Academic literature on the topic 'Security policie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security policie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security policie"
Supriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (August 31, 2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.
Full textAntonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Full textAchmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (March 1, 2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.
Full textPoincignon, Yann. "Defense Academy Excellence European Union Civilian Policing: Foreign Policy Action or Internal Security Tool." Connections: The Quarterly Journal 02, no. 2 (2003): 111–30. http://dx.doi.org/10.11610/connections.02.2.12.
Full textHelmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Full textElbably, Amar. "سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة." Security Policy Paper 2, no. 2 (December 31, 2021): 1–20. http://dx.doi.org/10.26735/hjoo8882.
Full textSchneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (February 2000): 30–50. http://dx.doi.org/10.1145/353323.353382.
Full textPotter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (October 2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.
Full textMatvejevs, Aleksandrs. "Problems of Police Activity in Ensuring Public Order and Public Safety." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no. 21 (2021): 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.
Full textMcIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (August 1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.
Full textDissertations / Theses on the topic "Security policie"
MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.
Full textSchlittler, Maria Carolina de Camargo. ""Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP." Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.
Full textApproved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:08:53Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:09:03Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Made available in DSpace on 2017-08-01T19:15:57Z (GMT). No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5) Previous issue date: 2016-09-06
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Cette thèse analyse la relation entre les pratiques policières quotidiennes et la conformation avec la police militaire de l'Etat de São Paulo, responsable pour mantenir l’ordre. Issu d’entretiens et d’analyses de données officielles, le présent travail cherche à comprendre comment les policiers, lors de leurs opérations, sélectionnent les personnes qui subiront les actions de la police et, par conséquent, celles du système de justice criminelle. Partant de là, il a été possible de comprendre, de manière plus particulier, quels sont les publics et les crimes les plus surveillés par les policiers militarisés et, d'une manière globale, les caractéristiques du modèle de police ostensible de São Paulo. L'objectif des opérations policières ostensibles est de prendre en flagrant délit des suspects criminels, ce qui confère à la Police Militaire la responsabilité de sélectionner et « d’expulser » des rues tous ceux que les policiers identifient comme des criminels. Cela autorise la Police Militaire à avoir recours notamment à trois actions : a) l’arrestation ou b) l’élimination des personnes identifiées comme des criminelles et c) le « bon sens » du policier en tant qu’outil pour distinguer les criminels et les « bons citoyens ». Une des conclusions de cette recherche repose sur le constat d’un ample usage du « bon sens » policier lors des opérations de vigilance ostensible, ainsi que de son aspect racial. De ce fait, le « bon sens » policier, au même titre que la létalité et les arrestations, est devenu le responsable de l’accumulation de désavantages pour la population jeune et noire, en ce qui concerne le droit à la vie en sécurité ; en effet on observe que ce groupe risque beaucoup plus d’aller en prison que le reste de la population. De plus, nous avons constaté que pendant les vingt dernières années la politique sécuritaire menée dans São Paulo s’est focalisé sur le type de vigilance ostensible décrit ci-dessus, et ce en dépit de l’échec de l’opération pour ce qui concerne la diminution du nombre de crimes contre les biens à São Paulo.
This thesis analyzes the relation between daily police practices and the conformation with ostensible policing run by the Military Police of São Paulo State. This work started from interviews and analysis of official data to understand how the Military Police, during the ostensible policing, selects the people who will suffer the police approach and therefore the prosecution of the criminal justice system. Thenceforth it was possible to understand specifically which public and which crimes were most closely watched by the military police and, in an embracing way, the characteristics of the São Paulo ostensible policing model. The purpose of ostensible policing is to catch criminal suspects, implying to the Military Police the responsibility to select and remove from the streets those who the police itself identifies as “bandits”. It is also observed that this framework does not configure a public security policy, but a crime and violence management, marked by the "war" against certain types of crimes that are available to the Military Police, especially with three features: a) imprisonment; b) elimination of those identified as “bandits”, and c) the “police scent” as a differentiation tool to identify "bandits" and "good citizens". One of the study highlights is that the wide use of the “police scent” by the military police which has racial aspects in its composition added to the lethality and imprisonment, became responsible for the accumulation of disadvantages for the young black population, referring to the right to secure life and a higher risk of being arrested for property offenses in relation to the rest of the population. In all, it became clear that in the last twenty years there is an insistence from the state public security in an ostensible policing with such characteristics, even in the face of failure in the decrease of numbers of property offenses in the state of São Paulo.
A tese analisa a articulação entre práticas policiais cotidianas e a conformação do policiamento ostensivo militarizado protagonizado pela Polícia Militar. O presente trabalho partiu de entrevistas e análise de dados oficiais da segurança pública paulista para compreender como os policiais, durante o policiamento ostensivo, selecionam as pessoas que sofrerão as investidas da polícia e, por conseguinte, do sistema de justiça criminal. A partir daí foi possível entender, de forma específica, quais são os públicos e os crimes mais vigiados pelos policiais militares e, de forma abrangente, as características do modelo de policiamento ostensivo paulista. Constatou-se que o objetivo do policiamento ostensivo é flagrar suspeitos criminais, o que incute à PM a responsabilidade de selecionar e “retirar” das ruas aqueles que os policiais identificam como “bandidos”. Para tal estão disponíveis à PM, sobretudo, três recursos: a) o aprisionamento ou b) a eliminação daqueles identificados como bandidos e c) o tirocínio policial enquanto ferramenta para diferenciar “bandidos” e “cidadãos de bem”. Uma das conclusões da pesquisa é a constatação da ampla utilização do tirocínio pelos policiais que atuam no policiamento ostensivo e de seu aspecto racializado; isto significa que, para a fundamentação da suspeita policial, são utilizados marcadores raciais. Desta forma, o tirocínio, ao lado da letalidade policial e do aprisionamento se tornaram responsáveis pelo acúmulo de desvantagens para a população jovem e negra, no que tange ao direito à vida segura e a um maior risco de serem presos por crimes patrimoniais em relação ao restante da população. No mais, constatou-se que nos últimos vinte anos há uma insistência por parte da segurança pública paulista num policiamento ostensivo com tais características, mesmo diante do insucesso na diminuição no número de crimes patrimoniais no estado de São Paulo.
SQUILLACE, LAURA. "Praia para quem? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.
Full textThe beaches of Rio de Janeiro are considered one of the most democratic areas of leisure in the city, with free access and a heterogeneous public coming from different neighborhoods and belonging to different social classes. Despite this, the Operação Verão (Operation Summer), a security policy executed on the beaches by the Military Police and the Municipal Guard of Rio de Janeiro, may question the limits of this democracy. Among its objectives, the Operação Verão aims to prevent the so-called arrastões, a collective form of theft and robbery, supposedly committed by groups of young people and adolescents from the suburbs. Consequently, this category becomes one of the main targets of the Operação Verão. Through an ethnographic observation of the Operação Verão, carried out by accompanying law enforcement agents in their work, this thesis seeks to understand the mechanisms of social and spatial control in the context of beach leisure in Rio de Janeiro. In addition, this research is based on the result of interviewing other actors who interact in this public space: youth from the suburbs, subjected to a continuous surveillance; the public of the beach, which generates the demand for security in the coastal area and other people who work over there. The interviews conducted and the ethnographic study of the monitoring of the security forces during the Operação Verão guide the reading of the interaction in this public space. All this also shows the limitations that this measure provides in regards of the access to the beach to groups of youths and adolescents from the suburbs, considered a threat to public security. The goal of the thesis is to present the Operação Verão through a qualitative analysis and to demonstrate how the demand for a safer beach could generate a mechanism of discrimination and could compromise free access to the beach for a segment of population already historically criminalized and excluded in Rio de Janeiro: the youth from the suburbs.
Lim, Yow Tzu. "Evolving security policies." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.
Full textGuillén, Lasierra Francesc. "Modelos de policía y seguridad." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.
Full textThis thesis aims at stressing the importance of the diverse ideal conceptions of policing (models) that constitute the grounds for police organisations and policing. All of them have made contributions to the service with which the police provide the citizens and, at the same time, have evidenced shortcomings and limitations. The idea sustained in this work is that policing models (and consequently security models) are not theoretical constructions without any influence in daily policing, but, to the contrary, they are extremely relevant for the diverse areas of policing. Models stem from different legitimacies and affect the nuclear aim of policing (the mission), relationships with citizens, public order management, the structure and dynamics of police organisation and the systems of accountability and efficiency indicators as well. The first chapters begin with the description of the context in which the police appears as an institution of formal social control and the material field of policing focusing on its most substantial elements in order to build models up (police culture, mission, relationships with citizens, public order, organisation and accountability). Then, three models are defined: the governmental, the professional and community policing or public service policing. The governmental model gets its legitimacy from a representative Government in the framework of the rule of law with state powers balance, law abiding and judiciary control. It is a model with some tendency to be influenced by political power, in which citizens are more or less important depending on political junctures; police organisation is just an instrument to transmit orders, management of public order and gathering and treatment of information are crucial objectives for the police. The professional model is based on police professional knowledge (such as doctors or architects) in the framework of law; war on crime constitutes its mission, although it also tackles traffic police and public order; citizens or politicians should have no role in policing due to their lack of knowledge. Community policing or public service policing is thought from the citizens, for them and with them, police become a service addressed their needs with their collaboration and their opinion is the chore reference to assess the police. After having thoroughly described the three models, modern strategies of policing that have dominated criminological debates in last decades are discussed (Problem Oriented Policing, Intelligence-led Policing, Broken Windows Policing, and Reassurance Policing) in order to evidence the reasons why they are not considered policing models. It is argued that they don’t constitute new models because they are not complete ideal constructions of policing. Nevertheless they bring methodological innovations into the pre-existent models that try to improve their efficiency. Finally, this thesis analyses current tendencies in existing police systems, stressing the influence of politicization, globalisation, new technologies and the economic crisis in police organisations. The study of these tendencies and the virtues and deficiencies of the different models discussed in previous chapters offer the bases for the conclusions about how police should be to be able to face future challenges of policing in a satisfactory way.
Hallett, Joseph. "Capturing mobile security policies precisely." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.
Full textPersson, Magnus. "Building trust : The contradiction between security and democracy in post Apartheid South Africa." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.
Full textBrooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.
Full textThimamontri, Apinya. "Homeland Security Roles and Responsibilities: an Examination of Texas Police Chiefs’ Perceptions." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.
Full textBrown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Full textBooks on the topic "Security policie"
Žáček, Pavel. ŠtB na Slovensku za "normalizácie": Agónia komunistickej moci v zvodkách tajnej policie. [Bratislava?]: Ministerstvo spravidlivosti SR, Oddelenie pre dokumentáciu zločinov komunizmu, 2002.
Find full textWeiss, Tomáš. Role policie a armády v Evropské unii: Analýza evropské a národní úrovně s využitím případové studie České republiky. Praha: Univerzita Karlova v Praze, 2014.
Find full textLindsey, George. Canada's security policies. [Toronto, Ont.]: Canadian Institute of International Affairs, 2003.
Find full textStockholm International Peace Research Institute., ed. Policies for common security. London: Taylor & Francis, 1985.
Find full textAttwood, Tony. Secondary schools' security policies. Peterborough: First & Best in Education, 1998.
Find full textKapoor, H. L. Police, crime, and security. New Delhi: Ess Ess Publications, 1992.
Find full textJoseph, Carmel. Safety and security. Johannseburg: Friedrich Ebert Stiftung, South Africa Office, 2002.
Find full textLtd, Asia BioBusiness Pte. Food security policies in APEC. Singapore]: APEC Policy Support Unit, Asia Pacific Economic Cooperation, 2012.
Find full textA, Campbell Andrew, ed. Water security: Conflicts, threats, policies. Denver, CO: DTP Publishing, 2011.
Find full textL, Green James, and United States. National Aeronautics and Space Administration., eds. SPAN security policies and guidelines. 2nd ed. [Washington, DC: National Aeronautics and Space Administration, 1989.
Find full textBook chapters on the topic "Security policie"
Meerts, Clarissa. "Police: Public Versus Private Policing." In Encyclopedia of Security and Emergency Management, 1–4. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_86-1.
Full textMeerts, Clarissa. "Police: Public Versus Private Policing." In Encyclopedia of Security and Emergency Management, 775–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_86.
Full textBeach, Derek. "Security Policies." In Analyzing Foreign Policy, 151–71. London: Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00279-2_6.
Full textLegrand, Tim, and Simon Bronitt. "Policing to a Different Beat: Measuring Police Performance." In Policing and Security in Practice, 1–19. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137007780_1.
Full textKabay, M. E., and Sean Kelley. "Developing Security Policies." In Computer Security Handbook, 66.1–66.16. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch66.
Full textCuppens, Frédéric, and Nora Cuppens-Boulahia. "Multilevel Security Policies." In Encyclopedia of Cryptography and Security, 811–12. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_824.
Full textNielson, Flemming, René Rydhof Hansen, and Hanne Riis Nielson. "Adaptive Security Policies." In Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles, 280–94. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61470-6_17.
Full textDatta, Anupam, Somesh Jha, Ninghui Li, David Melski, and Thomas Reps. "Analyzing Security Policies." In Analysis Techniques for Information Security, 63–98. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02334-7_4.
Full textHerpolsheimer, Jens. "Regional security policies." In Spatializing Practices of Regional Organizations during Conflict Intervention, 145–72. Abingdon, Oxon; New York, NY: Routledge, 2021. |: Routledge, 2021. http://dx.doi.org/10.4324/9781003106647-5.
Full textClifton, Darrell. "Policies and Procedures." In Hospitality Security, 37–58. 2nd ed. New York: CRC Press, 2022. http://dx.doi.org/10.4324/9781003037644-2.
Full textConference papers on the topic "Security policie"
Eyers, David M., Sriram Srinivasan, Ken Moody, and Jean Bacon. "Compile-Time Enforcement of Dynamic Security Policies." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.24.
Full textWelch, Ian, and Fan Lu. "Policy-driven reflective enforcement of security policies." In the 2006 ACM symposium. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141645.
Full textTrivellato, Daniel, Nicola Zannone, and Sandro Etalle. "A Security Framework for Systems of Systems." In 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.16.
Full textKotenko, Igor, Olga Chervatuk, Ekaterina Sidelnikova, and Artem Tishkov. "Hybrid Multi-module Security Policy Verification." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.25.
Full textSinghal, Anoop. "Web Services Security: Challenges and Techniques." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.50.
Full textBarın, Nurgül Emine. "Principle of Interpretation in Favor of the Insuree in Turkish Social Security Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2016. http://dx.doi.org/10.36880/c07.01754.
Full textBasile, Cataldo, Antonio Lioy, Gregorio Martinez Perez, Felix J. Garcia Clemente, and Antonio F. Gomez Skarmeta. "POSITIF: A Policy-Based Security Management System." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.37.
Full textRoth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, and Ben Stock. "Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.
Full textGunter, Carl A. "Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers." In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.41.
Full textBrucker, Achim D., and Helmut Petritsch. "A Framework for Managing and Analyzing Changes of Security Policies." In 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.47.
Full textReports on the topic "Security policie"
Research Institute (IFPRI), International Food Policy. Developed country policies: Domestic farm policy reform and global food security. Washington, DC: International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_07.
Full textSachnackenberg, Dan, Kelly Bunn, Daylan Darby, Laurence Rockwell, and Travis Reid. Adaptive System Security Policies. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada400196.
Full textSchneider, Edward A., William Kalsow, Lynn TeWinkel, and Michael Carney. Experimentation with Adaptive Security Policies. Fort Belvoir, VA: Defense Technical Information Center, June 1996. http://dx.doi.org/10.21236/ada311215.
Full textCarney, Michael, Brian Loe, and Terrence Mitchem. Experience with Adaptive Security Policies. Fort Belvoir, VA: Defense Technical Information Center, March 1998. http://dx.doi.org/10.21236/ada345381.
Full textIrvine, Cynthia E. Security Policy Enforcement. Fort Belvoir, VA: Defense Technical Information Center, September 2005. http://dx.doi.org/10.21236/ada605488.
Full textGoebel, Peter. German Security Policy. Fort Belvoir, VA: Defense Technical Information Center, June 1999. http://dx.doi.org/10.21236/ada385824.
Full textSaito, Toshio. Japan's Security Policy. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada385898.
Full textOmondi Okwany, Clifford Collins. Territoriality as a Method for Understanding Armed Groups in Kenya and Strengthening Policy Responses. RESOLVE Network, January 2023. http://dx.doi.org/10.37805/pn2023.1.lpbi.
Full textSpencer, Ray, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen, and Jay Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada443108.
Full textHalpern, Joseph Y. Formulating and Reasoning about Security Policies. Fort Belvoir, VA: Defense Technical Information Center, December 2004. http://dx.doi.org/10.21236/ada431396.
Full text