930 resultados para local security committee


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Le présent travail de recherche se propose d’analyser les dispositifs de gouvernance nodale de la sécurité locale en France, alors que le paradigme a vu le jour et s’est développé dans les pays anglo-saxons fortement décentralisés. C’est qu’en France les dispositifs de gouvernance nodale s’apparentent bien plus à un dialogue entre central et local qu’entre secteur public et privé. La recherche identifie ainsi les caractéristiques de la gouvernance nodale au cœur des dispositifs partenariaux de la sécurité locale, supportés par le Contrat Local de Sécurité (CLS), le Conseil Local de Sécurité et de Prévention de la Délinquance (CLSPD) ou encore le Groupe Local de Traitement de la Délinquance (GLTD). La recherche identifie ainsi les stratégies de décentrage de l’État et de transfert de la production de sécurité vers une diversité d’acteurs locaux, dont les maires et les services municipaux. Une diversité de politiques publiques locales de sécurité de pertinences différentes voit alors le jour. Le premier enseignement de cette recherche est l’importance du rôle joué par le node super-structurel, que nous appelons super-node et qui regroupe le maire ou l’élu local à la sécurité, le responsable de la police d’État, celui de la police municipale et le représentant de l’État. Il apparaît que dans le dispositif de gouvernance nodale, ce groupe informel génère la dynamique collective qui permet de regrouper, tant les producteurs que les consommateurs de sécurité locale gravitant au sein du réseau local de sécurité. La quarantaine d’entrevues qualitatives permet également d’identifier que la Justice, productrice de sécurité comme peut l’être aussi la sécurité privée ou la médiation sociale, apparaît plus distante que ce que pouvait laisser penser l’étude des textes réglementaires organisant le partenariat. Les bailleurs sociaux, les transporteurs et l’Éducation nationale apparaissent clairement comme des acteurs importants, mais périphériques de sécurité, en intégrant cette « famille élargie » de la sécurité locale. Le deuxième enseignement est relatif au fonctionnement même du dispositif nodal ainsi que du super-node, la recherche permettant d’identifier les ressources mutualisées par l’ensemble des nodes. Cela permet également d’identifier les mécanismes de répartition des tâches entre les différents acteurs et plus particulièrement entre les deux organisations policières d’État et municipale, travaillant autant en compétition, qu’en complémentarité. Cette recherche explore également le rôle joué par l’information dans le fonctionnement du super-node ainsi que l’importance de la confiance dans les relations interpersonnelles des représentants des nodes au sein du super-node. Enfin, l’étude permet également de mettre en perspective les limites du dispositif actuel de gouvernance nodale : le défaut avéré d’outils performants permettant d’informer convenablement le super-node quant aux phénomènes de violence ainsi que d’évaluer l’efficience du dispositif. Cela permet également de questionner l’autonomie des dispositifs de gouvernance nodale, la confiance pouvant ouvrir à la déviance et la collégialité au défaut de la traçabilité de la responsabilité. La fracture avec la société civile apparaît clairement et ne facilite pas le contrôle sur un mode de production de sécurité qui se développe en parallèle des dispositifs traditionnels de démocratie locale.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This article summarizes field notes related to the study of the actions performed by the Metropolitan Police of Santiago de Cali in the context of its ‘Plan Cuadrante’ (a micro-local security action plan) and the citizen’s perception towards it. Taking an ethnographic approach, it places special emphasis on the actions that imply identifying the main criminal and violent actors and activities. The study focuses on four local districts of the city: El Cortijo, Mariano Ramos, Terrón Colorado y Villa del Lago.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

WI docs. no.: Leg.3:SB/1971/18.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

President’s Report Hello fellow AITPM members, Welcome to the first edition of the AITPM National Newsletter for 2009! I trust we all had a relaxing break and managed to lose track of all things transport for just a little while. I know I had trouble doing so when hunting for a car space at the shopping centre, and experiencing new projects such as the Tugun Bypass – the new gateway between New South Wales and Queensland. Byron Bay is now as close as Noosa for those high profile beach goers of Brisbane. There was also my experience of the reduced posted speed of 90km/h on the Bruce Highway around the troublesome Gympie stretch, when returning from a short Fraser Coast holiday. I expect that this relatively inexpensive safety improvement will pay substantial dividends in terms of crash reduction. The Newsletter took its annual leave last month and is refreshed and ready for a new year to keep us all informed of the latest in traffic and transport engineering, planning and management. I would like to take this opportunity to acknowledge the ongoing significant contributions of many volunteers in the Newsletter’s production. Mr Andrew Hulse, AITPM’s Immediate Past National President, serves as the Editorial Coordinator on behalf of the Institute. Each Branch Committee also includes a Newsletter Coordinator and committee members frequently contribute as well. And the ongoing contributions of readers enable us to offer the Newsletter as a vehicle for dialogue and debate around our sector. If you would like to contribute please email AITPM’s administration officer Josephine Mitton at aitpm@aitpm.com or through your local Branch Committee. I would also like to welcome back on deck our Editor, Mr David Brown of Driven Media, who creates a fantastic package for us each month. Lastly, members would have received the Call for Papers for the AITPM 2009 National Conference, Traffic Beyond Tomorrow, to be held at the Adelaide Convention Centre between 5 – 7 August. Abstracts will be accepted up to 20 February 2009. We look forward to seeing everyone at this, our flagship event for the year. To all a good year ahead, Jon Bunker Post Script: We all will have seen through the media the enormous scale and nature of the two natural disasters Australia is experiencing at present. AITPM’s thoughts are with all of those members, family and friends who may be experiencing hardship as a result of the Victorian bushfires and North Queensland floods. AITPM is a not for profit organisation however the National Executive has taken the decision to donate in measure to the Red Cross Victorian Bushfire Disaster Relief fund and the Queensland Premier’s Disaster Relief fund as a gesture to support our fellow Australians in their time of need. Details about these funds can be found via the Victorian and Queensland Governments’ websites.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.