Academic literature on the topic 'Private security services – United States'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Private security services – United States.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Private security services – United States"

1

Trounstine, Jessica. "The Privatization of Public Services in American Cities." Social Science History 39, no. 3 (2015): 371–85. http://dx.doi.org/10.1017/ssh.2015.61.

Full text
Abstract:
In the United States, significant variation regarding the quality of public goods exists across local governments. In this article, I seek to explain these patterns. I argue that economically and racially homogenous communities are collectively willing to invest more resources in public goods relative to diverse communities. I provide evidence in support of this claim by analyzing the relationship between race and income diversity and the share of community security and education that is provided by private entities. I find that as racial diversity and income inequality increase, the share of private security guards and white children enrolled in private school is higher.
APA, Harvard, Vancouver, ISO, and other styles
2

Khalyasov, Ilshat S., and Andrey G. Svetlakov. "TO THE QUESTION OF RUSSIAN AND FOREIGN EXPERIENCE OF COUNTERACTION CRIMINALIZATION IN THE MARKET OF SECURITY SERVICES." Today and Tomorrow of Russian Economy, no. 107-108 (2022): 63–73. http://dx.doi.org/10.26653/1993-4947-2022-107-108-05.

Full text
Abstract:
This article discusses the issues of decriminalization of the security services market, the author’s definition of this concept is proposed; the functions of private security companies in the implementation of public and private interests, the scheme of interaction between security officers, security companies, customer organizations and the state in the security services market are presented. The characteristic features of the implementation of security activities in Russia are considered, the powers of security officers are determined, including the protection of the life and health of citizens, the protection of objects and property, consulting, ensuring public order, conducting inspections while ensuring intra-object and access control. The analysis of foreign experience in the implementation of security services in the United States, Germany, Bulgaria and China, as well as the interaction of private security companies with private military companies. The level of salaries of security officers in Russia and foreign countries is presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Karska, Elżbieta, and Karol Karski. "Introduction: The Use of Private Military and Security Companies by the United Nations." International Community Law Review 16, no. 4 (October 24, 2014): 399–404. http://dx.doi.org/10.1163/18719732-12341286.

Full text
Abstract:
The work of private military and security contractors is extremely controversial from the point of view of international law and of practice. Sometimes there are doubts as to whether some of their activities should be considered legal activities or illegal mercenarism. Like any other entities using force, they can violate human rights as well as international humanitarian law. They provide their services to, amongst others, states and intergovernmental organisations, including the un. This requires a precise definition of the rules under which such contractors operate, both with regard to the law of treaties and the domestic law of the entities using their services. A question also arises as to whether there is any legal limit to their services being used by intergovernmental organisations, i.e. entities deriving their competences from the will of their member states. The work of the un is an interesting example here. The organisation uses such contractors, but on the other hand, it undertakes various activities to eliminate any potential threats in this respect.
APA, Harvard, Vancouver, ISO, and other styles
4

Nalla, Mahesh K., Sheila R. Maxwell, and Chae M. Mamayek. "Legitimacy of Private Police in Developed, Emerging, and Transitional Economies." European Journal of Crime, Criminal Law and Criminal Justice 25, no. 1 (January 12, 2017): 76–100. http://dx.doi.org/10.1163/15718174-25012107.

Full text
Abstract:
Research suggests that states that fail to provide political goods, such as security, have low citizens’ confidence in state apparatuses, resulting in greater demand for services by non-state actors like private security. The present study seeks to compare citizen trust and confidence in private security guards, in 6 developed, emerging, and transitional economies in the Americas (the United States), Asia (India, Singapore, South Korea), and Europe (The Netherlands, Slovenia). This study seeks to assess whether democracy levels across the countries and/or contextual factors such as contact, perceived professionalism, nature of work, and civility of security guards affect citizens’ trust across various levels of democracy. The findings show that citizens in countries with full-democracy rankings have less trust in private police compared to citizens in lower democracy levels. Findings also suggest that across all democracies, perceived civility and professionalism of private security officers significantly influence citizens’ trust of private police.
APA, Harvard, Vancouver, ISO, and other styles
5

Kuznetsov, E. A. "The Role of the Commercial Space Industry within the US National Security under the Trump Administration." Moscow University Bulletin of World Politics 13, no. 1 (April 7, 2021): 85–119. http://dx.doi.org/10.48015/2076-7404-2021-13-1-85-119.

Full text
Abstract:
The US space activities from their inception have been closely connected with the private sector. However, only in 2010s private space companies have come to play a prominent role not only on the global market of space services but in the field of international security as well. At the same time, this trend towards commercialization of outer space use and the growing role of the private space sector in ensuring national security is still understudied. This paper aims to partially fill this gap by assessing approaches to these issues adopted by the administration of D. Trump. In the first section the author notes that both conceptual and legal frameworks of private space activities lack clarity and proposes an operational definition of the phenomenon. The second section provides a brief overview of the key strategic policy documents of the Trump’s administration including those on commercial use of space in general and its implications for the US national security in particular. The third section identifies the trend towards the institutionalization of the US Space Forces as one of the priorities of the Trump’s administration military policy. The fourth section thoroughly examines key forms and areas of the public–private partnership in commercial use of space, including launch services, communication services, intelligence gathering, as well as production and maintenance of satellites. Finally, the fifth section assesses the prospects for private space activities given the current tightness of the space services market and growing competition. The author concludes that private space plays a subsidiary role within the US national security and is still heavily dependent on state support. Nevertheless, the scope of public–private cooperation is expanding and the models of interaction are changing. The Trump’s administration has contributed to the development of the industry through liberalization of regulations and involvement of private sector in the new large-scale projects, such as the Artemis program. The other important outcome of the space policy of the 45th President of the United States is anchoring of private space activities in the US national security strategy documents.
APA, Harvard, Vancouver, ISO, and other styles
6

Krahmann, Elke. "Choice, voice, and exit: Consumer power and the self-regulation of the private security industry." European Journal of International Security 1, no. 1 (January 27, 2016): 27–48. http://dx.doi.org/10.1017/eis.2015.6.

Full text
Abstract:
AbstractPromoting Private Security Company (PSC) self-regulation has become a key focus due to high profile scandals during the military interventions in Iraq and Afghanistan. Related efforts include the Montreux Document, the International Code of Conduct for Private Security Service Providers (ICoC), American National Standards Institute/ASIS certification, and the new International Standards Organization (ISO) Management System Standard for Private Security Operations. Implicit in industry self-regulation, however, is the assumption that the consumers of private security services will help facilitate and enforce professional standards by shifting their custom to PSCs which have signed up to these codes of conduct or certification schemes. This article investigates the validity of this assumption with regard to government contracting. To what degree are public agencies able – and willing – to let professional standards guide their contracting behaviour? To answer this question, this article develops a general framework for the analysis of public consumer influence through choice, voice, and exit which draws on insights from microeconomics and Albert Hirschman’s classical treatiseExit, Voice, Loyalty.Taking the United States government as an illustrative example, the analysis observes several obstacles to encouraging security industry self-regulation through consumer power.
APA, Harvard, Vancouver, ISO, and other styles
7

San Nicolas-Rocca, Tonia, and Richard J. Burkhard. "Information Security in Libraries." Information Technology and Libraries 38, no. 2 (June 17, 2019): 58–71. http://dx.doi.org/10.6017/ital.v38i2.10973.

Full text
Abstract:
Libraries in the United States handle sensitive patron information, including personally identifiable information and circulation records. With libraries providing services to millions of patrons across the U.S., it is important that they understand the importance of patron privacy and how to protect it. This study investigates how knowledge transferred within an online cybersecurity education affects library employee information security practices. The results of this study suggest that knowledge transfer does have a positive effect on library employee information security and risk management practices.
APA, Harvard, Vancouver, ISO, and other styles
8

DAVITTI, Daria. "The Rise of Private Military and Security Companies in European Union Migration Policies: Implications under the UNGPs." Business and Human Rights Journal 4, no. 1 (November 9, 2018): 33–53. http://dx.doi.org/10.1017/bhj.2018.21.

Full text
Abstract:
AbstractThis article examines the involvement of Private Military and Security Companies (PMSCs) in both shaping and implementing the European Agenda on Migration (European Agenda), launched by the European Union in May 2015. The migration policies which have since been adopted have increasingly enabled the outsourcing to private security contractors of various border control operations, including those related to forced returns, administrative detention and security services for the Italian and Greek ‘hotspots’. The article argues that PMSCs frame, shape and entrench militarized responses in the European Agenda. It also contends that the current context of the European refugee ‘crisis’ meets the conditions of a high-risk context, as understood within the United Nations Guiding Principles on Business and Human Rights (UNGPs). This re-definition of the refugee ‘crisis’ as a high-risk context, in turn, enables the identification of heightened human rights obligations of home states and responsibilities of companies when implementing the UNGPs.
APA, Harvard, Vancouver, ISO, and other styles
9

Korol’kova, E. "Evolution of United States’ Private Military and Security Companies: The Case of Afghanistan 2001–2021." International Trends / Mezhdunarodnye protsessy 20, no. 1 (2022): 122–47. http://dx.doi.org/10.17994/it.2022.20.1.68.7.

Full text
Abstract:
The withdrawal of troops on 31 August 2021 which was carried out in accordance with the Agreement signed on 29 February 2020 between the U.S. government and the Taliban (an international terrorist organization banned in the Russian Federation) marked the end of the international military campaign in Afghanistan which lasted twenty years. Assessing the preliminary outcomes of nearly a quarter-century of the US military and their NATO allies’ presence in Afghanistan, U.S. President Joseph Biden announced the end of “an era of major military operations to remake other countries”. Though the consequences of the Western coalition campaign in the area remain to be evaluated and they are unlikely to turn out to be unequivocal, the Atlantic strategy aimed at rebuilding and democratization of Afghanistan proved itself as bankrupt. Our research focuses on the way the twenty-year military campaign in Afghanistan affected the development of the U.S. private military and security companies (PMSC) industry. For these purposes, we, firstly, studied and traced the transformation of the private military and security services market in the U.S., and examined the changes of approaches and mechanisms used to contract PMSCs. Secondly, we analyzed the way the U.S. authorities addressed the challenges new market evoked, focusing on the measures of legal regulation that were applied to PMSCs, and the way the working of the U.S. institutional mechanisms was transforming. The final part of the research contains conclusions on the perspectives for the development of the American PMSC industry after the withdrawal of the U.S. troops from Afghanistan. We believe that due to its duration and continuity, the Afghan operation ensured a launchpad for the PMSC industry and provided conditions for private military and security companies to acquire and master high-end experience which in turn, contributed to the development of a certain market that goes well beyond the involvement of conventional human capital. It provided solutions for the production, utilization, and maintenance of the equipment and technologies, allowing the minimization of the direct participation of specialists in hostilities. Alongside the development of the American PMSC industry itself, the research studies the investigations conducted by the U.S. authorities into the cases of abuse committed by the contractors during their participation in Afghan war. It discusses the way this practice encouraged the transformations of United States procedures and mechanisms aimed at reducing malpractice when performing contracts and launched changes in U.S. legislation. It also demonstrates the lessons learned by the U.S. from the contractual practice with regard to the regulation of PMSCs. The research reveals the strengths and weaknesses of the American policy regarding PMSCs during the whole period of the military conflict in Afghanistan and helps to evaluate the success of the U.S. efforts in monitoring contractors across Afghanistan. To conclude, we reckon that considerable contractual experience acquired in Afghanistan ensures technological and procedural progress of the U.S. PMSC industry. Given the enduring rivalry between the U.S., Russia, and China, including in the military and technological spheres, the twenty-year experience of direct participation in hostilities by U.S. PMSCs boosted its competitive advantage compared to Russia and China, whose PMSCs still lack such an experience.
APA, Harvard, Vancouver, ISO, and other styles
10

Pradnyajaya, I. Kadek Wahyu, and Made Maharta Yasa. "LEGALITAS DAN TANGGUNG JAWAB PRIVATE MILITARY AND SECURITY COMPANY DALAM INVASI IRAK OLEH AMERIKA SERIKAT." Kertha Semaya : Journal Ilmu Hukum 10, no. 7 (May 29, 2022): 1496. http://dx.doi.org/10.24843/ks.2022.v10.i07.p03.

Full text
Abstract:
Amerika Serikat (AS) melibatkan Perusahaan Militer dan Keamanan Swasta atau “Private Military and Security Companies” (PMSC) dalam jumlah besar atas misi rekonstruksi Irak sejak tahun 2003. Keterlibatan dari PMSC telah menimbulkan banyak permasalahan khususnya kejahatan terhadap kemanusiaan (Crime Against Humanity) yang dilakukan kepada warga sipil dalam misi rekonstruksi Irak ini. Adapun tulisan ini bertujuan untuk mengetahui status hukum dari PMSC dalam invasi Irak oleh Amerika Serikat (AS) berdasarkan hukum internasional yang berlaku serta untuk menganalisa pertanggungjawaban dari Amerika Serikat (AS) selaku pihak yang menggunakan PMSC dalam invasi ke Irak yang telah menyebabkan banyak permasalahan bagi Irak. Tulisan ini merupakan penelitian yuridis normatif yang menggunakan pendekatan peraturan perundang-undangan, dalam hal ini perjanjian, konvensi dan instrumen internasional yang relevan, pendekatan kasus serta pendekatan sejarah. Kesimpulan yang didapatkan adalah PMSC merupakan sebuah perusahaan yang bergerak pada pelayanan jasa berupa bantuan militer atau keamanan. Kontraktor PMSC yang melakukan Penembakan terhadap warga sipil di Irak telah mengubah statusnya dari civilian menjadi seseorang yang tidak berhak diberi status sebagai kombatan ataupun tawanan perang. Adapun hal ini telah sesuai dengan unsur-unsur daripada pasal 47 Protokol Tambahan 1 1977 United Nation Mercenary Convention dan The Montreux Document. Dapat pula disimpulkan mengenai pertanggungjawaban dibebankan kepada Amerika Serikat selaku pihak penyewa PMSC yang telah melakukan banyak permasalahan khususnya kejahatan terhadap kemanusiaan (Crime Against Humanity) kepada warga sipil wajib dikarenakan telah terjadi pelanggaran terhadap Konvensi Jenewa 1949, Pasal 51 Protokol Tambahan I 1977 dan Statuta Roma 1998. The United States of America (US) has engaged a large number of Private Military and Security Companies (PMSC) in Iraq reconstruction missions since 2003. The involvement of the PMSC has created many problems of crimes against humanity committed against civilians on this Iraq reconstruction mission. This paper aims to see the legal status of the PMSC in the invasion of Iraq by the United States of America (US) based on applicable international law and to analyze the accountability of the United States of America (US) as the party who used PMSC in the invasion of Iraq which has caused many problems. This paper is a normative legal research that uses statute approach, in terms of treaties, conventions and relevant international instruments, case approach and historical approach. The conclusion is that PMSC is a company engaged in services such as military or security assistance. PMSC contractors who carried out shootings on civilians in Iraq have changed their status from civilian to someone who is not entitled to the status of a combatant or prisoner of war. As for this, it is in accordance with the elements of Article 47 of Additional Protocol 1 of the 1977 United Nations Mercenary Convention and The Montreux Document. It can also be concluded that the responsibility imposed on the United of America States as the charterer of PMSC which has committed many problems, especially crimes against humanity (Crime Against Humanity), to civilians is obliged due to violations of the 1949 Geneva Conventions, Article 51 Additional Protocol I 1977 and the Rome Statute 1998.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Private security services – United States"

1

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Neple, Pernille. "The regulation of mercenary and private security-related activities under South African law compared to other legislations and conventions." Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/1896.

Full text
Abstract:
Thesis (MA (Political Science))--Stellenbosch University, 2008.
Private Military and Security Companies (PMSCs) have become increasingly important actors since the end of the Cold War. They provide a wide range of services and are therefore difficult to classify. Many view them as new front companies for mercenaries, which this thesis argues is not the case. Few states have put in place legislation to deal with the problems caused by these companies, and they are therefore generally not accountable to states. This is problematic because their services are within an area where states have traditionally had monopoly. This thesis studies the new South African legislation, the Prohibition of Mercenary Activities and Regulation of Certain Activities in Country of Armed Conflict Act of 2006, which was put in place in order to ban mercenaries and regulate the services offered by the private military and security companies based in the country. By comparing it to the older South African legislation, the thesis evaluates the extent to which the new legislation has been able to close loopholes inherent in the old legislation. The new South African legislation is also compared to the international conventions which bans mercenaries. By banning these actors, South Africa is very much in line with the international community when it designed the conventions. However, PNSCs are not mercenaries. The thesis then compares the new South African legislation to the domestic regulation in place in the United States of America. It finds that despite having many of the same weaknesses as the South African legislation, it is more likely that the American regulation will be abided by than the South African. This is due to the positive relationship between the US government and American PMSCs, and the fact that the government is a major client of the companies. South Africa does not enjoy the same positive relationship with its companies. Finally, the new South African legislation is compared to the UK Green Paper of 2002, which presented options of how to deal with the companies. The ban on mercenaries put in place by the new South African legislation was discouraged in the Green Paper. The licensing regime (as in the USA) that was proposed by the Green Paper, however, is similar to the authorisation scheme established in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
3

Eicher, Michael. "Protecting diplomats in Iraq what can the U.S. Department of State do to improve it's management and oversight of security contractors in Iraq? /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kayser, Valérie. "Legal aspects of private launch services in the United States." Thesis, McGill University, 1991. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=60462.

Full text
Abstract:
The last decade has witnessed the development of a private launch industry. Under international space law, in particular the Outer Space Treaty of 1967, States shall supervise and authorize the activities of their nationals, including private launch companies, in Outer Space. In the United States, a substantial set of regulations has been elaborated to exercise this control over the activities of the private launch industry. This thesis analyzes, in a first chapter, the evolution which led to these regulations. The Commercial Space Launch Act of 1984 and the subsequent regulations issued by the Office of Commercial Space Transportation, regarding the licensing process are dealt with in the second chapter. The third chapter examines the most important practical legal issue relating to private launch services, namely liability and insurance.
APA, Harvard, Vancouver, ISO, and other styles
5

Jaksec, Gregory M. "Public-private-defense partnering in critical infrastructure protection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FJaksec.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Ted Lewis. "March 2006." Includes bibliographical references (p.41-45). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
6

McGovern, Philip P. III. "Creation of a United States Emergency Medical Services Administration Within the Department of Homeland Security." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6833.

Full text
Abstract:
Approved for public release; distribution is unlimited
Federal administration of this nations emergency medical services (EMS) has come under increasing criticism, in a post- September 11 world, by many of its stakeholders and constituents. Critics accurately argue that the current construct of federal governance and oversight is impairing the disciplines shareholders from being able to prepare, train, respond and recover appropriately from natural and manmade catastrophic events both locally and nationally. Valid reasons exist to endorse consolidating all the various bodies of federal authority and management into a centric office, the United States Emergency Medical Services Administration (USEMSA). Many of the EMS non-municipal organizations are poorly represented on a national, state and local scale. This nations EMS competence and potential to respond efficiently and productively to any domestic or international catastrophic incident in normal and abnormal environments, regardless of whether the etiology is manmade or natural, requires a skilled, educated and well-equipped workforce. This thesis evaluates the federal EMS paradigm of the administration for EMS and its complex systems of care and transport and recommends the best model of federal oversight for EMS to meet the challenges set forth in the National Incident Management System, National Response Framework and National Strategy Security plans.
APA, Harvard, Vancouver, ISO, and other styles
7

LaSalle-Lund, Arlene J. "Privatization a revolving partnership of the public and private sectors /." Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 1990. http://www.kutztown.edu/library/services/remote_access.asp.

Full text
Abstract:
Thesis--Kutztown University of Pennsylvania, 1990.
Source: Masters Abstracts International, Volume: 45-06, page: 2923. Abstract precedes thesis as 5 preliminary leaves. Typescript. Includes bibliographical references (leaves 106-114).
APA, Harvard, Vancouver, ISO, and other styles
8

Puryear, Ann Davies. "Policies, programs, and services for nontraditional students at private, four year institutions in the southeastern United States." Diss., Virginia Polytechnic Institute and State University, 1988. http://hdl.handle.net/10919/49928.

Full text
Abstract:
Growth in the numbers of nontraditional students on campuses nationwide has increased significantly over the past two decades. Many nontraditional students return to the campus for work-related reasons. Furthermore, societal transformations, demographic trends, and the developmental growth of adults appear to be interrelated components underlying the changing composition of the student population. The purpose of this study was to describe the current state of support services for nontraditional students at private, four-year institutions in the Southeastern United States. Nontraditional students were defined in this study as undergraduate students who are 25 years old or older. The population for the study consisted of the 226 private, four-year institutions with undergraduate student populations that appeared on the 1986 Member List of the Southern Association of Schools and Colleges. The results of the study indicated that 78% of the responding institutions serve a nontraditional student population, and that 21% of the institutions not presently serving nontraditional students plan to recruit from the adult population in the academic year 1988-89. Additionally, a wide range of support services were reported by institutions with nontraditional students. Approximately 87% (N=119) of these institutions reported one or more policies designated for nontraditional students. Demographic data were provided by crosstabulation of each policy, program, and service with the following variables: institutional location, type (church-affiliated or independent), and size. A demographic profile of the nontraditional student indicated that the majority of nontraditional students are between 25 and 34 years old and attend church-affiliated institutions with an enrollment of over 2,000 students, located in cities of over 100,000 population. A follow-up study examined in detail innovative programs at 18 institutions.
Counseling and Student Personnel. Ed. D.
incomplete_metadata
APA, Harvard, Vancouver, ISO, and other styles
9

Bruer, Ruth A. "Public-private partnership in the transfer of technology to human service programs by Ruth A. Bruer." Diss., Virginia Tech, 1990. http://hdl.handle.net/10919/39895.

Full text
Abstract:
The purpose of this dissertation is to describe the transfer of a specific technology to a program intended to benefit a segment of the older population. The study interprets the implications of this transfer process for human service programs responsive to the public interest. This provides a lucrative realm for examining the process as an outgrowth of public-private partnerships. Analysis of a partnership in five case studies illustrates the dynamics between nonprofit and for-profit organizations and potential tensions related to differing goals, means, and values. Theoretical grounding draws on relevant organization theory that guides the consideration of prominent concepts, such as responsiveness to the public and the potential for cooptation of public goals in public-private organizational partnerships. With this as a base, the dissertation provides implications for the development of theory on technology transfer in the delivery of human services.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
10

O'Neil, Dara Veronica. "Predicting public managers' readiness for contracting of professional services in a changing State Government Agency." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-06282007-154406/.

Full text
Abstract:
Thesis (Ph. D.)--Public Policy, Georgia Institute of Technology, 2008.
Dr. Hans Klein, Committee Member ; Dr. Diana Hicks, Committee Member ; Dr. Barry Bozeman, Committee Member ; Dr. Gordon Kingsley, Committee Chair ; Dr. Michael Meyer, Committee Member.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Private security services – United States"

1

Introduction to private security. Belmont, CA: Wadsworth Cengage Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hess, Kären M. Introduction to private security. 2nd ed. St. Paul: West Pub. Co., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Introduction to private security. 5th ed. Belmont, CA: Cengage Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1922-, Wrobleski Henry M., ed. Introduction to private security. 4th ed. Minneapolis/St. Paul: West Pub. Co., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hess, Kären M. Introduction to private security. 3rd ed. St. Paul: West Pub. Co., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

J, Farber Bernard, and Arnold David W. 1954-, eds. Protective security law. 2nd ed. Boston: Butterworth-Heinemann, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mendelson, Gallery Shari, ed. Security training: Readings fromSecurity management magazine. Boston: Butterworths, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bruce, McBride R., ed. Proactive security administration. 2nd ed. Upper Saddle River, N.J: Prentice Hall, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1951-, Nemeth Charles P., ed. Private security and public safety: A community-based approach. Upper Saddle River, N.J: Pearson Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Homeland security: Federal Protective Service's contract guard program requires more oversight and reassessment of use of contract guards : report to congressional requesters. Washington, D.C.]: U.S. Govt. Accountability Office, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Private security services – United States"

1

Benny, Daniel J. "United States Intelligence Services." In U.S. National Security and the Intelligence Services, 25–39. New York: CRC Press, 2022. http://dx.doi.org/10.4324/9781003270843-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Benny, Daniel J. "United States Key Allied Intelligence Services." In U.S. National Security and the Intelligence Services, 41–50. New York: CRC Press, 2022. http://dx.doi.org/10.4324/9781003270843-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vorwig, Petra A. "Regulation of Private Launch Services in the United States." In National Regulation of Space Activities, 405–19. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9008-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bajtelsmit, Vickie. "Retirement Income Security in the United States: An Overview of the Public and Private Retirement System." In Contributions to Management Science, 29–48. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-6446-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Friedel, Michael J. "Climate Change Effects on Ecosystem Services in the United States – Issues of National and Global Security." In Climate Change and its Effects on Water Resources, 17–24. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-1143-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Hui, and Xin Yang. "Prototype of Sovereignty Network and Application of Private Network Based on MIN." In Co-governed Sovereignty Network, 183–257. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2670-8_5.

Full text
Abstract:
AbstractMulti-Identifier Network (MIN) is compatible with IP network, and supports naturally and gradually de-IP, which will be promoted by users and the market for its performance gains rather than by compulsively. It is a predictable circumstance that the IP network may still be mainstream at United States of American in the future. But other countries will move away from IP to MIN in order to safeguard their sovereignty over cyberspace, and the connectivity between them and IP network are guaranteed through MIN. In other words, IP network will become the internal network of the United States, while other countries will constitute a multilateral governance network system based on MIN. In brief, the applications scenarios of Co-governed Sovereignty Network based on MIN could be classified into three scales: the small-scale scenarios such as high-security private networks for enterprises, industries, and government departments; the medium-scale scenarios of industrial Internet, private network of Internet of vehicles and smart city; the United Nations of Cyberspace: raplacing the current IP network with the large-scale high-security cyberspace for multilateral condominium and sovereign autonomy.
APA, Harvard, Vancouver, ISO, and other styles
7

Steensland, Ann, and Margaret Zeigler. "Productivity in Agriculture for a Sustainable Future." In The Innovation Revolution in Agriculture, 33–69. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50991-0_2.

Full text
Abstract:
Abstract The Malthusian predictions of the future have not come to pass due largely to innovative agricultural technologies and practices that stimulated significant gains in agricultural productivity. This chapter examines the linkages between innovation, productivity, and sustainability. The definition of agricultural productivity, measured as total factor productivity (TFP), will be explained, as well as the contribution of innovation to global TFP growth and the contribution of TFP to sustainable food and agriculture systems. To illustrate these connections, this chapter highlights innovative technologies and practices used by crop and livestock producers in the United States, Colombia, India, Kenya, and Vietnam. These cases demonstrate how advanced seed technologies, improvements in soil health and nutrient management, mechanization, and an emphasis on animal health drive productivity growth around the world. Many of these cases feature partnerships between the public sector, private sector, and producers where innovations and new practices are used to increase productivity, incomes, food security, and nutrition. Creating an enabling policy environment is essential for agricultural innovation, productivity, and sustainability; the chapter gives examples of public policies that stimulate such productivity: investing in public sector research and development (R&D), embracing science-based technologies, and establishing smart regulatory environments. The chapter includes a discussion of innovation, productivity, and the Sustainable Development Goals (SDGs).
APA, Harvard, Vancouver, ISO, and other styles
8

Choer Moraes, Henrique, and Mikael Wigell. "Balancing Dependence: The Quest for Autonomy and the Rise of Corporate Geoeconomics." In The Political Economy of Geoeconomics: Europe in a Changing World, 29–55. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-01968-5_2.

Full text
Abstract:
AbstractThe acceleration of great-power competition is leading most major powers to become increasingly concerned about the security risks that economic interdependence poses for state autonomy. This tendency can be seen in the EU’s efforts to develop its ‘open strategic autonomy’, the United States’ ‘reshoring’ of supply chains and technological ‘decoupling’, as well as China’s ‘Made in China’- strategy. In order to make sense of these transformations, this chapter introduces the concept of ‘balancing dependence’, by which we refer to state policies that seek to reduce economic dependencies on foreign actors, both public and private. The chapter describes how such geoeconomic balancing by major economies triggers a reaction by other economies in such a way that challenges the largely market-oriented rationale of the (neo)liberal order prevailing over the course of the last three decades. Yet, in an interdependent global economy, it is expected that companies will try to influence the impact of governments’ actions over their businesses, either to discourage geoeconomic balancing or to benefit from it. Thus, the chapter also puts forward the concept of ‘corporate geoeconomics’, which describes how firms are trying to preserve a measure of autonomy in an economic environment marked by increased state (geoeconomic) intervention.
APA, Harvard, Vancouver, ISO, and other styles
9

McCrie, Robert. "Private security services regulations in the United States today." In Regulating the Security Industry, 129–46. Routledge, 2020. http://dx.doi.org/10.4324/9781351010375-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cole, Thomas, Amit Kumar Bhardwaj, Lalit Garg, and Divya Prakash Shrivastava. "Investigation Into Cloud Computing Adoption Within the Hedge Fund Industry." In Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, 1615–41. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5339-8.ch079.

Full text
Abstract:
Cloud computing is not associated with a specific technology, instead it as an alternative method to deliver technology as a service. This article investigates current cloud computing adoption in the United States (USA) and United Kingdom (UK) hedge fund industry. Hedge fund technologists, prime service consultants, technology service providers, industry application vendors, investors and an independent information security consultant participated were surveyed for this article. The article acknowledges the growth of cloud computing in the hedge fund sector. This research work also highlights that the private cloud definition is vague and requires further classification, elaborating on the variants of private cloud. This is important as the variants of private cloud computing offer varying benefits and risk which the hedge fund sector has proven to be sensitive. Equally, this article argues that some of the current security concerns are over-stated and perhaps reflect a conservative decision making framework rather than a realistic consideration of the options.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Private security services – United States"

1

Jovanović, Zoran. "Uticaj novog javnog menadžmeta na privatizaciju javnih službi." In XVI Majsko savetovanje. University of Kragujevac, Faculty of Law, 2020. http://dx.doi.org/10.46793/upk20.891j.

Full text
Abstract:
Public services that satisfy the interest of the community in contemporary conditions are provided by administrative organizations, market entities or an administrative organization and a private entity together through various arrangements, all depending on the generally accepted conception of the role of the state in public administration. Some of the countries to be analyzed went much deeper into management than other countries because governments realized that they did not have to provide goods and services to citizens if they could not guarantee that services would be provided fairly, which contributed to the rapid and effective public service reform. The state (administration) becomes (remains) only the coordinator of public policies that ensures fairness in providing services to citizens, and ceases to be its undisputed immediate executor. In this paper, the author analyzes the impact of new public management on the privatization of public services in the United States and in Westminster countries (Canada, United Kingdom and Australia). Private provision of public services has long been a part of efficient and effective governance in these countries. In the midst of new public management reforms that have spread around the world since the 1980s and beyond, there is a growing interest in private governance and ownership of key public services at all levels of government. A key question for governments considering privatizing public services is whether private firms provide higher quality services than their public sector partners. Compared to the performance of private sector organizations, the quality of public service delivery is difficult to measure and monitor in today's context. For these reasons, it is sometimes thought that private firms may not have the necessary capabilities to deal with all elements of effective public service management.
APA, Harvard, Vancouver, ISO, and other styles
2

Onescu, Dragos ionut. "EU AND CYBER SECURITY." In eLSE 2016. Carol I National Defence University Publishing House, 2016. http://dx.doi.org/10.12753/2066-026x-16-063.

Full text
Abstract:
EU and cyber security Securing network and information systems in the EU is essential to ensure prosperity and to keep the online economy running. The European Union works on a number of fronts to ensure cybersecurity in Europe, from providing the delivery of better internet for kids to implementing the international cooperation on cybersecurity and cybercrime. As societies, governments and businesses become increasingly reliant on the Internet for the normal functioning of every-day activities and the supply of essential services, protecting cyberspace from malicious activities has become a critical action point for policymakers globally. While digital and networked technologies promise much, the implications of successful attacks can be huge. The continued rapid development of information and communication technologies, globalization, the drastic increase in data volumes and the growing number of different types of equipment connected to data networks have an impact on daily life, the economy and the functioning of the state. On the one hand, this level of ICT development will contribute to the improved availability and usability of services, enhance transparency and citizen participation in governance, and cut public as well as private sector costs. On the other hand, the increasing importance of technology is accompanied by an increase in the state's growing dependence on already entrenched e-solutions, and cements the expectation of technology operating eamlessly. Social processes are also becoming increasingly dependent on a growing number of information technology resources, and in the future attention must be drawn to the fact that society at large, and each individual in particular, will be able to maintain control over the corresponding processes. Otherwise, there is potential for information technologies to reduce the role of humans in the decision-making process, and processes may become self-regulatory (technological singularity). The number of state actors in cyberspace that are involved in cyber espionage targeted at computers connected to the Internet as well as closed networks continues to grow, with their aim being to collect information on both national security as well as economic interests. The amount and activeness of states capable of cyber-attacks are increasing. In addition to the activation of state actors, the ability of politically motivated individuals and groups with limited means to organize their activities using social networks and carry out denial of service and other types of attacks is growing as well. Meaningful and effective cooperation between the public and private sector in the development of cyber security organization as well as in preventing and resolving cyber incidents is becoming increasingly unavoidable. National defense and internal security are dependent on the private sector's infrastructure and resources, while at the same time the state can assist vital service providers and guarantors of national critical information infrastructure as a coordinator and balancer of various interests.
APA, Harvard, Vancouver, ISO, and other styles
3

Barattino, William J., Scott Foster, and James Spaulding. "The U.S. Federal Market as an Early Adopter of SMRs." In ASME 2014 Small Modular Reactors Symposium. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/smr2014-3331.

Full text
Abstract:
The Federal Government accounts for about 2% of energy usage within the United States, with electricity accounting for approximately one-fifth of this usage. The Department of Defense (DOD) is the largest energy consumer across all Federal Agencies, accounting for nearly half of total use and has implemented programs to assure sustainable energy supplies for meeting mission critical operations. As prototype systems of Small Modular Reactors mature during the remainder of this decade, there is growing interest at senior levels of government to use the secure confines of military bases for electricity generated with SMRs to service power requirements of the DOD base and possibly the surrounding communities. This paper explores the potential for using DOD as an early adopter of SMRs from perspectives of the size of the market and adaptability of the current procurement process for private ownership of SMRs on military bases. Such an approach is shown to be consistent with DOD Sustainability objectives, as well as ensuring a continuation of the projected erosion of diversity mix for prime power generation within the U.S. A review of contract types for energy services are evaluated from the perspective of including SMRs. Required modifications for SMRs to be a part of this energy mix for Federal Agencies are presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Barbosa, Fábio C. "Competition Into Brazilian and North American Freight Rail Systems: A Comparative Regulatory Assessment." In 2018 Joint Rail Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/jrc2018-6138.

Full text
Abstract:
Competition is the driving force of any economic system, as it creates a challenging environment for service suppliers to provide affordable and reliable services to customers. Rail systems are an important element of the logistic chain, as they provide a unique service category (generally transporting large volumes at low unit costs) to shippers that otherwise would not be serviced by other modes — the so called captive shippers. In this scenario, competition is essential to guarantee the required service levels (availability and reliability), followed by competitive rates, which ultimately may influence shippers’ business competitiveness, both regionally and globally. Brazil and some North American countries (Canada, Mexico and United States), have a common feature, i.e. continental territories allied with the economic exploitation of bulky activities (industrial, mineral and agricultural), and, hence, depend strongly on heavy haul rail systems. These countries have been performing a continuous effort on improving competition practices into their rail systems, which are translated into important, and sometimes controversial, regulatory measures. These initiatives require a tenuous equilibrium, as they are supposed to provide the required competitive service at affordable rates for shippers, as well as a sustainable (financial and operational) environment to rail carriers, to guarantee the required return on long term investments and avoid compromising medium and long term rail network efficiency. This challenging task for rail market stakeholders (rail carriers, shippers and regulators) is far from a consensus. Rail companies claim that, as a capital intensive sector, governmental regulatory intervention into the rail system may inhibit their ability to invest the required funds to provide and expand rail capacity, as well as the maintenance of the required safety levels. Shippers, on the other hand, state that rail systems operate within a strong market concentration (originally formatted or due to subsequent merges and acquisitions) that give some rail carriers a disproportionate market power, that resembles a monopoly, which ultimately leaves a significant contingent of the so called captive shippers with just one freight rail carrier option, sometimes subjected to excessive rates, and, in some special instances (into offer restricted rail markets, for example), are responsible for the unavailability of rail services into the required volumes. In this context, there is currently a controversial debate regarding the effectiveness of competitive regulatory remedies into freight rail systems. This debate includes both market oriented rail systems (Canadian and U.S.), as well as rail contractual granted ones (Brazilian and Mexican). In the formers, the systems are mostly owned and operated by the private sector, and inter and intra modal options may theoretically provide the required competition level, while in the latter, rail systems have been broken into separate pieces and granted to the private sector under a concession arrangement, followed by an exclusive right to serve their territories, with trackage rights provisions, to be exerted by third parties, under previously defined circumstances and subjected to contractual agreements among rail operators. In both systems, competitive regulatory actions may be desirable and effective, as far as they may address the technical-operational-economic boundary conditions of each particular rail system. This work is supposed to present, into a review format, sourced from an extensive research into available international technical literature, and gathered as a unique document, an overview of the Brazilian and North American freight rail competition scenario, followed by a technical and unbiased effectiveness’ assessment of current (existing) and proposed competitive regulatory freight rail initiatives into Brazil, Canada, Mexico and United States, highlighting their strengths and eventually their weaknesses.
APA, Harvard, Vancouver, ISO, and other styles
5

Atmaca, Serhat, and Metin Bayrak. "The Impact of Government Spending On Economic Growth in Kazakhstan and Kyrgyzstan." In International Conference on Eurasian Economies. Eurasian Economists Association, 2017. http://dx.doi.org/10.36880/c09.01974.

Full text
Abstract:
The realization of economic growth in order to grow and develop an economy and increase social welfare is one of the basic aims of every society. For this reason, states are making great efforts to realize economic growth and make it sustainable. In this context, the impact of public expenditure on the economic growth of countries is a matter of research. Government spending can be classified economically as expenditure on capital and current expenditures, functionally as general public services, defense services, education services, public order and security services, economic affairs and services, environmental protection services, health services and other services. There are also investment expenditures made by the government for economic development. In particular, public investment expenditures complementary to private investments have positive effects on growth. The Kazakhstan and Kyrgyzstan economies, which are in the category of developing countries, are looking for ways to achieve development and growth and are implementing various practices and economic policies in this process. In this context, Kazakhstan and Kyrgyzstan have the main purpose of studying and analyzing the effects of the public expenditures that they think will be effective on economic growth. The various variables of public spending in the study were examined with the Karma Average Group (PMG) model, which shows how Kazakhstan and Kyrgyzstan's growth affected their growth in the short and long term. As a result, public spending has been influenced by economic growth and it has been determined which components are active on a country basis.
APA, Harvard, Vancouver, ISO, and other styles
6

Palmieri, Alessandro, and Blerina Nazeraj. "OPEN BANKING AND COMPETITION: AN INTRICATE RELATIONSHIP." In International Jean Monnet Module Conference of EU and Comparative Competition Law Issues "Competition Law (in Pandemic Times): Challenges and Reforms. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18822.

Full text
Abstract:
Open banking – promoted in the European Union by the access to account rule contained in the Directive (EU) 2015/2366 on payment services in the internal market (PSD2) – is supposed to enhance consumer’s welfare and to foster competition. However, many observers are fearful about the negative effects of the entry into the market of the so-called BigTech giants. Unless incumbent banks are able to rise above the technological challenges, the risk is that, in the long run, BigTech firms could dominate the market, by virtue of their great ability to collect data on consumer preferences, and to process them with sophisticated tools, such as Artificial Intelligence and Machine Learning techniques; not to mention the possible benefits arising from the cross-subsidisation. This paper aims at analysing the controversial relationship between open banking and competition. In this framework, many aspects must be clarified, such as the definition of the relevant markets; the identification of the dominant entities; the relationship with the essential facility doctrine. The specific competition problems encountered in the financial sector need to be inscribed in the context of the more general debate around access to data in the digital sphere. The evolving scenario poses a serious challenge to regulators, calling them to strike the right balance between fostering innovation and preserving financial stability. The appraisal intends not only to cover EU law and policy, but also to make a comparison with other legal systems. In this respect, something noteworthy is taking place in the United States where, as of today, consumers’ access to financial data sharing has been largely dependent on private-sector efforts. Indeed, Section 1033 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (passed in the aftermath of the financial crisis of 2008) provides that, subject to rules prescribed by the Bureau of Consumer Financial Protection (CFPB), a consumer financial services provider must make available to a consumer information, in its control or possession, concerning the consumer financial product or service that the consumer obtained from the provider. This provision, which dates back to 2010, has never been implemented. However, on 22 October 2020, the CFBP has announced its intention to regulate open banking, issuing an advanced notice of proposed rulemaking. In light of their investigation, the authors advocate the adaptation of the current strategies to the modified conditions and, in some instances, the creation of novel mechanisms, more suitable to face unprecedented threats.
APA, Harvard, Vancouver, ISO, and other styles
7

Jackson, J. Dale, and Dale E. Donaldson. "DOE’s Stewardship of Government-Owned Uranium Materials." In 10th International Conference on Nuclear Engineering. ASMEDC, 2002. http://dx.doi.org/10.1115/icone10-22590.

Full text
Abstract:
Beginning in the 1980’s, a significant number of Department of Energy facilities have been shut down and are in the decommissioning process. The shutdown of additional facilities is planned. In addition, during the past several decades, the Department of Energy has loaned nuclear material to a wide variety of private and governmental institutions for research and educational purposes. Subsequent changes in the Department’s priorities have reduced the need for nuclear materials to support the Department’s programs. Similarly, there has been a reduction in the need for borrowed nuclear materials by organizations and institutions using nuclear materials “on loan” from the Department. As a result, inventories of uranium material from the Department’s facilities and “on loan” must be removed and returned to the Department. This material is in the form of low enriched uranium (LEU), normal uranium (NU), and depleted uranium (DU) in various forms. This uranium material is located at over one hundred sites within the United States and overseas, including universities and laboratories. Much of this uranium is not needed to support national priorities and programs. The Department of Energy has assumed a stewardship role in managing nuclear materials throughout their life cycle, from acquisition to storage. Surplus uranium has created challenges for DOE in managing and storing the material as well as identifying opportunities for its further use. On behalf of the Department, the Oak Ridge Operations Office has been given the responsibility to implement the Department responsibilities in meeting these challenges and managing the Department’s uranium materials. To support this effort, the Office of Nuclear Fuel Security and Uranium Technology within the ORO complex coordinates uranium management functions across the Department of Energy. This coordination provides DOE with a number of important benefits, among which are: consolidated management and storage of uranium; improved security; a reduction of operating costs; effective use and reuse of DOT certified shipping containers; and accelerated site closure.
APA, Harvard, Vancouver, ISO, and other styles
8

Mihai, Mihaela, Emilia Titan, Daniela Manea, and Aida Catana. "THE DIGITAL PREMIUM PROGRESS OF AN INCLUSIVE ECONOMY." In eLSE 2018. Carol I National Defence University Publishing House, 2018. http://dx.doi.org/10.12753/2066-026x-18-242.

Full text
Abstract:
The progress on digital technologies and services does not only impact the production of goods and services or the way we do business but transforms the way we live, communicate with others and spend our free time. The rapidity of developments is reflected in particular on the increase in the quality of life on the one hand, but on the other hand, it creates inconveniences associated with lack of basic or advanced skills, industrial reorganization, data security, private life, etc. All these developments are monitored by the European Commission, which, recognizing their potential, has brought digital policies to the forefront of its agenda. The Digital Agenda is a program document launched in a crisis-dominated European socio-economic context to define the influence that the use of information and communication technology has on achieving Europe's 2020 goals and to develop a Digital Single Market. In this respect, Neelie Kroes, Vice-President of the Digital Agenda, stressed that "we must put the interests of European citizens and companies at the forefront of the digital revolution in order to fully benefit from the potential of Information and Communication Technology (ICT) create new jobs and promote social sustainability and inclusion." At the same time, he argues that "the ambitious strategy presented today clearly shows the areas on which we must concentrate our efforts in the years to come. In order to fully realize the potential of Europe's digital future, we need the full commitment of the Member States, the ICT sector and other major economic actors. "
APA, Harvard, Vancouver, ISO, and other styles
9

Schicker, Philippe C., and Heejin Cho. "Multi-Regional Design and Analysis of Biomass-Driven Combined Cooling, Heating and Power Systems for Rural Communities." In ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-96104.

Full text
Abstract:
Abstract The challenges during the aftermath of natural disasters in remote locations, such as unreliable power supply from the grid during crucial times, coupled with ever-increasing energy needs, demand new and innovative solutions to limited energy production. Local, on-site power generation, such as combined cooling, heating, and power (CCHP) systems, may safeguard against grid fluctuations, outages, and provide additional security through grid independence. CCHP systems can provide more reliable and resilient energy supply to buildings and communities while also providing energy-efficient, cost-effective, and environmentally sustainable solutions compared to centralized power systems. Biomass-driven CCHP systems have been recognized as a potential technology to bring increased efficiency of fuel utilization and environmentally sustainable solutions. Biomass as an energy source is created through agricultural and forestry by-products and may thus be efficiently and conveniently transported to remote rural communities. This paper presents a design and implementation analysis of biomass (primarily wood pellets)-driven CCHP systems for a rural community across the United States. The U.S. Department of Energy Climate Regions map was used to determine areas of interest. For this study, all three climates moist, dry, and marine as well as all major climate zones (2–6) were included. To effectively compare small towns across the U.S., the selection process was based on certain criteria: A population of approximately 1,500 people, the existence of a rural hospital, two kinds of schools (E.g., an elementary and a high school), and small businesses. The following places meet those conditions and are located in differentiating climate zones: (2A) Keystone Heights, FL, (3A) Ackerman, MS, (3B) Quincy, CA, (3C) Mariposa, CA, (4A) Hardinsburg, KY, (4C) Coupeville, WA, (5A) Alma, NE, (5B) Lovelock, NV, (6A) Colebrook, NH, (6B) Choteau, MT. Each location was investigated based on the merits of on-site CCHP systems and potential grid independence. The viability of wood pellets (WP) as a suitable fuel source is explored by comparing it to a conventional natural gas-driven and grid-connected system. To measure viability, three performance parameters — operational cost (OC), primary energy consumption (PEC), and carbon dioxide emission (CDE) — are considered in the analysis. The results demonstrate that in many climate regions wood pellet-fueled CCHP systems create significant economic and environmental advantages over traditional systems. Additionally, on-site energy production and the potential for grid independence, especially in the aftermath of natural disasters provide critical services and added upsides of traditional systems. The main factors in increasing the viability of CCHP systems are the appropriate sizing and operational strategies of the system and the purchase price of biomass with respect to the price of traditional fuels.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Private security services – United States"

1

Grespin, Whitney. The Evolving Contingency Contracting Market: Private Sector Self regulation and United States Government Monitoring of Procurement of Stability Operations Services. Fort Belvoir, VA: Defense Technical Information Center, January 2016. http://dx.doi.org/10.21236/ad1004033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frost, Jennifer J., Jennifer Mueller, and Zoe H. Pleasure. Trends and Differentials in Receipt of Sexual and Reproductive Health Services in the United States: Services Received and Sources of Care, 2006–2019. Guttmacher Institute, June 2021. http://dx.doi.org/10.1363/2021.33017.

Full text
Abstract:
Key Points Seven in 10 U.S. women of reproductive age, some 44 million women, make at least one medical visit to obtain sexual and reproductive health (SRH) services each year. While the overall number of women receiving any SRH service remained relatively stable between 2006–2010 and 2015–2019, the number of women receiving preventive gynecologic care fell and the number receiving STI testing doubled. Disparities in use of SRH services persist, as Hispanic women are significantly less likely than non-Hispanic White women to receive SRH services, and uninsured women are significantly less likely to receive services than privately insured women. Publicly funded clinics remain critical sources of SRH care for many women, with younger women, lower income women, women of color, foreign-born women, women with Medicaid coverage and women who are uninsured especially likely to rely on publicly funded clinics. Among women who go to clinics for SRH care, two-thirds report that the clinic is their usual source for medical care. Among those relying on both private providers and public clinics, the proportion of women who reported receiving a combination of contraceptive and STI/HIV care increased between 2006–2010 and 2015–2019. Implementation of the Affordable Care Act has likely contributed to some of the changes observed in where women receive contraceptive and other SRH services and how they pay for that care: The share of women receiving contraceptive services who go to private providers rose from 69% to 77% between 2006–2010 and 2015–2019, in part because more women gained private or public health insurance coverage and there was a greater likelihood that their health insurance would cover SRH services. There was a complementary drop in the share of women receiving contraceptive services who went to a publicly funded clinic, from 27% in 2006–2010 to 18% in 2015–2019. For non-Hispanic Black women, immigrant women and uninsured women, there was no increase in the use of private providers for contraceptive care from 2006–2010 to 2015–2019. Among women served at publicly funded clinics between 2006–2010 and 2015–2019, there were significant increases in the use of both public and private insurance to pay for their care.
APA, Harvard, Vancouver, ISO, and other styles
3

Kilgore, Michael A., Paul B. Ellefson, Travis J. Funk, and Gregory E. Frey. State property tax incentives for promoting ecosystem goods and services from private forest land in the United States: a review and analysis. Asheville, NC: U.S. Department of Agriculture, Forest Service, Southern Research Station, 2017. http://dx.doi.org/10.2737/srs-gtr-228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kilgore, Michael A., Paul B. Ellefson, Travis J. Funk, and Gregory E. Frey. State property tax incentives for promoting ecosystem goods and services from private forest land in the United States: a review and analysis. Asheville, NC: U.S. Department of Agriculture, Forest Service, Southern Research Station, 2017. http://dx.doi.org/10.2737/srs-gtr-228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Flagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20200051.

Full text
Abstract:
U.S. research security requires trust and collaboration between those conducting R&D and the federal government. Most R&D takes place in the private sector, outside of government authority and control, and researchers are wary of federal government or law enforcement involvement in their work. Despite these challenges, as adversaries work to extract science, technology, data and know-how from the United States, the U.S. government is pursuing an ambitious research security initiative. In order to secure the 78 percent of U.S. R&D funded outside the government, authors Melissa Flagg and Zachary Arnold propose a new, public-private research security clearinghouse, with leadership from academia, business, philanthropy, and government and a presence in the most active R&D hubs across the United States.
APA, Harvard, Vancouver, ISO, and other styles
6

Wiener, Joshua M., Mary E. Knowles, and Erin E. White. Financing Long-Term Services and Supports: Continuity and Change. RTI Press, September 2017. http://dx.doi.org/10.3768/rtipress.2017.op.0042.1709.

Full text
Abstract:
This article provides an overview of financing for long-term services and supports (LTSS) in the United States, paying special attention to how it has changed and not changed over the last 30 years. Although LTSS expenditures have increased greatly (like the rest of health care), the broad outline of the financing system has remained remarkably constant. Medicaid—a means-tested program—continues to dominate LTSS financing, while private long-term care insurance plays a minor role. High out-of-pocket costs and spend-down to Medicaid because of those high costs continue to be hallmarks of the system. Although many major LTSS financing reform proposals were introduced over this period, none was enacted—except the Community Living Assistance Services and Supports Act, which was repealed before implementation because of concerns about adverse selection. The one major change during this time period has been the very large increase in Medicare spending for post-acute services, such as short-term skilled nursing facility and home health care. With the aging of the population, demand for LTSS is likely to increase, placing strain on the existing system.
APA, Harvard, Vancouver, ISO, and other styles
7

Lewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2021. http://dx.doi.org/10.54813/uzav2714.

Full text
Abstract:
The imperative to provide humanitarian and medical services on an urgent basis in armed conflicts is anchored in moral tenets, shared values, and international rules. States spend tens of billions of dollars each year to help implement humanitarian programs in conflicts across the world. Yet, in practice, counterterrorism objectives increasingly prevail over humanitarian concerns, often resulting in devastating effects for civilian populations in need of aid and protection in war. Not least, confusion and misapprehensions about the power and authority of States relative to the United Nations Security Council to set policy preferences and configure legal obligations contribute significantly to this trajectory. In this guide for States, we present a framework to reconfigure relations between these core commitments by assessing the counterterrorism architecture through the lens of impartial humanitarianism. We aim in particular to provide an evidence base and analytical frame for States to better grasp key legal and policy issues related to upholding respect for principled humanitarian action in connection with carrying out the Security Council’s counterterrorism decisions. We do so because the lack of knowledge regarding interpretation and implementation of counterterrorism resolutions matters for the coherence, integrity, and comprehensiveness of humanitarian policymaking and protection of the humanitarian imperative. In addition to analyzing foundational concerns and evaluating discernible behaviors and attitudes, we identify avenues that States may take to help achieve pro-humanitarian objectives. We also endeavor to help disseminate indications of, and catalyze, States’ legally relevant positions and practices on these issues. In section 1, we introduce the guide’s impetus, objectives, target audience, and structure. We also describe the methods that we relied on and articulate definitions for key terms. In section 2, we introduce key legal actors, sources of law, and the notion of international legal responsibility, as well as the relations between international and national law. Notably, Security Council resolutions require incorporation into national law in order to become effective and enforceable by internal administrative and judicial authorities. In section 3, we explain international legal rules relevant to advancing the humanitarian imperative and upholding respect for principled humanitarian action, and we sketch the corresponding roles of humanitarian policies, programs, and donor practices. International humanitarian law (IHL) seeks to ensure — for people who are not, or are no longer, actively participating in hostilities and whose needs are unmet — certain essential supplies, as well as medical care and attention for the wounded and sick. States have also developed and implemented a range of humanitarian policy frameworks to administer principled humanitarian action effectively. Further, States may rely on a number of channels to hold other international actors to account for safeguarding the humanitarian imperative. In section 4, we set out key theoretical and doctrinal elements related to accepting and carrying out the Security Council’s decisions. Decisions of the Security Council may contain (binding) obligations, (non-binding) recommendations, or a combination of the two. UN members are obliged to carry out the Council’s decisions. Member States retain considerable interpretive latitude to implement counterterrorism resolutions. With respect to advancing the humanitarian imperative, we argue that IHL should represent a legal floor for interpreting the Security Council’s decisions and recommendations. In section 5, we describe relevant conduct of the Security Council and States. Under the Resolution 1267 (1999), Resolution 1989 (2011), and Resolution 2253 (2015) line of resolutions, the Security Council has established targeted sanctions as counterterrorism measures. Under the Resolution 1373 (2001) line of resolutions, the Security Council has adopted quasi-“legislative” requirements for how States must counter terrorism in their national systems. Implementation of these sets of resolutions may adversely affect principled humanitarian action in several ways. Meanwhile, for its part, the Security Council has sought to restrict the margin of appreciation of States to determine how to implement these decisions. Yet international law does not demand that these resolutions be interpreted and implemented at the national level by elevating security rationales over policy preferences for principled humanitarian action. Indeed, not least where other fields of international law, such as IHL, may be implicated, States retain significant discretion to interpret and implement these counterterrorism decisions in a manner that advances the humanitarian imperative. States have espoused a range of views on the intersections between safeguarding principled humanitarian action and countering terrorism. Some voice robust support for such action in relation to counterterrorism contexts. A handful call for a “balancing” of the concerns. And some frame respect for the humanitarian imperative in terms of not contradicting counterterrorism objectives. In terms of measures, we identify five categories of potentially relevant national counterterrorism approaches: measures to prevent and suppress support to the people and entities involved in terrorist acts; actions to implement targeted sanctions; measures to prevent and suppress the financing of terrorism; measures to prohibit or restrict terrorism-related travel; and measures that criminalize or impede medical care. Further, through a number of “control dials” that we detect, States calibrate the functional relations between respect for principled humanitarian action and countering terrorism. The bulk of the identified counterterrorism measures and related “control dials” suggests that, to date, States have by and large not prioritized advancing respect for the humanitarian imperative at the national level. Finally, in section 6, we conclude by enumerating core questions that a State may answer to help formulate and instantiate its values, policy commitments, and legal positions to secure respect for principled humanitarian action in relation to counterterrorism contexts.
APA, Harvard, Vancouver, ISO, and other styles
8

Langenkamp, Max, and Melissa Flagg. AI Hubs: Europe and CANZUK. Center for Security and Emerging Technology, April 2021. http://dx.doi.org/10.51593/20200061.

Full text
Abstract:
U.S. policymakers need to understand the landscape of artificial intelligence talent and investment as AI becomes increasingly important to national and economic security. This knowledge is critical as leaders develop new alliances and work to curb China’s growing influence. As an initial effort, an earlier CSET report, “AI Hubs in the United States,” examined the domestic AI ecosystem by mapping where U.S. AI talent is produced, where it is concentrated, and where AI private equity funding goes. Given the global nature of the AI ecosystem and the importance of international talent flows, this paper looks for the centers of AI talent and investment in regions and countries that are key U.S. partners: Europe and the CANZUK countries (Canada, Australia, New Zealand, and the United Kingdom).
APA, Harvard, Vancouver, ISO, and other styles
9

Lewis, Dustin, and Naz Modirzadeh. Taking into Account the Potential Effects of Counterterrorism Measures on Humanitarian and Medical Activities: Elements of an Analytical Framework for States Grounded in Respect for International Law. Harvard Law School Program on International Law and Armed Conflict, May 2021. http://dx.doi.org/10.54813/qbot8406.

Full text
Abstract:
For at least a decade, States, humanitarian bodies, and civil-society actors have raised concerns about how certain counterterrorism measures can prevent or impede humanitarian and medical activities in armed conflicts. In 2019, the issue drew the attention of the world’s preeminent body charged with maintaining or restoring international peace and security: the United Nations Security Council. In two resolutions — Resolution 2462 (2019) and Resolution 2482 (2019) — adopted that year, the Security Council urged States to take into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities, including medical activities, that are carried out by impartial humanitarian actors in a manner consistent with international humanitarian law (IHL). By implicitly recognizing that measures adopted to achieve one policy objective (countering terrorism) can impair or prevent another policy objective (safeguarding humanitarian and medical activities), the Security Council elevated taking into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities to an issue implicating international peace and security. In this legal briefing, we aim to support the development of an analytical framework through which a State may seek to devise and administer a system to take into account the potential effects of counterterrorism measures on humanitarian and medical activities. Our primary intended audience includes the people involved in creating or administering a “take into account” system and in developing relevant laws and policies. Our analysis zooms in on Resolution 2462 (2019) and Resolution 2482 (2019) and focuses on grounding the framework in respect for international law, notably the U.N. Charter and IHL. In section 1, we introduce the impetus, objectives, and structure of the briefing. In our view, a thorough legal analysis of the relevant resolutions in their wider context is a crucial element to laying the conditions conducive to the development and administration of an effective “take into account” system. Further, the stakes and timeliness of the issue, the Security Council’s implicit recognition of a potential tension between measures adopted to achieve different policy objectives, and the relatively scant salient direct practice and scholarship on elements pertinent to “take into account” systems also compelled us to engage in original legal analysis, with a focus on public international law and IHL. In section 2, as a primer for readers unfamiliar with the core issues, we briefly outline humanitarian and medical activities and counterterrorism measures. Then we highlight a range of possible effects of the latter on the former. Concerning armed conflict, humanitarian activities aim primarily to provide relief to and protection for people affected by the conflict whose needs are unmet, whereas medical activities aim primarily to provide care for wounded and sick persons, including the enemy. Meanwhile, for at least several decades, States have sought to prevent and suppress acts of terrorism and punish those who commit, attempt to commit, or otherwise support acts of terrorism. Under the rubric of countering terrorism, States have taken an increasingly broad and diverse array of actions at the global, regional, and national levels. A growing body of qualitative and quantitative evidence documents how certain measures designed and applied to counter terrorism can impede or prevent humanitarian and medical activities in armed conflicts. In a nutshell, counterterrorism measures may lead to diminished or complete lack of access by humanitarian and medical actors to the persons affected by an armed conflict that is also characterized as a counterterrorism context, or those measures may adversely affect the scope, amount, or quality of humanitarian and medical services provided to such persons. The diverse array of detrimental effects of certain counterterrorism measures on humanitarian and medical activities may be grouped into several cross-cutting categories, including operational, financial, security, legal, and reputational effects. In section 3, we explain some of the key legal aspects of humanitarian and medical activities and counterterrorism measures. States have developed IHL as the primary body of international law applicable to acts and omissions connected with an armed conflict. IHL lays down several rights and obligations relating to a broad spectrum of humanitarian and medical activities pertaining to armed conflicts. A violation of an applicable IHL provision related to humanitarian or medical activities may engage the international legal responsibility of a State or an individual. Meanwhile, at the international level, there is no single, comprehensive body of counterterrorism laws. However, States have developed a collection of treaties to pursue specific anti-terrorism objectives. Further, for its part, the Security Council has assumed an increasingly prominent role in countering terrorism, including by adopting decisions that U.N. Member States must accept and carry out under the U.N. Charter. Some counterterrorism measures are designed and applied in a manner that implicitly or expressly “carves out” particular safeguards — typically in the form of limited exceptions or exemptions — for certain humanitarian or medical activities or actors. Yet most counterterrorism measures do not include such safeguards. In section 4, which constitutes the bulk of our original legal analysis, we closely evaluate the two resolutions in which the Security Council urged States to take into account the effects of (certain) counterterrorism measures on humanitarian and medical activities. We set the stage by summarizing some aspects of the legal relations between Security Council acts and IHL provisions pertaining to humanitarian and medical activities. We then analyze the status, consequences, and content of several substantive elements of the resolutions and what they may entail for States seeking to counter terrorism and safeguard humanitarian and medical activities. Among the elements that we evaluate are: the Security Council’s new notion of a prohibited financial “benefit” for terrorists as it may relate to humanitarian and medical activities; the Council’s demand that States comply with IHL obligations while countering terrorism; and the constituent parts of the Council’s notion of a “take into account” system. In section 5, we set out some potential elements of an analytical framework through which a State may seek to develop and administer its “take into account” system in line with Resolution 2462 (2019) and Resolution 2482 (2019). In terms of its object and purpose, a “take into account” system may aim to secure respect for international law, notably the U.N. Charter and IHL pertaining to humanitarian and medical activities. In addition, the system may seek to safeguard humanitarian and medical activities in armed conflicts that also qualify as counterterrorism contexts. We also identify two sets of preconditions arguably necessary for a State to anticipate and address relevant potential effects through the development and execution of its “take into account” system. Finally, we suggest three sets of attributes that a “take into account” system may need to embody to achieve its aims: utilizing a State-wide approach, focusing on potential effects, and including default principles and rules to help guide implementation. In section 6, we briefly conclude. In our view, jointly pursuing the policy objectives of countering terrorism and safeguarding humanitarian and medical activities presents several opportunities, challenges, and complexities. International law does not necessarily provide ready-made answers to all of the difficult questions in this area. Yet devising and executing a “take into account” system provides a State significant opportunities to safeguard humanitarian and medical activities and counter terrorism while securing greater respect for international law.
APA, Harvard, Vancouver, ISO, and other styles
10

Burniske, Jessica, Dustin Lewis, and Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, October 2015. http://dx.doi.org/10.54813/nrmd2833.

Full text
Abstract:
In 2014, reports suggested that a surge of foreign jihadists were participating in armed conflicts in Syria, Iraq, and elsewhere. The United Nations Security Council responded by imposing in Resolution 2178 (2014) an array of obligations on member states to counter the threat posed by “foreign terrorist fighters” (FTFs). In the intervening year, those states have taken a range of actions — though at various speeds and with varying levels of commitment — to implement the FTF obligations imposed by the Council. Meanwhile, many states continue to fund and otherwise throw their support behind life-saving humanitarian relief for civilians in armed conflicts around the world — including conflicts involving terrorists. Yet, in recent years, members of the humanitarian community have been increasingly aware of the real, perceived, and potential impacts of counterterrorism laws on humanitarian action. Part of their interest stems from the fact that certain counterterrorism laws may, intentionally or unintentionally, adversely affect principled humanitarian action, especially in regions where terrorist groups control territory (and thus access to civilians, too). The effects of these laws may be widespread — ranging from heightened due diligence requirements on humanitarian organizations to restrictions on travel, from greater government scrutiny of national and regional staff of humanitarian organizations to decreased access to financial services and funding. Against that backdrop, this briefing report has two aims: first, to provide a primer on the most salient issues at the intersection of counterterrorism measures and humanitarian aid and assistance, with a focus on the ascendant FTF framing. And second, to put forward, for critical feedback and assessment, a provisional methodology for evaluating the following question: is it feasible to subject two key contemporary wartime concerns — the fight against FTFs and supporting humanitarian aid and assistance for civilians in terrorist-controlled territories — to meaningful empirical analysis?
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography