Journal articles on the topic 'Security policie'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security policie.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Supriyanto, Eko Eddya, Meida Rachmawati, and Fibry Jati Nugroho. "Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0." Jurnal Bina Praja 13, no. 2 (August 31, 2021): 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.
Full textAntonius, Rachad, Micheline Labelle, and François Rocher. "Canadian Immigration Policies: Securing a Security Paradigm?" International Journal of Canadian Studies, no. 36 (2007): 191. http://dx.doi.org/10.7202/040782ar.
Full textAchmad, Farid Yusuf Nur. "Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau." Kybernan: Jurnal Studi Kepemerintahan 1, no. 1 (March 1, 2016): 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.
Full textPoincignon, Yann. "Defense Academy Excellence European Union Civilian Policing: Foreign Policy Action or Internal Security Tool." Connections: The Quarterly Journal 02, no. 2 (2003): 111–30. http://dx.doi.org/10.11610/connections.02.2.12.
Full textHelmy, Army Fuad. "PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN." Badamai Law Journal 1, no. 2 (September 1, 2016): 221. http://dx.doi.org/10.32801/damai.v1i2.1820.
Full textElbably, Amar. "سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة." Security Policy Paper 2, no. 2 (December 31, 2021): 1–20. http://dx.doi.org/10.26735/hjoo8882.
Full textSchneider, Fred B. "Enforceable security policies." ACM Transactions on Information and System Security 3, no. 1 (February 2000): 30–50. http://dx.doi.org/10.1145/353323.353382.
Full textPotter, Bruce. "Wireless security policies." Network Security 2003, no. 10 (October 2003): 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.
Full textMatvejevs, Aleksandrs. "Problems of Police Activity in Ensuring Public Order and Public Safety." SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no. 21 (2021): 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.
Full textMcIlwraith, Angus. "Security policies — A security officer's perspective." Computer Audit Update 1993, no. 8 (August 1993): 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.
Full textSuhaibah, Suhaibah, Armiwal Armiwal, and Mukallaf Mukallaf. "The Role of the Polri Intelligence in Securing the General Election and Institution of the Pidie District DPRK." Budapest International Research and Critics Institute (BIRCI-Journal): Humanities and Social Sciences 4, no. 1 (January 22, 2021): 626–31. http://dx.doi.org/10.33258/birci.v4i1.1645.
Full textMurtaza, Mirza B. "Risk Management For Health Information Security And Privacy." American Journal of Health Sciences (AJHS) 3, no. 2 (April 2, 2012): 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.
Full textSheptycki, J. "High Policing in the Security Control Society." Policing 1, no. 1 (January 1, 2007): 70–79. http://dx.doi.org/10.1093/police/pam005.
Full textPOTOČNIK, GREGOR. "SODELOVANJE SLOVENSKE VOJSKE IN POLICIJE PRI NALOGAH NOTRANJE STABILNOSTI IN VARNOSTI REPUBLIKE SLOVENIJE." KONCEPT KREPITVE ODPORNOSTI DRUŽBE/THE CONCEPT OF STRENGHTENING THE RESILIENCE OF SOCIETY, VOLUME 22/ISSUE 4 (October 23, 2020): 67–83. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.4.4.
Full textTodorova, Antonia. "Turkish Security Discourses and Policies: The Kurdish Question." Information & Security: An International Journal 33, no. 1,2 (October 2015): 108–21. http://dx.doi.org/10.11610/isij.3305.
Full textBrock, Lothar, Anna Geis, Sabine Jaberg, Hanne-Margret Birckenbach, Hans-Georg Ehrhart, Dan Krause, Michael Brzoska, et al. "Mythen der etablierten Sicherheitspolitik." Die Friedens-Warte 92, no. 3-4 (2019): 115. http://dx.doi.org/10.35998/fw-2019-0006.
Full textClaudia Cifali, Ana, and Rodrigo Ghiringhelli De Azevedo. "Public Security, Criminal Policy and Sentencing in Brazil during the Lula and Dilma Governments, 2003-2014: Changes and Continuities." International Journal for Crime, Justice and Social Democracy 6, no. 1 (March 1, 2017): 146–63. http://dx.doi.org/10.5204/ijcjsd.v6i1.392.
Full textGyamfi, Gerald D. "Exploring the Challenges and Possibilities of Pan African International Police Cooperation." International Journal of Public Administration in the Digital Age 6, no. 4 (October 2019): 43–53. http://dx.doi.org/10.4018/ijpada.2019100104.
Full textPangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.
Full textBasin, David, Vincent Jugé, Felix Klaedtke, and Eugen Zălinescu. "Enforceable Security Policies Revisited." ACM Transactions on Information and System Security 16, no. 1 (June 2013): 1–26. http://dx.doi.org/10.1145/2487222.2487225.
Full textPernul, G., and A. M. Tjoa. "Security Policies for Databases." IFAC Proceedings Volumes 25, no. 30 (October 1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.
Full textCuppens, Frédéric, and Nora Cuppens-Boulahia. "Modeling contextual security policies." International Journal of Information Security 7, no. 4 (November 6, 2007): 285–305. http://dx.doi.org/10.1007/s10207-007-0051-9.
Full textØlnes, Jon. "Development of security policies." Computers & Security 13, no. 8 (January 1994): 628–36. http://dx.doi.org/10.1016/0167-4048(94)90042-6.
Full textShebanow, Annie, Richard Perez, and Caroline Howard. "The Effect of Firewall Testing Types on Cloud Security Policies." International Journal of Strategic Information Technology and Applications 3, no. 3 (July 2012): 60–68. http://dx.doi.org/10.4018/jsita.2012070105.
Full textSampson, F., and J. McNeill. "Redefining the Gaps: Connecting Neighbourhood Safety to National Security." Policing 1, no. 4 (November 7, 2007): 460–71. http://dx.doi.org/10.1093/police/pam068.
Full textSimmons, A. "Room, Stewart (2009). * BUTTERWORTHS DATA SECURITY: LAW AND PRACTICE." Policing 6, no. 1 (March 21, 2011): 99–100. http://dx.doi.org/10.1093/police/par014.
Full textArko-Achemfuor, Akwasi. "Addressing the challenges of food security and youth unemployment in South Africa through land reform policies." Environmental Economics 7, no. 3 (October 21, 2016): 52–59. http://dx.doi.org/10.21511/ee.07(3).2016.06.
Full textATVUR, Senem, and Çağla VURAL. "Sürdürülebilir Güvenlik Çerçevesinde Türkiye’nin İklim Politikaları." Bilig, no. 103 (October 27, 2022): 59–93. http://dx.doi.org/10.12995/bilig.10303.
Full textde Rover, Cees. "Police and security forces." International Review of the Red Cross 81, no. 835 (September 1999): 637–47. http://dx.doi.org/10.1017/s1560775500059836.
Full textPutra, Aditya Permana. "THE URGENCY OF FORMING A SPECIAL POLICE FORCE IN COURTS AS AN EFFORT TO FULFILL THE RIGHT OF PERSONAL SECURITY FOR JUDGES IN INDONESIA." Jurnal Hukum Peratun 3, no. 2 (March 23, 2021): 127–40. http://dx.doi.org/10.25216/peratun.322020.127-140.
Full textCorreia, Eduardo, and Ricardo Claro. "A Segurança Comunitária e a Pandemia de COVID-19." Revista Portuguesa de Ciência Política / Portuguese Journal of Political Science 14 (2020): 21–32. http://dx.doi.org/10.33167/2184-2078.rpcp2020.14/pp.21-32.
Full textBăloi, Alexandra-Iulia. "Politica de securitate națională a României 1990-2020." Sociologie Romaneasca 19, no. 1 (May 31, 2021): 168–82. http://dx.doi.org/10.33788/sr.19.1.9.
Full textDeibert, Ronald J., and Rafal Rohozinski. "Risking Security: Policies and Paradoxes of Cyberspace Security." International Political Sociology 4, no. 1 (March 2010): 15–32. http://dx.doi.org/10.1111/j.1749-5687.2009.00088.x.
Full textQuintella, José Pedro Guedes, and José Luis Felicio Carvalho. "Segurança Pública, Violência Urbana e Expansão do Setor de Segurança Privada no Município do Rio de Janeiro." Revista Produção e Desenvolvimento 3, no. 2 (August 1, 2017): 1–20. http://dx.doi.org/10.32358/rpd.2017.v3.223.
Full textChang, Il-sik. "Security Policy of POLICE according to Increase of Elder Crimes." J-Institute 2, no. 2 (December 30, 2017): 1–6. http://dx.doi.org/10.22471/police.2017.2.2.01.
Full textPrenzler, T. "Strike Force Piccadilly and ATM Security: A Follow-up Study." Policing 5, no. 3 (May 27, 2011): 236–47. http://dx.doi.org/10.1093/police/par029.
Full textAli, Aitizaz, Hasliza A. Rahim, Jehad Ali, Muhammad Fermi Pasha, Mehedi Masud, Ateeq Ur Rehman, Can Chen, and Mohammed Baz. "A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority." Applied Sciences 11, no. 21 (October 26, 2021): 9999. http://dx.doi.org/10.3390/app11219999.
Full textWicaksana, Dimas Putra, Agung Anak Sagung Laksmi Dewi, and Luh Putu Suryani. "TanggungJawab Polri dalam Pengamanan Calon Kepala dan Wakil Kepala Daerah di Kota Denpasar." Jurnal Konstruksi Hukum 2, no. 3 (July 1, 2021): 558–62. http://dx.doi.org/10.22225/jkh.2.3.3641.558-562.
Full textPark, Suhyeon, Younhoon Cho, and Suhong Jeong. "Changes in Private Security with Changes in the PUBLIC SAFETY Environment." J-Institute 1, no. 2 (December 30, 2016): 26–30. http://dx.doi.org/10.22471/police.2016.1.2.26.
Full textHunton, P. "Cyber Crime and Security: A New Model of Law Enforcement Investigation." Policing 4, no. 4 (August 2, 2010): 385–95. http://dx.doi.org/10.1093/police/paq038.
Full textSong, Yang, Xingyang Zhang, and Xiaolei Zhao. "Research on the application of UAVs in the security of major events." BCP Social Sciences & Humanities 19 (August 30, 2022): 247–53. http://dx.doi.org/10.54691/bcpssh.v19i.1611.
Full textPinochet, Luis Hernan Contreras. "Uma visão organizacional na formulação de políticas de segurança de informações em instituições hospitalares." O Mundo da Saúde 2011, no. 3 (September 30, 2011): 278–89. http://dx.doi.org/10.15343/0104-7809.20113278289.
Full textSilva, Caíque Azael Ferreira da, and Pedro Paulo Gastalho de Bicalho. "Psicologia e direitos humanos: por que discutir necroliberalismo nas políticas de segurança?" Revista Direito e Práxis 13, no. 3 (July 2022): 2009–23. http://dx.doi.org/10.1590/2179-8966/2022/69298.
Full textOliinyk, Olena S., Roman M. Shestopalov, Volodymyr O. Zarosylo, Mykhaylo I. Stankovic, and Sergii G. Golubitsky. "Economic security through criminal policies." Revista Científica General José María Córdova 20, no. 38 (April 1, 2022): 265–85. http://dx.doi.org/10.21830/19006586.899.
Full textBauer, Lujo, Jay Ligatti, and David Walker. "Composing security policies with polymer." ACM SIGPLAN Notices 40, no. 6 (June 12, 2005): 305–14. http://dx.doi.org/10.1145/1064978.1065047.
Full textBerdennikov, Mikhail V. "Russia and her security policies." RUSI Journal 137, no. 6 (December 1992): 5–9. http://dx.doi.org/10.1080/03071849208445651.
Full textVignesh, U., and S. Asha. "Modifying Security Policies Towards BYOD." Procedia Computer Science 50 (2015): 511–16. http://dx.doi.org/10.1016/j.procs.2015.04.023.
Full textBohi, Douglas R., and Michael A. Toman. "Energy security: externalities and policies." Energy Policy 21, no. 11 (November 1993): 1093–109. http://dx.doi.org/10.1016/0301-4215(93)90260-m.
Full textZajac, Bernard P. "Information security policies made easy." Computers & Security 13, no. 3 (May 1994): 218–19. http://dx.doi.org/10.1016/0167-4048(94)90074-4.
Full textBauer, Lujo, Jay Ligatti, and David Walker. "Composing expressive runtime security policies." ACM Transactions on Software Engineering and Methodology 18, no. 3 (May 2009): 1–43. http://dx.doi.org/10.1145/1525880.1525882.
Full text