4 resultados para Protest policing

em Universidade Federal do Rio Grande do Norte(UFRN)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The spatial and temporal fluidity conditioned by the technologies of social interaction online have been allowing that collective actions of protest and activism arise every day in cyberspace - the cyber-activism. If before these actions were located in geographical boundaries, today's demands and mobilizations extrapolate the location, connect to the global, and at the same time, return to the regional through digital virtuality. Within this context of the relationship between digital technology and global flow of sociability, emerges in October 2010 the social movement of the hashtag "#ForaMicarla", which means the dissatisfaction of cibernauts from Natal of Twitter with the current management of the municipality of Natal-RN, Micarla de Sousa (Green Party). We can find in the center of this movement and others who appeared in the world at the same time a technological condition of Twitter, with the hashtag "#". Given this scenario, this research seeks to analyze how the relationship of the agents of movement hashtag "ForaMicarla", based on the principle that it was formed in the Twitter network and is maintained on the platform on a daily basis, it can create a new kind of political culture. Thus, this study discusses theoretically the importance of Twitter and movements that emerge on the platform and through it to understand the social and political demands of the contemporary world and this public sphere, which now seems to include cyberspace

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work of research presents an investigation into the knowledge related to the ostensive policing activities of a group of the Rio Grande do Norte State Military Police Captains. This knowledge, which is decisive and part of Brazilian Military Police Constitutional matters, must be taken into consideration when it comes down to planning and putting into force the services related to ostensive public security. Thus, a historical and social analysis about the formation of the police by starting from foreigner experiences down to Rio Grande do Norte s reality, led by such knowledge, was made. Further, studying Brazilian and local scene, this knowledge was analyzed on the ostensive policing activities as for the principles of the Brazilian National Public Security Plan, Brazilian Classification of Occupations / CBO 2002, the reference documents and studies for police graduation Curricular Basis and Matrix; the Variables of Ostensive Policing, as well as some important competences of police service. Arguing that this knowledge is somehow related to what is presented in this work as Orientation Axis to Military Police Service , research tools such as Critical Case Solution and the answers to the Questionnaire on Fundamental Areas of Military Police Service , having in the end six knowledge models related to ostensive policing activities were used within that group. This knowledge can be classified in three distinct categories of connotations within the military police activity: one with reactive/repressive characteristics being the most predominant; the second as preventive; and another one that revealed that the military police activity is being misused for actions and/or missions outside the scope of action of military police

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The inconclusive policies regarding the teaching background, specifically the Pedagogy Course, whose National Curricular Directives DCN were ratified by the Ministry of Education on April 4th 2006, have been causing protest from the various forces within the scope of the university, specifically in the Pedagogy Departments in which, through their professionals, express the several stands about the pedagogue profile, his/her professional acting field and a curriculum that meets the background needs of this professional. This paper tried to assess, from the viewpoint of the student who graduated from the Pedagogy Course and who acts in classroom in the first years of the Elementary School, to what extent this course meets the background needs of the professional who works as teacher. In specific terms it was this paper's objective to identify the most important background needs of teachers who graduated in Pedagogy, who act in the first years of the Elementary School; To list the contributions and limitations of the Pedagogy Course of CAJIM/UERN in the teachers' background, outlined by the graduates of the course; to raise suggestions for the improvement of the teachers' background in the Pedagogy Course of the CAJIM/UERN. In order to turn these objectives viable we opted for the qualitative approach in research, more precisely for the case study methodology, from which we used as instruments for the execution of the field work the observation in classrooms, semi-structured interviews which became the main instrument used for the data construction and analysis. The data analysis process took place through the content analysis technique based in Bardin (2000). The theoretical line is based on the studies from Schön (2000), Nóvoa (1997), Perrenoud (1993), Alarcão (2003), Ramalho (2003) we also used the National Curricular Directives which serve as current Parameter for the Pedagogy courses. The study indicated that the Pedagogy Course contributed for the personal and professional enrichment, however, difficulties in the theory-practice articulation are still present in the everyday life. The theoretical knowledge assimilated, though represent increments to the professional practice, are not enough to enable a pedagogical practice with excellence. There is a need to consider a curriculum in a dialectic perspective, configurator of social and cultural practices sustained by the reasoning as praxis, thus it must not be seen solely in a theoretical plan, mas as a process that builds itself between the acting and the reasoning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Information is one of the most valuable organization s assets, mainly on a global and highly competitive world. On this scenery there are two antagonists forces: on one side, organizations struggle for keeping protected its information, specially those considered as strategic, on the other side, the invaders, leaded by innumerous reasons - such as hobby, challenge or one single protest with the intention of capturing and corrupting the information of other organizations. This thesis presents the descriptive results of one research that had as its main objective to identify which variables influence the Executives´ and CIOs´ perceptions toward Information Security. In addition, the research also identified the profile of Rio Grande do Norte s organizations and its Executives/CIOs concerning Information Security, computed the level of agreement of the respondents according to NBR ISO/IEC 17799 (Information technology Code of practice for information security management) on its dimension Access Control. The research was based on a model, which took into account the following variables: origin of the organization s capital, sector of production, number of PCs networked, number of employees with rights to network, number of attacks suffered by the organizations, respondent´s positions, education level, literacy on Information Technology and specific training on network. In the goal´s point of view, the research was classified as exploratory and descriptive, and, in relation of the approach, quantitative. One questionnaire was applied on 33 Executives and CIOs of the 50 Rio Grande do Norte s organizations that collected the highest taxes of ICMS - Imposto sobre Circulação de Mercadorias on 2000. After the data collecting, cluster analysis and chi-square statistical tools were used for data analysis. The research made clear that the Executives and CIOs of Rio Grande do Norte s organizations have low level of agreement concerning the rules of the NBR ISO/IEC 17799. It also made evident that the Executives and CIOs have its perception toward Information Security influenced by the number of PCs networked and by the number of attacks suffered by the organizations