• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 53
  • 8
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 84
  • 84
  • 65
  • 34
  • 27
  • 26
  • 22
  • 14
  • 13
  • 12
  • 12
  • 10
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

US store detectives : the relationship between individual characteristics and job performance

Hayes, Read January 2001 (has links)
US retailers lose over $30 billion in merchandise annually. Merchants also suffer billions more in losses of cash, supplies, time, equipment, and growing civil liability costs. In order to control these losses, retail companies use a combination of people, programs, and systems. A review of the literature indicates specialised loss prevention employees are an important part of many asset protection programs.;A major interest of managers is improving the efficiency of their crime and loss control processes, including loss prevention store detective programs. Retail managers commonly use job performance reviews to gauge the individual efficacy of store detectives. In addition to job training, and job output supervision, research has indicated certain stable characteristics of individuals helps explain actual job performance, making pre-employment selection a critical part of process improvement. However, relatively little attention has been devoted to the selection of in-store detectives in the literature.;Qualitative research was used to identify critical job tasks in order to develop and validate a specialised job performance instrument. The preliminary research with subject matter experts indicated four distinct job roles of store detectives. This job analysis also resulted in a new job performance rating instrument later tested in the quantitative phase of the project.;Subsequently, a quantitative study of 201 US store detectives (using the performance instrument in a concurrent validity design) developed four distinct selection models designed to help explain role-specific job performance variance. Four hypothesis regarding the relationship between biographical data, personality traits, cognitive ability and the four measures of job performance were tested using multiple and logistic regression. The four resulting models explained between 13% and 23% of the variance in detective job performance measures.;Implications of the project's findings, and suggestions are also discussed in context t the current sample, as well as prior work in pre-employment selection research.
42

Proposta e implementação de uma Camada de Integração de Serviços de Segurança (CISS) em SoC e multiplataforma. / Proposal and Implementation of an Security Services Integration Layer (ISSL) in SoC and multiplatform.

Pereira, Fábio Dacêncio 09 November 2009 (has links)
As redes de computadores são ambientes cada vez mais complexos e dotados de novos serviços, usuários e infra-estruturas. A segurança e a privacidade de informações tornam-se fundamentais para a evolução destes ambientes. O anonimato, a fragilidade e outros fatores muitas vezes estimulam indivíduos mal intencionados a criar ferramentas e técnicas de ataques a informações e a sistemas computacionais. Isto pode gerar desde pequenas inconveniências até prejuízos financeiros e morais. Nesse sentido, a detecção de intrusão aliada a outras ferramentas de segurança pode proteger e evitar ataques maliciosos e anomalias em sistemas computacionais. Porém, considerada a complexidade e robustez de tais sistemas, os serviços de segurança muitas vezes não são capazes de analisar e auditar todo o fluxo de informações, gerando pontos falhos de segurança que podem ser descobertos e explorados. Neste contexto, esta tese de doutorado propõe, projeta, implementa e analisa o desempenho de uma camada de integração de serviços de segurança (CISS). Na CISS foram implementados e integrados serviços de segurança como Firewall, IDS, Antivírus, ferramentas de autenticação, ferramentas proprietárias e serviços de criptografia. Além disso, a CISS possui como característica principal a criação de uma estrutura comum para armazenar informações sobre incidentes ocorridos em um sistema computacional. Estas informações são consideradas como a fonte de conhecimento para que o sistema de detecção de anomalias, inserido na CISS, possa atuar com eficiência na prevenção e proteção de sistemas computacionais detectando e classificando prematuramente situações anômalas. Para isso, foram criados modelos comportamentais com base nos conceitos de Modelo Oculto de Markov (HMM) e modelos de análise de seqüências anômalas. A CISS foi implementada em três versões: (i) System-on-Chip (SoC), (ii) software JCISS em Java e (iii) simulador. Resultados como desempenho temporal, taxas de ocupação, o impacto na detecção de anomalias e detalhes de implementação são apresentados, comparados e analisados nesta tese. A CISS obteve resultados expressivos em relação às taxas de detecção de anomalias utilizando o modelo MHMM, onde se destacam: para ataques conhecidos obteve taxas acima de 96%; para ataques parciais por tempo, taxas acima de 80%; para ataques parciais por seqüência, taxas acima de 96% e para ataques desconhecidos, taxas acima de 54%. As principais contribuições da CISS são a criação de uma estrutura de integração de serviços de segurança e a relação e análise de ocorrências anômalas para a diminuição de falsos positivos, detecção e classificação prematura de anormalidades e prevenção de sistemas computacionais. Contudo, soluções foram criadas para melhorar a detecção como o modelo seqüencial e recursos como o subMHMM, para o aprendizado em tempo real. Por fim, as implementações em SoC e Java permitiram a avaliação e utilização da CISS em ambientes reais. / Computer networks are increasingly complex environments and equipped with new services, users and infrastructure. The information safety and privacy become fundamental to the evolution of these environments. The anonymity, the weakness and other factors often encourage people to create malicious tools and techniques of attacks to information and computer systems. It can generate small inconveniences or even moral and financial damage. Thus, the detection of intrusion combined with other security tools can protect and prevent malicious attacks and anomalies in computer systems. Yet, considering the complexity and robustness of these systems, the security services are not always able to examine and audit the entire information flow, creating points of security failures that can be discovered and explored. Therefore, this PhD thesis proposes, designs, implements and analyzes the performance of an Integrated Security Services Layer (ISSL). So several security services were implemented and integrated to the ISSL such as Firewall, IDS, Antivirus, authentication tools, proprietary tools and cryptography services. Furthermore, the main feature of our ISSL is the creation of a common structure for storing information about incidents in a computer system. This information is considered to be the source of knowledge so that the system of anomaly detection, inserted in the ISSL, can act effectively in the prevention and protection of computer systems by detecting and classifying early anomalous situations. In this sense, behavioral models were created based on the concepts of the Hidden Markov Model (MHMM) and models for analysis of anomalous sequences. The ISSL was implemented in three versions: (i) System-on-Chip (SoC), (ii) JCISS software in Java and (iii) one simulator. Results such as the time performance, occupancy rates, the impact on the detection of anomalies and details of implementation are presented, compared and analyzed in this thesis. The ISSL obtained significant results regarding the detection rates of anomalies using the model MHMM, which are: for known attacks, rates of over 96% were obtained; for partial attacks by a time, rates above 80%, for partial attacks by a sequence, rates were over 96% and for unknown attacks, rates were over 54%. The main contributions of ISSL are the creation of a structure for the security services integration and the relationship and analysis of anomalous occurrences to reduce false positives, early detection and classification of abnormalities and prevention of computer systems. Furthermore, solutions were figured out in order to improve the detection as the sequential model, and features such as subMHMM for learning at real time. Finally, the SoC and Java implementations allowed the evaluation and use of the ISSL in real environments.
43

Proposta e implementação de uma Camada de Integração de Serviços de Segurança (CISS) em SoC e multiplataforma. / Proposal and Implementation of an Security Services Integration Layer (ISSL) in SoC and multiplatform.

Fábio Dacêncio Pereira 09 November 2009 (has links)
As redes de computadores são ambientes cada vez mais complexos e dotados de novos serviços, usuários e infra-estruturas. A segurança e a privacidade de informações tornam-se fundamentais para a evolução destes ambientes. O anonimato, a fragilidade e outros fatores muitas vezes estimulam indivíduos mal intencionados a criar ferramentas e técnicas de ataques a informações e a sistemas computacionais. Isto pode gerar desde pequenas inconveniências até prejuízos financeiros e morais. Nesse sentido, a detecção de intrusão aliada a outras ferramentas de segurança pode proteger e evitar ataques maliciosos e anomalias em sistemas computacionais. Porém, considerada a complexidade e robustez de tais sistemas, os serviços de segurança muitas vezes não são capazes de analisar e auditar todo o fluxo de informações, gerando pontos falhos de segurança que podem ser descobertos e explorados. Neste contexto, esta tese de doutorado propõe, projeta, implementa e analisa o desempenho de uma camada de integração de serviços de segurança (CISS). Na CISS foram implementados e integrados serviços de segurança como Firewall, IDS, Antivírus, ferramentas de autenticação, ferramentas proprietárias e serviços de criptografia. Além disso, a CISS possui como característica principal a criação de uma estrutura comum para armazenar informações sobre incidentes ocorridos em um sistema computacional. Estas informações são consideradas como a fonte de conhecimento para que o sistema de detecção de anomalias, inserido na CISS, possa atuar com eficiência na prevenção e proteção de sistemas computacionais detectando e classificando prematuramente situações anômalas. Para isso, foram criados modelos comportamentais com base nos conceitos de Modelo Oculto de Markov (HMM) e modelos de análise de seqüências anômalas. A CISS foi implementada em três versões: (i) System-on-Chip (SoC), (ii) software JCISS em Java e (iii) simulador. Resultados como desempenho temporal, taxas de ocupação, o impacto na detecção de anomalias e detalhes de implementação são apresentados, comparados e analisados nesta tese. A CISS obteve resultados expressivos em relação às taxas de detecção de anomalias utilizando o modelo MHMM, onde se destacam: para ataques conhecidos obteve taxas acima de 96%; para ataques parciais por tempo, taxas acima de 80%; para ataques parciais por seqüência, taxas acima de 96% e para ataques desconhecidos, taxas acima de 54%. As principais contribuições da CISS são a criação de uma estrutura de integração de serviços de segurança e a relação e análise de ocorrências anômalas para a diminuição de falsos positivos, detecção e classificação prematura de anormalidades e prevenção de sistemas computacionais. Contudo, soluções foram criadas para melhorar a detecção como o modelo seqüencial e recursos como o subMHMM, para o aprendizado em tempo real. Por fim, as implementações em SoC e Java permitiram a avaliação e utilização da CISS em ambientes reais. / Computer networks are increasingly complex environments and equipped with new services, users and infrastructure. The information safety and privacy become fundamental to the evolution of these environments. The anonymity, the weakness and other factors often encourage people to create malicious tools and techniques of attacks to information and computer systems. It can generate small inconveniences or even moral and financial damage. Thus, the detection of intrusion combined with other security tools can protect and prevent malicious attacks and anomalies in computer systems. Yet, considering the complexity and robustness of these systems, the security services are not always able to examine and audit the entire information flow, creating points of security failures that can be discovered and explored. Therefore, this PhD thesis proposes, designs, implements and analyzes the performance of an Integrated Security Services Layer (ISSL). So several security services were implemented and integrated to the ISSL such as Firewall, IDS, Antivirus, authentication tools, proprietary tools and cryptography services. Furthermore, the main feature of our ISSL is the creation of a common structure for storing information about incidents in a computer system. This information is considered to be the source of knowledge so that the system of anomaly detection, inserted in the ISSL, can act effectively in the prevention and protection of computer systems by detecting and classifying early anomalous situations. In this sense, behavioral models were created based on the concepts of the Hidden Markov Model (MHMM) and models for analysis of anomalous sequences. The ISSL was implemented in three versions: (i) System-on-Chip (SoC), (ii) JCISS software in Java and (iii) one simulator. Results such as the time performance, occupancy rates, the impact on the detection of anomalies and details of implementation are presented, compared and analyzed in this thesis. The ISSL obtained significant results regarding the detection rates of anomalies using the model MHMM, which are: for known attacks, rates of over 96% were obtained; for partial attacks by a time, rates above 80%, for partial attacks by a sequence, rates were over 96% and for unknown attacks, rates were over 54%. The main contributions of ISSL are the creation of a structure for the security services integration and the relationship and analysis of anomalous occurrences to reduce false positives, early detection and classification of abnormalities and prevention of computer systems. Furthermore, solutions were figured out in order to improve the detection as the sequential model, and features such as subMHMM for learning at real time. Finally, the SoC and Java implementations allowed the evaluation and use of the ISSL in real environments.
44

Privatised peacekeeping : a necessary evil?

Waddington, Conway. January 2008 (has links)
The rise of the Private Military Industry has been cemented in modern global political reality, but where next will this multi-billion dollar industry go and what form will it take after the market boom of Iraq? Post-Colonial Africa is considered the birthplace of the modern mercenary and historically features prominently as a testament to the potential for immoral privately sponsored military activities within unstable states. Moreover, it is a rich market that the Private Military Industry is increasingly turning its attention to, albeit focussing on support functions for now, but a massive industry with a competitive and poorly regulated market environment will invariably begin to explore different avenues as competition grows. With market diversification grows the ethical risk of abuse. At the same time, peacekeeping efforts across the continent are hampered by numerous factors, not least of all a chronic lack of trained personnel. Could the legal and political legitimacy, not to mention the sustainable market environment sought by the PMI potentially exist in multilaterally sanctioned, privatised peacekeeping and peace support operations in Africa? Can the ethical challenges of mercenarism be suspended or even bypassed for the sake of expedient intervention in potential genocides, or be perhaps pragmatically accepted as an inevitable development that should be embraced rather than condemned, for strategic security reasons? Can the ethical condemnation of the proposed means of peace support be overridden by the potential ends generated by such a move? Is the world ready for privatised peacekeepers? This dissertation explores the ethical background to the privatisation of military operations and how these foreign policy trends and social perceptions of control of force impact on the notion of privatised peacekeeping, particularly in the context of operations in Africa. It investigates the philosophical implications of privatised peacekeeping by way of a constrained pragmatic form of consequentialist evaluation that warns against reckless expediency. Ultimately, this dissertation offers a more philosophically suitable argument to justify and control this seemingly inevitable next step in the trend of privatisation of force. / Thesis (M.A.)-University of KwaZulu-Natal, Pietermaritzburg, 2008.
45

Private Sicherheitsdienste und Waffenrecht /

Storch, Thomas, January 2001 (has links) (PDF)
Univ., Diss.--Bielefeld, 2000. / Literaturverz. S. 263 - 276.
46

Outsourcing security : the role of private military companies and arms dealers in modern conflicts /

Lyons, Clint, January 1900 (has links)
Thesis (M.S.)--Missouri State University, 2009. / "May 2009." Includes bibliographical references (leaves 89-97). Also available online.
47

Prevention mechanisms to minimise injuries on duty : perceptions of security officers in a private security company

Van Rooyen, Bernadette 12 1900 (has links)
The aim of the study was to determine the causes of IODs in the workplace and to identify possible preventative measures to reduce IODs. A literature review was conducted as part of the study, involving assessment of all related articles and books on the subject of IODs in the workplace. A qualitative research methodology was utilised to conduct the study. The main research instruments were four focus group interviews and eight individual interviews. The study concluded that employees experienced IODs in different ways, with most participants describing negative experiences such as physical pain, undue financial hardship, psychological trauma and lack of support from the employer. A minor percentage experienced IODs in a positive sense in that there is heightened safety awareness in the workplace after an IOD has occurred, and the adoption of a more cautious approach by employees when performing their duties. From a practical and organisational/managerial perspective, the adoption of effective training of security officers and adherence to organisational standard operating procedures will assist in reducing IODs in the workplace. Limitations of the study included the small sample size from the research population, perceived language barriers during the interview processes and non-participation and inputs from managers at the organisation. However, it is hoped that the study will form the basis for further research to broaden the field to include parastatal or public-service entities / Human Resource Management / M. Com. (Human Resource Management)
48

O padrão de atuação das empresas de segurança privada: o caso de Angola

Paoliello, Tomaz Oliveira [UNESP] January 2011 (has links) (PDF)
Made available in DSpace on 2014-06-11T19:27:59Z (GMT). No. of bitstreams: 0 Previous issue date: 2011Bitstream added on 2014-06-13T18:32:20Z : No. of bitstreams: 1 paoliello_to_me_mar.pdf: 427260 bytes, checksum: 8192f058d3716664b52425847d1d9b5e (MD5) / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP) / Nos dias de hoje, um dos fenômenos que chama atenção e suscita o debate no âmbito da disciplina de relações internacionais é a ascensão das chamadas empresas de segurança privada. A atual dissertação se dedica ao estudo da inserção de tais empresas no contexto angolano durante os anos 1990. Essa inserção é marcada por dois momentos, um primeiro, paradigmático para a literatura sobre o tema, trata da ação particular da empresa Executive Outcomes. Num segundo momento, abordamos o desenvolvimento de um mercado local para a segurança privada, construído por uma série de dispositivos que fazem do panorama angolano um modelo único e ainda pouco estudado. Angola foi um campo de teste para a atuação das empresas de segurança privada, mas acabou se transformando num caso excepcional, com uma série de empresas locais provendo a segurança para o país durante o conflito interno, e tornando-se fundamentais para o desenho de poder em Angola. Essa situação é derivada de uma série de especificidades da história angolana, notadamente a permanente violência, e a perpetuação da fragilidade do Estado. Desenvolvemos a discussão sobre o papel das empresas de segurança privada como novos atores no sistema internacional, e observamos o alcance das descobertas sobre tais empresas quando confrontadas com o caso de Angola / Nowadays, one of the phenomena that draws attention and raises the debate within the discipline of international relations is the rise of the so-called private security companies. The present dissertation studies the inclusion of such companies in the Angolan context during the 1990s. This inclusion is marked by two moments, the first one paradigmatic for the literature on the subject, the particular action of the company Executive Outcomes. Secondly, we discuss the development of a local market for private security, built by a series of devices that make the Angolan landscape a unique and poorly studied model. Angola was a testing ground for the actions of the private security companies, but turned out to be an exceptional case with a number of local companies providing security for the country during its own internal conflict, and making them fundamental for the design of Power in Angola. This situation is derived from a number of specific features of the Angolan history, especially the continued violence and the perpetuation of state fragility. We further explore the discussion on the role of private security companies as new actors in the international system, and observe the range of findings about these companies when confronted with the case of Angola
49

O padrão de atuação das empresas de segurança privada : o caso de Angola /

Paoliello, Tomaz Oliveira. January 2011 (has links)
Orientador: Reginaldo Mattar Nasser / Banca: Mônica Herz / Banca: Flávia de Campos Mello / O Programa de Pós-Graduação em Relações Internacionais é instituído em parceria com a Unesp/Unicamp/PUC-SP, em projeto subsidiado pela CAPES, intitulado "Programa San Tiago Dantas" / Resumo: Nos dias de hoje, um dos fenômenos que chama atenção e suscita o debate no âmbito da disciplina de relações internacionais é a ascensão das chamadas empresas de segurança privada. A atual dissertação se dedica ao estudo da inserção de tais empresas no contexto angolano durante os anos 1990. Essa inserção é marcada por dois momentos, um primeiro, paradigmático para a literatura sobre o tema, trata da ação particular da empresa Executive Outcomes. Num segundo momento, abordamos o desenvolvimento de um mercado local para a segurança privada, construído por uma série de dispositivos que fazem do panorama angolano um modelo único e ainda pouco estudado. Angola foi um campo de teste para a atuação das empresas de segurança privada, mas acabou se transformando num caso excepcional, com uma série de empresas locais provendo a segurança para o país durante o conflito interno, e tornando-se fundamentais para o desenho de poder em Angola. Essa situação é derivada de uma série de especificidades da história angolana, notadamente a permanente violência, e a perpetuação da fragilidade do Estado. Desenvolvemos a discussão sobre o papel das empresas de segurança privada como novos atores no sistema internacional, e observamos o alcance das descobertas sobre tais empresas quando confrontadas com o caso de Angola / Abstract: Nowadays, one of the phenomena that draws attention and raises the debate within the discipline of international relations is the rise of the so-called private security companies. The present dissertation studies the inclusion of such companies in the Angolan context during the 1990s. This inclusion is marked by two moments, the first one paradigmatic for the literature on the subject, the particular action of the company Executive Outcomes. Secondly, we discuss the development of a local market for private security, built by a series of devices that make the Angolan landscape a unique and poorly studied model. Angola was a testing ground for the actions of the private security companies, but turned out to be an exceptional case with a number of local companies providing security for the country during its own internal conflict, and making them fundamental for the design of Power in Angola. This situation is derived from a number of specific features of the Angolan history, especially the continued violence and the perpetuation of state fragility. We further explore the discussion on the role of private security companies as new actors in the international system, and observe the range of findings about these companies when confronted with the case of Angola / Mestre
50

Como se vigia os vigias : o controle da Policia Federal sobre a segurança privada / Watching the watchers : Federal Police control about private security

Lopes, Cleber da Silva 25 April 2007 (has links)
Orientador: Andrei Koerner / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciencias Humanas / Made available in DSpace on 2018-08-10T21:44:23Z (GMT). No. of bitstreams: 1 Lopes_CleberdaSilva_M.pdf: 2526653 bytes, checksum: 008a185418187f4991c15c082e02c99e (MD5) Previous issue date: 2007 / Resumo: A emergência da segurança privada e de organizações e agentes particulares que provêem policiamento de maneira informal colocaram novos problemas para a efetivação dos direitos civis na sociedade brasileira. O trabalho analisa o controle estatal sobre a segurança privada exercido pela Polícia Federal no período 1996-2006. Constata que nos últimos quatro anos ocorreram melhoras nos instrumentos legais que visam assegurar policiamento privado responsável publicamente, mas persistem regras deficientes e mecanismos frágeis para incentivar o controle interno e o controle externo da segurança privada. Verifica também melhoras na capacidade fiscalizadora da Polícia Federal sobre o universo legal da segurança privada, mas permanece baixa e limitada a sua capacidade para fiscalizar o universo informal dos provedores particulares de policiamento / Abstract: The private security emergency and of organizations and private agents that provide policing in an informal way they put new problems for the effectives of the civil rights in the Brazilian society. The work analyzes the state control on the private security exercised by the Federal Police in the period 1996-2006. The study verifies that in the last four years they happened improvements in the legal instruments that they seek to assure responsible policing openly, but they persist deficient rules and fragile mechanisms to motivate the internal control and the private security external control. It also verifies improvements in the capacity supervise of the Federal Police on the private security legal universe, but it stays low and limited his capacity to supervise the providers' peculiar of policing informal universe / Mestrado / Mestre em Ciência Política

Page generated in 0.0811 seconds