Littérature scientifique sur le sujet « Security policie »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Security policie ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Security policie"

1

Supriyanto, Eko Eddya, Meida Rachmawati et Fibry Jati Nugroho. « Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0 ». Jurnal Bina Praja 13, no 2 (31 août 2021) : 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.

Texte intégral
Résumé :
Police transformation policy to carry out community security functions is very adaptive in addressing the changing times. The research aims to map the transformation and strengthening of police infrastructure in response to the era of digitalization. The research uses a qualitative type of research with a literature study approach and policy analysis programmed by the Police. The results showed that the transformation policy consisting of organizational transformation, operation transformation, public service transformation, and supervise transformation is needed by the Police, especially in the current digital transition. Moreover, it can be carried out correctly if the Police have internally and externally owned by POLRI. The research concludes that transformative efforts and strengthening of police infrastructure strongly support the duties and functions of the National Police in securing the community.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Antonius, Rachad, Micheline Labelle et François Rocher. « Canadian Immigration Policies : Securing a Security Paradigm ? » International Journal of Canadian Studies, no 36 (2007) : 191. http://dx.doi.org/10.7202/040782ar.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Achmad, Farid Yusuf Nur. « Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau ». Kybernan : Jurnal Studi Kepemerintahan 1, no 1 (1 mars 2016) : 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.

Texte intégral
Résumé :
This studywas conducted todetermine and analyze the implementation of the licensing policies and notices of community activities in Baubau City Police and communication factors, resources, disposition, and structure influence the implementation of the licensing policies and notices of community activities in Police Baubau. The results showed that the licensing policies and notices activities of people implemented by (a) Providea receipt notice (b) To coordinate with the responsible delivery of opinions in the Public (c) To coordinate with the leadership, the agency/institutionwhich is the goal of delivering the opinion (d) Prepare securing alocation and route that passed.(e) responsible for protecting the participants in the delivery of public opinion (f) responsible for organizing security and factors factors that influence the implementation of the licensing policies and noticesof community activities are: (1) Communication; (2) Resources (3) Disposition; and (4) Organizational Structure.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Poincignon, Yann. « Defense Academy Excellence European Union Civilian Policing : Foreign Policy Action or Internal Security Tool ». Connections : The Quarterly Journal 02, no 2 (2003) : 111–30. http://dx.doi.org/10.11610/connections.02.2.12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Helmy, Army Fuad. « PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN ». Badamai Law Journal 1, no 2 (1 septembre 2016) : 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Texte intégral
Résumé :
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 63 of 2004 on the Securing of National Vital Security Object there is described that pattern Sispamobvitnas, they are: (1) The main executor of the system Securing of National Vital Objek is obvitnas management authority, in this case the Police through Dirpamobvit; (2) Police are obliged to provide security assistance obvitnas; (3) priority preemptive and preventive activities; (4) in an integrated and simultaneous shared obvitnas managers implement security systems obvitnas; and (5) and against obvitnas is an organic part of or including the military, the security environment remain to be implemented, although the security environment outside Obvitnas or process interruption handling defense and security. 2. The obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan, they are: (1) Lack of quality personnel guard PT. Pertamina (Persero) BBM Terminal Banjarmasin due to lack of professional recruitment system; (2) Insufficient number of security officers compared to the vulnerability of the region; (3) Infrastructure security Obvit Of Polda Kalimantan Selatan are limited;(4) The lack of security coordination between Ditpamobvit Polda Kalimantan Selatan with regional security managers of the company, and the company's internal security guard at the Police Post.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Elbably, Amar. « سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة ». Security Policy Paper 2, no 2 (31 décembre 2021) : 1–20. http://dx.doi.org/10.26735/hjoo8882.

Texte intégral
Résumé :
يُسهِم‭ ‬التعاوُن‭ ‬الأمني‭ ‬الرقمي‭ ‬بين‭ ‬الدول‭ ‬إسهامًا‭ ‬كبيرًا‭ ‬في‭ ‬انحسار‭ ‬الجرائم‭ ‬المُنظَّمة‭ ‬والقضاء‭ ‬عليها،‭ ‬وبخاصَّةٍ‭ ‬الجرائم‭ ‬الإرهابيَّة،‭ ‬وهو‭ ‬ما‭ ‬يتطلَّب‭ ‬ضرورة‭ ‬تفاعُل‭ ‬الدول‭ ‬فيما‭ ‬بينها،‭ ‬وزيادة‭ ‬الجهود‭ ‬في‭ ‬سبيل‭ ‬تشجيع‭ ‬هذا‭ ‬التعاوُن‭ ‬وتفعيله،‭ ‬بإيجاد‭ ‬وسائل‭ ‬تعاونيَّة‭ ‬في‭ ‬المسائل‭ ‬الأمنيَّة‭ ‬الكفيلة‭ ‬بالوقاية‭ ‬من‭ ‬الجريمة‭ ‬وتَتَبُّع‭ ‬مرتكبيها‭ ‬حالَ‭ ‬وقوعها‭ ‬باستخدام‭ ‬شبكات‭ ‬مُؤَمَّنَة‭ ‬تسمح‭ ‬بنقل‭ ‬البيانات‭ ‬والمعلومات‭ ‬والتطبيقات‭ ‬بين‭ ‬الأجهزة‭ ‬المعنيَّة‭ ‬بأجهزة‭ ‬الشرطة‭ ‬العربيَّة،‭ ‬واستخدام‭ ‬التقنيات‭ ‬المُؤَمَّنَة‭ ‬والسريعة‭ ‬التي‭ ‬تسمح‭ ‬بالتبادُل‭ ‬الرقمي‭ ‬للأجهزة‭ ‬الشرطيَّة،‭ ‬ما‭ ‬يحقِّق‭ ‬منع‭ ‬وقوع‭ ‬الجرائم‭ ‬والكشف‭ ‬عنها،‭ ‬وملاحقة‭ ‬المخطَّطات‭ ‬الإجراميَّة‭ ‬والإرهابيَّة‭ ‬بجميع‭ ‬أشكالها‭ ‬واستباق‭ ‬المعلومات‭ ‬بما‭ ‬يحافظ‭ ‬على‭ ‬الأمن‭ ‬الوطني‭ ‬للدول‭ ‬العربيَّة‭.‬
Styles APA, Harvard, Vancouver, ISO, etc.
7

Schneider, Fred B. « Enforceable security policies ». ACM Transactions on Information and System Security 3, no 1 (février 2000) : 30–50. http://dx.doi.org/10.1145/353323.353382.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Potter, Bruce. « Wireless security policies ». Network Security 2003, no 10 (octobre 2003) : 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Matvejevs, Aleksandrs. « Problems of Police Activity in Ensuring Public Order and Public Safety ». SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no 21 (2021) : 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.

Texte intégral
Résumé :
The article addresses the issues concerning public order and public security. These two are the objects of the state administration that form separate legal institutes. The duties of the police include securing the rule of law, maintaining public order and security, preventing, detecting and investigating crimes. The police ensure safety of people and environment and prevent all violations of the law and disturbances by eliminating and investigating all such incidents. The tasks of the police are defined in the Police Act. The police cooperate with other authorities and local residents and communities in maintaining security. Keywords: public order, public security, public place, police activity.
Styles APA, Harvard, Vancouver, ISO, etc.
10

McIlwraith, Angus. « Security policies — A security officer's perspective ». Computer Audit Update 1993, no 8 (août 1993) : 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Security policie"

1

MUTTI, Simone. « Policy and Security Conguration Management in Distributed Systems ». Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.

Texte intégral
Résumé :
The evolution of information system sees a continuously increasing need of flexible and sophisticated approaches for the management of security requirements. On one hand, systems are increasingly more integrated (e.g., Bring Your Own Device) and present interfaces for the invocation of services accessible through network connections. On the other hand, system administrators have the responsibility to guarantee that this integration and the consequent exposure of internal resources does not introduce vulnerabilities. The need to prove that the system correctly manages the security requirements is not only motivated by the increased exposure, but also by the need to show compliance with respect to the many regulations promulgated by governments and commercial bodies. In modern information systems a particular area of security requirement is access control management, with security policies that describe how resources and services should be protected. These policies offer a classification of the actions on the system that distinguishes them into authorized and forbidden, depending on a variety of parameters. Given the critical role of security and their large size and complexity, concerns arise about the correctness of the policy. It is not possible anymore to rely on the security designer to have a guarantee that the policy correctly represents how the system should protect the access to resources. The research documented in this thesis investigates new approaches for the development of a collection of both methodologies and tools, which are flexible enough to help the system administrators, or generally users, in the correct management of security requirements. Due to the complexity of this topic, the research was focused on (i) enterprise and (ii) mobile scenario.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Schlittler, Maria Carolina de Camargo. « "Matar muito, prender mal” : a produção da desigualdade racial como efeito do policiamento ostensivo militarizado em SP ». Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8914.

Texte intégral
Résumé :
Submitted by Aelson Maciera (aelsoncm@terra.com.br) on 2017-08-01T17:24:55Z No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:08:53Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-08-01T19:09:03Z (GMT) No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5)
Made available in DSpace on 2017-08-01T19:15:57Z (GMT). No. of bitstreams: 1 TeseMCS.pdf: 2997068 bytes, checksum: 7f84184a2f58192e394eaee3ae05cdec (MD5) Previous issue date: 2016-09-06
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Cette thèse analyse la relation entre les pratiques policières quotidiennes et la conformation avec la police militaire de l'Etat de São Paulo, responsable pour mantenir l’ordre. Issu d’entretiens et d’analyses de données officielles, le présent travail cherche à comprendre comment les policiers, lors de leurs opérations, sélectionnent les personnes qui subiront les actions de la police et, par conséquent, celles du système de justice criminelle. Partant de là, il a été possible de comprendre, de manière plus particulier, quels sont les publics et les crimes les plus surveillés par les policiers militarisés et, d'une manière globale, les caractéristiques du modèle de police ostensible de São Paulo. L'objectif des opérations policières ostensibles est de prendre en flagrant délit des suspects criminels, ce qui confère à la Police Militaire la responsabilité de sélectionner et « d’expulser » des rues tous ceux que les policiers identifient comme des criminels. Cela autorise la Police Militaire à avoir recours notamment à trois actions : a) l’arrestation ou b) l’élimination des personnes identifiées comme des criminelles et c) le « bon sens » du policier en tant qu’outil pour distinguer les criminels et les « bons citoyens ». Une des conclusions de cette recherche repose sur le constat d’un ample usage du « bon sens » policier lors des opérations de vigilance ostensible, ainsi que de son aspect racial. De ce fait, le « bon sens » policier, au même titre que la létalité et les arrestations, est devenu le responsable de l’accumulation de désavantages pour la population jeune et noire, en ce qui concerne le droit à la vie en sécurité ; en effet on observe que ce groupe risque beaucoup plus d’aller en prison que le reste de la population. De plus, nous avons constaté que pendant les vingt dernières années la politique sécuritaire menée dans São Paulo s’est focalisé sur le type de vigilance ostensible décrit ci-dessus, et ce en dépit de l’échec de l’opération pour ce qui concerne la diminution du nombre de crimes contre les biens à São Paulo.
This thesis analyzes the relation between daily police practices and the conformation with ostensible policing run by the Military Police of São Paulo State. This work started from interviews and analysis of official data to understand how the Military Police, during the ostensible policing, selects the people who will suffer the police approach and therefore the prosecution of the criminal justice system. Thenceforth it was possible to understand specifically which public and which crimes were most closely watched by the military police and, in an embracing way, the characteristics of the São Paulo ostensible policing model. The purpose of ostensible policing is to catch criminal suspects, implying to the Military Police the responsibility to select and remove from the streets those who the police itself identifies as “bandits”. It is also observed that this framework does not configure a public security policy, but a crime and violence management, marked by the "war" against certain types of crimes that are available to the Military Police, especially with three features: a) imprisonment; b) elimination of those identified as “bandits”, and c) the “police scent” as a differentiation tool to identify "bandits" and "good citizens". One of the study highlights is that the wide use of the “police scent” by the military police which has racial aspects in its composition added to the lethality and imprisonment, became responsible for the accumulation of disadvantages for the young black population, referring to the right to secure life and a higher risk of being arrested for property offenses in relation to the rest of the population. In all, it became clear that in the last twenty years there is an insistence from the state public security in an ostensible policing with such characteristics, even in the face of failure in the decrease of numbers of property offenses in the state of São Paulo.
A tese analisa a articulação entre práticas policiais cotidianas e a conformação do policiamento ostensivo militarizado protagonizado pela Polícia Militar. O presente trabalho partiu de entrevistas e análise de dados oficiais da segurança pública paulista para compreender como os policiais, durante o policiamento ostensivo, selecionam as pessoas que sofrerão as investidas da polícia e, por conseguinte, do sistema de justiça criminal. A partir daí foi possível entender, de forma específica, quais são os públicos e os crimes mais vigiados pelos policiais militares e, de forma abrangente, as características do modelo de policiamento ostensivo paulista. Constatou-se que o objetivo do policiamento ostensivo é flagrar suspeitos criminais, o que incute à PM a responsabilidade de selecionar e “retirar” das ruas aqueles que os policiais identificam como “bandidos”. Para tal estão disponíveis à PM, sobretudo, três recursos: a) o aprisionamento ou b) a eliminação daqueles identificados como bandidos e c) o tirocínio policial enquanto ferramenta para diferenciar “bandidos” e “cidadãos de bem”. Uma das conclusões da pesquisa é a constatação da ampla utilização do tirocínio pelos policiais que atuam no policiamento ostensivo e de seu aspecto racializado; isto significa que, para a fundamentação da suspeita policial, são utilizados marcadores raciais. Desta forma, o tirocínio, ao lado da letalidade policial e do aprisionamento se tornaram responsáveis pelo acúmulo de desvantagens para a população jovem e negra, no que tange ao direito à vida segura e a um maior risco de serem presos por crimes patrimoniais em relação ao restante da população. No mais, constatou-se que nos últimos vinte anos há uma insistência por parte da segurança pública paulista num policiamento ostensivo com tais características, mesmo diante do insucesso na diminuição no número de crimes patrimoniais no estado de São Paulo.
Styles APA, Harvard, Vancouver, ISO, etc.
3

SQUILLACE, LAURA. « Praia para quem ? Segurança e usos do espaço público na Operação Verão no Rio de Janeiro ». Doctoral thesis, Università degli Studi di Milano-Bicocca, 2020. http://hdl.handle.net/10281/298997.

Texte intégral
Résumé :
As praias do Rio de Janeiro são consideradas um dos espaços de lazer mais democráticos da cidade, pelo acesso gratuito e por serem frequentadas por um público heterogêneo, proveniente de diversos bairros e pertencente a diferentes camadas sociais. Contudo, a Operação Verão, uma política de segurança executada nas praias pela Polícia Militar do Estado do Rio de Janeiro e pela Guarda Municipal, pode questionar os limites desta democracia. Entre seus objetivos, a Operação Verão visa prevenir os chamados arrastões, uma modalidade coletiva de furtos e roubos, supostamente cometida por grupos de jovens e adolescentes provenientes dos subúrbios. Consequentemente, essa categoria se torna um dos alvos principais da Operação Verão. Esta tese busca compreender os mecanismos de controle social e espacial no âmbito de lazer praiano no Rio de Janeiro, através da Operação Verão e por meio de uma observação etnográfica conduzida a partir do acompanhamento do policiamento da Guarda Municipal e da Polícia Militar na área litoral. Além disso, esta pesquisa se baseia em outras entrevistas realizadas com diversos atores que interagem nesse espaço público: a juventude proveniente das periferias, submetida a uma vigilância contínua; o público praiano, que gera a demanda de segurança na área litoral; além de algumas pessoas que trabalham na faixa de areia. As entrevistas realizadas e o estudo etnográfico do acompanhamento das forças de segurança durante a Operação Verão guiam a leitura do convívio nesse espaço público e mostram as limitações que essa medida proporciona no acesso à praia aos grupos de jovens e adolescentes das periferias considerados uma ameaça à segurança pública. O objetivo da tese é apresentar a Operação Verão através de uma análise qualitativa e demostrar como a demanda de uma praia mais segura pode gerar um mecanismo de discriminação e comprometer o acesso livre à praia para um segmento de população já historicamente criminalizado e excluído no Rio de Janeiro: a juventude suburbana.
The beaches of Rio de Janeiro are considered one of the most democratic areas of leisure in the city, with free access and a heterogeneous public coming from different neighborhoods and belonging to different social classes. Despite this, the Operação Verão (Operation Summer), a security policy executed on the beaches by the Military Police and the Municipal Guard of Rio de Janeiro, may question the limits of this democracy. Among its objectives, the Operação Verão aims to prevent the so-called arrastões, a collective form of theft and robbery, supposedly committed by groups of young people and adolescents from the suburbs. Consequently, this category becomes one of the main targets of the Operação Verão. Through an ethnographic observation of the Operação Verão, carried out by accompanying law enforcement agents in their work, this thesis seeks to understand the mechanisms of social and spatial control in the context of beach leisure in Rio de Janeiro. In addition, this research is based on the result of interviewing other actors who interact in this public space: youth from the suburbs, subjected to a continuous surveillance; the public of the beach, which generates the demand for security in the coastal area and other people who work over there. The interviews conducted and the ethnographic study of the monitoring of the security forces during the Operação Verão guide the reading of the interaction in this public space. All this also shows the limitations that this measure provides in regards of the access to the beach to groups of youths and adolescents from the suburbs, considered a threat to public security. The goal of the thesis is to present the Operação Verão through a qualitative analysis and to demonstrate how the demand for a safer beach could generate a mechanism of discrimination and could compromise free access to the beach for a segment of population already historically criminalized and excluded in Rio de Janeiro: the youth from the suburbs.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Lim, Yow Tzu. « Evolving security policies ». Thesis, University of York, 2010. http://etheses.whiterose.ac.uk/1612/.

Texte intégral
Résumé :
As computer system size and complexity grow, formulating effective policies require more sophistication. There are many risk factors that need to be considered, some of which may be in conflict. Inevitably, unpredictable circumstances that demand decisions will arise during operation. In some cases an automated response may be imperative; in other cases these may be ill-advised. Manual decisions are often made that override the current policy and serve effectively to redefine it. This matter is further complicated in highly dynamic operational environments like mobile ad-hoc networks, in which the risk factors may be changing continually. Thus, security policies must be able to change and adapt to the operational needs. This study investigates the potential of evolutionary algorithms as a tool in determining the optimal security policies that suit such environments. This thesis reviews some fundamental concepts in related domains. It presents three applications of evolutionary algorithms in solving problems that are of direct relevance. These include the inference of security policies from decision examples, the dynamic adaptation of security policies, and the optimisation of security policies for a specific set of missions. The results show that the inference approaches based on evolutionary algorithms are very promising. The thesis concludes with an evaluation of the work done, the extent to which the work justifies the thesis hypothesis and some possible directions on how evolutionary algorithms can be applied to address a wider range of relevant problems in the domain of concern.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Guillén, Lasierra Francesc. « Modelos de policía y seguridad ». Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/291813.

Texte intégral
Résumé :
Esta tesis pretende demostrar la importancia de las diversas concepciones ideales (modelos) a partir de las cuáles se articulan las organizaciones y las actuaciones policiales así como sus contribuciones a la mejora del servicio con que la policía provee a los ciudadanos y las limitaciones de cada uno de ellos. La tesis parte de la idea de que los modelos policiales (y, en consecuencia, de seguridad) no son construcciones teóricas sin influencia en el día a día de las organizaciones policiales, sino todo lo contrario, que tienen influencia en los diversos ámbitos del trabajo policial. Los modelos parten de legitimaciones diferentes e influencian la finalidad principal (misión) de la policía, las relaciones con el ciudadano, la gestión del orden público, la estructura y las dinámicas de las organizaciones policiales así como los controles de la actuación policial y sus indicadores de referencia. El trabajo comienza describiendo el contexto en que la policía aparece como institución de control social formal así como cuál es su ámbito funcional de actuación y los elementos más significativos de la función policial de cara a la construcción ideal de los modelos, con una reflexión crítica sobre el concepto de cultura policial. Posteriormente, se definen tres grandes modelos policiales: el gubernativo, el profesional y el comunitario o de servicio público y se describen las respuestas que cada uno de ellos dan a aspectos claves de la realidad policial. Así, el modelo gubernativo recibe su legitimación de un Gobierno representativo constituido en el marco de estados de derecho con separación de poderes, con respeto a la legalidad y el control judicial correspondiente. Se trata de un modelo con tendencia a estar influenciado por el poder político, en el que los ciudadanos tienen mayor o menor importancia en función de las coyunturas políticas, la organización policial es un instrumento de transmisión de órdenes y la gestión del orden público y el tratamiento de la información son muy relevantes. El modelo profesional se configura a partir de la legitimación que otorga el saber profesional (como en el caso de los médicos o los arquitectos) en el marco del respeto a la ley. La lucha contra la delincuencia es la misión fundamental, aunque no rechaza la gestión de la seguridad viaria o el orden público; ni el ciudadano ni el poder político son relevantes en la función policial por su falta de conocimientos profesionales. El modelo de policía comunitaria o de servicio público se construye a partir de los ciudadanos, para ellos y con ellos, siendo la policía un servicio destinado a satisfacer sus necesidades con su colaboración, y su opinión, el elemento clave de valoración de la policía. El trabajo continúa con la descripción de las modernas estrategias de policía que han dominado el debate criminológico en los últimos años (policía orientada a los problemas, policía guiada por la inteligencia, Broken Windows Policing, y policía de aseguramiento) para valorar las razones por las cuáles, a pesar de sus positivas aportaciones, no constituyen nuevos modelos en tanto que no implican construcciones ideales completas de la policía. Finalmente, se analizan las tendencias existentes en los sistemas de policía, poniendo sobre la mesa la influencia de la politización y la democratización de la seguridad, la globalización, la revolución tecnológica y la crisis económica en las organizaciones policiales. Estas tendencias y las virtudes y deficiencias señaladas de cada uno de los modelos sirven de base a las conclusiones sobre las características que tendría que tener la policía para afrontar con éxito los retos futuros, aprovechando las virtudes de los modelos estudiados.
This thesis aims at stressing the importance of the diverse ideal conceptions of policing (models) that constitute the grounds for police organisations and policing. All of them have made contributions to the service with which the police provide the citizens and, at the same time, have evidenced shortcomings and limitations. The idea sustained in this work is that policing models (and consequently security models) are not theoretical constructions without any influence in daily policing, but, to the contrary, they are extremely relevant for the diverse areas of policing. Models stem from different legitimacies and affect the nuclear aim of policing (the mission), relationships with citizens, public order management, the structure and dynamics of police organisation and the systems of accountability and efficiency indicators as well. The first chapters begin with the description of the context in which the police appears as an institution of formal social control and the material field of policing focusing on its most substantial elements in order to build models up (police culture, mission, relationships with citizens, public order, organisation and accountability). Then, three models are defined: the governmental, the professional and community policing or public service policing. The governmental model gets its legitimacy from a representative Government in the framework of the rule of law with state powers balance, law abiding and judiciary control. It is a model with some tendency to be influenced by political power, in which citizens are more or less important depending on political junctures; police organisation is just an instrument to transmit orders, management of public order and gathering and treatment of information are crucial objectives for the police. The professional model is based on police professional knowledge (such as doctors or architects) in the framework of law; war on crime constitutes its mission, although it also tackles traffic police and public order; citizens or politicians should have no role in policing due to their lack of knowledge. Community policing or public service policing is thought from the citizens, for them and with them, police become a service addressed their needs with their collaboration and their opinion is the chore reference to assess the police. After having thoroughly described the three models, modern strategies of policing that have dominated criminological debates in last decades are discussed (Problem Oriented Policing, Intelligence-led Policing, Broken Windows Policing, and Reassurance Policing) in order to evidence the reasons why they are not considered policing models. It is argued that they don’t constitute new models because they are not complete ideal constructions of policing. Nevertheless they bring methodological innovations into the pre-existent models that try to improve their efficiency. Finally, this thesis analyses current tendencies in existing police systems, stressing the influence of politicization, globalisation, new technologies and the economic crisis in police organisations. The study of these tendencies and the virtues and deficiencies of the different models discussed in previous chapters offer the bases for the conclusions about how police should be to be able to face future challenges of policing in a satisfactory way.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Hallett, Joseph. « Capturing mobile security policies precisely ». Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31341.

Texte intégral
Résumé :
The security policies of mobile devices that describe how we should use these devices are often informally specified. Users have preferences for some apps over others. Some users may avoid apps which can access large amounts of their personal data, whilst others may not care. A user is unlikely to write down these policies or describe them using a formal policy language. This is unfortunate as without a formal description of the policy we cannot precisely reason about them. We cannot help users to pick the apps they want if we cannot describe their policies. Companies have mobile security policies that definehowan employee should use smart phone devices and tablet computers from home at work. A company might describe the policy in a natural language document for employees to read and agree to. They might also use some software installed on employee's devices to enforce the company rules. Without a link between the specification of the policy in the natural language document and the implementation of the policy with the tool, understanding how they are related can be hard. This thesis looks at developing an authorisation logic, called AppPAL, to capture the informal security policies of the mobile ecosystem, which we define as the interactions surrounding the use of mobile devices in a particular setting. This includes the policies of the users, the devices, the app stores, and the environments the users bring the devices into. Whilst earlier work has looked on checking and enforcing policies with low-level controls, this work aims to capture these informal policy's intents and the trust relationships within them separating the policy specification from its enforcement. This allows us to analyse the informal policies precisely, and reason about how they are used. We show how AppPAL instantiates SecPAL, a policy language designed for access control in distributed environments. We describe AppPAL's implementation as an authorisation logic for mobile ecosystems. We show how we can check AppPAL policies for common errors. Using AppPAL we show that policies describing users privacy preferences do not seem to match the apps users install. We explore the differences between app stores and how to create new ones based on policy. We look at five BYOD policies and discover previously unexamined idioms within them. This suggests aspects of BYOD policies not managed by current BYOD tools.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Persson, Magnus. « Building trust : The contradiction between security and democracy in post Apartheid South Africa ». Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-17110.

Texte intégral
Résumé :
Abstract Title: Building Trust: The contradiction between security and democracy in post apartheid South Africa Author: Magnus Persson Supervisor: Svante Lundberg This paper aims to investigate the contradiction between security and democracy in post-apartheid South African policing, and was executed on the field together with the South African Police Service (SAPS). The theoretical point of departure is that trust between people, in relation to the institutions of society, is fundamental to democratic development. This in combination with previous research on police reform, police academy socialization, community policing and militarization has lead to the conclusion that a remilitarization process is under way and that a militaristic approach to policing is likely to be counterproductive in terms of achieving democratic development. The study has been executed on a South African police academy as well as at two different police stations with the combined methods of participatory observation and interviews.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Brooks, Jason L., et Jason A. Goss. « SECURITY ISSUES AND RESULTING SECURITY POLICIES FOR MOBILE DEVICES ». Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32799.

Texte intégral
Résumé :
Mobile devices, given their promise of mobility with rich functionality, are being deployed with broadening use cases throughout the United States Department of Defense. All the while, massive quantities of information are stored and accessed by these devices without there being a comprehensive and specialized security policy dedicated to protecting that information. The importance of having a security policy grows as these devices start providing new capabilities and replacing many information systems we currently have deployed. Since the same device will be used in many different contexts, each with potentially different security policies, the devices will have to be able to adapt to those contexts. The security policy(ies) enforced by the device will have to adapt accordingly. We investigate potential mobile computing security policies to balance this request for context aware functionality with the information assurance required of these government devices. We investigate the security issues raised in the use of these devices and provide example security policies that address some of these issues.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Thimamontri, Apinya. « Homeland Security Roles and Responsibilities : an Examination of Texas Police Chiefs’ Perceptions ». Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149673/.

Texte intégral
Résumé :
Research has shown that the police industry has entered into an era of homeland security. However, whether the core functions of policing have significantly changed since September 11, 2001, has been the topic of considerable debate. Using secondary data, the research identifies variables that are most influential in predicting whether Texas police chiefs understand their departments’ homeland security roles and responsibilities. The data was originally obtained in 2007 through self-administered surveys of police chiefs attending the Texas Chief Leadership Series (TPCLS) and the New Chief Development Program (NCDP).
Styles APA, Harvard, Vancouver, ISO, etc.
10

Brown, David A. « Examining the Behavioral Intention of Individuals' Compliance with Information Security Policies ». ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3750.

Texte intégral
Résumé :
Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from deterrence theory and protection motivation theory, became the structural model used for partial least squares-structural equation modeling (PLS-SEM) analysis of the survey response data, which indicated that self-efficacy was statistically significant. The remaining model variables, perceived threat vulnerability, perceived threat severity, response efficacy, informal sanction certainty, informal sanction severity, formal sanction certainty, and formal sanction severity, were not statistically significant. A statistically significant self-efficacy result could indicate confidence among the population to comply with information security policies. The nonsignificant results could indicate the fear appeal treatment did not motivate a change in behavior or information security policy awareness bias was introduced by selecting information technology professionals. Social change in information security could be achieved by developing an effective information security policy compliance fear appeal communication, which could change information security compliance behavior and contribute to securing the nation's critical cyber infrastructure and protecting data.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Security policie"

1

Žáček, Pavel. ŠtB na Slovensku za "normalizácie" : Agónia komunistickej moci v zvodkách tajnej policie. [Bratislava?] : Ministerstvo spravidlivosti SR, Oddelenie pre dokumentáciu zločinov komunizmu, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Weiss, Tomáš. Role policie a armády v Evropské unii : Analýza evropské a národní úrovně s využitím případové studie České republiky. Praha : Univerzita Karlova v Praze, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Lindsey, George. Canada's security policies. [Toronto, Ont.] : Canadian Institute of International Affairs, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Stockholm International Peace Research Institute., dir. Policies for common security. London : Taylor & Francis, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Attwood, Tony. Secondary schools' security policies. Peterborough : First & Best in Education, 1998.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Kapoor, H. L. Police, crime, and security. New Delhi : Ess Ess Publications, 1992.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Joseph, Carmel. Safety and security. Johannseburg : Friedrich Ebert Stiftung, South Africa Office, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ltd, Asia BioBusiness Pte. Food security policies in APEC. Singapore] : APEC Policy Support Unit, Asia Pacific Economic Cooperation, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

A, Campbell Andrew, dir. Water security : Conflicts, threats, policies. Denver, CO : DTP Publishing, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

L, Green James, et United States. National Aeronautics and Space Administration., dir. SPAN security policies and guidelines. 2e éd. [Washington, DC : National Aeronautics and Space Administration, 1989.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Security policie"

1

Meerts, Clarissa. « Police : Public Versus Private Policing ». Dans Encyclopedia of Security and Emergency Management, 1–4. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_86-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Meerts, Clarissa. « Police : Public Versus Private Policing ». Dans Encyclopedia of Security and Emergency Management, 775–79. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_86.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Beach, Derek. « Security Policies ». Dans Analyzing Foreign Policy, 151–71. London : Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00279-2_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Legrand, Tim, et Simon Bronitt. « Policing to a Different Beat : Measuring Police Performance ». Dans Policing and Security in Practice, 1–19. London : Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137007780_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Kabay, M. E., et Sean Kelley. « Developing Security Policies ». Dans Computer Security Handbook, 66.1–66.16. Hoboken, NJ, USA : John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118820650.ch66.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Cuppens, Frédéric, et Nora Cuppens-Boulahia. « Multilevel Security Policies ». Dans Encyclopedia of Cryptography and Security, 811–12. Boston, MA : Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_824.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Nielson, Flemming, René Rydhof Hansen et Hanne Riis Nielson. « Adaptive Security Policies ». Dans Leveraging Applications of Formal Methods, Verification and Validation : Engineering Principles, 280–94. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61470-6_17.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Datta, Anupam, Somesh Jha, Ninghui Li, David Melski et Thomas Reps. « Analyzing Security Policies ». Dans Analysis Techniques for Information Security, 63–98. Cham : Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-02334-7_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Herpolsheimer, Jens. « Regional security policies ». Dans Spatializing Practices of Regional Organizations during Conflict Intervention, 145–72. Abingdon, Oxon ; New York, NY : Routledge, 2021. | : Routledge, 2021. http://dx.doi.org/10.4324/9781003106647-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Clifton, Darrell. « Policies and Procedures ». Dans Hospitality Security, 37–58. 2e éd. New York : CRC Press, 2022. http://dx.doi.org/10.4324/9781003037644-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Security policie"

1

Eyers, David M., Sriram Srinivasan, Ken Moody et Jean Bacon. « Compile-Time Enforcement of Dynamic Security Policies ». Dans 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.24.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Welch, Ian, et Fan Lu. « Policy-driven reflective enforcement of security policies ». Dans the 2006 ACM symposium. New York, New York, USA : ACM Press, 2006. http://dx.doi.org/10.1145/1141277.1141645.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Trivellato, Daniel, Nicola Zannone et Sandro Etalle. « A Security Framework for Systems of Systems ». Dans 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kotenko, Igor, Olga Chervatuk, Ekaterina Sidelnikova et Artem Tishkov. « Hybrid Multi-module Security Policy Verification ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.25.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Singhal, Anoop. « Web Services Security : Challenges and Techniques ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.50.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Barın, Nurgül Emine. « Principle of Interpretation in Favor of the Insuree in Turkish Social Security Law ». Dans International Conference on Eurasian Economies. Eurasian Economists Association, 2016. http://dx.doi.org/10.36880/c07.01754.

Texte intégral
Résumé :
One of the major problems encountered in the implementation of the rule of law is in the absence of the meaning of law or what it wants to tell is not clearly defined, the true meaning is revealed through interpretation. In labor law and social security law; Although the review will benefit from the rules for the common law, workers-interpretation in favor of the insuree is effective. This policy is considered as one of the fundamental policies of the Labour and Social Security Law. Located between the basic policies of business law, the protection of the workers, which is a consequence of the interpretation in favor of the insuree policy, shows itself in the form of interpretation in favor of the insuree in the social security law. One factor for necessity of supporting interpretation in favor of the insuree is, social security right is among the basic human rights. In particular, the interpretation of legislation related to the social security right by constitutional guarantee, it is important to keep in mind this basic policy. The overall purpose of the social security law is to benefit from this right by more people, namely the expansion of the scope. In this study, the place of interpretation in favor of the insuree and limitations related to this interpretation will be examined in the light of samples of Supreme Court Decisions and regarding substance of the Constitution and laws.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Basile, Cataldo, Antonio Lioy, Gregorio Martinez Perez, Felix J. Garcia Clemente et Antonio F. Gomez Skarmeta. « POSITIF : A Policy-Based Security Management System ». Dans Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.37.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Roth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis et Ben Stock. « Complex Security Policy ? A Longitudinal Analysis of Deployed Content Security Policies ». Dans Network and Distributed System Security Symposium. Reston, VA : Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Gunter, Carl A. « Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers ». Dans 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.41.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Brucker, Achim D., et Helmut Petritsch. « A Framework for Managing and Analyzing Changes of Security Policies ». Dans 2011 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2011. http://dx.doi.org/10.1109/policy.2011.47.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Security policie"

1

Research Institute (IFPRI), International Food Policy. Developed country policies : Domestic farm policy reform and global food security. Washington, DC : International Food Policy Research Institute, 2018. http://dx.doi.org/10.2499/9780896292970_07.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sachnackenberg, Dan, Kelly Bunn, Daylan Darby, Laurence Rockwell et Travis Reid. Adaptive System Security Policies. Fort Belvoir, VA : Defense Technical Information Center, janvier 2002. http://dx.doi.org/10.21236/ada400196.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Schneider, Edward A., William Kalsow, Lynn TeWinkel et Michael Carney. Experimentation with Adaptive Security Policies. Fort Belvoir, VA : Defense Technical Information Center, juin 1996. http://dx.doi.org/10.21236/ada311215.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Carney, Michael, Brian Loe et Terrence Mitchem. Experience with Adaptive Security Policies. Fort Belvoir, VA : Defense Technical Information Center, mars 1998. http://dx.doi.org/10.21236/ada345381.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Irvine, Cynthia E. Security Policy Enforcement. Fort Belvoir, VA : Defense Technical Information Center, septembre 2005. http://dx.doi.org/10.21236/ada605488.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Goebel, Peter. German Security Policy. Fort Belvoir, VA : Defense Technical Information Center, juin 1999. http://dx.doi.org/10.21236/ada385824.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Saito, Toshio. Japan's Security Policy. Fort Belvoir, VA : Defense Technical Information Center, mai 1999. http://dx.doi.org/10.21236/ada385898.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Omondi Okwany, Clifford Collins. Territoriality as a Method for Understanding Armed Groups in Kenya and Strengthening Policy Responses. RESOLVE Network, janvier 2023. http://dx.doi.org/10.37805/pn2023.1.lpbi.

Texte intégral
Résumé :
This policy note explores the characteristics of community-based armed groups (CBAGs) unique to the Kenyan context through a comparison of local CBAGs with other nonstate armed groups, particularly violent extremist organizations (VEOs). In doing so, it introduces the concept of territoriality—the degree to which government and security agents are able to monopolize political, social, and security control of spaces—and suggests that both CBAGs and VEOs are most likely to thrive in Kenya under conditions of semi-territoriality, where state authority sometimes shifts fluidly from strong to weak depending on capacity or interest. To combat the rise of VEOs it recommends community-oriented policing as a devolved security strategy, strengthening relations between civil society and the police through the Police Reforms Working Group Kenya (PRWGK), helping to monitor and evaluate the police service. Additionally, mapping CBAGs and VEOs through clan structures is a community-oriented strategy that helps strengthen territoriality and counter semi-territoriality.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Spencer, Ray, Stephen Smalley, Peter Loscocco, Mike Hibler, David Andersen et Jay Lepreau. The Flask Security Architecture : System Support for Diverse Security Policies. Fort Belvoir, VA : Defense Technical Information Center, janvier 2006. http://dx.doi.org/10.21236/ada443108.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Halpern, Joseph Y. Formulating and Reasoning about Security Policies. Fort Belvoir, VA : Defense Technical Information Center, décembre 2004. http://dx.doi.org/10.21236/ada431396.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie