business has outgrown the number of police officers since 2001.Despite the quantitative development of the private security industry, the quality of the services provided by the businesses has not advanced sufficiently except for a few number of specialized areas because of the perception that the police should be in charge of the overall security of society in addition to the low crime rate in the country and the lack of safety awareness by citizens. This has also resulted in an overflow of under-qualified businesses. Moreover, the lack of sense of duty among the employees of private security has resulted in violations of the existing laws and regulations, which has hindered further development of the industry. In this study, the current state of the private security companies registered at the Seoul Metropolitan Police Agency is examined in addition to the details of the Private Security Act and its breaches by the security businesses in Seoul area during 2013. With a basis on the findings, the causes for the violations are assessed and prevention measures are suggested.
APA, Harvard, Vancouver, ISO, and other styles
41

van Staden, Alfred. "The (ir)resistible temptation of privatizing security: A Dutch perspective." Security and Human Rights 19, no. 3 (2008): 201–7. http://dx.doi.org/10.1163/187502308785851750.

Full text
Abstract:
AbstractThe use of private contractors in peace support operations may involve a large variety of services. However, there is a conspicuous lack of information and transparency in general regarding the number of PMC personnel employed, the tasks they perform and the sums of money that are at stake. The employment of private military companies can be looked at from three different perspectives, the economic, the military-operational and the legal (as well as ethical) perspective. In the recently published report Employing Private Military Companies two recommendations are made. First, the Dutch government is advised to make the level of its political ambitions with regard to participation in peace support operations dependent on the structural capacity of the armed forces, including basic logistics. Second, the government is urged to provide as much information as possible concerning all relevant aspects of the employment of private companies that render services to the Dutch armed forces in operational areas. Finally, the government is urged to raise the whole issue in the ESDP discussions of the European Union.
APA, Harvard, Vancouver, ISO, and other styles
42

Yardımcı, Sibel, and Zeynep Alemdar. "The privatization of security in Turkey: Reconsidering the state, the concept of “governmentality” and Neoliberalism." New Perspectives on Turkey 43 (2010): 33–61. http://dx.doi.org/10.1017/s0896634600005768.

Full text
Abstract:
AbstractThe privatization of security services, which implies the dispersal of the legitimate right to use force, has been traditionally understood as operating at the expense of state sovereignty. The increasing privatization of security services around the world and the substantial growth of the private security sector in Turkey create the need to reassess the nature of this privatization. Drawing upon the work of Michel Foucault and other scholars of governmentality, as well as our own field research, we try to make such an assessment, without falling back on the traditional state-market (state-society) duality. Research shows that the Turkish private security sector, reported as being tied to both the exigencies of the state and the rules of the market, has an amorphic nature marked by intricate relationships, formal and informal, with public law enforcement agencies. We argue that the sector's privatization, although defended by some as a way to grant accountability and transparency to security services, is neither a remedy for those gaps, nor does it imply a straightforward decline of the state; rather, it is proof that the idea of an autonomous, unitary “state” should be revised and a sign that a different and intricate network of state apparatus and private experts continue to govern our lives in ways unique to neoliberalism.
APA, Harvard, Vancouver, ISO, and other styles
43

Lin, Han-Yu. "A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking Services." Applied Sciences 9, no. 7 (April 6, 2019): 1452. http://dx.doi.org/10.3390/app9071452.

Full text
Abstract:
Nowadays there are many social networking services supporting three-party communication such as Skype, Line, and Facebook Messenger. To ensure the message security, a cryptographic encryption scheme is a commonly adopted measure. However, the traditional asymmetric encryption only allows one designated recipient to decrypt the ciphertext with his/her private key. It is thus difficult for two parties to share the same ciphertext without exposing their private keys. In this paper, the author comes up with a novel dual authenticated encryption (DAE) scheme designed for three-party communication environments. Specifically, a DAE scheme enables a party to generate a single ciphertext that could be solely decrypted by the other two participants without sharing their private keys. It is also formally shown that the proposed scheme achieves the crucial security properties using the random oracle proof model.
APA, Harvard, Vancouver, ISO, and other styles
44

Kmietowicz, Z. "Private firm gets 400m contract to run NHS administrative services in England." BMJ 350, jun23 9 (June 23, 2015): h3421. http://dx.doi.org/10.1136/bmj.h3421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Mbana, Linda, Jacob T. Mofokeng, Witness Maluleke, and Dorcas Khosa. "Sharpening the Axe: Identifying and Closing Gaps Within the Training Space of the South African Private Security Industry." International Journal of Criminology and Sociology 10 (October 21, 2021): 1406–14. http://dx.doi.org/10.6000/1929-4409.2021.10.161.

Full text
Abstract:
The ever-present threat of crime in South Africa continues to drive the rise and demand for Private Security Industry (PSI) services amongst various governmental institutions, businesses and citizens to ensure their safety. This rise for the Private Security Services (PSS) persistently presents new challenges to the Private Security Industry Regulatory Authority (PSiRA) such as poor security training standards and deployment of untrained security officers attached to the Private Security Companies (PSCs), which negatively impacts the professionalism of the security industry. This study was guided by this objective: Identifying and closing the gaps within South African training space of PSI. This qualitative study was guided by the exploratory research design. The judgemental sampling technique was adopted to sample 40 participants confined to Gauteng (GP), Kwa-Zulu Natal (KZN) and Western Cape (WC) Provinces. The selected relevant stakeholders were attached to the South African Police Service (SAPS), Department of Labour (DoLl), Department of Home Affairs (DoH), National Prosecuting Authority (NPA) and the legal fraternity) and the PSI Directors and security officers to form part of the Focus Group Discussions (FGDs) and hybrid semi-structured interviews. The findings highlighted that the majority of the participants agreed that the private security industry training space is affected by security service providers letting PSiRA down by not training at, but rather engaging in, criminal activity through selling and people buying PSiRA security certificates. Some of the challenges mentioned include; poor training standards, non-compliance to legislated training standards, unqualified security training facilitators and outdated security Grades, misuse of security equipment leading to serious injuries and death, corruption in the industry, some of it being perpetrated by PSiRA inspectors, the very people who are supposed to keep the industry in check. This study recommends that, in order to overcome the challenges in the security training space, PSiRA needs to do away with the outdated security Grades by developing a new policy framework which will enable the creation of a new security-training curriculum and revise the training methods to suit the ever-changing security industry.
APA, Harvard, Vancouver, ISO, and other styles
46

Dwi Kurnia Wibowo, Ahmad Luthfi, Yudi Prayudi, Erika Ramadhani, and Muhamad Maulana. "Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 6, no. 6 (December 29, 2022): 1028–36. http://dx.doi.org/10.29207/resti.v6i6.4714.

Full text
Abstract:
Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the study' findings would lead to suggestions for more research and cybersecurity management procedures.
APA, Harvard, Vancouver, ISO, and other styles
47

Tian, Xin. "Private Security Companies: Emerging Protectors of China’s Overseas Interests." China Quarterly of International Strategic Studies 06, no. 02 (January 2020): 205–21. http://dx.doi.org/10.1142/s2377740020500104.

Full text
Abstract:
An increasing number of Chinese enterprises and citizens are going abroad, which exposes them to risks threatening their personal safety and security of their property. With the expansion of Chinese overseas interests, traditional protection methods fall short of a demand for diverse services, revealing a major shortfall in the Chinese government’s capability to provide overseas security protection for its citizens. New service providers are therefore urgently needed, and private security company are becoming an increasingly popular choice. As this is a fairly new demand, only a small number of Chinese private security companies are operating overseas at present. Difficulties abound for them, such as absence of regulatory clarity on business operation and gun control. The presence of private security providers could also pose a challenge to host nation authority and trigger conflicts. To serve as true protectors of overseas Chinese interests, Chinese private security companies have a long way to go.
APA, Harvard, Vancouver, ISO, and other styles
48

DUBNYAK, M., and V. SOLOVYOVA. "Digital transformation of legal services." INFORMATION AND LAW, no. 2(41) (June 27, 2022): 52–57. http://dx.doi.org/10.37750/2616-6798.2022.2(41).270363.

Full text
Abstract:
It is shown in the article that the modern foreign legal market actively implements a wide range of Legal Tech directions for optimization and improvement of legal services. Attention is drawn to the benefits of using this innovative approach and the role of machine learning in Legal Tech. It is argued that Legal Tech implementation has a number of obstacles that relate to both the typical problems of startups and those related to state policy, sources of financing and security considerations. The approach on how these problems could be solved is analyzed along with the interaction between the state and private sector, cyber security challenges, legal tech processes and legal education understanding is provided.
APA, Harvard, Vancouver, ISO, and other styles
49

Kim, Tae-Min. "The Transition Process and Implications of Legal Regulations in the Security Instructor System in Korea." Korean Society of Private Security 21, no. 3 (September 30, 2022): 27–54. http://dx.doi.org/10.56603/jksps.2022.21.3.27.

Full text
Abstract:
The private security services industry in Korea is defined as a ‘security services industry’ according to the 「Security Services Industry Act」, and it is possible to operate the industry only with permission from the commissioner of the Metropolitan/Provincial Police Agency. As of the end of 2021, the number of licensed corporations is 4,342, the number of business fields is 5,143, and the number of deployed security guards is 186,609. And the number of security instructors appointed and deployed in the field to guide, supervise, and educate security guards has reached 8,017. In the security instructor exam, which is a national technical qualification certificate, the number of passers by the 22nd exam has reached 25,024. The security instructor system introduced to improve the quality of security guards deployed nationwide and to develop the private security services industry has improved and supplemented loop holes by amending the ordinance of the Security Services Industry Act according to the changing times and social environment. Nevertheless, there are still voices from the industry and the academic field for improving the legal system to secure the effectiveness of the security instructor system. The purpose of this study was to find the meaning and implications, and to discuss the development direction of the security instructor system in Korea by recognizing the need for continuous study on the system, and by considering the transition process of its legal regulations from the legal point of view for the development of the private security services industry. As a result of the study, the timely revision (based on the effective date) of the security instructor system-related regulations under the Security Services Industry Act has been carried out a total of 11 times. A total of 3 revisions were made to strengthen regulations, 6 revisions were made to ease regulations, and 2 revisions were made to improve and supplement some loop holes. The major revisions with strengthened regulations included strengthening the requirements for permission for the security services industry, strengthening the reasons for disqualification of security instructors, expanding the duties of security instructors, and providing standards for administrative measures. The major revisions with mitigated regulations included mitigating the reasons for disqualification of security instructors, lowering the age for acquiring the security instructor certificate, removing physical conditions, mitigating the criteria for suspension of qualification, increasing the business autonomy of security business operators by abolishing the regulations on submission of security instructor deployment plans, lowering basic training hours for security instructors, exempting from common education upon completion of basic training, expanding exemptions for the security instructor exam, reducing the intensity of job performance, and expanding test opportunities and securing stability by stipulating the security instructor exam cycle at least once a year. In the future, continuous discussion and research on issues and areas that have not been dealt with in depth so far in relation to the revision of legal regulations should be conducted.
APA, Harvard, Vancouver, ISO, and other styles
50

Kumar, Sanjeev, and Mukesh Kumar. "A Review on Multiple Layer Security of Cloud Server." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 475. http://dx.doi.org/10.23956/ijarcsse/v7i5/0181.

Full text
Abstract:
Cloud services[1] are offering flexible & scalable services. But there is always issue of security. When data is transferred from centrally located server storage to different cloud compromise of person & private data would increase. There is always risk to confidentiality & availability of data prior to selecting a cloud vender or choosing own cloud & cloud service migration. Cloud services usually have their security concerns that must be addressed. In this paper we have discussed threats to cloud service & data in case of conventional security system & modern security system & proposed an idea to secure data on cloud using multiple layers of security.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography