929 resultados para private security military company


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In 1924 the Cumann na nGaedheal government introduced the first Military Service Pensions Act to provide monetary compensation for those who fought for Irish independence between 1916 and 1923. Pensioners who were in receipt of remuneration from the state as civil and public servants had a portion of their pension deducted commensurate with their state income. This controversial provision was criticised by all political parties as representing a mean-spirited attitude towards veterans of the independence campaign and treating civil and public servants differently from those in private employment. It was eventually modified in the 1940s and abolished in the 1950s. This article provides a case study that highlights the parsimonious attitude of Irish governments towards veterans of the independence campaign and shows how the treatment of public and civil servants reflected tensions between the government and the civil service in the early years of the state.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The production of reports and the distribution of information have become integral to the operation of many non-governmental organizations. In this regard, the fact that the all-women organization of Checkpoint Watch publishes reports about the Israeli checkpoints in the occupied West Bank seems to comply with current trends. However, the reports—most of which are short repetitive descriptions of the banality and everydayness of the military checkpoints, counting the number of people and cars waiting, commenting on the manner in which the checks are performed and meticulously documenting what mostly amounts to minor incidents of humiliation and distress—do not seem to abide by any convention of reporting. This work analyzes the reporting praxis of the organization and claims that it should be understood as a form of activism in and of itself. Tracking the ways in which the reports address the Israeli public through the concept of parrhesia, the work suggests that this form of reporting enables the women activists to use their gendered marginality to make their way into the highly masculinized and militarized Israeli security discourse.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents a multimodal analysis of online self-representations of the Elite Squad of the military police of Rio de Janeiro, the Special Police Operations Battalion BOPE. The analysis is placed within the wider context of a “new military urbanism”, which is evidenced in the ongoing “Pacification” of many of the city’s favelas, in which BOPE plays an active interventionist as well as a symbolic role, and is a kind of solution which clearly fails to address the root causes of violence which lie in poverty and social inequality. The paper first provides a sociocultural account of BOPE’s role in Rio’s public security and then looks at some of the mainly visual mediated discourses the Squad employs in constructing a public image of itself as a modern and efficient, yet at the same time “magical” police force.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Even before the Russian air force launched its first strikes over Syria, there was already a Russian presence on the battleground. These were not the spetsnaz, Kremlin’s special forces, but war correspondents from the leading Russian media outlets. This was as clear a sign as any that the Russia’s priority has shifted from Ukraine, where these reporters spent most of the past 18 months, to Syria.

There is, however, no unanimity on Russia’s latest escalation in Syria. As Russian state TV stations report successes of Russia’s high-precision weapons projecting an image of a high-tech Russian military equal to the US, doubts persist about the latest adventure in the Middle East.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Attitudes towards a regional military force are of paramount importance when exploring public support for regional integration. Until now, however, scholarly research has not considered the influence of attitudes towards a regional military mechanism in the sub-Saharan African context. Using Afrobarometer data, we demonstrate that military concerns are vital when exploring Tanzanian attitudes towards the proposed political federation of the East African Community (EAC), the East African Federation (EAF). More specifically, opposition to military cooperation strongly influences Tanzanian scepticism of the EAF. This finding is highly relevant given that referendums in the participating member states must be passed to facilitate political integration. Heightened opposition towards military cooperation raises the possibility of the public rejecting a politically integrated EAC. This poses a potential obstacle to the implementation of joint security policies and crucial mechanisms to provide a more stable region at large. We account for alternative explanations of Tanzanian opinion formation and reflect on the strength of military-orientated concerns for investigating public support for the East African project specifically and regional integration in sub-Saharan Africa more widely.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

COMTEMP – Companhia de Temperos, Lda. is a Portuguese company that produces vinegars (e.g. CRISTAL vinegars), sauces and condiments. This case study aims to analyze its attractiveness to receive a venture capital investment. The main covered topics are arranged into the following sections: foundation, company, industry, competition, industrial kitchen opportunity, financial strategy and decision.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

George Ridout (1791-1871) was a member of the York volunteers during the War of 1812. He served as 3rd lieutenant in the grenadier company of the York militia, fought in the Battle of Queenston Heights, and was taken prisoner of war in April, 1813 when the Americans occupied York. Ridout studied law, and was admitted to the bar in Janurary 1813. He was an active member of the Law Society of Upper Canada, becoming a bencher in 1820, serving as treasurer for several years, and assisting in the development of the library. In 1828 he was appointed judge of the Niagara District Court and reappointed in 1832. In 1836, Sir Francis Bond Head, Lieutenant-Governor, charged Ridout with insult to the person and office of the Lieutenant Governor and disloyalty to the policies of the crown, and dismissed him from his offices. Ridout denied the charges and was eventually ordered to be reinstated by Lord Glenelg, the colonial secretary. Sir Francis Bond Head refused to do so, and instead chose to resign.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The bill is a proposal by the government to purchase Welland Canal stock held in private hands. The bill was read for the first time on Wednesday 4 August, 1841, and received second reading on 10th August, 1841. One hundred and fifty copies were printed of the bill. This example was addressed to Samuel Street at the Falls of Niagara, by William Hamilton Merritt, September 1841.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Welland Power and Supply Canal Company Limited, established in 1893 and incorporated in 1894 with a capital stock of $500,000. The aim of the company was to harness the natural water supply of the Niagara and Welland Rivers. In 1898 the Canadian Electrical News published a report by Henry Symons, QC outlining the main project of the company. This project involves the construction of a canal from the Welland River to the brow of the mountain at Thorold, a distance of 8 miles; the construction at Thorold of a power house, and from Thorold to Lake Ontario, a raceway by which to carry water into the lake. The estimate for the machinery to generate 100,000 horse power is £125,000; for transmission line to Toronto at a voltage of 10,000….The total estimate therefore amounts to £2,452,162, or roughly speaking, $12,000,000. Source: Canadian Electrical News, August 1898, p. 172. In 1899 the company officers petitioned the federal government desiring a name change to the Niagara-Welland Power Company Limited. Officers of the company were Harry Symons, President; Charles A. Hesson, Vice-President; and M.R. O’Loughlin, James B. Sheehan, James S. Haydon, Frederick K. Foster, directors; John S. Campbell, secretary-treasurer. The company’s head offices were located in St. Catharines, with a New York (City) office on Broad Street. In 1905 and 1909 the company petitioned the federal government for additional time to construct its works, which was granted. The company had until May 16, 1915 to complete construction. John S. Campbell (1860-1950) was a graduate of the University of Toronto and Osgoode Hall. During his university years John began his military career first in "K" Company, Queens Own rifles and then later as Commanding Officer of the 19th Lincoln Regiment, from 1906 to 1910. Upon his return to St. Catharines John Campbell served as secretary in the St. Catharines Garrison Club, a social club for military men begun in 1899. After being called to the Bar, he became a partner in the firm of Campbell and McCarron and was appointed to the bench in 1916, serving until retirement in 1934. Judge Campbell served as an alderman for several terms and was the mayor of St. Catharines in 1908 and 1909. He also served as the first chairman of the St. Catharines Public Utilities in 1914. John S. Campbell was married to Elizabeth Oille, daughter of Jerome B. and Charlotte (St. John) Oille. The family home "Cruachan" was located at 32 Church St.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Electrical Development Company of Ontario was created in 1903. It was one of three private power companies that had water power leases with the Niagara Parks Commission, but was the only one that was financed with Canadian capital. The company built the Toronto Power Generating Station at Niagara Falls beginning in 1906, and the power house was completed in 1913. During the construction, there was much debate about whether the utility should remain privately operated or become a public utility. In 1920, the company became part of the public utility.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A catalogue by Alkit with uniform descriptions and purchasing information for Military men and women.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Extract from the minutes of the board of directors of the Long Point Company (3 pages, printed). This includes private instructions for Alfred March, steward at Long Point. This has the names J.I. Mackenzie, secretary-treasurer and Joseph A. Woodruff, president on the bottom of the page, Feb. 25, 1882.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Le sujet sur lequel porte la présente étude est inspiré de la problématique à la base du développement du commerce électronique : la confiance. En effet, l’accroissement exponentiel du nombre d’internautes et des sites Web commerciaux pose un sérieux problème à ce niveau. Ces sites présentent au public une information et des services divers, mais peu vérifiables. Ainsi, le principal obstacle au développement du commerce électronique avec les particuliers est le manque de confiance qu’inspirent les lieux visités. En effet, comment savoir si l’entreprise existe, quelles sont ses politiques concernant la sécurité ou la gestion des renseignements personnels, etc. La vérification et la certification des sites apparaissent comme une solution de plus en plus attrayante et utilisée pour ajouter cet élément de confiance. Déjà, de nombreux sceaux de qualité sont apparus sur les sites commerciaux. Certains sceaux portent sur la confidentialité tandis que d’autres ciblent la protection des consommateurs. La certification peut provenir de la compagnie même, d’un tiers certificateur ou d’un organisme public. Ces éléments constituent des balises et repères importants pour le consommateur sur Internet. Toutefois, les incidences légales sont multiples et certains concepts demeurent flous. Pour apporter une réponse à ces questions, nous définirons le concept de certification des sites Web et ses enjeux dont plus particulièrement la problématique de la confiance des consommateurs. Les différents objets de la certification seront analysés, tant au niveau de l’entité, du contenu du site que de la dimension transactionnelle de celui-ci. Les processus possibles et les impacts de la certification occupent la seconde partie du travail. Il s’agit d’examiner successivement les étapes menant à la certification, soit l’établissement des standards, de l’évaluation de l’entité et de la certification elle-même. L’analyse des impacts de la certification, tant sur le plan de la portée, de la responsabilité légale et des effets sur la concurrence de la certification constitue quant à eux, l’aboutissement de la recherche, soit de savoir quel est l’impact juridique d’un tel mécanisme. Le but de la recherche est de permettre au lecteur de mieux cerner ce phénomène de l’utilisation de la certification sur Internet avec ses avantages et ses limites. Certes, cet outil peut s’avérer très utile pour bâtir la confiance des consommateurs, promouvoir l’essor du commerce électronique et constituer une forme d’autoréglementation. Toutefois, mal utilisé ou mal encadré, il peut engendrer l’effet inverse et détruire cette confiance si fragile à construire dans un environnement dématérialisé.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Les alertes que nos logiciels antivirus nous envoient ou encore les différents reportages diffusés dans les médias nous font prendre conscience de l'existence des menaces dans le cyberespace. Que ce soit les pourriels, les attaques par déni de service ou les virus, le cyberespace regorge de menaces qui persistent malgré les efforts qui sont déployés dans leur lutte. Est-ce que cela a à voir avec l'efficacité des politiques en place actuellement pour lutter contre ce phénomène? Pour y répondre, l'objectif général du présent mémoire est de vérifier quelles sont les politiques de prévention (lois anti-pourriel, partenariats publics-privés et démantèlements de botnets) qui influencent le plus fortement le taux de menaces informatiques détectées, tout en s'attardant également à l'effet de différents facteurs socio-économiques sur cette variable. Les données collectées par le logiciel antivirus de la compagnie ESET ont été utilisées. Les résultats suggèrent que les partenariats publics-privés offrant une assistance personnalisée aux internautes s'avèrent être la politique de prévention la plus efficace. Les démantèlements de botnets peuvent également s'avérer efficaces, mais seulement lorsque plusieurs acteurs/serveurs importants du réseau sont mis hors d'état de nuire. Le démantèlement du botnet Mariposa en est un bon exemple. Les résultats de ce mémoire suggèrent que la formule partenariats-démantèlements serait le choix le plus judicieux pour lutter contre les cybermenaces. Ces politiques de prévention possèdent toutes deux des méthodes efficaces pour lutter contre les menaces informatiques et c'est pourquoi elles devraient être mises en commun pour assurer une meilleure défense contre ce phénomène.