Letteratura scientifica selezionata sul tema "Maintenance of security order and defense of possessions"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Maintenance of security order and defense of possessions".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Maintenance of security order and defense of possessions":

1

Чернышева, Г. Н., Г. А. Лавренова, Ю. А. Савич e Э. Б. Лубянская. "ENSURING ECONOMIC SECURITY IN THE LOGISTICS OF THE STATE DEFENSE ORDER". Organizer of Production, n. 3 (9 febbraio 2022): 171–84. http://dx.doi.org/10.36622/vstu.2021.47.14.015.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Введение. Логистику закупок на производственных предприятиях, вовлеченных в процесс и получающих государственное финансирование в системе гособоронзаказа, направленного на поддержание военного потенциала государства, принято рассматривать через призму военно-научных, военно-экономических и военно-производственных возможностей государства на содержание и развитие вооружённых сил. Специфика осуществления таких закупок для вооруженных сил, а также для предприятий необходимых для организации производства ресурсов, услуг и работ заключается в дополнительных рисках, которые необходимо вовремя выявлять и предотвращать, так как они могут нанести вред не только экономической безопасности отдельных предприятий, но и нанести вред обороноспособности страны. Несмотря на то, что регламенты и процедуры заключения и выполнения гособоронзаказа строго прописаны в современном законодательстве, представленном широким перечнем федеральных законов и других нормативно-правовых актов (44 -ФЗ, 223-ФЗ, 275-ФЗ, Приказ 334, Постановление 1465 и др.), в силу противоположности интересов Заказчика и Исполнителя и необходимости соблюдения принципа секретности имеют место нарушения административного и уголовного характера в управлении материальными, финансовыми и информационными потоками. В этих условиях применение субъектами системы гособоронзаказа заказчиками и исполнителями логистического подхода управления материальными, информационными и финансовыми ресурсами позволит усилить контроль и надзор на всех этапах реализации ГОЗ и предотвратить потенциальные угрозы и нарушения. Данные и методы. В статье исследуется логистика реализации основных задач гособоронзаказа по стадиям его заключения и исполнения, включающая методы контроля процессов государственных закупок для обеспечения экономической безопасности с учетом специфики распределения бюджетных средств среди основных субъектов, занимающих монопольное положение. В процессе исследования проблем логистики гособоронзаказа был предложен системный подход, в соответствии с которым выделено три основных подсистемы: подсистема государственного заказчика, подсистема головного исполнителя и подсистема кооперации головного исполнителя, взаимодействие между которыми осуществляется через финансовые отношения. Полученные результаты. В статье предложен комплексный подход к организации контроля и надзора движения финансовых ресурсов между подсистемами системы гособоронзаказа. Заключение. Результаты исследования могут быть использованы в качестве теоретической основы для совершенствования логистики в гособоронзаказе. Материал представляет интерес как для государственных заказчиков, так и для руководителей и специалистов предприятий ОПК, являющихся головными исполнителями гособоронзаказа. Introduction. Procurement logistics at manufacturing enterprises involved in the process and receiving state funding in the system of state defense orders aimed at maintaining the military potential of the state is usually considered through the prism of military-scientific, military-economic and military-production capabilities of the state for the maintenance and development of the armed forces. The specifics of such purchases for the armed forces, as well as for enterprises necessary for the organization of production of resources, services and works, are additional risks that need to be identified and prevented in time, since they can harm not only the economic security of individual enterprises, but also harm the country's defense capability. Despite the fact that the regulations and procedures for concluding and executing a state defense order are strictly prescribed in modern legislation, represented by a wide list of federal laws and other regulatory legal acts ( 44-FZ, 223-FZ, 275-FZ, Order 334, Resolution 1465, etc.), due to the opposite interests of the Customer and the Contractor and the need to comply with the principle of secrecy, there are violations of an administrative and criminal nature in the management of material, financial and information flows. Under these conditions, the use by the subjects of the state defense order system by customers and performers of the logistics approach to managing material, information and financial resources will strengthen control and supervision at all stages of the implementation of the state defense order and prevent potential threats and violations. Data and methods. The article examines the logistics of implementing the main tasks of the state defense order by the stages of its conclusion and execution, including methods of controlling public procurement processes to ensure economic security, taking into account the specifics of the distribution of budget funds among the main subjects occupying a monopoly position. In the process of studying the problems of logistics of the state defense order, a systematic approach was proposed, according to which three main subsystems were identified : the subsystem of the state customer, the subsystem of the head contractor and the subsystem of cooperation of the head contractor, the interaction between which is carried out through financial relations. The results obtained. The article offers a comprehensive approach to the organization of control and supervision of the movement of financial resources between the subsystems of the state defense order system. Conclusion. The results of the study can be used as a theoretical basis for improving logistics in the state defense order. The material is of interest both for state customers and for managers and specialists of defense industry enterprises who are the main executors of the state defense order.
2

Zvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information". Mediaforum : Analytics, Forecasts, Information Management, n. 6 (17 dicembre 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The focus of the article revolves around NATO’s roadmap of smart defense against cyber attacks as the bedrock of Euro-Atlantic security. The author discloses NATO’S new policy and cutting-edge technical initiatives, aimed at focusing on countering global threats and cyber security challenges. It is stressed out, that new ideas towards a more synergetic approach between all the NATO Cyber Defense agencies should be explored to develop a shared framework for cybersecurity that might provide up-to-the date intelligence in order to ensure the development, acquisition and maintenance of the necessary military capabilities. The research highlights the core aspects of the 2010 Lisbon Summit that adopted NATO’s Strategic Concept ‘Active Engagement, Modern Defense: Strategic Concept for the Members of the North Atlantic. Treaty Organization’, that recognizes Cyber Defense as one of its strategic priorities. In particular, to foster Allied Nations’ cooperative efforts to counter terrorism, cyber attacks, prevent the proliferation of nuclear weapons and other weapons of mass destruction (WMD), Reinforce energy security and environmental constraints. Develop the capacity to contribute to energy security, including protection of critical energy infrastructure and transit areas and lines, cooperation with partners, and consultations among Allies on the basis of trategic assessments and contingency planning; In July 2011, NATO Defense Ministers adopted revised NATO Policy on Cyber Defense, which highlighted three areas: • The principles of subsidiarity and proportionality, which involve the assistance provided only upon request, in any other cases, the principle of selfresponsibility of sovereign states is applied; • Avoiding unnecessary duplication of the structures or capabilities and approaches on the international, regional and national levels; • Collaboration based on trust, with regard to the potential sensitivity and vulnerability of the system, the access to which has to be given. After the 2014 Wales Summit, in the revised NATO Cyber Defense Policy, cyber threats were identified as a potential prerequisite for collective defense under the Article 5 of the NATO Treaty. Noteworthy, Cyber Security is responsible for providing the broad spectrum of services in the following specialist security areas: CIS Security, Cyber Defense, Information Assurance, and Computer & Communications Security. Cyber defense is provided by many Alliance bodies: any NATO response concerning collective defense against cyber attacks will be subordinated to the North Atlantic Council (NAC), The Cyber Defense Committee (CDC) – the leading advisory body of the NAC. The executive level is represented by The Cyber Defense Management Board (CDMB), NATO Communications and Information Agency (NCI Agency), Cyber Security incorporates the NATO Computer Incident Response Capability (NCIRC) Technical Centre, providing specialist services to prevent, detect, respond to and recover from cyber security incidents.
3

Irianto, Dwi Wahyu, Sovian Aritonang e Ansori Ansori. "PEMELIHARAAN RUDAL AIR TO GROUND DALAM RANGKA MENDUKUNG TUGAS TNI AU". Strategi dan Kampanye Militer (SKM) 9, n. 2 (25 dicembre 2023): 17–39. http://dx.doi.org/10.33172/skm.v9i2.14562.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Indonesian Air Force (TNI AU) as an integral part of the Indonesian National Army plays a crucial role in maintaining and defending the sovereignty of the nation. However, the TNI AU faces several challenges in maintaining air to ground missiles, which are a vital part of the air defense system. Challenges such as limited maintenance facilities, the quality and quantity conditions of personnel, and insufficient software affect the implementation of maintenance. Therefore, this research will examine the maintenance strategy of air to ground missiles in order to increase the operational readiness and training of the TNI AU in maintaining the security of Indonesian airspace. The research method used is qualitative, using a SWOT analysis to identify strengths, weaknesses, opportunities, and threats related to missile maintenance. This research is conducted at Maintenance Depot 60 with informants chosen purposively. The results of the SWOT analysis will be used as a reference in determining the strategy in the maintenance of air to ground missiles. It is concluded that maintenance facilities, personnel, and software significantly influence the implementation of air to ground missile maintenance
4

Korniyenko, Dmytro, e Yuriy Pavlyutin. "The essence of the mechanism of administrative and legal support of service and combat activity of security forces (on the example of the National Guard of Ukraine)". Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 4, n. 4 (29 dicembre 2020): 35–41. http://dx.doi.org/10.31733/2078-3566-2020-4-35-41.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The article emphasizes that the administrative and legal support of the security forces involves the implementation of the state through a set of legal norms, regulations and means of regulating public relations in the field of security and defense. The narrow definition of administrative and legal support is aimed precisely at the service and combat activities of the security forces. It has been offered to consider administrative and legal maintenance of service and combat activity of security forces as implementation by the state by means of legal norms, instructions and means of streamlining of set of the coordinated and interconnected preventive, protective, protective, mode, isolation-restrictive measures (actions) of bodies, divisions, parts. and individual officials of the security forces, which are carried out in order to ensure the implementation of the tasks facing the security forces in accordance with the law in peacetime and in wartime, as well as crisis situations that threaten national security. The consideration of the mechanism of administrative and legal support of service and combat activity of security forces as a set of legal means, measures and methods by means of which regulation of public relations in the field of service and combat activity of security forces is carried out is substantiated. It has been concluded that the elements of the mechanism of administrative and legal support of the service and combat activities of the security forces include: public relations in the field of providing the service and combat activities of the security forces; authorized subjects of power of the security forces in the field of security and combat activities of the security forces; administrative and legal relations that take place in the process of ensuring the service and combat activities of the security forces; guarantees, measures, means, forms and methods of ensuring the service and combat activities of the security forces. It has been established that a promising area of development of the security and defense sector of the country may be the adoption of a separate Concept of administrative and legal support of combat operations in the field of security and defense (including combat operations of security forces) or other separate regulations.
5

Santoso, Dewi, e Fadhillah Nafisah. "Indonesia’s Global Maritime Axis Doctrine: Security Concerns and Recommendations". Jurnal Hubungan Internasional 10, n. 2 (9 gennaio 2018): 191. http://dx.doi.org/10.20473/jhi.v10i2.7306.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Since President Joko Widodo’s administration begins, there has been a new reform forIndonesia’s maritime psyche. The President sees a huge potential in Indonesia’s maritimesector, especially due to its strong and consolidated domain around Indian and PacificOceans. Hence, he came up with an overarching concept of “Global Maritime Axis”,and set it as the main point of his administration. This so-called “Jokowi’s doctrine”fundamentally represents national vision and development agenda to rebuild the country’sidentity as a maritime nation, boosts its maritime culture, and expands its economy fromwhich Indonesians could prosper. This paper seeks to analyze the impact of Indonesia’smaritime vision in foreign and defense policy, specifically upon maritime diplomacy andresolutions of border disputes; maintenance of territorial integrity, maritime sovereignty,good order at sea, security over the outer islands; and safeguards over national resourcesand exclusive economic zones (EEZ). It then ends with examining recent maritime securitydevelopments, which fosters Indonesia’s position as a maritime power with considerablediplomatic influence on the world, and the opportunities therein.
6

Meleshin, K. Yu, e A. Ye Shabalina. "From the Concept of National Security to the Concept of Civilizational Security as the Basis of Eurasian Integration". EURASIAN INTEGRATION: economics, law, politics 17, n. 2 (6 luglio 2023): 143–52. http://dx.doi.org/10.22394/2073-2929-2023-02-143-152.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In the conditions of the global crisis of the modern world order, the nation-state ceases to be a form adequate to the globalizing world, transforming into corporations-states, on the one hand, and into states-civilizations, on the other. This objectively leads to the transformation of the concept of national security into the concept of civilizational security, corresponding to the needs of transforming states and societies in the conditions of active confrontation of competing concepts of the future global world order.Aim. Substantiation of the evolution of the concept of national security into the concept of civilizational security and identification of its essence.Tasks. Identification of objective reasons for the evolution of security concepts, their differences and essence, development of proposals for the formation of the concept of Eurasian civilizational security.Methods. The structural-functional approach, comparative-historical analysis, system analysis, generalization, synthesis were used.Results. In the process of the development of the global crisis of the world order, there is a growing crisis of national states as a form of organization of societies. In parallel with the transformation of the nation-state into a corporation-state and a state-civilization, there is an objective process of formation of a new concept of civilizational security. The main objects of civilizational security are systems of civilizational values and civilizational identities that ensure the very existence of both civilizations and civilizational States.Conclusions. The ess ence of civilizational security is the maintenance and defense by civilization of its identity based on its own system of values, its model of society and the state, its system of historical and spiritual coordinates.
7

Tolstonosov, Yu, D. Tolstonosov e S. Kravchenko. "PROBLEM ISSUES OF THE ORGANIZATION OF INTERACTION BETWEEN THE NATIONAL GUARD OF UKRAINE AND SUBJECTS OF THE DEFENSE FORCES OF UKRAINE DURING THE PERFORMANCE OF STATE SECURITY TASKS UNDER THE CONDITIONS OF THE STATE OF MARTIAL". STATE SECURITY 1, n. 1 (2023): 75–79. http://dx.doi.org/10.33405/2786-8613/2023/1/1/288277.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The article examines the problems of interaction between the National Guard of Ukraine and other entities of the Defense Forces of Ukraine, analyzes important aspects of this interaction, and identifies problems that arise in the joint performance of tasks to ensure state security in the conditions of martial law. The article provides recommendations and approaches that can play an important role during planning, management and application by the National Guard of Ukraine and other subjects. In the opinion of the authors of the article, such recommendations can be:urgent improvement of domestic legislation, regarding the organization of effective interaction between NSU and other subjects for their joint actions to ensure state security during martial law; a clear distribution of authority, subordination and control, which should encourage coordinated joint actions between subjects;creation of an appropriate structure in management bodies for organization, coordination of efforts and maintenance of effective interaction between subjects;creation of a complex of support for subjects access to up-to-date information, convenient communication channels, which will allow the subjects management bodies to identify emerging risks in a timely manner and quickly take appropriate measures to respond to them; systematic coordination of the use of forces and means of subjects and the sequence of their actions during the performance of both joint and separate service-combat tasks;establishment and constant maintenance of mutual understanding among interacting subjects regarding the ways and means of achieving a common goal; organization and holding of a sufficient number of joint service meetings, training meetings (team-building events) of subjects, which will contribute to the development of trust, mutual assistance and reduction of the degree of mistrust and conflicts between them; the unity of views of the subjects on the preparation, maintenance and coordination of the relevant operational and service documentation; early determination of tasks, order of organization and maintenance of interaction of management bodies of subjects during preparation and during operations (combat operations); conscientious performance by officials of NSU and other subjects of their duties and obligations and adequate responsibility for non-fulfillment of previous agreements. The problems outlined in the article and the recommendations provided make a valuable contribution to the development of effective mechanisms of interaction between the NSU and other subjects of the defense forces of Ukraine, which contribute to the improvement of the overall state security of Ukraine in the conditions of a military conflict.
8

Bespalko, I. A., L. D. Hrekov, D. V. Pekariev e D. L. Fedorchuk. "The concept of information system for providing monitoring of space in order to increase military security". Kosmìčna nauka ì tehnologìâ 28, n. 4 (9 agosto 2022): 03–17. http://dx.doi.org/10.15407/knit2022.04.003.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The concept of an information system to provide the monitoring of space in order to increase military security is proposed with the accounted-for peculiarities of solving problems by the domestic structures of the security and defense sector. The concept is based on the separation of the functionality of open and specialized parts of the algorithm and software support for analyzing the space situation with the attainment of their compatibility. The results of the capability analysis of the publicly available software, which can be used for the evaluation of the space situation as an additional means, are presented. The functional model of the information system to provide the monitoring of space was developed, and a decomposition of its main functional block — a general assessment of the space situation has been carried out. The main software components of the algorithm and software support for the overall estimating of the space situation are determined: detection and monitoring of space objects, maintenance of the database of space objects, modeling and display of the space situation, and their main tasks are outlined. The structural scheme of the software and hardware complex of the general estimation of space situation is developed. Further ways of research are offered: concretization of the functionality of the components of the algorithms and software support of the general estimation of the space situation, substantiation and development of databases’ structures of space objects and objects of space activity, creation of the relevant software and hardware complexes and check of the adequacy of the used mathematical models, as well as issues of information security.
9

Kim, Sang Jin. "The Role of Private Security for a Quarantine and Social Safety Net after the COVID-19 Pandemic: Consensus Control and Reorganization of Safe Society". Forum of Public Safety and Culture 20 (30 gennaio 2023): 139–58. http://dx.doi.org/10.52902/kjsc.2023.20.139.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This study examines the gap (control of infected people and citizens, maintenance of order in hospital facilities, management of quarantine facilities, vaccine supply and demand, etc.) caused by a lack of quarantine response personnel in the process of responding to the COVID-19 pandemic in our society through private security in the event of a recurrence of the pandemic. It was conducted to present it as a good for building a quarantine social safety net. To this end, the purpose of this study is to estimate the role that private security can play as a good for health security and how it will affect the agreed-upon control and safety society reorganization structure. After the presentation, the results were drawn through two interviews. A total of 10 people were selected for the study, including 6 practitioners and 4 researchers. The first interview was held from May 1 to 30, 2021, and the second interview was held from October 1 to November 5, 2021. Investigation results, research project 1. Regarding the 'role of private security for the establishment of an anti-epidemic social safety net', cooperation with public security (12) is 'support for the quarantine authorities to maintain order,' and the expansion of service services (12) is 'maintenance of order in the clinic, vehicle control, and guidance. For the role of 'work, simple administrative assistance work', and the role of assisting quarantine activities (4), the 'role of temporarily supplementing and supporting the work (maintenance of order in inspection clinics, vehicle control and guidance work, etc.) of insufficient medical personnel' was the most showed a high response. Research project 2. Regarding the 'precedence of private expenses for agreed control', cooperation with the quarantine authorities (4) refers to 'whether it is about establishing and supporting a business cooperation system between the quarantine authorities and private security', promoting local governments and strengthening cooperation ( 8) is 'continuous publicity development so that citizens can recognize and sympathize with the role of private security guards in their duties, such as control and guidance', and securing credibility and public confidence (6) is 'to inspire citizens' mature awareness of participation, public institutions, the media, Cooperation activities with civic groups, etc.' was the highest response by factor. Research project 3. As for 'alternatives to the priority of private security for agreed control', securing service quality and professionalism (5) means 'reinforcing education so that private security officers can clearly know their authority and duties', and improving image (8).), 'Strengthening public relations activities to change public perception', and 'Securing the budget of public institutions for the use of private expenses' for privatization and preparation of legal basis (16) showed the highest response by factor. Research project 4. Regarding 'Prospects for Security Reorganization Structure', the confidence in private security and the opportunity to take another leap (9) are 'the effect of increasing the use of private expenses due to cooperation in disaster situations', improving the government's awareness of the private defense system and increasing immunity (7) is 'the effect of incorporating private security as a safety resource into the total force mobilization system in the case of a national disaster', and the effect of increasing the quarantine social safety net (7) is 'preventing the overuse of some quarantine authorities due to the use of alternative resources for private quarantine agents. ' was the highest response for each factor.
10

Mamlyuk, Boris N. "Uniting for “Peace” in the Second Cold War: A Response to Larry Johnson". AJIL Unbound 108 (2014): 129–34. http://dx.doi.org/10.1017/s2398772300002014.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Larry Johnson’s timely and important essay challenges both utopian and realist accounts of UN law and practice by reviving the debate over the nature and functions of the UN General Assembly, particularly the General Assembly’s power to deploy certain legal tactics not only to influence collective security deliberations in the UN Security Council, but also, more significantly, to provide some legal justification for multilateral military “collective measures” in the event of Security Council gridlock. One vehicle by which the General Assembly may assert its own right to intervene in defense of “international peace and security” is a “Uniting for Peace” (UFP) resolution, authorized by resolution 377(V) (1950). At its core, a “uniting for peace” resolution is an attempt to circumvent a Security Council deadlock by authorizing Member States to take collective action, including the use of force, in order to maintain or restore international peace and security. General Assembly resolution 377(V) does not require resolutions to take specific legal form—language that echoes the preambular “lack of unanimity of the permanent members [that results in the Security Council failing to] exercise its primary responsibility for the maintenance of international peace and security” is sufficient to render a given resolution a UFP, provided the General Assembly resolution calls for concrete “collective [forceful] measures.” For this reason, experts disagree on precisely how many times a UFP has indeed been invoked or implemented, although informed analysts suggest UFP has been invoked in slightly more than ten instances since 1950.

Tesi sul tema "Maintenance of security order and defense of possessions":

1

Fall, Papis. "Les déportés de la Sénégambie et du Soudan : entre résistances et répressions dans un espace colonial de 1840 à 1946". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUL074.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
La problématique de la déportation ou des déportés d’Afrique de l’Ouest, durant l’ère coloniale, n’est pas assez prise en charge par l’historiographie africaine d’expression française et même anglaise qui s'est davantage appesantie plus sur les guerres, les résistances et leurs différentes formes. Ce faisant, une réalité d’un pan de l’histoire coloniale reste plus ou moins méconnue. C'est pourquoi nous voudrions étudier le thème suivant, qui a été et demeure d’une actualité brûlante: « Les déportés de la Sénégambie et du Soudan : entre résistances et répressions dans un espace colonial de 1840 à 1946 ». Les acteurs de cette histoire des déportés sont des figures emblématiques et/ou de simples anonymes, qui ont voulu défendre la terre de leurs ancêtres, diriger les destinées de leurs peuples, lutter pour le maintien des valeurs et des traditions africaines. L’histoire de « ces soldats du refus » – à savoir les chefs religieux, les combattants au service de l’islam et des valeurs ou croyances ancestrales et les chefs politiques auxquels s’ajoutent les aliénés mentaux, les bandits sociaux et délinquants, les hommes de presse, les partisans et/ou disciples des chefs et même les tirailleurs sénégalais – mérite d’être examinée. Cette thèse s’inscrit dans les questionnements d’une histoire coloniale attentive aux enjeux de la répression et du maintien de l’ordre. Face au refus manifeste des meneurs de troupes ou créateurs d’émotions de se résigner au diktat colonial, la réponse donnée par les autorités coloniales était, entre autres, de les déporter/emprisonner, les assigner en résidence surveillée, leur interdire de séjour, pour leur couper toute forme de communication, tout contact avec leur entourage et les mettre ainsi hors d’état de nuire. Dans de nombreux cas, il s'agissait d'une forme d'emprisonnement, ce qui nous conduit à l'étude du milieu carcéral qui dévoile les formes d’évitement, les conditions de vie des déportés, l’architecture liée aux questions sécuritaires, etc. L’application de cette technique de répression, entrant dans la logique des politiques de sécurité, était une manière de freiner l’élan des chefs et d’anéantir toutes les résistances coloniales. L'étude que nous souhaitons conduire vise surtout à cerner la place déterminante de la déportation dans le dispositif de répression coloniale, dans le maintien de l’ordre sécuritaire, de mainmise politique, de contrôle des hommes et des espaces, pour l’exploitation des colonies. La trame chronologique que ce travail tente d’éclairer va de 1840 à 1946, une période charnière de l’histoire coloniale en Afrique de l’Ouest, particulièrement en Sénégambie et au Soudan, en ce sens qu’elle est marquée par des transformations rapides à tous les niveaux (politique, économique, social et culturel). La déportation était-elle si fondamentale, si nécessaire pour la réalisation du projet colonial, le maintien de l’ordre sécuritaire ? Dans quelle mesure les déportés constituaient-ils un réel obstacle, une entrave à l’implantation et à l’imposition du pouvoir colonial ? Quel a été le rôle des acteurs de l’ordre dans le processus de déportation ? Cette thèse explore des thématiques majeures telles que les contextes de déportation, les abus de pouvoir des administrateurs coloniaux, l’Indigénat et la justice indigène, les motivations de la déportation, les multiples réponses des indigènes, leur arrestation et déportation, la place des agents/acteurs (armée, gendarmerie et police coloniales) dans le maintien, le rétablissement et/ou la protection de la stabilité et les conséquences politico-économiques d’une telle « technique de pouvoir»
The problem of deportation or deportees from West Africa during the colonial era is not sufficiently addressed by French- and even English-speaking African historiography, which has focused more on wars, resistances and their different forms. In doing so, a reality of a part of colonial history remains more or less unknown. That is why we would like to study the following theme, which has been and remains of burning topicality: "The deportees of Senegambia and Sudan: between resistance and repression in a colonial space from 1840 to 1946". The actors in this story of the deportees are emblematic figures and/or simple anonymous, who wanted to defend the land of their ancestors, direct the destinies of their peoples, fight for the maintenance of African values and traditions. The history of "these soldiers of refusal" – namely religious leaders, fighters in the service of Islam and ancestral values or beliefs and political leaders to which are added the mentally insane, social bandits and delinquents, men of the press, supporters and/or followers of leaders and even Senegalese riflemen – deserves to be examined. This thesis is part of the questions of a colonial history attentive to the issues of repression and the maintenance of order. Faced with the manifest refusal of the leaders of troops or creators of emotions to resign themselves to the colonial diktat, the response given by the colonial authorities was, among other things, to deport/imprison them, to house arrest, to prohibit them from staying, to cut them off all forms of communication, any contact with their entourage and thus put them out of harm's way. In many cases, it was a form of imprisonment, which leads us to the study of the prison environment that reveals the forms of avoidance, the living conditions of the deportees, the architecture related to security issues, etc. The application of this technique of repression, part of the logic of security policies, was a way of slowing down the momentum of the leaders and annihilating all colonial resistance. The study we wish to conduct aims above all to identify the decisive place of deportation in the system of colonial repression, in the maintenance of security order, political control, control of people and spaces, for the exploitation of colonies. The chronological framework that this work attempts to illuminate goes from 1840 to 1946, a pivotal period in colonial history in West Africa, particularly in Senegambia and Sudan, in that it is marked by rapid transformations at all levels (political, economic, social and cultural). Was deportation so fundamental, so necessary for the realization of the colonial project, the maintenance of security order? To what extent did the deportees constitute a real obstacle, an obstacle to the establishment and imposition of colonial power? What was the role of law enforcement actors in the deportation process? This thesis explores major themes such as the contexts of deportation, the abuse of power by colonial administrators, indigénat and indigenous justice, the motivations of deportation, the multiple responses of indigenous people, their arrest and deportation, the place of agents/actors (army, gendarmerie and colonial police) in maintaining, restoring and/or protecting stability and the politico-economic consequences of such a "technique of power"

Capitoli di libri sul tema "Maintenance of security order and defense of possessions":

1

Mitchell, A. Wess. "Barricades of Time". In The Grand Strategy of the Habsburg Empire, 227–55. Princeton University Press, 2019. http://dx.doi.org/10.23943/princeton/9780691196442.003.0008.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This chapter examines Austria at its post-Napoleonic peak, assessing congress diplomacy and the pecuniary, forts-based system that undergirded it. The Habsburg Monarchy emerged from the Napoleonic Wars in a position of unprecedented strength. In the postwar settlement at the Congress of Vienna, Austria regained lost territories to form an expanded empire whose possessions and dependencies stretched from Venice to Cracow. To protect these enlarged holdings, Habsburg leaders extrapolated on past frontier strategies to build a European-wide security system based on two broad components: a reorganized and fortified network of buffer territories integrating neighboring lands into Austrian defense; and elaborate diplomatic structures that mediated conflict and co-opted rivals into the joint management of Habsburg buffers. The resulting “Vienna system” mitigated the time pressure of managing multiple frontiers while converting long-standing enemies into participants in the maintenance of Austrian power. This, in turn, obviated the need for large standing military commitments on the scale that would have been demanded to manage Austria’s sprawling position through force alone. The apogee of Habsburg strategic statecraft, this system of security endowed Austria with many of the attributes of hegemony at an affordable cost to itself, while creating conditions of European stability that lasted for half a century.
2

Guo, Deming, Yi Liang, Mingyue Qiu e Dianwei Zhang. "Multi-Dimensional Based Intelligent Patrol Path Planning Design". In Frontiers in Artificial Intelligence and Applications. IOS Press, 2024. http://dx.doi.org/10.3233/faia231226.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
With the rapid development of economy and technology and the continuous growth of population, urbanization is accelerating and the social situation is becoming more and more complicated. Especially in densely populated urban areas, the pressure of law and order rises significantly. In this context, public security patrol defense has become an important link in the maintenance of public security, and it is crucial to improve its effectiveness. In order to protect people’s lives and properties, this study integrates public security patrol with multidimensional path planning to optimize the patrol work. The current situation and challenges of the integration are analyzed, and algorithms such as FP-Growth, Mountaineering, Apriori, Artificial Potential Field, and Optimized Ant Colony are applied to realize multi-dimensional intelligent patrol paths in simulation. Prospects for the integration of the two are comprehensively explored to provide new ideas and guidance for the development of public security patrol, and to contribute wisdom and strength to the construction of a safer and more stable society.

Atti di convegni sul tema "Maintenance of security order and defense of possessions":

1

Morota, Hidetsugu, Hiroshi Suzuki, Takashi Sakihama, Hesham R. Nasif e Hiroshi Sano. "Risk-Informed and Defense-in-Depth Oriented Plant Design Approach". In 2012 20th International Conference on Nuclear Engineering and the ASME 2012 Power Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/icone20-power2012-54810.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Defense-in-Depth is the basis of safety design of nuclear plants, and refined and strengthened year by year. Nowadays, the importance of it has been further highlighted triggered by the accident at Fukushima Daiichi Nuclear Power Station. Accidents described previously have been shown it could not care enough to uncertainty related to design, construction, maintenance and operation has exposed. It’s the lessons learned of that is to say to reduce uncertainty of design is the use of risk informed is essential. Therefore, the establishment of the design approach that uses risk informed consideration of the Defense-in-Depth is an important theme. Defense-in-Depth is a measure which prevents the increase of the event frequency and core damage in consideration of the degree of safety margins, redundancy, diversity and consideration of radiation safety due to core damage and security. The plant designers and utilities have made efforts to ensure safety utilized conventional design technique, which means deterministic, and risk information, in order to incorporate Defense-in-Depth concepts. To consider Defense-in-Depth in the design phase, various requirements should be taken into consideration. It has been coming to be able to perform more rational and quantitative judgment by utilization of risk information. In that case, while the designers of various fields will work in cooperation to ensure safety, if there are common utilization schemes for risk information among designers, more efficient and rational design works can be advanced in consideration of Defense-in-Depth. However, conventionally, it is hard to say that such schemes have functioned in order that designers may advance design works in collaboration. This research intends to generate the schemes which advance design works in sharing the same risk information databases, which mean various risk indications etc), in other words, the schemes which will become lingua franca for utilizing risk information, in case of nuclear plants designs.

Vai alla bibliografia