511 resultados para Cité


Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the growth and development of communication technology there is an increasing need for the use of interception technologies in modern policing. Law enforcement agencies are faced with increasingly sophisticated and complex criminal networks that utilise modern communication technology as a basis for their criminal success. In particular, transnational organised crime (TOC) is a diverse and complicated arena, costing global society in excess of $3 trillion annually, a figure that continues to grow (Borger, 2007) as crime groups take advantage of disappearing borders and greater profit markets. However, whilst communication can be a critical success factor for criminal enterprise it is also a key vulnerability. It is this vulnerability that the use of CIT, such as phone taps or email interception, can exploit. As such, law enforcement agencies now need a method and framework that allows them to utilise CIT to combat these crimes efficiently and successfully. This paper provides a review of current literature with the specific purpose of considering the effectiveness of CIT in the fight against TOC and the groundwork that must be laid in order for it to be fully exploited. In doing so, it fills an important gap in current research, focusing on the practical implementation of CIT as opposed to the traditional area of privacy concerns that arise with intrusive methods of investigation. The findings support the notion that CIT is an essential intelligence gathering tool that has a strong place within the modern policing arena. It identifies that the most effective use of CIT is grounded within a proactive, intelligence‐led framework and concludes that in order for this to happen Australian authorities and law enforcement agencies must re‐evaluate and address the current legislative and operational constraints placed on the use of CIT and the culture that surrounds intelligence in policing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The complex, K2.5Na2NH4[Mo2O2S2(cit)(2)]. 5H(2)O (1), was obtained by crystallization from a solution of (NH4)(2)MoS4, potassium citrate (K(3)cit) and hydroxyl sodium in methanol and water under an atmosphere of pure nitrogen at ambient temperature. The crystals are triclinic, space group , a = 7.376 (3)Angstrom, b = 14.620 (2) Angstrom, c = 14.661 (1) Angstrom, alpha = 71.10 (1)degrees, beta = 81.77 (1)degrees, gamma = 78.27(2)degrees, R = 0.0584 for 2545 observed (I > 2 sigma (I)) reflections. Single crystal structure analysis reveals that citrate ligand coordinated to molybdenum atom through two carboxylato oxygens and one deprotonated hydroxyl oxygen together with two bridging sulfur atoms and a terminal oxygen atom completes distorted coordination octahedron around each molybdenum atom. Principal dimensions are: Mo = O-t, 1.707 Angstrom (av); Mo-S-b, 2.341 Angstrom (av); Mo-O-(hydroxyl), 2.021 Angstrom (av); Mo-O(alpha-carboxyl), 2.1290 Angstrom (av) and Mo-O(beta-carboxyl), 2.268(av) Angstrom. IR spectrum is in agreement with the structure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Die Auswahl geeigneter Bewerber/Innen nimmt aufgrund der demographischen Entwicklung und der damit verbundenen Verknappung der Ressource Personal einen immer höheren Stellenwert ein. Der Einsatz von Anforderungsprofilen soll dabei helfen das Risiko einer fehlerhaften Auswahlentscheidung zu verringern und somit den geeignetsten Bewerber auszuwählen. Ein Trend hin zu den Soft-Skills, wie beispielsweise Teamfähigkeit und Kommunikationsbereitschaft, ist klar zu erkennen. Gegenstand der nachfolgenden Diplomarbeit ist daher die Entwicklung eines Anforderungsprofils, welches sich auf diese Soft-Skills konzentriert. Die Erstel-lung des Anforderungsprofils erfolgt dabei auf Grundlage der von John C. Flanagan entwickelten „Critical Incident Technique“, die im deutschen Sprachgebrauch auch als Methode der kritischen Ereignisse bezeichnet wird. Infolgedessen werden zunächst die theoretischen Grundlagen eines Anforderungsprofils sowie die der „Critical Incident Technique“ detailliert erläutert. Im Anschluss daran erfolgt eine ausführliche Beschreibung der methodischen Vorgehensweise, die den kompletten Ablauf der praktischen Durchführung widerspiegelt. In diesem Zusammenhang werden getroffene Entscheidungen, die zu einer Anpassung der Vorgehensweise führten, näher erläutert und begründet. Die aus den Mitarbeiterbefragungen gewonnenen „Critical Incidents“ werden nachfolgend kategorisiert und zu Anforderungsbereichen zusammengefasst, die abschließend zum Anforderungsprofil verdichtet werden. Ferner wird die Möglichkeit einer praktischen Anwendung der Ergebnisse anhand von drei vom Autor begleiteten Projekten dargestellt.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Référence bibliographique : Rol, 59495

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Référence bibliographique : Rol, 59496

Relevância:

20.00% 20.00%

Publicador:

Resumo:

N° 40 des mss envoyés à Paris par Maugerard en octobre 1802; cf. B.n.F., département des Manuscrits, Archives Modernes 497; — abbaye d'Echternach (dioc. de Trèves), cf. titre "Continet" et cote grattée; 1789. Le patrimoine libéré, 152 et n° 96