Dissertations / Theses on the topic 'Security policie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security policie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
MUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.
Full textSchlittler, Maria Carolina de Camargo. ""Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP." Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.
Full textApproved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:08:53Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:09:03Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Made available in DSpace on 2017-08-01T19:15:57Z (GMT). No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5) Previous issue date: 2016-09-06
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Cette thèse analyse la relation entre les pratiques policières quotidiennes et la conformation avec la police militaire de l'Etat de São Paulo, responsable pour mantenir l’ordre. Issu d’entretiens et d’analyses de données officielles, le présent travail cherche à comprendre comment les policiers, lors de leurs opérations, sélectionnent les personnes qui subiront les actions de la police et, par conséquent, celles du système de justice criminelle. Partant de là, il a été possible de comprendre, de manière plus particulier, quels sont les publics et les crimes les plus surveillés par les policiers militarisés et, d'une manière globale, les caractéristiques du modèle de police ostensible de São Paulo. L'objectif des opérations policières ostensibles est de prendre en flagrant délit des suspects criminels, ce qui confère à la Police Militaire la responsabilité de sélectionner et « d’expulser » des rues tous ceux que les policiers identifient comme des criminels. Cela autorise la Police Militaire à avoir recours notamment à trois actions : a) l’arrestation ou b) l’élimination des personnes identifiées comme des criminelles et c) le « bon sens » du policier en tant qu’outil pour distinguer les criminels et les « bons citoyens ». Une des conclusions de cette recherche repose sur le constat d’un ample usage du « bon sens » policier lors des opérations de vigilance ostensible, ainsi que de son aspect racial. De ce fait, le « bon sens » policier, au même titre que la létalité et les arrestations, est devenu le responsable de l’accumulation de désavantages pour la population jeune et noire, en ce qui concerne le droit à la vie en sécurité ; en effet on observe que ce groupe risque beaucoup plus d’aller en prison que le reste de la population. De plus, nous avons constaté que pendant les vingt dernières années la politique sécuritaire menée dans São Paulo s’est focalisé sur le type de vigilance ostensible décrit ci-dessus, et ce en dépit de l’échec de l’opération pour ce qui concerne la diminution du nombre de crimes contre les biens à São Paulo.
This thesis analyzes the relation between daily police practices and the conformation with ostensible policing run by the Military Police of São Paulo State. This work started from interviews and analysis of official data to understand how the Military Police, during the ostensible policing, selects the people who will suffer the police approach and therefore the prosecution of the criminal justice system. Thenceforth it was possible to understand specifically which public and which crimes were most closely watched by the military police and, in an embracing way, the characteristics of the São Paulo ostensible policing model. The purpose of ostensible policing is to catch criminal suspects, implying to the Military Police the responsibility to select and remove from the streets those who the police itself identifies as “bandits”. It is also observed that this framework does not configure a public security policy, but a crime and violence management, marked by the "war" against certain types of crimes that are available to the Military Police, especially with three features: a) imprisonment; b) elimination of those identified as “bandits”, and c) the “police scent” as a differentiation tool to identify "bandits" and "good citizens". One of the study highlights is that the wide use of the “police scent” by the military police which has racial aspects in its composition added to the lethality and imprisonment, became responsible for the accumulation of disadvantages for the young black population, referring to the right to secure life and a higher risk of being arrested for property offenses in relation to the rest of the population. In all, it became clear that in the last twenty years there is an insistence from the state public security in an ostensible policing with such characteristics, even in the face of failure in the decrease of numbers of property offenses in the state of São Paulo.
A tese analisa a articulação entre práticas policiais cotidianas e a conformação do policiamento ostensivo militarizado protagonizado pela Polícia Militar. O presente trabalho partiu de entrevistas e análise de dados oficiais da segurança pública paulista para compreender como os policiais, durante o policiamento ostensivo, selecionam as pessoas que sofrerão as investidas da polícia e, por conseguinte, do sistema de justiça criminal. A partir daí foi possível entender, de forma específica, quais são os públicos e os crimes mais vigiados pelos policiais militares e, de forma abrangente, as características do modelo de policiamento ostensivo paulista. Constatou-se que o objetivo do policiamento ostensivo é flagrar suspeitos criminais, o que incute à PM a responsabilidade de selecionar e “retirar” das ruas aqueles que os policiais identificam como “bandidos”. Para tal estão disponíveis à PM, sobretudo, três recursos: a) o aprisionamento ou b) a eliminação daqueles identificados como bandidos e c) o tirocínio policial enquanto ferramenta para diferenciar “bandidos” e “cidadãos de bem”. Uma das conclusões da pesquisa é a constatação da ampla utilização do tirocínio pelos policiais que atuam no policiamento ostensivo e de seu aspecto racializado; isto significa que, para a fundamentação da suspeita policial, são utilizados marcadores raciais. Desta forma, o tirocínio, ao lado da letalidade policial e do aprisionamento se tornaram responsáveis pelo acúmulo de desvantagens para a população jovem e negra, no que tange ao direito à vida segura e a um maior risco de serem presos por crimes patrimoniais em relação ao restante da população. No mais, constatou-se que nos últimos vinte anos há uma insistência por parte da segurança pública paulista num policiamento ostensivo com tais características, mesmo diante do insucesso na diminuição no número de crimes patrimoniais no estado de São Paulo.
SQUILLACE, LAURA. "Praia para quem? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.
Full textThe beaches of Rio de Janeiro are considered one of the most democratic areas of leisure in the city, with free access and a heterogeneous public coming from different neighborhoods and belonging to different social classes. Despite this, the Operação Verão (Operation Summer), a security policy executed on the beaches by the Military Police and the Municipal Guard of Rio de Janeiro, may question the limits of this democracy. Among its objectives, the Operação Verão aims to prevent the so-called arrastões, a collective form of theft and robbery, supposedly committed by groups of young people and adolescents from the suburbs. Consequently, this category becomes one of the main targets of the Operação Verão. Through an ethnographic observation of the Operação Verão, carried out by accompanying law enforcement agents in their work, this thesis seeks to understand the mechanisms of social and spatial control in the context of beach leisure in Rio de Janeiro. In addition, this research is based on the result of interviewing other actors who interact in this public space: youth from the suburbs, subjected to a continuous surveillance; the public of the beach, which generates the demand for security in the coastal area and other people who work over there. The interviews conducted and the ethnographic study of the monitoring of the security forces during the Operação Verão guide the reading of the interaction in this public space. All this also shows the limitations that this measure provides in regards of the access to the beach to groups of youths and adolescents from the suburbs, considered a threat to public security. The goal of the thesis is to present the Operação Verão through a qualitative analysis and to demonstrate how the demand for a safer beach could generate a mechanism of discrimination and could compromise free access to the beach for a segment of population already historically criminalized and excluded in Rio de Janeiro: the youth from the suburbs.
Lim, Yow Tzu. "Evolving security policies." Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.
Full textGuillén, Lasierra Francesc. "Modelos de policía y seguridad." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.
Full textThis thesis aims at stressing the importance of the diverse ideal conceptions of policing (models) that constitute the grounds for police organisations and policing. All of them have made contributions to the service with which the police provide the citizens and, at the same time, have evidenced shortcomings and limitations. The idea sustained in this work is that policing models (and consequently security models) are not theoretical constructions without any influence in daily policing, but, to the contrary, they are extremely relevant for the diverse areas of policing. Models stem from different legitimacies and affect the nuclear aim of policing (the mission), relationships with citizens, public order management, the structure and dynamics of police organisation and the systems of accountability and efficiency indicators as well. The first chapters begin with the description of the context in which the police appears as an institution of formal social control and the material field of policing focusing on its most substantial elements in order to build models up (police culture, mission, relationships with citizens, public order, organisation and accountability). Then, three models are defined: the governmental, the professional and community policing or public service policing. The governmental model gets its legitimacy from a representative Government in the framework of the rule of law with state powers balance, law abiding and judiciary control. It is a model with some tendency to be influenced by political power, in which citizens are more or less important depending on political junctures; police organisation is just an instrument to transmit orders, management of public order and gathering and treatment of information are crucial objectives for the police. The professional model is based on police professional knowledge (such as doctors or architects) in the framework of law; war on crime constitutes its mission, although it also tackles traffic police and public order; citizens or politicians should have no role in policing due to their lack of knowledge. Community policing or public service policing is thought from the citizens, for them and with them, police become a service addressed their needs with their collaboration and their opinion is the chore reference to assess the police. After having thoroughly described the three models, modern strategies of policing that have dominated criminological debates in last decades are discussed (Problem Oriented Policing, Intelligence-led Policing, Broken Windows Policing, and Reassurance Policing) in order to evidence the reasons why they are not considered policing models. It is argued that they don’t constitute new models because they are not complete ideal constructions of policing. Nevertheless they bring methodological innovations into the pre-existent models that try to improve their efficiency. Finally, this thesis analyses current tendencies in existing police systems, stressing the influence of politicization, globalisation, new technologies and the economic crisis in police organisations. The study of these tendencies and the virtues and deficiencies of the different models discussed in previous chapters offer the bases for the conclusions about how police should be to be able to face future challenges of policing in a satisfactory way.
Hallett, Joseph. "Capturing mobile security policies precisely." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.
Full textPersson, Magnus. "Building trust : The contradiction between security and democracy in post Apartheid South Africa." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.
Full textBrooks, Jason L., and Jason A. Goss. "SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.
Full textThimamontri, Apinya. "Homeland Security Roles and Responsibilities: an Examination of Texas Police Chiefs’ Perceptions." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.
Full textBrown, David A. "Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.
Full textRimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.
Full textHerzog, Almut. "Usable Security Policies for Runtime Environments." Doctoral thesis, Linköpings universitet, IISLAB - Laboratoriet för intelligenta informationssystem, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8809.
Full textHerzog, Almut. "Usable security policies in runtime environments /." Linköping : Department of Computer and Information Science, Linköpings universitet, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8809.
Full textKhoury, Raphaël. "Enforcing Security Policies with Runtime Monitors." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28124/28124.pdf.
Full textExecution monitoring is an approach that seeks to allow an untrusted code to run safely by observing its execution and reacting if need be to prevent a potential violation of a user-supplied security policy. This method has many promising applications, particularly with respect to the safe execution of mobile code. Academic research on monitoring has generally focused on two questions. The first, relates to the set of policies that can be enforced by monitors under various constraints and the conditions under which this set can be extended. The second question deals with the way to inline a monitor into an untrusted or potentially malicious program in order to produce a new instrumented program that provably respects the desired security policy. This study builds on the two strands of research mentioned above and brings new insights to this study. It seeks, in the first place, to increase the scope of monitorable properties by suggesting a new approach of monitor inlining. By drawing on an a priori model of the program’s possible behavior, we develop a monitor that can enforce a strictly larger set of security properties. Furthermore, longstanding research has showed that a monitor that is allowed to transform its input is more powerful than one lacking this ability. Naturally, this ability must be constrained for the enforcement to be meaningful. Otherwise, if the monitor is given too broad a leeway to transform valid and invalid sequences, any property can be enforced, but not in a way that is useful or desirable. In this study, we propose two new enforcement paradigms which capture reasonable restrictions on a monitor’s ability to alter its input. We study the set of properties enforceable if these enforcement paradigms are used and give examples of real-life security policies that can be enforced using our approach.
Hwang, JeeHyun. "Improving the Quality of Security Policies." Thesis, North Carolina State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3584006.
Full textSystems such as web applications, database systems, and cloud services regulate users’ access control to sensitive resources based on security policies. Organizations often manage security policies in an ad-hoc and inconsistent manner due to a lack of budget, resources, and staff. This management could cause crucial security problems such as unauthorized access to sensitive resources.
A security policy is a set of restrictions and properties that specify how a computing system prevents information and computing resources from being used in violation of an organization’s security laws, rules, and practices. In computer systems, security policies are enforced to ensure correct functioning of access control such as “who” (e.g., authorized users or processes) can perform actions under “what” conditions.
Policy authors may follow common patterns in specifying and maintaining security policies. Researchers applied data mining techniques for deriving (implicit) patterns such as a group of users (i.e., roles in RBAC policies) who have the same access permissions. Policy authors reuse common patterns to reduce mistakes. Anomalies of those patterns are candidates for inspection to determine whether these anomalies expose faults.
Faults (i.e., misconfigurations) in security policies could result in tragic consequences, such as disallowing an authorized user to access her/his resources and allowing malicious users to access critical resources. Therefore, to improve the quality of security policies in terms of policy correctness, policy authors must conduct rigorous testing and verification during testing and maintenance phases of software development process. However, manual test-input generation and verification is an error-prone, time-consuming, and tedious task.
In this dissertation, we propose approaches that help improve the quality of security policies automatically. Our research goal is to help policy authors through automated pattern mining and testing techniques in the efficient detection and removal of faults. This dissertation is comprised of three research projects where each project focuses on a specific software engineering task. The three research projects are as follows:
Pattern Mining. We present an approach to mine patterns from security policies used in open source software products. Our approach applies data mining techniques on policy evolution and specification data of those security policies to identify common patterns, which represent usage of security policies. Our approach uses mined patterns as policy specification rules and detect faults in security policies under analysis as deviations from the mined patterns.
Automated Test Generation. We present a systematic structural testing approach for security policies. Our approach is based on the concept of policy coverage, which helps test a policy’s structural entities (i.e., rules, predicates, and clauses) to check whether each entity is specified correctly. Our approach analyzes security policies under test and generates test cases automatically to achieve high structural coverage. These test cases can achieve high fault-detection capability (i.e., detecting faults).
Automated Test Selection for Regression Testing. We present a safe-test-selection approach for regression testing of security policies. Among given initial test cases in access control systems under test, our approach selects and executes only test cases that could expose different policy behaviors across multiple versions of security policies. Our approach helps detect unexpected policy behaviors (i.e., regression faults) caused by policy changes efficiently.
These three research project have resulted in the following contributions:
• Patterns characterizing correlations of attributes in security policies help detect faults.
• Structural coverage for security policies is closely related to fault-detection capability. An original set of test cases with higher structural coverage often achieves higher fault-detection capability. Furthermore, its reduced set of test cases while maintaining the same structural coverage achieves similar fault-detection capability with the original set.
• Substantial number of test cases for regression testing can be reduced to help improve performance.
Li, Yanhuang. "Interoperability and Negotiation of Security Policies." Thesis, Télécom Bretagne, 2016. http://www.theses.fr/2016TELB0414/document.
Full textSecurity policy provides a way to define the constraints on behavior of the members belonging to a system, organization or other entities. With the development of IT technology such as Grid Computing and Cloud Computing, more and more applications and platforms exchange their data and services for cooperating. Toward this trend, security becomes an important issue and security policy has to be applied in order to ensure the safety of data and service interaction. In this thesis, we deal with one type of security policy: access control policy. Access control policy protects the privileges of resource's utilization and there exist different policy models for various scenarios. Our goal is to ensure that the service customer well expresses her security requirements and chooses the service providers that fit these requirements.The first part of this dissertation is dedicated to service provider selection. In case that the security policies of the service provider are accessible to the service customer, we provide a method for measuring the similarity between security policies. Another case is that security policies are not accessible to the service customer or not specified explicitly. Our solution is proposing a policy-based framework which enables the derivation from attribute-based security requirements to concrete security policies. The second part of the dissertation focuses on the security policy negotiation. We investigate the process of reaching agreement through bargaining process in which negotiators exchange their offers and counter offers step by step. The positive result of the negotiation generates a policy contract
Giacomantonio, Christopher Joseph. "Policing integration : the inter- and intra-organizational coordination of police work." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:4c85a7d4-4475-42a0-9fa1-226baaca43fc.
Full textMartinez, Salvador. "Automatic reconstruction and analysis of security policies from deployed security components." Phd thesis, Ecole des Mines de Nantes, 2014. http://tel.archives-ouvertes.fr/tel-01065944.
Full textYalcinkaya, Ramazan. "Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4801/.
Full textEl, Maarabani Mazen. "Verification and test of interoperability security policies." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00717602.
Full textMartins, Francisco. "Controlling Security Policies in a Distributed Environment." Doctoral thesis, Department of Informatics, University of Lisbon, 2006. http://hdl.handle.net/10451/14314.
Full textMarhia, Natasha. "Everyday (in)security/(re)securing the everyday : gender, policing and violence against women in Delhi." Thesis, London School of Economics and Political Science (University of London), 2012. http://etheses.lse.ac.uk/759/.
Full textMichael, Deborah Francis. "A sense of security? : the ideology and accountability of private security officers." Thesis, London School of Economics and Political Science (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271286.
Full textGraham, Scott W. Mills Stephen E. "Monitoring information systems to enforce computer security policies /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369434.
Full text"September 1999". Thesis advisor(s): Vicente Garcia. Includes bibliographical references (p. 123-124). Also available online.
Singh, Kapil. "Designing security policies and frameworks for web applications." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41122.
Full textWeikard, Hans-Peter. "Industrial policies and social security : investigating the links." Universität Potsdam, 1997. http://opus.kobv.de/ubp/volltexte/2010/4876/.
Full textGraham, Scott W., and Stephen E. Mills. "Monitoring information systems to enforce computer security policies." Thesis, Monterey, California. Naval Postgraduate School, 1999. http://hdl.handle.net/10945/8698.
Full textAlzahrani, Ali Mousa G. "Efficient enforcement of security policies in distributed systems." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9029.
Full textSui, Guang Ye. "Formal Enforcement of Security Policies : An Algebraic Approach." Doctoral thesis, Université Laval, 2015. http://hdl.handle.net/20.500.11794/26466.
Full textThe security of information systems is one of the most important preoccupations of today’s computer science field. Individuals and companies are more and more affected by security flaws and billions of dollars have been lost because of cyber-attacks. This thesis introduces a formal program-rewriting approach that can automatically enforce security policies on non-trusted programs. For a program P and a security policy Q, we generate another program P’ that respects the security policy Q and behaves like P except when the enforced security policy is about to be violated. The presented approach uses the [symbol] algebra that is a variant of the BPA (Basic Process Algebra) algebra extended with variables, environments and conditions to formalize and resolve the problem. The problem of computing the expected enforced program [symbol] is transformed to a problem of resolving a linear system for which we already know how to extract the solution by a polynomial algorithm. This thesis presents our approach progressively and shows how the solution evolves when we move from the [symbol] algebra to the [symbol] algebra.
Steffinlongo, Enrico <1987>. "Efficient security analysis of administrative access control policies." Doctoral thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/12917.
Full textSaboya, PÃmela Costa Landim. "As mudanÃas na formaÃÃo do policial militar do Cearà no contexto da seguranÃa pÃblica." Universidade Federal do CearÃ, 2017. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=19094.
Full textO presente trabalho investiga a evoluÃÃo do conhecimento realizado nas Academias de PolÃcias com uma preocupaÃÃo em mostrar quais fatores influenciaram as mudanÃas para se chegar ao atual modelo de formaÃÃo implementado na Academia Estadual de SeguranÃa PÃblica do Estado do CearÃ. Tratou-se de uma pesquisa qualitativa, com carÃter comparativo, pautada nos referenciais da sociologia e das mudanÃas curriculares dos cursos de formaÃÃo do policial militar do CearÃ. Como procedimentos metodolÃgicos foram utilizados principalmente pesquisas bibliogrÃficas sobre a seguranÃa pÃblica, a violÃncia e a formaÃÃo policial, coleta e anÃlise de dados sobre violÃncia, com observaÃÃes de acontecimentos histÃricos da formaÃÃo policial cearense. No primeiro capÃtulo do trabalho faz-se uma anÃlise dos acontecimentos que permitiram se chegar a construÃÃo das polÃcias militares no Brasil com a problematizaÃÃo da violÃncia como fator social determinante para se analisar a instituiÃÃo policial. No segundo capÃtulo do trabalho foi abordado o cenÃrio atual da sociedade brasileira e o atual modelo de formaÃÃo empregado na academia policial cearense. Na terceira parte à feita uma anÃlise dos currÃculos de formaÃÃo inicial dos policiais militares do CearÃ. Foram utilizadas como leituras os livros de Marcos Rolim, ClÃudio Beato Filho, Theodomiro Dias Neto, IgnÃcio Cano e outros tendo como organizadores e autores CÃsar Barreira, GlaucÃria Mota Brasil e estudiosos da modernidade que tratam do tema polÃcia com Ãnfase na formaÃÃo moderna como algo a ser desvendado e explorado. No terceiro capÃtulo à feito uma anÃlise das mudanÃas promovidas nos currÃculos de formaÃÃo inicial dos policiais militares do CearÃ. Por fim, nas consideraÃÃes finais à feita uma anÃlise das mudanÃas realizadas na seguranÃa pÃblica no Cearà apÃs a redemocratizaÃÃo do Brasil e quais as consequÃncias para os homicÃdios e a formaÃÃo policial dessas mudanÃas.
The present work investigates the evolution of the knowledge carried out in the Police Academies with a concern to show which factors influenced the changes to reach the current training model implemented in the State Academy of Public Security of the State of CearÃ. It was a qualitative research, with a comparative character, based on the sociology references and the curricular changes of the training courses of the military police of CearÃ. As methodological procedures, bibliographical research on public security, violence and police training, collection and analysis of data on violence, with observations of historical events of the police training in CearÃ, were used. In the first chapter of the article, an analysis is made of the events that led to the construction of military police in Brazil with the problematization of violence as a determining social factor for analyzing the police institution. In the second chapter of the study the current scenario of Brazilian society and the current training model employed in the police academy of Cearà were discussed. In the third part, an analysis of the curricula of initial training of the military police of Cearà is made. The books of Marcos Rolim, ClÃudio Beato Filho, Theodomiro Dias Neto, IgnÃcio Cano and others were used as readings, as organizers and authors CÃsar Barreira, GlaucÃria Mota Brasil and modernity scholars who deal with the theme police with emphasis on modern training as something to Be unveiled and explored. In the third chapter an analysis of the changes promoted in the initial training curricula of the military police of Cearà is made. Finally, in the final considerations, an analysis is made of the changes made in public security in Cearà after the re-democratization of Brazil and the consequences for homicides and police training of these changes.
Furst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.
Full textDesilets-Bixler, Nicole L. "Security in transition : police reform in El Salvador and South Africa." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://handle.dtic.mil/100.2/ADA404711.
Full textThesis advisor(s): Jeanne Giraldo, Maria Rasmussen. Includes bibliographical references. Also available online.
Doyle, Maria. "FEELINGS OF SAFETY : Feelings of Safety In The Presence Of the Police, Security Guards and Police Volunteers." Thesis, Örebro universitet, Institutionen för juridik, psykologi och socialt arbete, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-35885.
Full textMenzel, Michael. "Model-driven security in service-oriented architectures : leveraging security patterns to transform high-level security requirements to technical policies." Phd thesis, Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2012/5905/.
Full textIm Bereich der Enterprisearchitekturen hat das Paradigma der Service-orientierten Architektur (SOA) in den vergangenen Jahren eine große Bedeutung erlangt. Dieser Ansatz ermöglicht die Strukturierung und Umsetzung verteilter, IT-basierter Geschäftsfunktionen, um einen effizienten und flexiblen Einsatz von IT-Ressourcen zu ermöglichen. Während in der Vergangenheit fachliche Anforderungen in monolithischen Applikationen umgesetzt wurden, setzt dieser Architekturansatz auf wiederverwendbare Dienste, die spezifische Geschäftsfunktionen implementieren. Diese Dienste können dann dynamisch zur Umsetzung von Geschäftsprozessen herangezogen werden und ermöglichen eine schnelle Reaktion auf verändernde geschäftliche Rahmenbedingungen durch Anpassung der Prozesse. Die einzelnen Dienste existieren unabhängig voneinander und sind lose über einen Nachrichtenaustausch gekoppelt. Diese Unabhängigkeit unterscheidet den SOA-Ansatz von der bisherigen Entwicklung klassischer verteilter Anwendungen. Die Verwendung unabhängiger Dienste geht aber auch mit einem größeren Gefährdungspotential einher, da eine Vielzahl von Schnittstellen bereitgestellt wird, die mittels komplexer Protokolle angesprochen werden können. Somit ist die korrekte Umsetzung von Sicherheitsmechanismen in allen Diensten und SOA-Infrastrukturkomponeten essentiell. Kommunikationspartner müssen an jedem Kommunikationsendpunkt authentifiziert und autorisiert werden und ausgetauschte Nachrichten müssen immer geschützt werden. Solche Sicherheitsanforderungen werden in technischen Sicherheitskonfigurationen (Policydokumenten) mittels einer Policysprache kodiert und werden an die Dienste verteilt, die diese Anforderungen durchsetzen. Da Policysprachen für SOA aber durch die Vielzahl und Vielfalt an Sicherheitsmechanismen, -protokollen und -standards eine hohe Komplexität aufweisen, sind Sicherheitskonfigurationen höchst fehleranfällig und mit viel Fachwissen zu erstellen. Um die Generierung von Sicherheitskonfigurationen in komplexen Systemen zu vereinfachen, wird in dieser Arbeit ein modellgetriebener Ansatz vorgestellt, der eine visuelle Modellierung von Sicherheitsanforderungen in Architekturmodellen ermöglicht und eine automatisierte Generierung von Sicherheitskonfigurationen auf Basis dieser Anforderungen unterstützt. Die Modellierungsebene ermöglicht eine einfache und abstrakte Darstellung von Sicherheitsanforderungen, die sich auch für Systemarchitekten erschließen, welche keine Sicherheits-experten sind. Beispielsweise können modellierte Daten einfach mit einem Schloss annotiert werden, um den Schutz dieser Daten zu fordern. Die Syntax, die Semantik und die Darstellung dieser Anforderungen werden durch die in dieser Arbeit vorgestellte Sicherheitsmodellierungssprache SecureSOA spezifiziert. Der vorgestellte modellgetriebene Ansatz transformiert die modellierten Anforderungen auf ein domänen-unabhängiges Policymodell, das eine Abstraktionsschicht zu konkreten Policysprachen bildet. Diese Abstrak-tionsschicht vereinfacht die Generierung von Sicherheitspolicies in verschiedenen Policysprachen. Allerdings kann diese Transformation nur erfolgen, wenn im System Expertenwissen hinterlegt ist, das die Auswahl von konkreten Sicherheitsmechanismen und -optionen bestimmt. Im Rahmen dieser Arbeit werden Entwurfsmuster für SOA-Sicherheit zur Transformation herangezogen, die dieses Wissen repräsentieren. Dazu wird ein Katalog von Entwurfsmustern eingeführt, der die Abbildung von abstrakten Sicherheitsanforderungen auf konkrete Konfigurationen ermöglicht. Diese Muster sind mittels einer Entwurfsmustersprache definiert, die in dieser Arbeit eingeführt wird. Die formale Semantik dieser Sprache ermöglicht die formale Verifikation des Transformationsprozesses, um die Korrektheit der Entwurfsmusteranwendung nachzuweisen. Die Definition dieses Entwurfsmusterkatalogs und der darauf basierende Transformationsprozess ermöglichen die Abbildung von abstrakten Sicherheitsanforderungen auf konkrete technische Sicherheitskonfigurationen und stellen den Beitrag dieser Arbeit dar. Abschließend wird in dieser Arbeit das SOA-Security-Lab vorgestellt, das die Umsetzung dieses Ansatzes demonstriert.
Plotkin, Lori A. "Kuwait, 1979-1991 : problems and policies for internal security." Thesis, University of Oxford, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288970.
Full textHassan, S. M. A. "Food security and regional development policies in arid Sudan." Thesis, Swansea University, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637243.
Full textToje, Asle. "American influence on European Union security policies, 1998-2004." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612838.
Full textLomsak, Daniel. "Toward More Composable Software-Security Policies: Tools and Techniques." Scholar Commons, 2013. http://scholarcommons.usf.edu/etd/4531.
Full textMallios, Ioannis. "Probabilistic-Cost Enforcement of Security Policies in Distributed Systems." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/736.
Full textSchwan, Matthias. "Specification and verification of security policies for smart cards." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät II, 2008. http://dx.doi.org/10.18452/15767.
Full textSecurity systems that use smart cards are nowadays an important part of our daily life, which becomes increasingly dependent on the reliability of such systems, for example cash cards, electronic health cards or identification documents. Since a security policy states both the main security objectives and the security functions of a certain security system, it is the basis for the reliable system development. This work focuses on multi-applicative smart card operating systems and addresses new security objectives regarding the applications running on the card. As the quality of the operating system is determined by the underlying security policy, its correctness is of crucial importance. A formalization of it first provides an unambiguous interpretation and second allows for the analysis with mathematical precision. The formal verification of a security policy generally requires the verification of so-called safety properties; but in the proposed security policy we are additionally confronting security properties. At present, safety and security properties of formal system models are verified separately using different formalisms. In this work we first formalize a security policy in a TLA system specification to analyze safety properties and then separately verify security properties using an inductive model of cryptographic protocols. We provide a framework for combining both models with the help of an observer methodology. Since all specifications and proofs are performed with the tool VSE-II, the verified formal model of the security policy is not just an abstract view on the security system but becomes its high level specification, which shall be refined in further development steps also to be performed with the tool. Hence, the integration of the two approaches within the tool VSE-II leads to a new quality level of security policies and ultimately of the development of security systems.
Hanus, Bartlomiej T. "The Impact of Information Security Awareness on Compliance with Information Security Policies: a Phishing Perspective." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699974/.
Full textLee, Thomas F. "A new role for local police in radiological security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FLee.pdf.
Full textThesis Advisor(s): Brannan, David ; Simeral, Robert. "September 2007." Description based on title screen as viewed on October 22, 2007. Includes bibliographical references (p. 65-72). Also available in print.
Oliveira, Nathalia Pereira de. "Policiais Violados, policiais violentos: uma análise da formação policial." Universidade Federal de Goiás, 2016. http://repositorio.bc.ufg.br/tede/handle/tede/6189.
Full textApproved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2016-09-12T15:51:41Z (GMT) No. of bitstreams: 2 Dissertação - Nathalia Pereira de Oliveira - 2016.pdf: 4172415 bytes, checksum: faf8d0f5decce7bd59ee91fad742b22d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2016-09-12T15:51:41Z (GMT). No. of bitstreams: 2 Dissertação - Nathalia Pereira de Oliveira - 2016.pdf: 4172415 bytes, checksum: faf8d0f5decce7bd59ee91fad742b22d (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2016-08-22
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
The objective of this research was to analyze police violence in a further way, that is, in addition to pointing out the existence of abuse of the use of police force, sought to especially understand the causes that can be identified as responsible for violent attitudes of military police. It started from the hypothesis that the training course of these professionals is based on authoritarian and violent practices against students that will be reflected in the way the police will act. Owing to interviews realized with military police, it was possible to know the existence of several elements present both in police training and throughout his career and that may also be considered as sources of violence suffered and perpetrated by military police such as the disciplinary regulations, the military culture and the society. The interviews and the reading of other papers have highlighted the absence of a right to the voice of the military police, because of this, we sought this work, whenever possible, to quote the statements of police officers, both those derived from empirical work done in this dissertation, as well those found in other academic papers.
O objetivo desta pesquisa foi analisar a violência policial de uma maneira mais aprofundada, isto é, além de apontar a existência do abuso do uso da força policial, buscou-se especialmente compreender as causas que podem ser apontadas como responsáveis por atitudes violentas por parte dos policiais militares. Partiu-se da hipótese de que o curso de formação desses profissionais é baseado em práticas autoritárias e violentas contra os alunos que irão refletir na atuação policial. A partir de entrevistas realizadas com policiais militares, percebeu-se a existência de diversos elementos presentes tanto na formação policial quanto ao longo de sua carreira, que também podem ser considerados como fontes das violências sofridas e perpetradas por policiais militares tais como: o regulamento disciplinar, a cultura militar e as pressões advindas da sociedade. As entrevistas e a leitura de trabalhos empíricos e teóricos a respeito do tema evidenciaram a inexistência do direito à voz do policial militar, sobretudo daqueles que não compõem o oficialato e, devido a isso, buscou-se, sempre que possível, trazer falas dos policiais, tanto aquelas derivadas do trabalho empírico realizado nesta dissertação, como também as encontradas em outros trabalhos acadêmicos.
Hamilton, Sheilah Elizabeth. "Private security and government : a Hong Kong perspective, 1841-1941 /." Thesis, Click to view the E-thesis via HKUTO, 1999. http://sunzi.lib.hku.hk/hkuto/record/B42575102.
Full textGerônimo, Gislene Donizetti. "Segurança pública: dever do Estado: garantia do exercício da cidadania." Universidade Presbiteriana Mackenzie, 2011. http://tede.mackenzie.br/jspui/handle/tede/1028.
Full textThe Modern State appeared as a new type of State. Characterized for the sovereign power, it was instituted to assure the order and the peace in the State community, as well as providing a legal communitarian order in which the individuals could exert their basic rights and lived with dignity. In this way, the State it is constructed to guarantee to the individual the security to live in society, endorsed by laws which could provide the full exercise of their personal rights. The Modern State appears as a Liberal State or 'Rule of Law', characterized for the legal limitation of State power. It is followed by the Social State, and, later, for the Democratic State of Law, characterized for the consecration of the human rights and by the popular sovereignty. Amongst the consecrated human rights, we also could find the right to the public security which, by the way, always was present in the history of the human kind and in all of the Brazilian Constitutions. The Federal Constitution of Brazil in 1988, regulated the public security as a basic right in its article 5º, also as social right in its article 6º and as a State duty and a responsibility of the brazilian society in its article 144, in which regulated the responsible of police agencies for the exercise of the public security. Still thus, the public security is exerted by agencies that had not been regulated in the Constitution, what generates relative debate which also occur, even though, for the incapacity of the policies constitutionally established in consequence of the highest index of existing crime in our Country. Thus, it is necessary joint action of the State Powers, through its Executive, Legislative and Judiciary branches, and also by the society, in order to elaborate and implement public policies towards the public security, that could contribute to prevent and to contain crime.
O Estado Moderno surgiu como um novo tipo de Estado. Marcado pelo poder soberano, foi instituído com a função de assegurar a ordem e a paz na comunidade jurídica do Estado, assim como para colocar à disposição uma ordem comunitária justa na qual os indivíduos pudessem exercer seus direitos fundamentais e viver com dignidade. Desse modo, surge o Estado para garantir ao indivíduo a segurança para estar em sociedade, respaldado por leis que lhe garantam o pleno exercício de seus direitos. O Estado Moderno se inicia como Estado Liberal ou Estado de Direito, caracterizado pela limitação jurídica ao poder estatal. É sucedido pelo Estado Social, e, depois pelo Estado Democrático de Direito, marcado pela consagração dos direitos humanos e caracterizado pela soberania popular. Dentre os direitos humanos consagrados, encontra-se o direito à segurança, que, aliás, sempre esteve presente na história da humanidade e em todas as constituições brasileiras. A Constituição Federal de 1988 a previu como direito fundamental em seu artigo 5º, como direito social, em seu artigo 6º e como dever do Estado e responsabilidade de todos em seu artigo 144, no qual elencou taxativamente os órgãos policiais responsáveis pelo exercício da segurança pública. Ainda assim, a segurança pública é exercida por órgãos que constitucionalmente não foram previstos, o que gera relativo debate, que ocorre, até mesmo, pela incapacidade das polícias constitucionalmente estabelecidas, ante ao elevadíssimo índice de criminalidade existente em nosso País. Assim, faz-se necessária ação conjunta do Estado, através de seus Poderes Executivo, Legislativo e Judiciário, e da sociedade civil no sentido de elaborar e implementar políticas de segurança pública que contribuam para prevenir e conter a criminalidade existente.
Dario, Diogo M. "Human security policies in the Colombian conflict during the Uribe government." Thesis, University of St Andrews, 2013. http://hdl.handle.net/10023/4516.
Full textTimilsina, Anga. "Getting the policies right the prioritization and sequencing of policies in post-conflict countries /." Santa Monica, CA : RAND, 2007. http://www.rand.org/pubs/rgs_dissertations/RGSD222/.
Full textHetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Full textThesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
Herusutopo, Antonius. "A study of computer security policies for the Indonesian Navy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from the National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA272533.
Full text