Academic literature on the topic 'Security policie'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security policie.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security policie"

1

Supriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (August 31, 2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.

Full text
Abstract:
Police transformation policy to carry out community security functions is very adaptive in addressing the changing times. The research aims to map the transformation and strengthening of police infrastructure in response to the era of digitalization. The research uses a qualitative type of research with a literature study approach and policy analysis programmed by the Police. The results showed that the transformation policy consisting of organizational transformation, operation transformation, public service transformation, and supervise transformation is needed by the Police, especially in the current digital transition. Moreover, it can be carried out correctly if the Police have internally and externally owned by POLRI. The research concludes that transformative efforts and strengthening of police infrastructure strongly support the duties and functions of the National Police in securing the community.
APA, Harvard, Vancouver, ISO, and other styles
2

Antonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Achmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (March 1, 2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.

Full text
Abstract:
This studywas conducted todetermine and analyze the implementation of the licensing policies and notices of community activities in Baubau City Police and communication factors, resources, disposition, and structure influence the implementation of the licensing policies and notices of community activities in Police Baubau. The results showed that the licensing policies and notices activities of people implemented by (a) Providea receipt notice (b) To coordinate with the responsible delivery of opinions in the Public (c) To coordinate with the leadership, the agency/institutionwhich is the goal of delivering the opinion (d) Prepare securing alocation and route that passed.(e) responsible for protecting the participants in the delivery of public opinion (f) responsible for organizing security and factors factors that influence the implementation of the licensing policies and noticesof community activities are: (1) Communication; (2) Resources (3) Disposition; and (4) Organizational Structure.
APA, Harvard, Vancouver, ISO, and other styles
4

Poincignon, Yann. "Defense Academy Excellence European Union Civilian Policing: Foreign Policy Action or Internal Security Tool." Connections: The Quarterly Journal 02, no. 2 (2003): 111–30. http://dx.doi.org/10.11610/connections.02.2.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Full text
Abstract:
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 63 of 2004 on the Securing of National Vital Security Object there is described that pattern Sispamobvitnas, they are: (1) The main executor of the system Securing of National Vital Objek is obvitnas management authority, in this case the Police through Dirpamobvit; (2) Police are obliged to provide security assistance obvitnas; (3) priority preemptive and preventive activities; (4) in an integrated and simultaneous shared obvitnas managers implement security systems obvitnas; and (5) and against obvitnas is an organic part of or including the military, the security environment remain to be implemented, although the security environment outside Obvitnas or process interruption handling defense and security. 2. The obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan, they are: (1) Lack of quality personnel guard PT. Pertamina (Persero) BBM Terminal Banjarmasin due to lack of professional recruitment system; (2) Insufficient number of security officers compared to the vulnerability of the region; (3) Infrastructure security Obvit Of Polda Kalimantan Selatan are limited;(4) The lack of security coordination between Ditpamobvit Polda Kalimantan Selatan with regional security managers of the company, and the company's internal security guard at the Police Post.
APA, Harvard, Vancouver, ISO, and other styles
6

Elbably, Amar. "سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة." Security Policy Paper 2, no. 2 (December 31, 2021): 1–20. http://dx.doi.org/10.26735/hjoo8882.

Full text
Abstract:
يُسهِم‭ ‬التعاوُن‭ ‬الأمني‭ ‬الرقمي‭ ‬بين‭ ‬الدول‭ ‬إسهامًا‭ ‬كبيرًا‭ ‬في‭ ‬انحسار‭ ‬الجرائم‭ ‬المُنظَّمة‭ ‬والقضاء‭ ‬عليها،‭ ‬وبخاصَّةٍ‭ ‬الجرائم‭ ‬الإرهابيَّة،‭ ‬وهو‭ ‬ما‭ ‬يتطلَّب‭ ‬ضرورة‭ ‬تفاعُل‭ ‬الدول‭ ‬فيما‭ ‬بينها،‭ ‬وزيادة‭ ‬الجهود‭ ‬في‭ ‬سبيل‭ ‬تشجيع‭ ‬هذا‭ ‬التعاوُن‭ ‬وتفعيله،‭ ‬بإيجاد‭ ‬وسائل‭ ‬تعاونيَّة‭ ‬في‭ ‬المسائل‭ ‬الأمنيَّة‭ ‬الكفيلة‭ ‬بالوقاية‭ ‬من‭ ‬الجريمة‭ ‬وتَتَبُّع‭ ‬مرتكبيها‭ ‬حالَ‭ ‬وقوعها‭ ‬باستخدام‭ ‬شبكات‭ ‬مُؤَمَّنَة‭ ‬تسمح‭ ‬بنقل‭ ‬البيانات‭ ‬والمعلومات‭ ‬والتطبيقات‭ ‬بين‭ ‬الأجهزة‭ ‬المعنيَّة‭ ‬بأجهزة‭ ‬الشرطة‭ ‬العربيَّة،‭ ‬واستخدام‭ ‬التقنيات‭ ‬المُؤَمَّنَة‭ ‬والسريعة‭ ‬التي‭ ‬تسمح‭ ‬بالتبادُل‭ ‬الرقمي‭ ‬للأجهزة‭ ‬الشرطيَّة،‭ ‬ما‭ ‬يحقِّق‭ ‬منع‭ ‬وقوع‭ ‬الجرائم‭ ‬والكشف‭ ‬عنها،‭ ‬وملاحقة‭ ‬المخطَّطات‭ ‬الإجراميَّة‭ ‬والإرهابيَّة‭ ‬بجميع‭ ‬أشكالها‭ ‬واستباق‭ ‬المعلومات‭ ‬بما‭ ‬يحافظ‭ ‬على‭ ‬الأمن‭ ‬الوطني‭ ‬للدول‭ ‬العربيَّة‭.‬
APA, Harvard, Vancouver, ISO, and other styles
7

Schneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (February 2000): 30–50. http://dx.doi.org/10.1145/353323.353382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Potter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (October 2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Matvejevs, Aleksandrs. "Problems of Police Activity in Ensuring Public Order and Public Safety." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no. 21 (2021): 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.

Full text
Abstract:
The article addresses the issues concerning public order and public security. These two are the objects of the state administration that form separate legal institutes. The duties of the police include securing the rule of law, maintaining public order and security, preventing, detecting and investigating crimes. The police ensure safety of people and environment and prevent all violations of the law and disturbances by eliminating and investigating all such incidents. The tasks of the police are defined in the Police Act. The police cooperate with other authorities and local residents and communities in maintaining security. Keywords: public order, public security, public place, police activity.
APA, Harvard, Vancouver, ISO, and other styles
10

McIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (August 1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security policie"

1

MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.

Full text
Abstract:
The evolution of information system sees a continuously increasing need of flexible and sophisticated approaches for the management of security requirements. On one hand, systems are increasingly more integrated (e.g., Bring Your Own Device) and present interfaces for the invocation of services accessible through network connections. On the other hand, system administrators have the responsibility to guarantee that this integration and the consequent exposure of internal resources does not introduce vulnerabilities. The need to prove that the system correctly manages the security requirements is not only motivated by the increased exposure, but also by the need to show compliance with respect to the many regulations promulgated by governments and commercial bodies. In modern information systems a particular area of security requirement is access control management, with security policies that describe how resources and services should be protected. These policies offer a classification of the actions on the system that distinguishes them into authorized and forbidden, depending on a variety of parameters. Given the critical role of security and their large size and complexity, concerns arise about the correctness of the policy. It is not possible anymore to rely on the security designer to have a guarantee that the policy correctly represents how the system should protect the access to resources. The research documented in this thesis investigates new approaches for the development of a collection of both methodologies and tools, which are flexible enough to help the system administrators, or generally users, in the correct management of security requirements. Due to the complexity of this topic, the research was focused on (i) enterprise and (ii) mobile scenario.
APA, Harvard, Vancouver, ISO, and other styles
2

Schlittler, Maria Carolina de Camargo. ""Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP." Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.

Full text
Abstract:
Submitted by Aelson Maciera (aelsoncm@terra.com.br) on 2017-08-01T17:24:55Z No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:08:53Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:09:03Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Made available in DSpace on 2017-08-01T19:15:57Z (GMT). No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5) Previous issue date: 2016-09-06
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Cette thèse analyse la relation entre les pratiques policières quotidiennes et la conformation avec la police militaire de l'Etat de São Paulo, responsable pour mantenir l’ordre. Issu d’entretiens et d’analyses de données officielles, le présent travail cherche à comprendre comment les policiers, lors de leurs opérations, sélectionnent les personnes qui subiront les actions de la police et, par conséquent, celles du système de justice criminelle. Partant de là, il a été possible de comprendre, de manière plus particulier, quels sont les publics et les crimes les plus surveillés par les policiers militarisés et, d'une manière globale, les caractéristiques du modèle de police ostensible de São Paulo. L'objectif des opérations policières ostensibles est de prendre en flagrant délit des suspects criminels, ce qui confère à la Police Militaire la responsabilité de sélectionner et « d’expulser » des rues tous ceux que les policiers identifient comme des criminels. Cela autorise la Police Militaire à avoir recours notamment à trois actions : a) l’arrestation ou b) l’élimination des personnes identifiées comme des criminelles et c) le « bon sens » du policier en tant qu’outil pour distinguer les criminels et les « bons citoyens ». Une des conclusions de cette recherche repose sur le constat d’un ample usage du « bon sens » policier lors des opérations de vigilance ostensible, ainsi que de son aspect racial. De ce fait, le « bon sens » policier, au même titre que la létalité et les arrestations, est devenu le responsable de l’accumulation de désavantages pour la population jeune et noire, en ce qui concerne le droit à la vie en sécurité ; en effet on observe que ce groupe risque beaucoup plus d’aller en prison que le reste de la population. De plus, nous avons constaté que pendant les vingt dernières années la politique sécuritaire menée dans São Paulo s’est focalisé sur le type de vigilance ostensible décrit ci-dessus, et ce en dépit de l’échec de l’opération pour ce qui concerne la diminution du nombre de crimes contre les biens à São Paulo.
This thesis analyzes the relation between daily police practices and the conformation with ostensible policing run by the Military Police of São Paulo State. This work started from interviews and analysis of official data to understand how the Military Police, during the ostensible policing, selects the people who will suffer the police approach and therefore the prosecution of the criminal justice system. Thenceforth it was possible to understand specifically which public and which crimes were most closely watched by the military police and, in an embracing way, the characteristics of the São Paulo ostensible policing model. The purpose of ostensible policing is to catch criminal suspects, implying to the Military Police the responsibility to select and remove from the streets those who the police itself identifies as “bandits”. It is also observed that this framework does not configure a public security policy, but a crime and violence management, marked by the "war" against certain types of crimes that are available to the Military Police, especially with three features: a) imprisonment; b) elimination of those identified as “bandits”, and c) the “police scent” as a differentiation tool to identify "bandits" and "good citizens". One of the study highlights is that the wide use of the “police scent” by the military police which has racial aspects in its composition added to the lethality and imprisonment, became responsible for the accumulation of disadvantages for the young black population, referring to the right to secure life and a higher risk of being arrested for property offenses in relation to the rest of the population. In all, it became clear that in the last twenty years there is an insistence from the state public security in an ostensible policing with such characteristics, even in the face of failure in the decrease of numbers of property offenses in the state of São Paulo.
A tese analisa a articulação entre práticas policiais cotidianas e a conformação do policiamento ostensivo militarizado protagonizado pela Polícia Militar. O presente trabalho partiu de entrevistas e análise de dados oficiais da segurança pública paulista para compreender como os policiais, durante o policiamento ostensivo, selecionam as pessoas que sofrerão as investidas da polícia e, por conseguinte, do sistema de justiça criminal. A partir daí foi possível entender, de forma específica, quais são os públicos e os crimes mais vigiados pelos policiais militares e, de forma abrangente, as características do modelo de policiamento ostensivo paulista. Constatou-se que o objetivo do policiamento ostensivo é flagrar suspeitos criminais, o que incute à PM a responsabilidade de selecionar e “retirar” das ruas aqueles que os policiais identificam como “bandidos”. Para tal estão disponíveis à PM, sobretudo, três recursos: a) o aprisionamento ou b) a eliminação daqueles identificados como bandidos e c) o tirocínio policial enquanto ferramenta para diferenciar “bandidos” e “cidadãos de bem”. Uma das conclusões da pesquisa é a constatação da ampla utilização do tirocínio pelos policiais que atuam no policiamento ostensivo e de seu aspecto racializado; isto significa que, para a fundamentação da suspeita policial, são utilizados marcadores raciais. Desta forma, o tirocínio, ao lado da letalidade policial e do aprisionamento se tornaram responsáveis pelo acúmulo de desvantagens para a população jovem e negra, no que tange ao direito à vida segura e a um maior risco de serem presos por crimes patrimoniais em relação ao restante da população. No mais, constatou-se que nos últimos vinte anos há uma insistência por parte da segurança pública paulista num policiamento ostensivo com tais características, mesmo diante do insucesso na diminuição no número de crimes patrimoniais no estado de São Paulo.
APA, Harvard, Vancouver, ISO, and other styles
3

SQUILLACE, LAURA. "Praia para quem? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.

Full text
Abstract:
As praias do Rio de Janeiro são consideradas um dos espaços de lazer mais democráticos da cidade, pelo acesso gratuito e por serem frequentadas por um público heterogêneo, proveniente de diversos bairros e pertencente a diferentes camadas sociais. Contudo, a Operação Verão, uma política de segurança executada nas praias pela Polícia Militar do Estado do Rio de Janeiro e pela Guarda Municipal, pode questionar os limites desta democracia. Entre seus objetivos, a Operação Verão visa prevenir os chamados arrastões, uma modalidade coletiva de furtos e roubos, supostamente cometida por grupos de jovens e adolescentes provenientes dos subúrbios. Consequentemente, essa categoria se torna um dos alvos principais da Operação Verão. Esta tese busca compreender os mecanismos de controle social e espacial no âmbito de lazer praiano no Rio de Janeiro, através da Operação Verão e por meio de uma observação etnográfica conduzida a partir do acompanhamento do policiamento da Guarda Municipal e da Polícia Militar na área litoral. Além disso, esta pesquisa se baseia em outras entrevistas realizadas com diversos atores que interagem nesse espaço público: a juventude proveniente das periferias, submetida a uma vigilância contínua; o público praiano, que gera a demanda de segurança na área litoral; além de algumas pessoas que trabalham na faixa de areia. As entrevistas realizadas e o estudo etnográfico do acompanhamento das forças de segurança durante a Operação Verão guiam a leitura do convívio nesse espaço público e mostram as limitações que essa medida proporciona no acesso à praia aos grupos de jovens e adolescentes das periferias considerados uma ameaça à segurança pública. O objetivo da tese é apresentar a Operação Verão através de uma análise qualitativa e demostrar como a demanda de uma praia mais segura pode gerar um mecanismo de discriminação e comprometer o acesso livre à praia para um segmento de população já historicamente criminalizado e excluído no Rio de Janeiro: a juventude suburbana.
The beaches of Rio de Janeiro are considered one of the most democratic areas of leisure in the city, with free access and a heterogeneous public coming from different neighborhoods and belonging to different social classes. Despite this, the Operação Verão (Operation Summer), a security policy executed on the beaches by the Military Police and the Municipal Guard of Rio de Janeiro, may question the limits of this democracy. Among its objectives, the Operação Verão aims to prevent the so-called arrastões, a collective form of theft and robbery, supposedly committed by groups of young people and adolescents from the suburbs. Consequently, this category becomes one of the main targets of the Operação Verão. Through an ethnographic observation of the Operação Verão, carried out by accompanying law enforcement agents in their work, this thesis seeks to understand the mechanisms of social and spatial control in the context of beach leisure in Rio de Janeiro. In addition, this research is based on the result of interviewing other actors who interact in this public space: youth from the suburbs, subjected to a continuous surveillance; the public of the beach, which generates the demand for security in the coastal area and other people who work over there. The interviews conducted and the ethnographic study of the monitoring of the security forces during the Operação Verão guide the reading of the interaction in this public space. All this also shows the limitations that this measure provides in regards of the access to the beach to groups of youths and adolescents from the suburbs, considered a threat to public security. The goal of the thesis is to present the Operação Verão through a qualitative analysis and to demonstrate how the demand for a safer beach could generate a mechanism of discrimination and could compromise free access to the beach for a segment of population already historically criminalized and excluded in Rio de Janeiro: the youth from the suburbs.
APA, Harvard, Vancouver, ISO, and other styles
4

Lim, Yow Tzu. "Evolving security policies." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.

Full text
Abstract:
As computer system size and complexity grow, formulating effective policies require more sophistication. There are many risk factors that need to be considered, some of which may be in conflict. Inevitably, unpredictable circumstances that demand decisions will arise during operation. In some cases an automated response may be imperative; in other cases these may be ill-advised. Manual decisions are often made that override the current policy and serve effectively to redefine it. This matter is further complicated in highly dynamic operational environments like mobile ad-hoc networks, in which the risk factors may be changing continually. Thus, security policies must be able to change and adapt to the operational needs. This study investigates the potential of evolutionary algorithms as a tool in determining the optimal security policies that suit such environments. This thesis reviews some fundamental concepts in related domains. It presents three applications of evolutionary algorithms in solving problems that are of direct relevance. These include the inference of security policies from decision examples, the dynamic adaptation of security policies, and the optimisation of security policies for a specific set of missions. The results show that the inference approaches based on evolutionary algorithms are very promising. The thesis concludes with an evaluation of the work done, the extent to which the work justifies the thesis hypothesis and some possible directions on how evolutionary algorithms can be applied to address a wider range of relevant problems in the domain of concern.
APA, Harvard, Vancouver, ISO, and other styles
5

Guillén, Lasierra Francesc. "Modelos de policía y seguridad." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.

Full text
Abstract:
Esta tesis pretende demostrar la importancia de las diversas concepciones ideales (modelos) a partir de las cuáles se articulan las organizaciones y las actuaciones policiales así como sus contribuciones a la mejora del servicio con que la policía provee a los ciudadanos y las limitaciones de cada uno de ellos. La tesis parte de la idea de que los modelos policiales (y, en consecuencia, de seguridad) no son construcciones teóricas sin influencia en el día a día de las organizaciones policiales, sino todo lo contrario, que tienen influencia en los diversos ámbitos del trabajo policial. Los modelos parten de legitimaciones diferentes e influencian la finalidad principal (misión) de la policía, las relaciones con el ciudadano, la gestión del orden público, la estructura y las dinámicas de las organizaciones policiales así como los controles de la actuación policial y sus indicadores de referencia. El trabajo comienza describiendo el contexto en que la policía aparece como institución de control social formal así como cuál es su ámbito funcional de actuación y los elementos más significativos de la función policial de cara a la construcción ideal de los modelos, con una reflexión crítica sobre el concepto de cultura policial. Posteriormente, se definen tres grandes modelos policiales: el gubernativo, el profesional y el comunitario o de servicio público y se describen las respuestas que cada uno de ellos dan a aspectos claves de la realidad policial. Así, el modelo gubernativo recibe su legitimación de un Gobierno representativo constituido en el marco de estados de derecho con separación de poderes, con respeto a la legalidad y el control judicial correspondiente. Se trata de un modelo con tendencia a estar influenciado por el poder político, en el que los ciudadanos tienen mayor o menor importancia en función de las coyunturas políticas, la organización policial es un instrumento de transmisión de órdenes y la gestión del orden público y el tratamiento de la información son muy relevantes. El modelo profesional se configura a partir de la legitimación que otorga el saber profesional (como en el caso de los médicos o los arquitectos) en el marco del respeto a la ley. La lucha contra la delincuencia es la misión fundamental, aunque no rechaza la gestión de la seguridad viaria o el orden público; ni el ciudadano ni el poder político son relevantes en la función policial por su falta de conocimientos profesionales. El modelo de policía comunitaria o de servicio público se construye a partir de los ciudadanos, para ellos y con ellos, siendo la policía un servicio destinado a satisfacer sus necesidades con su colaboración, y su opinión, el elemento clave de valoración de la policía. El trabajo continúa con la descripción de las modernas estrategias de policía que han dominado el debate criminológico en los últimos años (policía orientada a los problemas, policía guiada por la inteligencia, Broken Windows Policing, y policía de aseguramiento) para valorar las razones por las cuáles, a pesar de sus positivas aportaciones, no constituyen nuevos modelos en tanto que no implican construcciones ideales completas de la policía. Finalmente, se analizan las tendencias existentes en los sistemas de policía, poniendo sobre la mesa la influencia de la politización y la democratización de la seguridad, la globalización, la revolución tecnológica y la crisis económica en las organizaciones policiales. Estas tendencias y las virtudes y deficiencias señaladas de cada uno de los modelos sirven de base a las conclusiones sobre las características que tendría que tener la policía para afrontar con éxito los retos futuros, aprovechando las virtudes de los modelos estudiados.
This thesis aims at stressing the importance of the diverse ideal conceptions of policing (models) that constitute the grounds for police organisations and policing. All of them have made contributions to the service with which the police provide the citizens and, at the same time, have evidenced shortcomings and limitations. The idea sustained in this work is that policing models (and consequently security models) are not theoretical constructions without any influence in daily policing, but, to the contrary, they are extremely relevant for the diverse areas of policing. Models stem from different legitimacies and affect the nuclear aim of policing (the mission), relationships with citizens, public order management, the structure and dynamics of police organisation and the systems of accountability and efficiency indicators as well. The first chapters begin with the description of the context in which the police appears as an institution of formal social control and the material field of policing focusing on its most substantial elements in order to build models up (police culture, mission, relationships with citizens, public order, organisation and accountability). Then, three models are defined: the governmental, the professional and community policing or public service policing. The governmental model gets its legitimacy from a representative Government in the framework of the rule of law with state powers balance, law abiding and judiciary control. It is a model with some tendency to be influenced by political power, in which citizens are more or less important depending on political junctures; police organisation is just an instrument to transmit orders, management of public order and gathering and treatment of information are crucial objectives for the police. The professional model is based on police professional knowledge (such as doctors or architects) in the framework of law; war on crime constitutes its mission, although it also tackles traffic police and public order; citizens or politicians should have no role in policing due to their lack of knowledge. Community policing or public service policing is thought from the citizens, for them and with them, police become a service addressed their needs with their collaboration and their opinion is the chore reference to assess the police. After having thoroughly described the three models, modern strategies of policing that have dominated criminological debates in last decades are discussed (Problem Oriented Policing, Intelligence-led Policing, Broken Windows Policing, and Reassurance Policing) in order to evidence the reasons why they are not considered policing models. It is argued that they don’t constitute new models because they are not complete ideal constructions of policing. Nevertheless they bring methodological innovations into the pre-existent models that try to improve their efficiency. Finally, this thesis analyses current tendencies in existing police systems, stressing the influence of politicization, globalisation, new technologies and the economic crisis in police organisations. The study of these tendencies and the virtues and deficiencies of the different models discussed in previous chapters offer the bases for the conclusions about how police should be to be able to face future challenges of policing in a satisfactory way.
APA, Harvard, Vancouver, ISO, and other styles
6

Hallett, Joseph. "Capturing mobile security policies precisely." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.

Full text
Abstract:
The security policies of mobile devices that describe how we should use these devices are often informally specified. Users have preferences for some apps over others. Some users may avoid apps which can access large amounts of their personal data, whilst others may not care. A user is unlikely to write down these policies or describe them using a formal policy language. This is unfortunate as without a formal description of the policy we cannot precisely reason about them. We cannot help users to pick the apps they want if we cannot describe their policies. Companies have mobile security policies that definehowan employee should use smart phone devices and tablet computers from home at work. A company might describe the policy in a natural language document for employees to read and agree to. They might also use some software installed on employee's devices to enforce the company rules. Without a link between the specification of the policy in the natural language document and the implementation of the policy with the tool, understanding how they are related can be hard. This thesis looks at developing an authorisation logic, called AppPAL, to capture the informal security policies of the mobile ecosystem, which we define as the interactions surrounding the use of mobile devices in a particular setting. This includes the policies of the users, the devices, the app stores, and the environments the users bring the devices into. Whilst earlier work has looked on checking and enforcing policies with low-level controls, this work aims to capture these informal policy's intents and the trust relationships within them separating the policy specification from its enforcement. This allows us to analyse the informal policies precisely, and reason about how they are used. We show how AppPAL instantiates SecPAL, a policy language designed for access control in distributed environments. We describe AppPAL's implementation as an authorisation logic for mobile ecosystems. We show how we can check AppPAL policies for common errors. Using AppPAL we show that policies describing users privacy preferences do not seem to match the apps users install. We explore the differences between app stores and how to create new ones based on policy. We look at five BYOD policies and discover previously unexamined idioms within them. This suggests aspects of BYOD policies not managed by current BYOD tools.
APA, Harvard, Vancouver, ISO, and other styles
7

Persson, Magnus. "Building trust : The contradiction between security and democracy in post Apartheid South Africa." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.

Full text
Abstract:
Abstract Title: Building Trust: The contradiction between security and democracy in post apartheid South Africa Author: Magnus Persson Supervisor: Svante Lundberg This paper aims to investigate the contradiction between security and democracy in post-apartheid South African policing, and was executed on the field together with the South African Police Service (SAPS). The theoretical point of departure is that trust between people, in relation to the institutions of society, is fundamental to democratic development. This in combination with previous research on police reform, police academy socialization, community policing and militarization has lead to the conclusion that a remilitarization process is under way and that a militaristic approach to policing is likely to be counterproductive in terms of achieving democratic development. The study has been executed on a South African police academy as well as at two different police stations with the combined methods of participatory observation and interviews.
APA, Harvard, Vancouver, ISO, and other styles
8

Brooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.

Full text
Abstract:
Mobile devices, given their promise of mobility with rich functionality, are being deployed with broadening use cases throughout the United States Department of Defense. All the while, massive quantities of information are stored and accessed by these devices without there being a comprehensive and specialized security policy dedicated to protecting that information. The importance of having a security policy grows as these devices start providing new capabilities and replacing many information systems we currently have deployed. Since the same device will be used in many different contexts, each with potentially different security policies, the devices will have to be able to adapt to those contexts. The security policy(ies) enforced by the device will have to adapt accordingly. We investigate potential mobile computing security policies to balance this request for context aware functionality with the information assurance required of these government devices. We investigate the security issues raised in the use of these devices and provide example security policies that address some of these issues.
APA, Harvard, Vancouver, ISO, and other styles
9

Thimamontri, Apinya. "Homeland Security Roles and Responsibilities: an Examination of Texas Police Chiefs’ Perceptions." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.

Full text
Abstract:
Research has shown that the police industry has entered into an era of homeland security. However, whether the core functions of policing have significantly changed since September 11, 2001, has been the topic of considerable debate. Using secondary data, the research identifies variables that are most influential in predicting whether Texas police chiefs understand their departments’ homeland security roles and responsibilities. The data was originally obtained in 2007 through self-administered surveys of police chiefs attending the Texas Chief Leadership Series (TPCLS) and the New Chief Development Program (NCDP).
APA, Harvard, Vancouver, ISO, and other styles
10

Brown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.

Full text
Abstract:
Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from deterrence theory and protection motivation theory, became the structural model used for partial least squares-structural equation modeling (PLS-SEM) analysis of the survey response data, which indicated that self-efficacy was statistically significant. The remaining model variables, perceived threat vulnerability, perceived threat severity, response efficacy, informal sanction certainty, informal sanction severity, formal sanction certainty, and formal sanction severity, were not statistically significant. A statistically significant self-efficacy result could indicate confidence among the population to comply with information security policies. The nonsignificant results could indicate the fear appeal treatment did not motivate a change in behavior or information security policy awareness bias was introduced by selecting information technology professionals. Social change in information security could be achieved by developing an effective information security policy compliance fear appeal communication, which could change information security compliance behavior and contribute to securing the nation's critical cyber infrastructure and protecting data.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security policie"

1

Žáček, Pavel. ŠtB na Slovensku za "normalizácie": Agónia komunistickej moci v zvodkách tajnej policie. [Bratislava?]: Ministerstvo spravidlivosti SR, Oddelenie pre dokumentáciu zločinov komunizmu, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weiss, Tomáš. Role policie a armády v Evropské unii: Analýza evropské a národní úrovně s využitím případové studie České republiky. Praha: Univerzita Karlova v Praze, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lindsey, George. Canada's security policies. [Toronto, Ont.]: Canadian Institute of International Affairs, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stockholm International Peace Research Institute., ed. Policies for common security. London: Taylor & Francis, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Attwood, Tony. Secondary schools' security policies. Peterborough: First & Best in Education, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kapoor, H. L. Police, crime, and security. New Delhi: Ess Ess Publications, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Joseph, Carmel. Safety and security. Johannseburg: Friedrich Ebert Stiftung, South Africa Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ltd, Asia BioBusiness Pte. Food security policies in APEC. Singapore]: APEC Policy Support Unit, Asia Pacific Economic Cooperation, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A, Campbell Andrew, ed. Water security: Conflicts, threats, policies. Denver, CO: DTP Publishing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

L, Green James, and United States. National Aeronautics and Space Administration., eds. SPAN security policies and guidelines. 2nd ed. [Washington, DC: National Aeronautics and Space Administration, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security policie"

1

Meerts, Clarissa. "Police: Public Versus Private Policing." In Encyclopedia of Security and Emergency Management, 1–4. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_86-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meerts, Clarissa. "Police: Public Versus Private Policing." In Encyclopedia of Security and Emergency Management, 775–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Beach, Derek. "Security Policies." In Analyzing Foreign Policy, 151–71. London: Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00279-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Legrand, Tim, and Simon Bronitt. "Policing to a Different Beat: Measuring Police Performance." In Policing and Security in Practice, 1–19. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137007780_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kabay, M. E., and Sean Kelley. "Developing Security Policies." In Computer Security Handbook, 66.1–66.16. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cuppens, Frédéric, and Nora Cuppens-Boulahia. "Multilevel Security Policies." In Encyclopedia of Cryptography and Security, 811–12. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nielson, Flemming, René Rydhof Hansen, and Hanne Riis Nielson. "Adaptive Security Policies." In Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, 280–94. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61470-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Datta, Anupam, Somesh Jha, Ninghui Li, David Melski, and Thomas Reps. "Analyzing Security Policies." In Analysis Techniques for Information Security, 63–98. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02334-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Herpolsheimer, Jens. "Regional security policies." In Spatializing Practices of Regional Organizations during Conflict Intervention, 145–72. Abingdon, Oxon; New York, NY: Routledge, 2021. |: Routledge, 2021. http://dx.doi.org/10.4324/9781003106647-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Clifton, Darrell. "Policies and Procedures." In Hospitality Security, 37–58. 2nd ed. New York: CRC Press, 2022. http://dx.doi.org/10.4324/9781003037644-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security policie"

1

Eyers, David M., Sriram Srinivasan, Ken Moody, and Jean Bacon. "Compile-Time Enforcement of Dynamic Security Policies." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Welch, Ian, and Fan Lu. "Policy-driven reflective enforcement of security policies." In the 2006 ACM symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Trivellato, Daniel, Nicola Zannone, and Sandro Etalle. "A Security Framework for Systems of Systems." In 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kotenko, Igor, Olga Chervatuk, Ekaterina Sidelnikova, and Artem Tishkov. "Hybrid Multi-module Security Policy Verification." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singhal, Anoop. "Web Services Security: Challenges and Techniques." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barın, Nurgül Emine. "Principle of Interpretation in Favor of the Insuree in Turkish Social Security Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2016. http://dx.doi.org/10.36880/c07.01754.

Full text
Abstract:
One of the major problems encountered in the implementation of the rule of law is in the absence of the meaning of law or what it wants to tell is not clearly defined, the true meaning is revealed through interpretation. In labor law and social security law; Although the review will benefit from the rules for the common law, workers-interpretation in favor of the insuree is effective. This policy is considered as one of the fundamental policies of the Labour and Social Security Law. Located between the basic policies of business law, the protection of the workers, which is a consequence of the interpretation in favor of the insuree policy, shows itself in the form of interpretation in favor of the insuree in the social security law. One factor for necessity of supporting interpretation in favor of the insuree is, social security right is among the basic human rights. In particular, the interpretation of legislation related to the social security right by constitutional guarantee, it is important to keep in mind this basic policy. The overall purpose of the social security law is to benefit from this right by more people, namely the expansion of the scope. In this study, the place of interpretation in favor of the insuree and limitations related to this interpretation will be examined in the light of samples of Supreme Court Decisions and regarding substance of the Constitution and laws.
APA, Harvard, Vancouver, ISO, and other styles
7

Basile, Cataldo, Antonio Lioy, Gregorio Martinez Perez, Felix J. Garcia Clemente, and Antonio F. Gomez Skarmeta. "POSITIF: A Policy-Based Security Management System." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Roth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, and Ben Stock. "Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gunter, Carl A. "Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers." In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brucker, Achim D., and Helmut Petritsch. "A Framework for Managing and Analyzing Changes of Security Policies." In 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security policie"

1

Research Institute (IFPRI), International Food Policy. Developed country policies: Domestic farm policy reform and global food security. Washington, DC: International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_07.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sachnackenberg, Dan, Kelly Bunn, Daylan Darby, Laurence Rockwell, and Travis Reid. Adaptive System Security Policies. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada400196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schneider, Edward A., William Kalsow, Lynn TeWinkel, and Michael Carney. Experimentation with Adaptive Security Policies. Fort Belvoir, VA: Defense Technical Information Center, June 1996. http://dx.doi.org/10.21236/ada311215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carney, Michael, Brian Loe, and Terrence Mitchem. Experience with Adaptive Security Policies. Fort Belvoir, VA: Defense Technical Information Center, March 1998. http://dx.doi.org/10.21236/ada345381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Irvine, Cynthia E. Security Policy Enforcement. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada605488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goebel, Peter. German Security Policy. Fort Belvoir, VA: Defense Technical Information Center, June 1999. http://dx.doi.org/10.21236/ada385824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saito, Toshio. Japan's Security Policy. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada385898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Omondi Okwany, Clifford Collins. Territoriality as a Method for Understanding Armed Groups in Kenya and Strengthening Policy Responses. RESOLVE Network, January 2023. http://dx.doi.org/10.37805/pn2023.1.lpbi.

Full text
Abstract:
This policy note explores the characteristics of community-based armed groups (CBAGs) unique to the Kenyan context through a comparison of local CBAGs with other nonstate armed groups, particularly violent extremist organizations (VEOs). In doing so, it introduces the concept of territoriality—the degree to which government and security agents are able to monopolize political, social, and security control of spaces—and suggests that both CBAGs and VEOs are most likely to thrive in Kenya under conditions of semi-territoriality, where state authority sometimes shifts fluidly from strong to weak depending on capacity or interest. To combat the rise of VEOs it recommends community-oriented policing as a devolved security strategy, strengthening relations between civil society and the police through the Police Reforms Working Group Kenya (PRWGK), helping to monitor and evaluate the police service. Additionally, mapping CBAGs and VEOs through clan structures is a community-oriented strategy that helps strengthen territoriality and counter semi-territoriality.
APA, Harvard, Vancouver, ISO, and other styles
9

Spencer, Ray, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada443108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Halpern, Joseph Y. Formulating and Reasoning about Security Policies. Fort Belvoir, VA: Defense Technical Information Center, December 2004. http://dx.doi.org/10.21236/ada431396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography