Works matching DE "SECURITY consultants"
Results: 28
A model for establishing a quality culture in a major private security company.
- Published in:
- Total Quality Management & Business Excellence, 2009, v. 20, n. 8, p. 787, doi. 10.1080/14783360903128058
- By:
- Publication type:
- Article
Securing the Global City: Crime, Consulting, Risk, and Ratings in the Production of Urban Space.
- Published in:
- Indiana Journal of Global Legal Studies, 2008, v. 15, n. 1, p. 75, doi. 10.2979/GLS.2008.15.1.75
- By:
- Publication type:
- Article
Researching Private Security Consumption.
- Published in:
- European Journal on Criminal Policy & Research, 2013, v. 19, n. 4, p. 401, doi. 10.1007/s10610-013-9207-5
- By:
- Publication type:
- Article
La collaboration internationale: un élément essentiel dans la conception des programmes de formation en sécurité aéroportuaire.
- Published in:
- Canadian Public Administration, 2007, v. 50, n. 3, p. 355, doi. 10.1111/j.1754-7121.2007.tb02132.x
- By:
- Publication type:
- Article
SİGORTA PRİMLERİNİN ÖDENME USULLERİ.
- Published in:
- Financial Analysis / Mali Cozum Dergisi, 2010, n. 100, p. 239
- By:
- Publication type:
- Article
Internet Security: You Don's Get What You Pay For.
- Published in:
- Financial Executive, 2003, v. 19, n. 9, p. 51
- By:
- Publication type:
- Article
John Siko/Jonah A. Victor: African Security. An Introduction, London: I. B. Tauris, 2020, 266 pp.
- Published in:
- 2022
- By:
- Publication type:
- Book Review
Consuming security? Tools for a sociology of security consumption.
- Published in:
- Theoretical Criminology, 2010, v. 14, n. 1, p. 3, doi. 10.1177/1362480609354533
- By:
- Publication type:
- Article
The Global Security Consultant's Pyramid: How To Be In The Top 5% Of Successful Security Consultants.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2017, v. 23, n. 1, p. 12
- By:
- Publication type:
- Article
The Four Pillars Of success: How To Earn A Million Dollars Per Year As A Global Security Consultant.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2016, v. 22, n. 3, p. 14
- By:
- Publication type:
- Article
IACSP Reader's Lounge.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
Private security companies.
- Published in:
- New Political Economy, 2005, v. 10, n. 1, p. 121, doi. 10.1080/13563460500031297
- By:
- Publication type:
- Article
Accounting Changes and Earnings Predictability.
- Published in:
- Accounting Review, 1990, v. 65, n. 1, p. 157
- By:
- Publication type:
- Article
Misperceiving the Beliefs of Others: How Pluralistic Ignorance Contributes to the Persistence of Positive Security Analyst Reactions to the Adoption of Stock Repurchase Plans.
- Published in:
- Organization Science, 2011, v. 22, n. 4, p. 869, doi. 10.1287/orsc.1100.0575
- By:
- Publication type:
- Article
Security for whom? Analysing hybrid security governance in Africa's extractive sectors.
- Published in:
- International Affairs, 2020, v. 96, n. 4, p. 995, doi. 10.1093/ia/iiaa090
- By:
- Publication type:
- Article
Passing the Buck: State Responsibility for Private Military Companies.
- Published in:
- European Journal of International Law, 2008, v. 19, n. 5, p. 989, doi. 10.1093/ejil/chn074
- By:
- Publication type:
- Article
Governability Matters: The Private Policing of Economic Crime and the Challenge of Democratic Governance.
- Published in:
- Policing & Society, 2005, v. 15, n. 2, p. 187, doi. 10.1080/10439460500071671
- By:
- Publication type:
- Article
The RWRD Security Scorecard Project: A Low-cost, Effective Method of Enhancing Security Culture.
- Published in:
- Journal: American Water Works Association, 2009, v. 101, n. 11, p. 27
- By:
- Publication type:
- Article
Organizando la seguridad: Análisis organizativo de los servicios privados de seguridad en España.
- Published in:
- Politica y Sociedad, 2005, v. 42, n. 3, p. 185
- By:
- Publication type:
- Article
E-business alarmist.
- Published in:
- IIE Solutions, 2000, v. 32, n. 11, p. 13
- Publication type:
- Article
Demand for security practitioners grow.
- Published in:
- ComputerWorld Hong Kong, 2007, v. 24, n. 8, p. 37
- By:
- Publication type:
- Article
Information security--now and beyond.
- Published in:
- Asia-Pacific Review, 2003, v. 10, n. 2, p. 89, doi. 10.1080/1343900032000148066
- By:
- Publication type:
- Article
SOUTH AFRICAN PRIVATE SECURITY CONTRACTORS ACTIVE IN ARMED CONFLICTS: CITIZENSHIP, PROSECUTION AND THE RIGHT TO WORK.
- Published in:
- Potchefstroom Electronic Law Journal, 2011, v. 14, n. 7, p. 71
- By:
- Publication type:
- Article
Concern over Private Security Companies.
- Published in:
- Africa Research Bulletin: Political, Social & Cultural Series, 2008, v. 45, n. 4, p. 17499
- Publication type:
- Article
Rwanda.
- Published in:
- Africa Research Bulletin: Political, Social & Cultural Series, 2006, v. 43, n. 2, p. 16556
- Publication type:
- Article
The "Levels of Analysis" Problem with Critical Infrastructure Risk.
- Published in:
- Journal of Physical Security, 2014, v. 7, n. 1, p. 43
- By:
- Publication type:
- Article
Money in a Glass Box.
- Published in:
- Journal of Physical Security, 2014, v. 7, n. 1, p. 25
- By:
- Publication type:
- Article
Implementation of User Cuts and Linear Sensitivity Factors to Improve the Computational Performance of the Security-Constrained Unit Commitment Problem.
- Published in:
- Energies (19961073), 2019, v. 12, n. 7, p. 1399, doi. 10.3390/en12071399
- By:
- Publication type:
- Article