Journal articles on the topic 'Private security services – England'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Private security services – England.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Abd-Alrazaq, Alaa, Ali Abdallah Alalwan, Brian McMillan, Bridgette M. Bewick, Mowafa Househ, and Alaa T. AL-Zyadat. "Patients’ Adoption of Electronic Personal Health Records in England: Secondary Data Analysis." Journal of Medical Internet Research 22, no. 10 (October 7, 2020): e17499. http://dx.doi.org/10.2196/17499.
Full textKatusiime, B., P. Sarma, S. Corlett, and R. Cassidy. "My HIV Care – Preferences of people living with HIV for medicine-related support from community pharmacists." International Journal of Pharmacy Practice 30, Supplement_2 (November 30, 2022): ii26—ii27. http://dx.doi.org/10.1093/ijpp/riac089.030.
Full textSaltirovska, Zorica. "The Development of Private Security and the Dillemas Surrounding the Effects of Private Security Services." Security Dialogues /Безбедносни дијалози 2 (2016): 81–91. http://dx.doi.org/10.47054/sd1620081s.
Full textKim, Yang-hyun. "A Study on Work Scope of Private Security Guards in Multi-Family Housing." Korean Society of Private Security 21, no. 4 (October 31, 2022): 33–50. http://dx.doi.org/10.56603/jksps.2022.21.4.33.
Full textPattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (May 19, 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Full textKhalyasov, Ilshat S., and Andrey G. Svetlakov. "TO THE QUESTION OF RUSSIAN AND FOREIGN EXPERIENCE OF COUNTERACTION CRIMINALIZATION IN THE MARKET OF SECURITY SERVICES." Today and Tomorrow of Russian Economy, no. 107-108 (2022): 63–73. http://dx.doi.org/10.26653/1993-4947-2022-107-108-05.
Full textAvant, Deborah, and Kara Kingma Neu. "The Private Security Events Database." Journal of Conflict Resolution 63, no. 8 (January 30, 2019): 1986–2006. http://dx.doi.org/10.1177/0022002718824394.
Full textGABRIEL, Jacek, and Adam KOŁODZIEJCZYK. "PRIVATE SECURITY COMPANIES AND THE DEONTOLOGICAL CODES." National Security Studies 15, no. 1 (December 13, 2018): 195–210. http://dx.doi.org/10.37055/sbn/132157.
Full textTrounstine, Jessica. "The Privatization of Public Services in American Cities." Social Science History 39, no. 3 (2015): 371–85. http://dx.doi.org/10.1017/ssh.2015.61.
Full textTzifakis, Nikolaos. "Contracting out to Private Military and Security Companies: The Market for Security Services." European View 11, no. 1 (June 2012): 125–26. http://dx.doi.org/10.1007/s12290-012-0197-3.
Full textCsaba, Zágon, and Zsolt Lippai. "The Borderline between Private and Public Security." Academic and Applied Research in Military and Public Management Science 20, no. 3 (May 26, 2022): 5–19. http://dx.doi.org/10.32565/aarms.2021.3.1.
Full textDworzecki, Jacek. "The Role and Place of Private Companies Offering People and Property Protection Services in the Slovak Internal Security System." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 3, 2018): 10–19. http://dx.doi.org/10.5604/01.3001.0012.4557.
Full textSarkar, Jaydip, and Mary di Lustro. "Evolution of secure services for women in England." Advances in Psychiatric Treatment 17, no. 5 (September 2011): 323–31. http://dx.doi.org/10.1192/apt.bp.109.007773.
Full textMoricova, Valeria, Monika Vaclavkova, Jana Studena, and Bo Wang. "A Software Tool to Support the Selection of Candidates in Private Security Services." Communications - Scientific letters of the University of Zilina 20, no. 2 (June 30, 2018): 102–9. http://dx.doi.org/10.26552/com.c.2018.2.102-109.
Full textJanković, Bojan, and Vladimir Cvetković. "Attitudes of members of private security about the police." Bezbednost, Beograd 64, no. 2 (2022): 5–21. http://dx.doi.org/10.5937/bezbednost2202005j.
Full textKubás, Jozef, Viktor Šoltés, and Katarína Repková Štofková. "SUPPORTING SMALL AND MEDIUM SIZED BUSINESSES IN SPECIFIC SERVICES WITHIN SLOVAKIA." CBU International Conference Proceedings 6 (September 25, 2018): 260–65. http://dx.doi.org/10.12955/cbup.v6.1166.
Full textNARVÁEZ GONZÁLEZ, Cristina, and Katharine VALENCIA. "Improving Human Rights in the Private Security Industry: Envisioning the Role of ICoCA in Latin America." Business and Human Rights Journal 4, no. 1 (January 2019): 79–107. http://dx.doi.org/10.1017/bhj.2018.24.
Full textYan, Tian, Shan Zeng, Mengyao Qi, Qingbao Hu, and Fazhi Qi. "Cyber security detection and monitoring at IHEP private cloud for web services." EPJ Web of Conferences 214 (2019): 07016. http://dx.doi.org/10.1051/epjconf/201921407016.
Full textHarkin, Diarmaid. "The uncertain commodity of ‘security’: Are private security companies ‘value for money’ for domestic violence services?" Journal of Criminology 54, no. 4 (October 11, 2021): 521–38. http://dx.doi.org/10.1177/26338076211046686.
Full textGerevich, János, and Imre Négyesi. "Network and Information Security of Cloud Computing Services." Hadtudományi Szemle 13, no. 2 (2020): 35–46. http://dx.doi.org/10.32563/hsz.2020.2.4.
Full textЗавальний, М. В. "National, International and Legal Mechanisms of Control over the Activity of Non-Government Security Entities." Law and Safety 73, no. 2 (June 21, 2019): 31–36. http://dx.doi.org/10.32631/pb.2019.2.04.
Full textLayard, Antonia. "Privatising land in England." Journal of Property, Planning and Environmental Law 11, no. 2 (July 8, 2019): 151–68. http://dx.doi.org/10.1108/jppel-03-2019-0009.
Full textØstensen, Åse Gilje. "Implementers or Governors?" International Community Law Review 16, no. 4 (October 24, 2014): 423–42. http://dx.doi.org/10.1163/18719732-12341288.
Full textKuznetsov, E. A. "The Role of the Commercial Space Industry within the US National Security under the Trump Administration." Moscow University Bulletin of World Politics 13, no. 1 (April 7, 2021): 85–119. http://dx.doi.org/10.48015/2076-7404-2021-13-1-85-119.
Full textKim, Sang Su, and Sang Yeol Lee. "A Study on the Perception of University Students on the Importance of Private Security." Forum of Public Safety and Culture 19 (November 30, 2022): 63–81. http://dx.doi.org/10.52902/kjsc.2022.19.63.
Full textThomas, Stuart D. M., Mairead Dolan, Jenny Shaw, Samantha Thomas, Graham Thornicroft, and Morven Leese. "Redeveloping Secure Psychiatric Services for Women." Medicine, Science and the Law 45, no. 4 (October 2005): 331–39. http://dx.doi.org/10.1258/rsmmsl.45.4.331.
Full textTian, Hong Fang, Yan Hua Liu, and Ying Hong Li. "Ethernet Private Line Access Design Scheme." Applied Mechanics and Materials 103 (September 2011): 578–82. http://dx.doi.org/10.4028/www.scientific.net/amm.103.578.
Full textKimani, John Kimani. "Perception on Private Securization on Service Delivery in Owned Businesses in Africa. A Critical Literature Review." Journal of International Relations and Policy 1, no. 1 (November 4, 2022): 47–59. http://dx.doi.org/10.47941/jirp.1109.
Full textRegényi, Kund, Nándor Jasenszky, and Zsolt Lippai. "The concept of security awareness, its development from the point of view of national security, counter-terrorism, and private security." Belügyi Szemle 70, no. 1. ksz. (March 17, 2022): 123–37. http://dx.doi.org/10.38146/bsz.spec.2022.1.7.
Full textAlbrzykowska, Ewelina. "Protection of Judicial Facilities in the Republic of Poland: An Outline of the Problem." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 36, no. 36 (December 20, 2019): 9–28. http://dx.doi.org/10.5604/01.3001.0014.1290.
Full textLee, Jen-Chieh, and Tyrone T. Lin. "Decision Analysis on Sustainable Value: Comparison of the London and Taiwan Markets for Product Integration of Family Security Services and Residential Fire Insurance." Journal of Risk and Financial Management 13, no. 11 (October 30, 2020): 266. http://dx.doi.org/10.3390/jrfm13110266.
Full textAvant, Deborah D. "Pragmatic Networks and Transnational Governance of Private Military and Security Services." International Studies Quarterly 60, no. 2 (February 18, 2016): 330–42. http://dx.doi.org/10.1093/isq/sqv018.
Full textNebolsina, M. A. "Private Military and Security Companies (PMSCs) in the Modern International Processes." Journal of International Analytics 13, no. 2 (June 28, 2022): 107–33. http://dx.doi.org/10.46272/2587-8476-2022-13-2-107-133.
Full textMekolela, Agosta Mecca, and Shadrack Bett. "Challenges Facing the Provision of Security Services by Private Security Firms; A Study of Juja Town, Kiambu County, Kenya." East African Journal of Business and Economics 5, no. 1 (November 8, 2022): 318–27. http://dx.doi.org/10.37284/eajbe.5.1.940.
Full textHarkin, Diarmaid, and Kate Fitz-Gibbon. "Private security companies and domestic violence: A welcome new development?" Criminology & Criminal Justice 17, no. 4 (October 16, 2016): 433–49. http://dx.doi.org/10.1177/1748895816673881.
Full textWilkinson, Greg. "Mental Health Services Planning." Bulletin of the Royal College of Psychiatrists 9, no. 7 (July 1985): 138. http://dx.doi.org/10.1192/s0140078900022161.
Full textBuriakovska, Kateryna. "Human Rights Obligations of Private Security and Military Companies: A Review of the Current Legal Framework and Practices." Philosophy of law and general theory of law, no. 1 (December 21, 2021): 262–78. http://dx.doi.org/10.21564/2707-7039.1.247620.
Full textQuintella, José Pedro Guedes, and José Luis Felicio Carvalho. "Segurança Pública, Violência Urbana e Expansão do Setor de Segurança Privada no Município do Rio de Janeiro." Revista Produção e Desenvolvimento 3, no. 2 (August 1, 2017): 1–20. http://dx.doi.org/10.32358/rpd.2017.v3.223.
Full textBoros, Martin, Andrej Velas, Zuzana Zvakova, and Robert Mendel. "Impact of the global pandemic situation of COVID-19 on the growth of the economic level of private security services in the selected region." SHS Web of Conferences 129 (2021): 01003. http://dx.doi.org/10.1051/shsconf/202112901003.
Full textLee, Ju-lak, Seok Lee, and Jinsung Kim. "The State of Security Law Violations by the Private Security Businesses in Seoul and Countermeasures." Journal of Public Administration and Governance 4, no. 3 (August 5, 2014): 159. http://dx.doi.org/10.5296/jpag.v4i3.6155.
Full textvan Staden, Alfred. "The (ir)resistible temptation of privatizing security: A Dutch perspective." Security and Human Rights 19, no. 3 (2008): 201–7. http://dx.doi.org/10.1163/187502308785851750.
Full textYardımcı, Sibel, and Zeynep Alemdar. "The privatization of security in Turkey: Reconsidering the state, the concept of “governmentality” and Neoliberalism." New Perspectives on Turkey 43 (2010): 33–61. http://dx.doi.org/10.1017/s0896634600005768.
Full textLin, Han-Yu. "A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking Services." Applied Sciences 9, no. 7 (April 6, 2019): 1452. http://dx.doi.org/10.3390/app9071452.
Full textKmietowicz, Z. "Private firm gets 400m contract to run NHS administrative services in England." BMJ 350, jun23 9 (June 23, 2015): h3421. http://dx.doi.org/10.1136/bmj.h3421.
Full textMbana, Linda, Jacob T. Mofokeng, Witness Maluleke, and Dorcas Khosa. "Sharpening the Axe: Identifying and Closing Gaps Within the Training Space of the South African Private Security Industry." International Journal of Criminology and Sociology 10 (October 21, 2021): 1406–14. http://dx.doi.org/10.6000/1929-4409.2021.10.161.
Full textDwi Kurnia Wibowo, Ahmad Luthfi, Yudi Prayudi, Erika Ramadhani, and Muhamad Maulana. "Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 6, no. 6 (December 29, 2022): 1028–36. http://dx.doi.org/10.29207/resti.v6i6.4714.
Full textTian, Xin. "Private Security Companies: Emerging Protectors of China’s Overseas Interests." China Quarterly of International Strategic Studies 06, no. 02 (January 2020): 205–21. http://dx.doi.org/10.1142/s2377740020500104.
Full textDUBNYAK, M., and V. SOLOVYOVA. "Digital transformation of legal services." INFORMATION AND LAW, no. 2(41) (June 27, 2022): 52–57. http://dx.doi.org/10.37750/2616-6798.2022.2(41).270363.
Full textKim, Tae-Min. "The Transition Process and Implications of Legal Regulations in the Security Instructor System in Korea." Korean Society of Private Security 21, no. 3 (September 30, 2022): 27–54. http://dx.doi.org/10.56603/jksps.2022.21.3.27.
Full textKumar, Sanjeev, and Mukesh Kumar. "A Review on Multiple Layer Security of Cloud Server." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 475. http://dx.doi.org/10.23956/ijarcsse/v7i5/0181.
Full text