• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 456
  • 12
  • 12
  • 11
  • 9
  • 5
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 765
  • 765
  • 231
  • 165
  • 117
  • 86
  • 85
  • 83
  • 80
  • 80
  • 80
  • 74
  • 72
  • 64
  • 63
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

A crime without punishment : policy advocacy for European Union Health and Safety legislation on harassment at work

Petri, Hedwig January 2001 (has links)
The study is concerned about employers' liability to protect the mental welfare of employees alongside their physical health. The need for protection is demonstrated in several ways. Firstly, the introduction examines the statistical evidence of harassment in the workplace and its effect on its victims. Secondly, data was collected from nine participants who had taken their employer to court claiming that they had been bullied out of their jobs. These documents which were supplemented in some cases by personal statements, were analysed using the Glaser and Strauss Grounded Theory method tempered with Case Study method. Ethical issues coming to the fore during data collection supplied additional material for a chapter which eflects on problems researchers will encounter when working with vulnerable research participants. Analysis showed the importance of social support for victims and implicated the role the trade unions, the medical and legal professions plays in secondary victimisation for victims of workplace bullying. A review of existing legislation was conducted to determine if internal voluntary guidelines or new legislation would give best protection. Employer-led bullying was identified as the form on which internal guidelines have no impact. Workplace bullying was always found to be morally wrong and the issue of what is legally right but not morally right was discussed. The findings emerging from the analysis together with recommendation to place protection of harassment at work within Health and Safety policies was presented to opinion makers to gauge the level of interest in the investigator's recommendation that European Union Health and Safety officials should take the lead in advancing legislative change outlawing workplace harassment.
172

Colonial legal institutions and their impact upon indigenous practices in Bengal, 1860-1914

Dhillon, Rajwinder Kaur January 2012 (has links)
This thesis examines the impact of colonial legal institutions planted by the British administration upon the working of local indigenous practices in Bengal from 1860 to 1914. The aim of the thesis is two-fold. Firstly, the aim is to highlight the constraints and limitations faced by institutions that were reorganised following the assumption of Crown control in 1858. Secondly, the purpose is to illustrate the ways in which these limitations allowed the native population to mould, and manipulate, state institutions according to local needs and expectations. By examining these issues the aim is to highlight the tenuous relationship between western methods and indigenous practices, at times complementing each other and at other times proving to be incompatible. Through an examination of the system of criminal administration, the thesis seeks to highlight the complexities of the interaction between the local populace and colonial law. Rather than representing rigid categories which highlighted the difference between coloniser and colonised, the system of criminal administration was often the site where boundaries would often become blurred. As the thesis will aim to demonstrate through specific scenarios and cases described both in private memoirs and official records, it was a site which would be shaped by a number of influences- from clashing interests and changing alliances amongst local groups to the conflicting objectives of the colonial rulers themselves. In the process individual agencies were asserted that confound simplistic characterisations of the impact of colonialism in this important region within the British Indian empire.
173

Preventing terror attacks in the Homeland : a new mission for state and local police

Lanier, Cathy L. 09 1900 (has links)
CHDS State/Local / As the Department of Homeland Security continues to develop plans and strategies to guide our government agencies towards a safer environment, state, local, and tribal law enforcement agencies are struggling to define their role in the Homeland Security Mission. This paper proposes the creation of a National Law Enforcement Network made up of the state, local and tribal law enforcement agencies throughout the country. The network design will allow local agencies to reach beyond the traditional law enforcement approach by establishing formal networks that facilitate local, regional, national and eventually global coordination of an effective strategy aimed at preventing future terror attacks in the homeland. The creation of this network will ensure that every police officer in the United States understands their role in preventing future terror attacks. Drilling down to the lowest local level to include businesses, industry and the private sector, the formation of the network expands our detection and prevention capabilities well beyond our current level. / Commander - Special Operations Division, Metropolitan Police Department
174

How can we improve information sharing among local law enforcement agencies?

Miller, Patrick E. 09 1900 (has links)
CHDS State/Local / The events of 9/11 and subsequent examination of the intelligence community in the United States have clearly identified several areas that require immediate repair. While we have, on the federal, state and local levels, a complex system of collecting, developing, and analyzing intelligence that can be used to prevent terrorist attacks, we do not have an accompanying system that shares intelligence information throughout the law enforcement community. The purpose of this thesis is to review information sharing between federal, state and local law enforcement agencies and to suggest methods to improve that capability. In the aftermath of the September 11th attacks, authorities uncovered patterns of suspicious activity occurring in places such as Maryland, Florida, and New Jersey. These activities included individuals paying cash for plane tickets, taking flight lessons, inquiring about crop duster planes, and frequenting drug stores. Taken individually, these incidents were not overly suspicious; nor were they seen as serious when reported to authorities. Yet, all together they illustrate at best highly suspicious behavior, and at worst a picture of a master plan of prospective criminal activity. When collecting data on terrorist potential, one isolated incident in a local jurisdiction may not have obvious significance, but the ability to view all incidents together across cities or states might paint a more complete picture. Agencies are now recognizing the benefits of data sharing across institutions and jurisdictions. / Assistant Police Chief, Ventura Police Department
175

State and local intelligence fusion centers : an evaluative approach in modeling a state fusion center

Forsyth, William A. 09 1900 (has links)
CHDS State/Local / In the final report on the attacks of September 11, 2001, the National Commission on Terrorist Attacks Upon the United States (9/11 Commission) found that the attacks were successful in part because information was not shared and analysis not pooled among the different agencies across all levels of government. Since that time, there have been significant strides to improve cooperation and close the intelligence gaps among the different intelligence and law enforcement services. Effective terrorism prevention, however, requires information and intelligence fusion as a cooperative process at all levels of government so that the flow of intelligence can be managed to support the identification of emerging threats to the homeland. This thesis explains the value of a state/regional fusion center by examining three successful fusion centers in Arizona, Georgia, and Los Angeles. Recommendations from each agency on lessons learned, as well as independent research, have been provided to help state and local agencies develop their own fusion centers. / Supervisory Special Agent (SSA), Federal Bureau of Investigation (FBI)
176

A qualitative analysis of the Turkish Gendarmerie assignment process

Soylemez, Kadir. 03 1900 (has links)
The Turkish General Command of the Gendarmerie, as a paramilitary police force, provides public security and order for people throughout 81 provinces and 902 districts. The Gendarmerie performs security and public order services in 92% of Turkey geographically and for 41% of the total population. Approximately 27 million people live in Gendarmerie jurisdiction areas / this number increases to 43 million (65% of the population) in the summer months. This study is an organizational analysis of the current assignment process of the Turkish General Command of the Gendarmerie. The analysis recommends long-term and short-term policy changes and implementation methodologies to the assignment process while taking into consideration such a geographically diverse region and often difficult assignment choices for individuals. In addition to the law-enforcement-related operations, the Gendarmerie is tasked to carry out various other types of operations, such as border security, antiterrorism, and peacekeeping. The Gendarmerie Organization, Duty, and Jurisdiction Law classifies these duties under four categories: administrative, judicial, military, and other duties. As a result of this job diversity, the Gendarmerie personnel perform different tasks in different unit areas. Therefore, the existence of geographically diverse billet characteristics has been an obstacle in the Gendarmerie assignment process.
177

Organized crime in the United States organizational analogies for counterinsurgency strategy

Privette, William Heath 12 1900 (has links)
As modern warfare moves towards the lower end of the intensity spectrum, conventional forces are placed in unconventional roles outside their traditional high intensity military specialty. By showing that there are analogies between organized crime and insurgencies, further studies can be conducted on the applicability of modern law enforcement tactics to military operations. This thesis shows that there are organizational and conceptual analogies between organized crime families and insurgencies. They both organize themselves as secret societies with similar hierarchical command structures for both survival and operational needs. Both organized crime families and insurgencies must remain hidden from authorities, whether from law enforcement agencies such as the FBI or the military. The similarity between organized crime and insurgent organizations provides a broad basis for further study in other areas. The FBI and other law enforcement agencies have been combating organized crime families for decades and have used proven techniques of infiltration, informants, wiretaps and electronic eavesdropping to expose organized crimeâ s largely invisible network. Based on the similarities between organized crime families and insurgent organizations, law enforcement tactics and their applicability to modern counterinsurgency doctrine are an area for further study.
178

Somalia Igad's attempt to restore Somalia's transitional federal government

Emathe, Francis E. 12 1900 (has links)
Political solutions have been found for several longstanding conflicts in Africa in 2003 - in the Democratic Republic of the Congo, Liberia and Burundi. The political arrangements in these countries may not necessarily usher in permanent peace and stability, but they at least afford an opportunity to work toward such goals. Unfortunately, this is not the case for Somalia, where anarchy, violence and chaos have prevailed for over 15 years. A national reconciliation conference - the 14th of its kind â sat in Nairobi for two years and finally formed a Transitional Federal Government (TFG) in August, 2004. As usual, the outcome of the conference was not welcomed, either by warlords or later on by Islamic clerics in Somalia. Nonetheless, despite institutional obstacles, the Governmental Authority for Development (IGAD) has continued to press their intention to send peacekeepers to Somalia to reinstall the fragile transitional government against the wishes of the Islamic Courts Council (ICC). This thesis examines the possible strategies that IGAD should consider using in its intended mission of supporting the restoration of the Transitional Inter Governmental Authority for Development (IGAD) has continued to press their intention to send peacekeepers to Somalia to reinstall the fragile transitional government against the wishes of the Islamic Courts Council (ICC). This thesis examines the possible strategies that IGAD should consider using in its intended mission of supporting the restoration of the Transitional Federal Government.
179

Efficient calculation of earth penetrating projectile trajectories

Youch, Daniel F. 09 1900 (has links)
Currently, two methods exist to determine trajectory of a ballistic penetrator: Poncelet Analysis and Differential Area Force Law (DAFL) methods. An exact solution for the Poncelet Equation exists; making for easy computation. However, the one dimensional nature of the equation fails to capture the intricate three-dimensional nature of real world ballistic penetrator trajectories. The DAFL methods employ empirically derived stress algorithms to calculate to forces acting on a differential area of a projectile. These stresses are then used to determine the forces and moments acting on the differential areas. These forces and moments are then used to solve the equations of motion to determine the trajectory of the ballistic penetrator. The DAFL methods accurately capture the three dimensional nature of the penetrator's trajectory, but are computationally intensive which make them slow. The Integrated Force Law (IFL) method combines the computational ease of the Poncelet Analysis with the accuracy of the DAFL methods. In IFL, the projectile shape is modeled as a polynomial. The stress algorithms used in the DAFL methods are them numerically integrated over the top and bottom surfaces of the projectile to determine the force and moment acting on the top and bottom half of the weapon. These two forces and moments are then used to solve the equations of motion. J-hook trajectories are solved in less than 40 seconds and stable trajectories are solved in less than three seconds.
180

Preventing terrorism using information sharing networks

France, Paul 09 1900 (has links)
CHDS State/Local / Many states currently do not have an intelligence fusion center, and therefore, their ability to prevent and deter a terrorist attack is limited by the lack of information sharing. Wisconsin in addition to many states lacks a central hub for information exchange and currently has no system in place that allows the variety of technologies to gain access to a common database to gather and/or exchange information. The vast majority of public safety agencies currently operate their own systems that are incapable of exchanging information. The inability to exchange and/or access information in user-friendly format has inhibited many state and local efforts to keep its citizens safe from the possibility of a terrorist attack. The ultimate goal is to provide a mechanism where law enforcement , public safety and private sector partners can come together with a common purpose and improve the ability to safeguard our homeland and prevent criminal activity. Terrorism Early Warning Systems (TEW's) embody the core of collaboration and are an effective tool to maximize available resources and build trusted relationships. The fusion process should be organized and coordinated on a statewide level between the major Urban Area Security Initiative (UASI) areas and the statewide fusion center concept. / Wisconsin Office of Justice

Page generated in 0.0706 seconds