Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Security policie.

Articles de revues sur le sujet « Security policie »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Security policie ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Supriyanto, Eko Eddya, Meida Rachmawati et Fibry Jati Nugroho. « Transformative Policies and Infrastructure Strengthening Towards the Police Era 4.0 ». Jurnal Bina Praja 13, no 2 (31 août 2021) : 231–43. http://dx.doi.org/10.21787/jbp.13.2021.231-243.

Texte intégral
Résumé :
Police transformation policy to carry out community security functions is very adaptive in addressing the changing times. The research aims to map the transformation and strengthening of police infrastructure in response to the era of digitalization. The research uses a qualitative type of research with a literature study approach and policy analysis programmed by the Police. The results showed that the transformation policy consisting of organizational transformation, operation transformation, public service transformation, and supervise transformation is needed by the Police, especially in the current digital transition. Moreover, it can be carried out correctly if the Police have internally and externally owned by POLRI. The research concludes that transformative efforts and strengthening of police infrastructure strongly support the duties and functions of the National Police in securing the community.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Antonius, Rachad, Micheline Labelle et François Rocher. « Canadian Immigration Policies : Securing a Security Paradigm ? » International Journal of Canadian Studies, no 36 (2007) : 191. http://dx.doi.org/10.7202/040782ar.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Achmad, Farid Yusuf Nur. « Implementasi Kebijakan Perizinan dan Pemberitahuan Kegiatan Masyarakat Pada Kepolisian Resort (POLRES) Kota Baubau ». Kybernan : Jurnal Studi Kepemerintahan 1, no 1 (1 mars 2016) : 16–25. http://dx.doi.org/10.35326/kybernan.v1i1.161.

Texte intégral
Résumé :
This studywas conducted todetermine and analyze the implementation of the licensing policies and notices of community activities in Baubau City Police and communication factors, resources, disposition, and structure influence the implementation of the licensing policies and notices of community activities in Police Baubau. The results showed that the licensing policies and notices activities of people implemented by (a) Providea receipt notice (b) To coordinate with the responsible delivery of opinions in the Public (c) To coordinate with the leadership, the agency/institutionwhich is the goal of delivering the opinion (d) Prepare securing alocation and route that passed.(e) responsible for protecting the participants in the delivery of public opinion (f) responsible for organizing security and factors factors that influence the implementation of the licensing policies and noticesof community activities are: (1) Communication; (2) Resources (3) Disposition; and (4) Organizational Structure.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Poincignon, Yann. « Defense Academy Excellence European Union Civilian Policing : Foreign Policy Action or Internal Security Tool ». Connections : The Quarterly Journal 02, no 2 (2003) : 111–30. http://dx.doi.org/10.11610/connections.02.2.12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Helmy, Army Fuad. « PENGAMANANOBJEK VITAL NASIONAL OLEH DIREKTORAT PENGAMANAN OBJEK VITAL POLDA KALIMANTAN SELATAN ». Badamai Law Journal 1, no 2 (1 septembre 2016) : 221. http://dx.doi.org/10.32801/damai.v1i2.1820.

Texte intégral
Résumé :
This research aims to: (1) Assess and evaluate the pattern containedsystem in the Securing of National Vital Objectsby Vital Object Security Directorate of Polda Kalimantan Selatan; and (2) Assess and evaluate the obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan. It can be concluded that: 1. The system pattern contained in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan not stated clearly and explicitly in the legislation pam obvitnas, but in the Presidential Decree No. 63 of 2004 on the Securing of National Vital Security Object there is described that pattern Sispamobvitnas, they are: (1) The main executor of the system Securing of National Vital Objek is obvitnas management authority, in this case the Police through Dirpamobvit; (2) Police are obliged to provide security assistance obvitnas; (3) priority preemptive and preventive activities; (4) in an integrated and simultaneous shared obvitnas managers implement security systems obvitnas; and (5) and against obvitnas is an organic part of or including the military, the security environment remain to be implemented, although the security environment outside Obvitnas or process interruption handling defense and security. 2. The obstacles in the Securing of National Vital Objects by Vital Object Security Directorate of Polda Kalimantan Selatan, they are: (1) Lack of quality personnel guard PT. Pertamina (Persero) BBM Terminal Banjarmasin due to lack of professional recruitment system; (2) Insufficient number of security officers compared to the vulnerability of the region; (3) Infrastructure security Obvit Of Polda Kalimantan Selatan are limited;(4) The lack of security coordination between Ditpamobvit Polda Kalimantan Selatan with regional security managers of the company, and the company's internal security guard at the Police Post.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Elbably, Amar. « سياسات التعاوُن الرقمي بين الأجهزة الأمنيَّة العربيَّة ». Security Policy Paper 2, no 2 (31 décembre 2021) : 1–20. http://dx.doi.org/10.26735/hjoo8882.

Texte intégral
Résumé :
يُسهِم‭ ‬التعاوُن‭ ‬الأمني‭ ‬الرقمي‭ ‬بين‭ ‬الدول‭ ‬إسهامًا‭ ‬كبيرًا‭ ‬في‭ ‬انحسار‭ ‬الجرائم‭ ‬المُنظَّمة‭ ‬والقضاء‭ ‬عليها،‭ ‬وبخاصَّةٍ‭ ‬الجرائم‭ ‬الإرهابيَّة،‭ ‬وهو‭ ‬ما‭ ‬يتطلَّب‭ ‬ضرورة‭ ‬تفاعُل‭ ‬الدول‭ ‬فيما‭ ‬بينها،‭ ‬وزيادة‭ ‬الجهود‭ ‬في‭ ‬سبيل‭ ‬تشجيع‭ ‬هذا‭ ‬التعاوُن‭ ‬وتفعيله،‭ ‬بإيجاد‭ ‬وسائل‭ ‬تعاونيَّة‭ ‬في‭ ‬المسائل‭ ‬الأمنيَّة‭ ‬الكفيلة‭ ‬بالوقاية‭ ‬من‭ ‬الجريمة‭ ‬وتَتَبُّع‭ ‬مرتكبيها‭ ‬حالَ‭ ‬وقوعها‭ ‬باستخدام‭ ‬شبكات‭ ‬مُؤَمَّنَة‭ ‬تسمح‭ ‬بنقل‭ ‬البيانات‭ ‬والمعلومات‭ ‬والتطبيقات‭ ‬بين‭ ‬الأجهزة‭ ‬المعنيَّة‭ ‬بأجهزة‭ ‬الشرطة‭ ‬العربيَّة،‭ ‬واستخدام‭ ‬التقنيات‭ ‬المُؤَمَّنَة‭ ‬والسريعة‭ ‬التي‭ ‬تسمح‭ ‬بالتبادُل‭ ‬الرقمي‭ ‬للأجهزة‭ ‬الشرطيَّة،‭ ‬ما‭ ‬يحقِّق‭ ‬منع‭ ‬وقوع‭ ‬الجرائم‭ ‬والكشف‭ ‬عنها،‭ ‬وملاحقة‭ ‬المخطَّطات‭ ‬الإجراميَّة‭ ‬والإرهابيَّة‭ ‬بجميع‭ ‬أشكالها‭ ‬واستباق‭ ‬المعلومات‭ ‬بما‭ ‬يحافظ‭ ‬على‭ ‬الأمن‭ ‬الوطني‭ ‬للدول‭ ‬العربيَّة‭.‬
Styles APA, Harvard, Vancouver, ISO, etc.
7

Schneider, Fred B. « Enforceable security policies ». ACM Transactions on Information and System Security 3, no 1 (février 2000) : 30–50. http://dx.doi.org/10.1145/353323.353382.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Potter, Bruce. « Wireless security policies ». Network Security 2003, no 10 (octobre 2003) : 10–12. http://dx.doi.org/10.1016/s1353-4858(03)01007-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Matvejevs, Aleksandrs. « Problems of Police Activity in Ensuring Public Order and Public Safety ». SOCRATES. Rīgas Stradiņa universitātes Juridiskās fakultātes elektroniskais juridisko zinātnisko rakstu žurnāls / SOCRATES. Rīga Stradiņš University Faculty of Law Electronic Scientific Journal of Law 3, no 21 (2021) : 159–68. http://dx.doi.org/10.25143/socr.21.2021.3.159-168.

Texte intégral
Résumé :
The article addresses the issues concerning public order and public security. These two are the objects of the state administration that form separate legal institutes. The duties of the police include securing the rule of law, maintaining public order and security, preventing, detecting and investigating crimes. The police ensure safety of people and environment and prevent all violations of the law and disturbances by eliminating and investigating all such incidents. The tasks of the police are defined in the Police Act. The police cooperate with other authorities and local residents and communities in maintaining security. Keywords: public order, public security, public place, police activity.
Styles APA, Harvard, Vancouver, ISO, etc.
10

McIlwraith, Angus. « Security policies — A security officer's perspective ». Computer Audit Update 1993, no 8 (août 1993) : 10–14. http://dx.doi.org/10.1016/0960-2593(93)90257-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Suhaibah, Suhaibah, Armiwal Armiwal et Mukallaf Mukallaf. « The Role of the Polri Intelligence in Securing the General Election and Institution of the Pidie District DPRK ». Budapest International Research and Critics Institute (BIRCI-Journal) : Humanities and Social Sciences 4, no 1 (22 janvier 2021) : 626–31. http://dx.doi.org/10.33258/birci.v4i1.1645.

Texte intégral
Résumé :
This research aims toknowingthe role of the Police Intelligence in securing the General Election and Inauguration of the Pidie Regency DPRK, the obstacles to the Intelligence of the Police in securing the General Election and the Inauguration of the DPRK and the efforts made to overcome the obstacles to the Police Intelligence in securing the General Election and Inauguration of the Pidie Regency DPRK In this study, the problem approach used was normative juridical and empirical juridical. Data collection was carried out by literature study and field studies. The data were analyzed qualitatively with data collection techniques through observation of library and field materials related to these problems. The results showed that the role of Police Intelligence in Securing the General Election and Inauguration of the Pidie Regency DPRK that is maintain and maintain a situation of security and national order in order to remain conducive since the preparatory stage, the election stage and the consolidation stage in order to ensure security for the public, election organizers in this case the KPU and Bawaslu, and Pilkada participants. Efforts Made to Overcome Police Intelligence Obstacles in Securing the General Election and Inauguration of the Pidie Regency DPRK by increasing organizational capabilities, individual capabilities, increasing security capabilities, increasing the ability to control activities and increasing additional capabilities.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Murtaza, Mirza B. « Risk Management For Health Information Security And Privacy ». American Journal of Health Sciences (AJHS) 3, no 2 (2 avril 2012) : 125–34. http://dx.doi.org/10.19030/ajhs.v3i2.6943.

Texte intégral
Résumé :
The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Sheptycki, J. « High Policing in the Security Control Society ». Policing 1, no 1 (1 janvier 2007) : 70–79. http://dx.doi.org/10.1093/police/pam005.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

POTOČNIK, GREGOR. « SODELOVANJE SLOVENSKE VOJSKE IN POLICIJE PRI NALOGAH NOTRANJE STABILNOSTI IN VARNOSTI REPUBLIKE SLOVENIJE ». KONCEPT KREPITVE ODPORNOSTI DRUŽBE/THE CONCEPT OF STRENGHTENING THE RESILIENCE OF SOCIETY, VOLUME 22/ISSUE 4 (23 octobre 2020) : 67–83. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.4.4.

Texte intégral
Résumé :
Povzetek Grožnje nacionalni varnosti se preoblikujejo zelo hitro. Prebivalci države pričakujejo, da se bo nacionalnovarnostni sistem učinkovito in uspešno odzval na te grožnje. Izvedbeno se lahko nacionalnovarnostni sistem države odzove samo tako, da v sistem zagotavljanja nacionalne varnosti vključi vse svoje vire v upanju sinergičnih učinkov. Uporaba oboroženih sil za zagotavljanje notranje varnosti je bila izredna naloga oboroženih sil. Obramba oziroma obrambna sposobnost vojske, ki se izvaja v notranjosti države za notranjo stabilnost in varnost države ob zakonskih in primarno konceptualno določenih nalogah vojske in policije, predstavlja zakonodajni in operacionalizacijski izziv države. Ključne besede Slovenska vojska, Policija, izredna pooblastila vojske, operacionalizacija. Abstract Nowadays, threats to national security are transforming extremely rapidly. The people of a country expect the national security system to respond effectively and successfully to these threats. Implementation-wise, a country's national security system can only respond by including all its resources in the national security system hoping to achieve synergistic effects. The use of the armed forces to ensure internal security was an extraordinary task of the armed forces. The defence and the defence capacity of the military, which are in addition to the legal and primarily conceptually determined tasks of the military and the police aimed at ensuring internal stability and national security in the interior of the country, represent a legislative and operational challenge of the state. Key words Slovenian Armed Forces, Police, extraordinary powers of the army, operationalization.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Todorova, Antonia. « Turkish Security Discourses and Policies : The Kurdish Question ». Information & ; Security : An International Journal 33, no 1,2 (octobre 2015) : 108–21. http://dx.doi.org/10.11610/isij.3305.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Brock, Lothar, Anna Geis, Sabine Jaberg, Hanne-Margret Birckenbach, Hans-Georg Ehrhart, Dan Krause, Michael Brzoska et al. « Mythen der etablierten Sicherheitspolitik ». Die Friedens-Warte 92, no 3-4 (2019) : 115. http://dx.doi.org/10.35998/fw-2019-0006.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Claudia Cifali, Ana, et Rodrigo Ghiringhelli De Azevedo. « Public Security, Criminal Policy and Sentencing in Brazil during the Lula and Dilma Governments, 2003-2014 : Changes and Continuities ». International Journal for Crime, Justice and Social Democracy 6, no 1 (1 mars 2017) : 146–63. http://dx.doi.org/10.5204/ijcjsd.v6i1.392.

Texte intégral
Résumé :
Since mid-1980s crime rates in Brazil started to increase with the transition from military dictatorship to democracy, a period marked by the rise of poverty and hyperinflation. Given levels of police corruption and protection of criminal gangs, trust in the criminal justice system was low, leading to a heightened dependence on private security, gated communities and the politicisation of law and order politics. An impressive punitive turn began at in the 1990s. This paper analysed penal policies under successive left-wing Lula and Dilma governments from 2003 to 2014. During this period the rise of ‘postneoliberal’ and ‘postneoconservative’ politics, led by the Workers Party, developed governmental strategies and initiatives that formulated and legitimized rich and complex expressions of traditionally left-wing politics. Despite the simultaneous implementation of distributive policies, the increase of human development levels throughout the country, the reduction of social inequalities and the redirection of the official discourse of Federal Government security policies towards crime prevention, incarceration rates continued to increase. This article examines why efforts to build an effective public security policy committed to upholding civil rights and improving the control of police and police activities have failed.
Styles APA, Harvard, Vancouver, ISO, etc.
18

Gyamfi, Gerald D. « Exploring the Challenges and Possibilities of Pan African International Police Cooperation ». International Journal of Public Administration in the Digital Age 6, no 4 (octobre 2019) : 43–53. http://dx.doi.org/10.4018/ijpada.2019100104.

Texte intégral
Résumé :
In the promotion of global peace and security, police cooperation is considered one of the major pillars. This exploratory qualitative study focuses on the possibilities and challenges that should be overcome in the quest to practicalize the implementation of security policies and other legal instruments relating to police cooperation and collaboration in Africa. Twenty-five top police officers and other security experts in Ghana were selected as participants using snowball approach. The participants were interviewed for their views on international police cooperation focusing on cooperation among the various police forces in Africa. The outcome of the study revealed that the major challenges include financial constraints, language barriers, political interference, and problems associated with information technology systems. Recommendations made to overcome most of the challenges include strengthening the African Union Police (AFRIPOL), intelligence sharing with the aid of advanced information technology, and promoting research on police effectiveness on the African continent.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Pangalos, G. J. « Medical Database Security Policies ». Methods of Information in Medicine 32, no 05 (1993) : 349–56. http://dx.doi.org/10.1055/s-0038-1634952.

Texte intégral
Résumé :
AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care. The general framework and the requirements for medical database security are presented. The three prominent proposals for medical database security are discussed in some detail, together with specific proposals for medical database security. A number of parameters for a secure medical database development are presented and discussed, and guidelines are given for the development of secure medical database systems.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Basin, David, Vincent Jugé, Felix Klaedtke et Eugen Zălinescu. « Enforceable Security Policies Revisited ». ACM Transactions on Information and System Security 16, no 1 (juin 2013) : 1–26. http://dx.doi.org/10.1145/2487222.2487225.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Pernul, G., et A. M. Tjoa. « Security Policies for Databases ». IFAC Proceedings Volumes 25, no 30 (octobre 1992) : 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Cuppens, Frédéric, et Nora Cuppens-Boulahia. « Modeling contextual security policies ». International Journal of Information Security 7, no 4 (6 novembre 2007) : 285–305. http://dx.doi.org/10.1007/s10207-007-0051-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Ølnes, Jon. « Development of security policies ». Computers & ; Security 13, no 8 (janvier 1994) : 628–36. http://dx.doi.org/10.1016/0167-4048(94)90042-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Shebanow, Annie, Richard Perez et Caroline Howard. « The Effect of Firewall Testing Types on Cloud Security Policies ». International Journal of Strategic Information Technology and Applications 3, no 3 (juillet 2012) : 60–68. http://dx.doi.org/10.4018/jsita.2012070105.

Texte intégral
Résumé :
An important aspect of security requirements is a firm understanding of the threats to systems so that specific defense mechanisms can be implemented. Globally scattered network systems and on-demand access to systems such as cloud computing require a high level of security, because the software and hardware of networks are integrated in vulnerable shared or outsourced environments. Hackers are relentless in finding new techniques to gain access to sensitive data. Securing infrastructures is a challenging task, but when researchers identify and investigate potential threats and create solutions, vulnerabilities may be reduced. The purpose of this paper is to explore how use, misuse, positive and negative, obstacle, and abuse testing cases of firewalls have broadened the security policies that mitigate or prevent threats in a cloud environment.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Sampson, F., et J. McNeill. « Redefining the Gaps : Connecting Neighbourhood Safety to National Security ». Policing 1, no 4 (7 novembre 2007) : 460–71. http://dx.doi.org/10.1093/police/pam068.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Simmons, A. « Room, Stewart (2009). * BUTTERWORTHS DATA SECURITY : LAW AND PRACTICE ». Policing 6, no 1 (21 mars 2011) : 99–100. http://dx.doi.org/10.1093/police/par014.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Arko-Achemfuor, Akwasi. « Addressing the challenges of food security and youth unemployment in South Africa through land reform policies ». Environmental Economics 7, no 3 (21 octobre 2016) : 52–59. http://dx.doi.org/10.21511/ee.07(3).2016.06.

Texte intégral
Résumé :
South Africa’s past policy of apartheid has contributed to some of the socio-economic challenges the country faces today. Some of the challenges include grinding poverty levels, increasing inequality and unemployment among large sections of the population. The constitution of the country makes provision for property and land rights as strategies for addressing some of the past injustices, ensuring food insecurity and sustainable livelihoods. A number of polices have been drafted in this regard, but it is acknowledged that some of the policies that have been adopted by the government have not yielded the desired result leading to the fear that if the situation is not radically addressed may lead to unintended consequences. This paper assesses a number of polices, programs, approaches and strategies regarding land reform policies have that been put into place, most of which have not worked as expected including the fact that the youth have not been factored into most of these programs and policies. This article advocates for the youth to be factored into all land reform and food security policies and programs as a way of capacitating them and getting the youth to see agriculture as a career choice to ensure future food security for the nation, while at the same time addressing youth unemployment and rural poverty. Keywords: land reform, youth, food security, livelihoods, development, policy. JEL Classification: Q15, Q18, O2
Styles APA, Harvard, Vancouver, ISO, etc.
28

ATVUR, Senem, et Çağla VURAL. « Sürdürülebilir Güvenlik Çerçevesinde Türkiye’nin İklim Politikaları ». Bilig, no 103 (27 octobre 2022) : 59–93. http://dx.doi.org/10.12995/bilig.10303.

Texte intégral
Résumé :
Climate change is becoming one of the most crucial problems threatening the integrity of the global system. The impacts of climate change have been posing new threats to the states’ interests, human prosperity and environmental sustainability. This article aims to analyze Türkiye’s climate policies within the context of the sustainable security approach, which focuses on the balance between national, human and environmental security. The study argues that Türkiye’s economic priorities prevail over its climate strategies. Moreover, Türkiye becomes more vulnerable and less resilient to the impacts of climate change as long as the country’s carbon emissions continue to rise. Therefore, this article argues that if Türkiye considers the risks of climate change with a sustainable security approach; economic advantages, social prosperity and environmental protection for both present and future generations could be equivalently guaranteed.
Styles APA, Harvard, Vancouver, ISO, etc.
29

de Rover, Cees. « Police and security forces ». International Review of the Red Cross 81, no 835 (septembre 1999) : 637–47. http://dx.doi.org/10.1017/s1560775500059836.

Texte intégral
Résumé :
Promouvoir l'enseignement du droit international humanitaire auprès des membres des forces armées a toujours été l'une des tâches prioritaires du CICR. Aujourd'hui cependant, les forces de police ou d'autres unités chargées de tâches similaires sont de plus en plus souvent engagées directement dans des opérations de maintien de l'ordre et de la sécurité, notamment dans des situations de troubles intérieurs, voire de conflit interne. Il est devenu important de s'assurer que les membres de ces unités connaissent quelques règies fondamentales en matière de protection de l'individu dans ces circonstances, et que leur comportement respecte la dignité humaine. Le CICR a mis en route un programme pour assister les autorités nationales compétentes dans l'organisation d'un tel enseignement.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Putra, Aditya Permana. « THE URGENCY OF FORMING A SPECIAL POLICE FORCE IN COURTS AS AN EFFORT TO FULFILL THE RIGHT OF PERSONAL SECURITY FOR JUDGES IN INDONESIA ». Jurnal Hukum Peratun 3, no 2 (23 mars 2021) : 127–40. http://dx.doi.org/10.25216/peratun.322020.127-140.

Texte intégral
Résumé :
Special police force is not something new in Indonesia. At least there are four special police force in Indonesia namely Prison Guard, Railway Police, Civil Service Police, and Forestry Special Police. Those police force are separated from, but hand in hand with Indonesian Police Force in securing civil society in Indonesia. In regards with the security of judges in Indonesia, this paper tries to argue that they need special police force to guard and secure them. In this paper, it is concluded that it is required to change the Law regarding Judicial Power especially in the part concerning judge’s safety and security. If it is not probable, then creating a special police force in court is a must.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Correia, Eduardo, et Ricardo Claro. « A Segurança Comunitária e a Pandemia de COVID-19 ». Revista Portuguesa de Ciência Política / Portuguese Journal of Political Science 14 (2020) : 21–32. http://dx.doi.org/10.33167/2184-2078.rpcp2020.14/pp.21-32.

Texte intégral
Résumé :
This article analyses the community safety paradigm in the light of the current pandemic crisis caused by COVID-19. In full evolution, the analysis presented considers the current security and civil protection needs, in particular the security aspects of community security. Through the development of strategies involving security forces and services, the community and citizens, the authors demonstrate the practical importance of security municipalisation through local administrative police, evolving into an important regionalization of security. Similarly, community policing and proximity strategies are observed in accordance with public security policies that point to greater political awareness in security problematization.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Băloi, Alexandra-Iulia. « Politica de securitate națională a României 1990-2020 ». Sociologie Romaneasca 19, no 1 (31 mai 2021) : 168–82. http://dx.doi.org/10.33788/sr.19.1.9.

Texte intégral
Résumé :
Security is a complex, multi-dimensional approach context. In broad terms, it represents the ability to protect its citizens. The sole holder of the legitimate right to use intra-state and inter-state force is obliged through the consequence and expression of its sovereignty to protect and guarantee its citizens’ rights and freedoms and ensure the conditions for the exercise of their rights and freedoms. After the dissolution of the communist political and military bloc, security develops as a global concept that tends to include traditional political and military dimensions, new dimensions, such as economic, energy or security, individual rights, and freedoms. This study addresses Romania’s security policy, its evolution after 1990 and until now. The paper aims to highlight Romania’s position as a territory and its role in the regional context regarding security. Its statute as a NATO and E.U. member, and strategic partner of the United States, determined a permanent update of its security policy and proposed objectives, correlated with those of the entities to which it belongs. From the point of view of security policy, Romania has an important geostrategic role and can stand out as a regional leader due to the threats it could be subjected to. The study will highlight that its security policy provides many benefits for the country’s citizens and its institutions.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Deibert, Ronald J., et Rafal Rohozinski. « Risking Security : Policies and Paradoxes of Cyberspace Security ». International Political Sociology 4, no 1 (mars 2010) : 15–32. http://dx.doi.org/10.1111/j.1749-5687.2009.00088.x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Quintella, José Pedro Guedes, et José Luis Felicio Carvalho. « Segurança Pública, Violência Urbana e Expansão do Setor de Segurança Privada no Município do Rio de Janeiro ». Revista Produção e Desenvolvimento 3, no 2 (1 août 2017) : 1–20. http://dx.doi.org/10.32358/rpd.2017.v3.223.

Texte intégral
Résumé :
The research was guided by the purpose of identifying how, in the city of Rio de Janeiro, the lack of public security policies affect the private security sector. The referential theoretical framework embraced the themes of social and economic contextualization of private security, the institutionalization of private security and the problem of public security in the city of Rio de Janeiro. The empirical stage of the study included semi-structured interviews with key informants, three of whom were directors of different medium-sized companies in the private security sector located in the municipality, a high-ranking officer of the Military Police of Rio de Janeiro, and the president of a private organization which provides training services to civilians, military and police forces. The results confirms contradictory aspects of integration and imbalance between the private security sector and the public power, as well as raises unique issues, such as the causal relation between the media role in violence and the growth of the sector, and the antinomy between the amplification of the ostensible presence of the police force on the streets and the increase of the sense of insecurity that causes the growth of the demand for private security.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Chang, Il-sik. « Security Policy of POLICE according to Increase of Elder Crimes ». J-Institute 2, no 2 (30 décembre 2017) : 1–6. http://dx.doi.org/10.22471/police.2017.2.2.01.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Prenzler, T. « Strike Force Piccadilly and ATM Security : A Follow-up Study ». Policing 5, no 3 (27 mai 2011) : 236–47. http://dx.doi.org/10.1093/police/par029.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Ali, Aitizaz, Hasliza A. Rahim, Jehad Ali, Muhammad Fermi Pasha, Mehedi Masud, Ateeq Ur Rehman, Can Chen et Mohammed Baz. « A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority ». Applied Sciences 11, no 21 (26 octobre 2021) : 9999. http://dx.doi.org/10.3390/app11219999.

Texte intégral
Résumé :
Blockchain is a promising technology in the context of digital healthcare systems, but there are issues related to the control of accessing the electronic health records. In this paper, we propose a novel framework based on blockchain and multiple certificate authority that implement smart contracts and access health records securely. Our proposed solution provides the facilities of flexible policies to update a record or invoke the policy such that a patient has complete authority. A novel approach towards multiple certificate’s authority (CA) is introduced in the design through our proposed framework. Our proposed policies and methods overcome the shortcoming and security breaches faced by single certificate authority. Our proposed scheme provides a flexible access control mechanism for securing electronic health records as compared to the existing benchmark models. Moreover, our proposed method provides a re-enrolment facility in the case of a user lost enrolment.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Wicaksana, Dimas Putra, Agung Anak Sagung Laksmi Dewi et Luh Putu Suryani. « TanggungJawab Polri dalam Pengamanan Calon Kepala dan Wakil Kepala Daerah di Kota Denpasar ». Jurnal Konstruksi Hukum 2, no 3 (1 juillet 2021) : 558–62. http://dx.doi.org/10.22225/jkh.2.3.3641.558-562.

Texte intégral
Résumé :
The responsibility of the National Police in securing the candidates who will be elected as regional heads and also their deputy is a responsible action during the regional head elections, therefore the police apparatus is very important in maintaining security and order during the election. This study examines the form of security for candidates for regional heads and deputy regional heads in Denpasar City and explains the responsibility of the National Police for the security of candidates for regional heads and deputy regional heads in Denpasar City. The research method used is an empirical legal research method, with a statutory approach. The data used are primary and secondary data obtained by interview, observation and documentation techniques. The results of the study indicate that the security procedures for candidates who will be elected as regional heads and also their representatives in Denpasar City are referred to the rules implemented by the Denpasar Police and based on Article 5 paragraph (2) of Law No. 2 of 2002 concerning the Police. While the responsibility of the National Police for the security of candidates who will be elected as regional heads and also their representatives in Denpasar City is as the bearer of obligations, especially under the command of the Chief of Police, one of the main tasks of carrying out these obligations is the role of the Police as an intelligence unit in overcoming potential security disturbances.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Park, Suhyeon, Younhoon Cho et Suhong Jeong. « Changes in Private Security with Changes in the PUBLIC SAFETY Environment ». J-Institute 1, no 2 (30 décembre 2016) : 26–30. http://dx.doi.org/10.22471/police.2016.1.2.26.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Hunton, P. « Cyber Crime and Security : A New Model of Law Enforcement Investigation ». Policing 4, no 4 (2 août 2010) : 385–95. http://dx.doi.org/10.1093/police/paq038.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Song, Yang, Xingyang Zhang et Xiaolei Zhao. « Research on the application of UAVs in the security of major events ». BCP Social Sciences & ; Humanities 19 (30 août 2022) : 247–53. http://dx.doi.org/10.54691/bcpssh.v19i.1611.

Texte intégral
Résumé :
UAVs have developed rapidly in the police due to their mobility, concealment, wide field of vision, shocking, and other attributes, especially in emergency response, aerial investigation, security guards, social security management, and emergency rescue And other aspects have played advantage and improved work efficiency. As the application of police drones in various police department departments becomes more and more extensive, some problems are increasingly exposed and highlighted in actual combat applications. It is urgent to standardize and improve the application of police drones to improve the Three-dimensional combat capability effectively. The article analyzes this. The construction of an efficient UAV application system for the security of significant events is the functional requirement of the police in the new era. It is an essential means to improve social security's comprehensive prevention and control capabilities and realize the integration of air and ground for significant events. This paper mainly discusses building a UAV public security prevention and control system from the aspects of construction background, requirements, key protection locations, and critical technologies.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Pinochet, Luis Hernan Contreras. « Uma visão organizacional na formulação de políticas de segurança de informações em instituições hospitalares ». O Mundo da Saúde 2011, no 3 (30 septembre 2011) : 278–89. http://dx.doi.org/10.15343/0104-7809.20113278289.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Silva, Caíque Azael Ferreira da, et Pedro Paulo Gastalho de Bicalho. « Psicologia e direitos humanos : por que discutir necroliberalismo nas políticas de segurança ? » Revista Direito e Práxis 13, no 3 (juillet 2022) : 2009–23. http://dx.doi.org/10.1590/2179-8966/2022/69298.

Texte intégral
Résumé :
Resumo A reflexão em torno das políticas de segurança no Rio de Janeiro revela a consolidação de um fenômeno que vem sendo chamado de necroliberalismo, caracterizado pela conjunção de práticas neoliberais e necropolíticas. No presente manuscrito, é feito um interrogatório à Psicologia, a partir de seus fundamentos éticos, para a elucidação do seu papel diante da racionalidade necroliberal que avança nas políticas públicas. As reflexões partem de uma ideia de que as práticas orientadas pelo necroliberalismo vão de encontro com as possibilidades de se garantir o acesso aos direitos fundamentais para parte da população, notadamente os mais pobres, negros e moradores de favelas e periferias. Conclui-se que tais políticas promovem subjetividades ora encarceradas, ora exterminadas, produzindo efeitos importantes para a análise dos processos psicossociais em curso no Brasil.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Oliinyk, Olena S., Roman M. Shestopalov, Volodymyr O. Zarosylo, Mykhaylo I. Stankovic et Sergii G. Golubitsky. « Economic security through criminal policies ». Revista Científica General José María Córdova 20, no 38 (1 avril 2022) : 265–85. http://dx.doi.org/10.21830/19006586.899.

Texte intégral
Résumé :
The article aims to identify the factors that have the greatest impact on economic security. Based on the study of legislative acts of the countries of the European Union, the United States, and relevant scientific literature, an analysis is made of the current situation in the field of economic security, exploring its constituent elements and factors influencing the security of the economy. Among them are ecology, the fight against crime, the financial and taxation spheres, innovative development, and the element itself as a component of the considered social relations, and processes, among others. The article outlines the key areas of public relations and other factors that influence the situation’s state concerning the issue addressed.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Bauer, Lujo, Jay Ligatti et David Walker. « Composing security policies with polymer ». ACM SIGPLAN Notices 40, no 6 (12 juin 2005) : 305–14. http://dx.doi.org/10.1145/1064978.1065047.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

Berdennikov, Mikhail V. « Russia and her security policies ». RUSI Journal 137, no 6 (décembre 1992) : 5–9. http://dx.doi.org/10.1080/03071849208445651.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Vignesh, U., et S. Asha. « Modifying Security Policies Towards BYOD ». Procedia Computer Science 50 (2015) : 511–16. http://dx.doi.org/10.1016/j.procs.2015.04.023.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Bohi, Douglas R., et Michael A. Toman. « Energy security : externalities and policies ». Energy Policy 21, no 11 (novembre 1993) : 1093–109. http://dx.doi.org/10.1016/0301-4215(93)90260-m.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Zajac, Bernard P. « Information security policies made easy ». Computers & ; Security 13, no 3 (mai 1994) : 218–19. http://dx.doi.org/10.1016/0167-4048(94)90074-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
50

Bauer, Lujo, Jay Ligatti et David Walker. « Composing expressive runtime security policies ». ACM Transactions on Software Engineering and Methodology 18, no 3 (mai 2009) : 1–43. http://dx.doi.org/10.1145/1525880.1525882.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie