To see the other types of publications on this topic, follow the link: Security policie.

Journal articles on the topic 'Security policie'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security policie.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Supriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (August 31, 2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.

Full text
Abstract:
Police transformation policy to carry out community security functions is very adaptive in addressing the changing times. The research aims to map the transformation and strengthening of police infrastructure in response to the era of digitalization. The research uses a qualitative type of research with a literature study approach and policy analysis programmed by the Police. The results showed that the transformation policy consisting of organizational transformation, operation transformation, public service transformation, and supervise transformation is needed by the Police, especially in the current digital transition. Moreover, it can be carried out correctly if the Police have internally and externally owned by POLRI. The research concludes that transformative efforts and strengthening of police infrastructure strongly support the duties and functions of the National Police in securing the community.
APA, Harvard, Vancouver, ISO, and other styles
2

Antonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Achmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (March 1, 2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.

Full text
Abstract:
This studywas conducted todetermine and analyze the implementation of the licensing policies and notices of community activities in Baubau City Police and communication factors, resources, disposition, and structure influence the implementation of the licensing policies and notices of community activities in Police Baubau. The results showed that the licensing policies and notices activities of people implemented by (a) Providea receipt notice (b) To coordinate with the responsible delivery of opinions in the Public (c) To coordinate with the leadership, the agency/institutionwhich is the goal of delivering the opinion (d) Prepare securing alocation and route that passed.(e) responsible for protecting the participants in the delivery of public opinion (f) responsible for organizing security and factors factors that influence the implementation of the licensing policies and noticesof community activities are: (1) Communication; (2) Resources (3) Disposition; and (4) Organizational Structure.
APA, Harvard, Vancouver, ISO, and other styles
4

Poincignon, Yann. "Defense Academy Excellence European Union Civilian Policing: Foreign Policy Action or Internal Security Tool." Connections: The Quarterly Journal 02, no. 2 (2003): 111–30. http://dx.doi.org/10.11610/connections.02.2.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Helmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Full text
Abstract:
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 63 of 2004 on the Securing of National Vital Security Object there is described that pattern Sispamobvitnas, they are: (1) The main executor of the system Securing of National Vital Objek is obvitnas management authority, in this case the Police through Dirpamobvit; (2) Police are obliged to provide security assistance obvitnas; (3) priority preemptive and preventive activities; (4) in an integrated and simultaneous shared obvitnas managers implement security systems obvitnas; and (5) and against obvitnas is an organic part of or including the military, the security environment remain to be implemented, although the security environment outside Obvitnas or process interruption handling defense and security. 2. The obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan, they are: (1) Lack of quality personnel guard PT. Pertamina (Persero) BBM Terminal Banjarmasin due to lack of professional recruitment system; (2) Insufficient number of security officers compared to the vulnerability of the region; (3) Infrastructure security Obvit Of Polda Kalimantan Selatan are limited;(4) The lack of security coordination between Ditpamobvit Polda Kalimantan Selatan with regional security managers of the company, and the company's internal security guard at the Police Post.
APA, Harvard, Vancouver, ISO, and other styles
6

Elbably, Amar. "سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة." Security Policy Paper 2, no. 2 (December 31, 2021): 1–20. http://dx.doi.org/10.26735/hjoo8882.

Full text
Abstract:
يُسهِم‭ ‬التعاوُن‭ ‬الأمني‭ ‬الرقمي‭ ‬بين‭ ‬الدول‭ ‬إسهامًا‭ ‬كبيرًا‭ ‬في‭ ‬انحسار‭ ‬الجرائم‭ ‬المُنظَّمة‭ ‬والقضاء‭ ‬عليها،‭ ‬وبخاصَّةٍ‭ ‬الجرائم‭ ‬الإرهابيَّة،‭ ‬وهو‭ ‬ما‭ ‬يتطلَّب‭ ‬ضرورة‭ ‬تفاعُل‭ ‬الدول‭ ‬فيما‭ ‬بينها،‭ ‬وزيادة‭ ‬الجهود‭ ‬في‭ ‬سبيل‭ ‬تشجيع‭ ‬هذا‭ ‬التعاوُن‭ ‬وتفعيله،‭ ‬بإيجاد‭ ‬وسائل‭ ‬تعاونيَّة‭ ‬في‭ ‬المسائل‭ ‬الأمنيَّة‭ ‬الكفيلة‭ ‬بالوقاية‭ ‬من‭ ‬الجريمة‭ ‬وتَتَبُّع‭ ‬مرتكبيها‭ ‬حالَ‭ ‬وقوعها‭ ‬باستخدام‭ ‬شبكات‭ ‬مُؤَمَّنَة‭ ‬تسمح‭ ‬بنقل‭ ‬البيانات‭ ‬والمعلومات‭ ‬والتطبيقات‭ ‬بين‭ ‬الأجهزة‭ ‬المعنيَّة‭ ‬بأجهزة‭ ‬الشرطة‭ ‬العربيَّة،‭ ‬واستخدام‭ ‬التقنيات‭ ‬المُؤَمَّنَة‭ ‬والسريعة‭ ‬التي‭ ‬تسمح‭ ‬بالتبادُل‭ ‬الرقمي‭ ‬للأجهزة‭ ‬الشرطيَّة،‭ ‬ما‭ ‬يحقِّق‭ ‬منع‭ ‬وقوع‭ ‬الجرائم‭ ‬والكشف‭ ‬عنها،‭ ‬وملاحقة‭ ‬المخطَّطات‭ ‬الإجراميَّة‭ ‬والإرهابيَّة‭ ‬بجميع‭ ‬أشكالها‭ ‬واستباق‭ ‬المعلومات‭ ‬بما‭ ‬يحافظ‭ ‬على‭ ‬الأمن‭ ‬الوطني‭ ‬للدول‭ ‬العربيَّة‭.‬
APA, Harvard, Vancouver, ISO, and other styles
7

Schneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (February 2000): 30–50. http://dx.doi.org/10.1145/353323.353382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Potter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (October 2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Matvejevs, Aleksandrs. "Problems of Police Activity in Ensuring Public Order and Public Safety." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no. 21 (2021): 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.

Full text
Abstract:
The article addresses the issues concerning public order and public security. These two are the objects of the state administration that form separate legal institutes. The duties of the police include securing the rule of law, maintaining public order and security, preventing, detecting and investigating crimes. The police ensure safety of people and environment and prevent all violations of the law and disturbances by eliminating and investigating all such incidents. The tasks of the police are defined in the Police Act. The police cooperate with other authorities and local residents and communities in maintaining security. Keywords: public order, public security, public place, police activity.
APA, Harvard, Vancouver, ISO, and other styles
10

McIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (August 1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Suhaibah, Suhaibah, Armiwal Armiwal, and Mukallaf Mukallaf. "The Role of the Polri Intelligence in Securing the General Election and Institution of the Pidie District DPRK." Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences 4, no. 1 (January 22, 2021): 626–31. http://dx.doi.org/10.33258/birci.v4i1.1645.

Full text
Abstract:
This research aims toknowingthe role of the Police Intelligence in securing the General Election and Inauguration of the Pidie Regency DPRK, the obstacles to the Intelligence of the Police in securing the General Election and the Inauguration of the DPRK and the efforts made to overcome the obstacles to the Police Intelligence in securing the General Election and Inauguration of the Pidie Regency DPRK In this study, the problem approach used was normative juridical and empirical juridical. Data collection was carried out by literature study and field studies. The data were analyzed qualitatively with data collection techniques through observation of library and field materials related to these problems. The results showed that the role of Police Intelligence in Securing the General Election and Inauguration of the Pidie Regency DPRK that is maintain and maintain a situation of security and national order in order to remain conducive since the preparatory stage, the election stage and the consolidation stage in order to ensure security for the public, election organizers in this case the KPU and Bawaslu, and Pilkada participants. Efforts Made to Overcome Police Intelligence Obstacles in Securing the General Election and Inauguration of the Pidie Regency DPRK by increasing organizational capabilities, individual capabilities, increasing security capabilities, increasing the ability to control activities and increasing additional capabilities.
APA, Harvard, Vancouver, ISO, and other styles
12

Murtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (April 2, 2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Full text
Abstract:
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
APA, Harvard, Vancouver, ISO, and other styles
13

Sheptycki, J. "High Policing in the Security Control Society." Policing 1, no. 1 (January 1, 2007): 70–79. http://dx.doi.org/10.1093/police/pam005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

POTOČNIK, GREGOR. "SODELOVANJE SLOVENSKE VOJSKE IN POLICIJE PRI NALOGAH NOTRANJE STABILNOSTI IN VARNOSTI REPUBLIKE SLOVENIJE." KONCEPT KREPITVE ODPORNOSTI DRUŽBE/THE CONCEPT OF STRENGHTENING THE RESILIENCE OF SOCIETY, VOLUME 22/ISSUE 4 (October 23, 2020): 67–83. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.4.4.

Full text
Abstract:
Povzetek Grožnje nacionalni varnosti se preoblikujejo zelo hitro. Prebivalci države pričakujejo, da se bo nacionalnovarnostni sistem učinkovito in uspešno odzval na te grožnje. Izvedbeno se lahko nacionalnovarnostni sistem države odzove samo tako, da v sistem zagotavljanja nacionalne varnosti vključi vse svoje vire v upanju sinergičnih učinkov. Uporaba oboroženih sil za zagotavljanje notranje varnosti je bila izredna naloga oboroženih sil. Obramba oziroma obrambna sposobnost vojske, ki se izvaja v notranjosti države za notranjo stabilnost in varnost države ob zakonskih in primarno konceptualno določenih nalogah vojske in policije, predstavlja zakonodajni in operacionalizacijski izziv države. Ključne besede Slovenska vojska, Policija, izredna pooblastila vojske, operacionalizacija. Abstract Nowadays, threats to national security are transforming extremely rapidly. The people of a country expect the national security system to respond effectively and successfully to these threats. Implementation-wise, a country's national security system can only respond by including all its resources in the national security system hoping to achieve synergistic effects. The use of the armed forces to ensure internal security was an extraordinary task of the armed forces. The defence and the defence capacity of the military, which are in addition to the legal and primarily conceptually determined tasks of the military and the police aimed at ensuring internal stability and national security in the interior of the country, represent a legislative and operational challenge of the state. Key words Slovenian Armed Forces, Police, extraordinary powers of the army, operationalization.
APA, Harvard, Vancouver, ISO, and other styles
15

Todorova, Antonia. "Turkish Security Discourses and Policies: The Kurdish Question." Information & Security: An International Journal 33, no. 1,2 (October 2015): 108–21. http://dx.doi.org/10.11610/isij.3305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Brock, Lothar, Anna Geis, Sabine Jaberg, Hanne-Margret Birckenbach, Hans-Georg Ehrhart, Dan Krause, Michael Brzoska, et al. "Mythen der etablierten Sicherheitspolitik." Die Friedens-Warte 92, no. 3-4 (2019): 115. http://dx.doi.org/10.35998/fw-2019-0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Claudia Cifali, Ana, and Rodrigo Ghiringhelli De Azevedo. "Public Security, Criminal Policy and Sentencing in Brazil during the Lula and Dilma Governments, 2003-2014: Changes and Continuities." International Journal for Crime, Justice and Social Democracy 6, no. 1 (March 1, 2017): 146–63. http://dx.doi.org/10.5204/ijcjsd.v6i1.392.

Full text
Abstract:
Since mid-1980s crime rates in Brazil started to increase with the transition from military dictatorship to democracy, a period marked by the rise of poverty and hyperinflation. Given levels of police corruption and protection of criminal gangs, trust in the criminal justice system was low, leading to a heightened dependence on private security, gated communities and the politicisation of law and order politics. An impressive punitive turn began at in the 1990s. This paper analysed penal policies under successive left-wing Lula and Dilma governments from 2003 to 2014. During this period the rise of ‘postneoliberal’ and ‘postneoconservative’ politics, led by the Workers Party, developed governmental strategies and initiatives that formulated and legitimized rich and complex expressions of traditionally left-wing politics. Despite the simultaneous implementation of distributive policies, the increase of human development levels throughout the country, the reduction of social inequalities and the redirection of the official discourse of Federal Government security policies towards crime prevention, incarceration rates continued to increase. This article examines why efforts to build an effective public security policy committed to upholding civil rights and improving the control of police and police activities have failed.
APA, Harvard, Vancouver, ISO, and other styles
18

Gyamfi, Gerald D. "Exploring the Challenges and Possibilities of Pan African International Police Cooperation." International Journal of Public Administration in the Digital Age 6, no. 4 (October 2019): 43–53. http://dx.doi.org/10.4018/ijpada.2019100104.

Full text
Abstract:
In the promotion of global peace and security, police cooperation is considered one of the major pillars. This exploratory qualitative study focuses on the possibilities and challenges that should be overcome in the quest to practicalize the implementation of security policies and other legal instruments relating to police cooperation and collaboration in Africa. Twenty-five top police officers and other security experts in Ghana were selected as participants using snowball approach. The participants were interviewed for their views on international police cooperation focusing on cooperation among the various police forces in Africa. The outcome of the study revealed that the major challenges include financial constraints, language barriers, political interference, and problems associated with information technology systems. Recommendations made to overcome most of the challenges include strengthening the African Union Police (AFRIPOL), intelligence sharing with the aid of advanced information technology, and promoting research on police effectiveness on the African continent.
APA, Harvard, Vancouver, ISO, and other styles
19

Pangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.

Full text
Abstract:
AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care. The general framework and the requirements for medical database security are presented. The three prominent proposals for medical database security are discussed in some detail, together with specific proposals for medical database security. A number of parameters for a secure medical database development are presented and discussed, and guidelines are given for the development of secure medical database systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Basin, David, Vincent Jugé, Felix Klaedtke, and Eugen Zălinescu. "Enforceable Security Policies Revisited." ACM Transactions on Information and System Security 16, no. 1 (June 2013): 1–26. http://dx.doi.org/10.1145/2487222.2487225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Pernul, G., and A. M. Tjoa. "Security Policies for Databases." IFAC Proceedings Volumes 25, no. 30 (October 1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Cuppens, Frédéric, and Nora Cuppens-Boulahia. "Modeling contextual security policies." International Journal of Information Security 7, no. 4 (November 6, 2007): 285–305. http://dx.doi.org/10.1007/s10207-007-0051-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ølnes, Jon. "Development of security policies." Computers & Security 13, no. 8 (January 1994): 628–36. http://dx.doi.org/10.1016/0167-4048(94)90042-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Shebanow, Annie, Richard Perez, and Caroline Howard. "The Effect of Firewall Testing Types on Cloud Security Policies." International Journal of Strategic Information Technology and Applications 3, no. 3 (July 2012): 60–68. http://dx.doi.org/10.4018/jsita.2012070105.

Full text
Abstract:
An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solutions, vulnerabilities may be reduced. The purpose of this paper is to explore how use, misuse, positive and negative, obstacle, and abuse testing cases of firewalls have broadened the security policies that mitigate or prevent threats in a cloud environment.
APA, Harvard, Vancouver, ISO, and other styles
25

Sampson, F., and J. McNeill. "Redefining the Gaps: Connecting Neighbourhood Safety to National Security." Policing 1, no. 4 (November 7, 2007): 460–71. http://dx.doi.org/10.1093/police/pam068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Simmons, A. "Room, Stewart (2009). * BUTTERWORTHS DATA SECURITY: LAW AND PRACTICE." Policing 6, no. 1 (March 21, 2011): 99–100. http://dx.doi.org/10.1093/police/par014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Arko-Achemfuor, Akwasi. "Addressing the challenges of food security and youth unemployment in South Africa through land reform policies." Environmental Economics 7, no. 3 (October 21, 2016): 52–59. http://dx.doi.org/10.21511/ee.07(3).2016.06.

Full text
Abstract:
South Africa’s past policy of apartheid has contributed to some of the socio-economic challenges the country faces today. Some of the challenges include grinding poverty levels, increasing inequality and unemployment among large sections of the population. The constitution of the country makes provision for property and land rights as strategies for addressing some of the past injustices, ensuring food insecurity and sustainable livelihoods. A number of polices have been drafted in this regard, but it is acknowledged that some of the policies that have been adopted by the government have not yielded the desired result leading to the fear that if the situation is not radically addressed may lead to unintended consequences. This paper assesses a number of polices, programs, approaches and strategies regarding land reform policies have that been put into place, most of which have not worked as expected including the fact that the youth have not been factored into most of these programs and policies. This article advocates for the youth to be factored into all land reform and food security policies and programs as a way of capacitating them and getting the youth to see agriculture as a career choice to ensure future food security for the nation, while at the same time addressing youth unemployment and rural poverty. Keywords: land reform, youth, food security, livelihoods, development, policy. JEL Classification: Q15, Q18, O2
APA, Harvard, Vancouver, ISO, and other styles
28

ATVUR, Senem, and Çağla VURAL. "Sürdürülebilir Güvenlik Çerçevesinde Türkiye’nin İklim Politikaları." Bilig, no. 103 (October 27, 2022): 59–93. http://dx.doi.org/10.12995/bilig.10303.

Full text
Abstract:
Climate change is becoming one of the most crucial problems threatening the integrity of the global system. The impacts of climate change have been posing new threats to the states’ interests, human prosperity and environmental sustainability. This article aims to analyze Türkiye’s climate policies within the context of the sustainable security approach, which focuses on the balance between national, human and environmental security. The study argues that Türkiye’s economic priorities prevail over its climate strategies. Moreover, Türkiye becomes more vulnerable and less resilient to the impacts of climate change as long as the country’s carbon emissions continue to rise. Therefore, this article argues that if Türkiye considers the risks of climate change with a sustainable security approach; economic advantages, social prosperity and environmental protection for both present and future generations could be equivalently guaranteed.
APA, Harvard, Vancouver, ISO, and other styles
29

de Rover, Cees. "Police and security forces." International Review of the Red Cross 81, no. 835 (September 1999): 637–47. http://dx.doi.org/10.1017/s1560775500059836.

Full text
Abstract:
Promouvoir l'enseignement du droit international humanitaire auprès des membres des forces armées a toujours été l'une des tâches prioritaires du CICR. Aujourd'hui cependant, les forces de police ou d'autres unités chargées de tâches similaires sont de plus en plus souvent engagées directement dans des opérations de maintien de l'ordre et de la sécurité, notamment dans des situations de troubles intérieurs, voire de conflit interne. Il est devenu important de s'assurer que les membres de ces unités connaissent quelques règies fondamentales en matière de protection de l'individu dans ces circonstances, et que leur comportement respecte la dignité humaine. Le CICR a mis en route un programme pour assister les autorités nationales compétentes dans l'organisation d'un tel enseignement.
APA, Harvard, Vancouver, ISO, and other styles
30

Putra, Aditya Permana. "THE URGENCY OF FORMING A SPECIAL POLICE FORCE IN COURTS AS AN EFFORT TO FULFILL THE RIGHT OF PERSONAL SECURITY FOR JUDGES IN INDONESIA." Jurnal Hukum Peratun 3, no. 2 (March 23, 2021): 127–40. http://dx.doi.org/10.25216/peratun.322020.127-140.

Full text
Abstract:
Special police force is not something new in Indonesia. At least there are four special police force in Indonesia namely Prison Guard, Railway Police, Civil Service Police, and Forestry Special Police. Those police force are separated from, but hand in hand with Indonesian Police Force in securing civil society in Indonesia. In regards with the security of judges in Indonesia, this paper tries to argue that they need special police force to guard and secure them. In this paper, it is concluded that it is required to change the Law regarding Judicial Power especially in the part concerning judge’s safety and security. If it is not probable, then creating a special police force in court is a must.
APA, Harvard, Vancouver, ISO, and other styles
31

Correia, Eduardo, and Ricardo Claro. "A Segurança Comunitária e a Pandemia de COVID-19." Revista Portuguesa de Ciência Política / Portuguese Journal of Political Science 14 (2020): 21–32. http://dx.doi.org/10.33167/2184-2078.rpcp2020.14/pp.21-32.

Full text
Abstract:
This article analyses the community safety paradigm in the light of the current pandemic crisis caused by COVID-19. In full evolution, the analysis presented considers the current security and civil protection needs, in particular the security aspects of community security. Through the development of strategies involving security forces and services, the community and citizens, the authors demonstrate the practical importance of security municipalisation through local administrative police, evolving into an important regionalization of security. Similarly, community policing and proximity strategies are observed in accordance with public security policies that point to greater political awareness in security problematization.
APA, Harvard, Vancouver, ISO, and other styles
32

Băloi, Alexandra-Iulia. "Politica de securitate națională a României 1990-2020." Sociologie Romaneasca 19, no. 1 (May 31, 2021): 168–82. http://dx.doi.org/10.33788/sr.19.1.9.

Full text
Abstract:
Security is a complex, multi-dimensional approach context. In broad terms, it represents the ability to protect its citizens. The sole holder of the legitimate right to use intra-state and inter-state force is obliged through the consequence and expression of its sovereignty to protect and guarantee its citizens’ rights and freedoms and ensure the conditions for the exercise of their rights and freedoms. After the dissolution of the communist political and military bloc, security develops as a global concept that tends to include traditional political and military dimensions, new dimensions, such as economic, energy or security, individual rights, and freedoms. This study addresses Romania’s security policy, its evolution after 1990 and until now. The paper aims to highlight Romania’s position as a territory and its role in the regional context regarding security. Its statute as a NATO and E.U. member, and strategic partner of the United States, determined a permanent update of its security policy and proposed objectives, correlated with those of the entities to which it belongs. From the point of view of security policy, Romania has an important geostrategic role and can stand out as a regional leader due to the threats it could be subjected to. The study will highlight that its security policy provides many benefits for the country’s citizens and its institutions.
APA, Harvard, Vancouver, ISO, and other styles
33

Deibert, Ronald J., and Rafal Rohozinski. "Risking Security: Policies and Paradoxes of Cyberspace Security." International Political Sociology 4, no. 1 (March 2010): 15–32. http://dx.doi.org/10.1111/j.1749-5687.2009.00088.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Quintella, José Pedro Guedes, and José Luis Felicio Carvalho. "Segurança Pública, Violência Urbana e Expansão do Setor de Segurança Privada no Município do Rio de Janeiro." Revista Produção e Desenvolvimento 3, no. 2 (August 1, 2017): 1–20. http://dx.doi.org/10.32358/rpd.2017.v3.223.

Full text
Abstract:
The research was guided by the purpose of identifying how, in the city of Rio de Janeiro, the lack of public security policies affect the private security sector. The referential theoretical framework embraced the themes of social and economic contextualization of private security, the institutionalization of private security and the problem of public security in the city of Rio de Janeiro. The empirical stage of the study included semi-structured interviews with key informants, three of whom were directors of different medium-sized companies in the private security sector located in the municipality, a high-ranking officer of the Military Police of Rio de Janeiro, and the president of a private organization which provides training services to civilians, military and police forces. The results confirms contradictory aspects of integration and imbalance between the private security sector and the public power, as well as raises unique issues, such as the causal relation between the media role in violence and the growth of the sector, and the antinomy between the amplification of the ostensible presence of the police force on the streets and the increase of the sense of insecurity that causes the growth of the demand for private security.
APA, Harvard, Vancouver, ISO, and other styles
35

Chang, Il-sik. "Security Policy of POLICE according to Increase of Elder Crimes." J-Institute 2, no. 2 (December 30, 2017): 1–6. http://dx.doi.org/10.22471/police.2017.2.2.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Prenzler, T. "Strike Force Piccadilly and ATM Security: A Follow-up Study." Policing 5, no. 3 (May 27, 2011): 236–47. http://dx.doi.org/10.1093/police/par029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ali, Aitizaz, Hasliza A. Rahim, Jehad Ali, Muhammad Fermi Pasha, Mehedi Masud, Ateeq Ur Rehman, Can Chen, and Mohammed Baz. "A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority." Applied Sciences 11, no. 21 (October 26, 2021): 9999. http://dx.doi.org/10.3390/app11219999.

Full text
Abstract:
Blockchain is a promising technology in the context of digital healthcare systems, but there are issues related to the control of accessing the electronic health records. In this paper, we propose a novel framework based on blockchain and multiple certificate authority that implement smart contracts and access health records securely. Our proposed solution provides the facilities of flexible policies to update a record or invoke the policy such that a patient has complete authority. A novel approach towards multiple certificate’s authority (CA) is introduced in the design through our proposed framework. Our proposed policies and methods overcome the shortcoming and security breaches faced by single certificate authority. Our proposed scheme provides a flexible access control mechanism for securing electronic health records as compared to the existing benchmark models. Moreover, our proposed method provides a re-enrolment facility in the case of a user lost enrolment.
APA, Harvard, Vancouver, ISO, and other styles
38

Wicaksana, Dimas Putra, Agung Anak Sagung Laksmi Dewi, and Luh Putu Suryani. "TanggungJawab Polri dalam Pengamanan Calon Kepala dan Wakil Kepala Daerah di Kota Denpasar." Jurnal Konstruksi Hukum 2, no. 3 (July 1, 2021): 558–62. http://dx.doi.org/10.22225/jkh.2.3.3641.558-562.

Full text
Abstract:
The responsibility of the National Police in securing the candidates who will be elected as regional heads and also their deputy is a responsible action during the regional head elections, therefore the police apparatus is very important in maintaining security and order during the election. This study examines the form of security for candidates for regional heads and deputy regional heads in Denpasar City and explains the responsibility of the National Police for the security of candidates for regional heads and deputy regional heads in Denpasar City. The research method used is an empirical legal research method, with a statutory approach. The data used are primary and secondary data obtained by interview, observation and documentation techniques. The results of the study indicate that the security procedures for candidates who will be elected as regional heads and also their representatives in Denpasar City are referred to the rules implemented by the Denpasar Police and based on Article 5 paragraph (2) of Law No. 2 of 2002 concerning the Police. While the responsibility of the National Police for the security of candidates who will be elected as regional heads and also their representatives in Denpasar City is as the bearer of obligations, especially under the command of the Chief of Police, one of the main tasks of carrying out these obligations is the role of the Police as an intelligence unit in overcoming potential security disturbances.
APA, Harvard, Vancouver, ISO, and other styles
39

Park, Suhyeon, Younhoon Cho, and Suhong Jeong. "Changes in Private Security with Changes in the PUBLIC SAFETY Environment." J-Institute 1, no. 2 (December 30, 2016): 26–30. http://dx.doi.org/10.22471/police.2016.1.2.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hunton, P. "Cyber Crime and Security: A New Model of Law Enforcement Investigation." Policing 4, no. 4 (August 2, 2010): 385–95. http://dx.doi.org/10.1093/police/paq038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Song, Yang, Xingyang Zhang, and Xiaolei Zhao. "Research on the application of UAVs in the security of major events." BCP Social Sciences & Humanities 19 (August 30, 2022): 247–53. http://dx.doi.org/10.54691/bcpssh.v19i.1611.

Full text
Abstract:
UAVs have developed rapidly in the police due to their mobility, concealment, wide field of vision, shocking, and other attributes, especially in emergency response, aerial investigation, security guards, social security management, and emergency rescue And other aspects have played advantage and improved work efficiency. As the application of police drones in various police department departments becomes more and more extensive, some problems are increasingly exposed and highlighted in actual combat applications. It is urgent to standardize and improve the application of police drones to improve the Three-dimensional combat capability effectively. The article analyzes this. The construction of an efficient UAV application system for the security of significant events is the functional requirement of the police in the new era. It is an essential means to improve social security's comprehensive prevention and control capabilities and realize the integration of air and ground for significant events. This paper mainly discusses building a UAV public security prevention and control system from the aspects of construction background, requirements, key protection locations, and critical technologies.
APA, Harvard, Vancouver, ISO, and other styles
42

Pinochet, Luis Hernan Contreras. "Uma visão organizacional na formulação de políticas de segurança de informações em instituições hospitalares." O Mundo da Saúde 2011, no. 3 (September 30, 2011): 278–89. http://dx.doi.org/10.15343/0104-7809.20113278289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Silva, Caíque Azael Ferreira da, and Pedro Paulo Gastalho de Bicalho. "Psicologia e direitos humanos: por que discutir necroliberalismo nas políticas de segurança?" Revista Direito e Práxis 13, no. 3 (July 2022): 2009–23. http://dx.doi.org/10.1590/2179-8966/2022/69298.

Full text
Abstract:
Resumo A reflexão em torno das políticas de segurança no Rio de Janeiro revela a consolidação de um fenômeno que vem sendo chamado de necroliberalismo, caracterizado pela conjunção de práticas neoliberais e necropolíticas. No presente manuscrito, é feito um interrogatório à Psicologia, a partir de seus fundamentos éticos, para a elucidação do seu papel diante da racionalidade necroliberal que avança nas políticas públicas. As reflexões partem de uma ideia de que as práticas orientadas pelo necroliberalismo vão de encontro com as possibilidades de se garantir o acesso aos direitos fundamentais para parte da população, notadamente os mais pobres, negros e moradores de favelas e periferias. Conclui-se que tais políticas promovem subjetividades ora encarceradas, ora exterminadas, produzindo efeitos importantes para a análise dos processos psicossociais em curso no Brasil.
APA, Harvard, Vancouver, ISO, and other styles
44

Oliinyk, Olena S., Roman M. Shestopalov, Volodymyr O. Zarosylo, Mykhaylo I. Stankovic, and Sergii G. Golubitsky. "Economic security through criminal policies." Revista Científica General José María Córdova 20, no. 38 (April 1, 2022): 265–85. http://dx.doi.org/10.21830/19006586.899.

Full text
Abstract:
The article aims to identify the factors that have the greatest impact on economic security. Based on the study of legislative acts of the countries of the European Union, the United States, and relevant scientific literature, an analysis is made of the current situation in the field of economic security, exploring its constituent elements and factors influencing the security of the economy. Among them are ecology, the fight against crime, the financial and taxation spheres, innovative development, and the element itself as a component of the considered social relations, and processes, among others. The article outlines the key areas of public relations and other factors that influence the situation’s state concerning the issue addressed.
APA, Harvard, Vancouver, ISO, and other styles
45

Bauer, Lujo, Jay Ligatti, and David Walker. "Composing security policies with polymer." ACM SIGPLAN Notices 40, no. 6 (June 12, 2005): 305–14. http://dx.doi.org/10.1145/1064978.1065047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Berdennikov, Mikhail V. "Russia and her security policies." RUSI Journal 137, no. 6 (December 1992): 5–9. http://dx.doi.org/10.1080/03071849208445651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Vignesh, U., and S. Asha. "Modifying Security Policies Towards BYOD." Procedia Computer Science 50 (2015): 511–16. http://dx.doi.org/10.1016/j.procs.2015.04.023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bohi, Douglas R., and Michael A. Toman. "Energy security: externalities and policies." Energy Policy 21, no. 11 (November 1993): 1093–109. http://dx.doi.org/10.1016/0301-4215(93)90260-m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Zajac, Bernard P. "Information security policies made easy." Computers & Security 13, no. 3 (May 1994): 218–19. http://dx.doi.org/10.1016/0167-4048(94)90074-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bauer, Lujo, Jay Ligatti, and David Walker. "Composing expressive runtime security policies." ACM Transactions on Software Engineering and Methodology 18, no. 3 (May 2009): 1–43. http://dx.doi.org/10.1145/1525880.1525882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography