Página 1 dos resultados de 2835 itens digitais encontrados em 0.034 segundos

Diretrizes para projeto de segurança patrimonial em edificações; Security building design guide

Moreira, Katia Beatris Rovaron
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Dissertação de Mestrado Formato: application/pdf
Publicado em 17/05/2007 Português
Relevância na Pesquisa
47.47508%
O objetivo do presente estudo é fazer um levantamento da aplicação das medidas de segurança patrimonial nas edificações. A paisagem urbana tem se modificado ao longo das últimas décadas em virtude de intervenções executadas para proteção pessoal e do patrimônio. Estas modificações têm sido executadas com ausência de metodologias, legislação e normalização sobre o assunto. Ao longo da dissertação são discutidas as modificações arquitetônicas em face da violência urbana e a necessidade da participação efetiva do arquiteto no processo de planejamento da segurança patrimonial. Por meio desta pesquisa, busca-se conhecer as metodologias existentes para a elaboração do projeto a fim de obter diretrizes mínimas para o planejamento da segurança. Demonstra-se que para a elaboração de um projeto são necessários levantamentos de valores patrimoniais, riscos, ameaças e vulnerabilidades aos quais a edificação está sujeita, a fim de determinar com maior precisão o nível de segurança necessário. Em uma segunda etapa são levantadas medidas de proteção passiva e ativa, a fim de dar diretrizes ao arquiteto quanto às soluções e equipamentos disponíveis para aplicação em projeto, fornecendo ferramentas adequadas para a elaboração de um projeto de segurança patrimonial. Pelos levantamentos teóricos que formam a base para o estabelecimento do nível de segurança e do conhecimento das medidas que podem ser aplicadas...

O processo de produção e gestão de segurança patrimonial de edificios residenciais verticais na cidade de São Paulo; The process of design production and management of security in high-rise residential buildings in the city of São Paulo.

Moreira, Katia Beatris Rovaron
Fonte: Biblioteca Digitais de Teses e Dissertações da USP Publicador: Biblioteca Digitais de Teses e Dissertações da USP
Tipo: Tese de Doutorado Formato: application/pdf
Publicado em 31/10/2012 Português
Relevância na Pesquisa
47.44528%
Este estudo tem como objetivo discutir o processo de produção e gestão da segurança patrimonial de edifícios residenciais verticais na cidade de São Paulo. Busca-se examinar, as causas da fragilidade da segurança neste tipo de condomínio. São analisadas as principais questões que estão diretamente envolvidas com a segurança: a violência urbana; as características de projeto dos edifícios e a implantação no lote; o crescente individualismo e falta de convivência em comunidade; a ausência de legislação regulatória para a segurança patrimonial; a deficiência na aplicação de metodologias para os planos de segurança e a falta de aplicação de conceitos de segurança nos projetos arquitetônicos. Para o desenvolvimento da tese, são pesquisados os fatores ligados à violência urbana que desencadeiam a sensação de insegurança nos habitantes e o histórico da legislação edilícia e urbana de São Paulo, para analisar a relação desta com as características arquitetônicas dos edifícios e com a formação dos bairros inseguros. São realizadas pesquisas de campo, com o objetivo de compreender o ponto de vista dos moradores de condomínios em relação às medidas de segurança aplicadas nos edifícios. Além disso...

Are Lives a Substitute for Livelihoods? Terrorism, Security, and U.S. Bilateral Imports

Mirza, Daniel; Verdier, Thierry
Fonte: World Bank, Washington, DC Publicador: World Bank, Washington, DC
Português
Relevância na Pesquisa
57.54203%
What is the impact of terrorism on trade through higher security at the borders? The authors set up a theory which shows that the impact goes not only from terrorism to trade. Higher trade with a partner might, in turn, increase the probability of terrorism acts and make security measures more costly for total welfare. To identify the true impact of terrorism, their theory allows for a strategy to condition out the latter mechanism. The authors show in particular how past incidents perpetrated in third countries (anywhere in the world except the origin or targeted country) constitute good exogenous factors for current security measures at the borders. Their tests suggest that terrorist incidents have a small effect on U.S. imports on average, but a much higher effect for those origin countries at the top of the distribution of incidents. In addition, the level of the impact is up to three times higher when the acts result in a relatively high number of victims, the products are sensitive to shipping time, and the size of the partner is small. The authors further show how terrorism affects the number of business visas given by the United States, thereby affecting significantly U.S. imports in differentiated products. These results suggest that security to prevent terrorism does matter for trade.

Review of Cost of Compliance with the New International Freight Transport Security Requirements : Consolidated Report of the Investigations Carried Out in Ports in the Africa, Europe and Central Asia, and Latin America and Caribbean Regions

Kruk, C. Bert; Donner, Michel Luc
Fonte: World Bank, Washington, DC Publicador: World Bank, Washington, DC
Português
Relevância na Pesquisa
47.738774%
Without transport there is no economic development and, in a reciprocal conclusion, the more efficient transport is, the better is the development. Bearing in mind that more than 90 percent of the world trade in tons per year is transported by sea and against the background of increasing ship sizes (especially in the container trade) and continuously growing globalization, the requirements for adequate and secure port facilities and the resulting logistics challenges are accelerating worldwide. The International Ship and Port Facility Security Code (ISPS code) is a comprehensive set of measures to enhance the security of ships and port facilities and came into force on the July 1, 2004. The ISPS code is implemented through chapter XI-2 special measures to enhance maritime security in the International Convention for the Safety of Life at Sea (SOLAS). The code has two parts, one mandatory (part A) and one recommendatory (part B). Compliance is mandatory for the 148 contracting parties to SOLAS; detailed implementation of the code is a matter for the individual national governments. The introduction of the ISPS Code has led to many questions and misunderstandings. The code does not...

Economic aspects of airport security measures

Santos, Alvaro K.
Fonte: Monterey, California: Naval Postgraduate School Publicador: Monterey, California: Naval Postgraduate School
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
47.631567%
Airport security measures use very expensive equipment, and may keep passengers in line for several minutes. The time passengers spend in those lines can add up, and must be understood as time opportunity cost. In the 1970s, several airport security measures were adopted to help stop aircraft hijackings. In 1978, William M. Landes wrote the paper "An Economic Study of the U.S. Aircraft Hijacking, 1961-1976", in which he analyzed the expenditures associated with airport security measures. He concluded that the costs of the adopted measures were very high. While Landes concentrated on the monetary costs of airport security, this thesis concentrates on the estimating the opportunity costs of airport security measures for passengers -- their losses in terms of their time value. This thesis estimates that the hijacking-preventing impact of airport screening measures is insignificant, but the opportunity costs these measures impose on airline passengers are significant and greatly exceed the benefits produced.

Security challenges in the Gulf of Guinea sub-region strategy for Nigeria

Iheme, Chuks Onwumere
Fonte: Monterey California. Naval Postgraduate School Publicador: Monterey California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: xvi, 71 p. : col. map ;
Português
Relevância na Pesquisa
47.322866%
The Gulf of Guinea (GoG) sub-region has large deposits of hydrocarbons and other natural resources. There is now a stiff international competition among industrialized nations including the United States, some European countries, China, Japan, and India that are looking for new, safer, and more reliable sources of energy as a result of the Middle East crisis. Extra-regional competitions for oil, while boosting the economy of the sub-region have also exposed the area to increased security risks. Subregional resources and potential are presently being undermined by multifaceted domestic, sub-regional and international threats and vulnerabilities. These challenge the sub-regional states, including Nigeria, with limited capacity for maritime security. Assessment of sub-regional naval forces based on their Order of Battle, shows that most of the navies cannot police beyond their territorial waters. This study presents an integrated collective maritime security strategy for the sub-region. The strategy proposes measures to protect the maritime environment from unauthorized use and to develop member states' capabilities to deal with the emerging security threats. Additionally, it would encourage collaboration with extra-regional powers and oil majors in efforts to transform naval capabilities and improve interoperability to meet the challenges of the changing security threats within the sub-regional maritime domain.; Nigerian Navy author.

The impact of land border security on terrorism financing: Turkey's Southeast land border and the PKK

Eren, Yunus
Fonte: Monterey, California: Naval Postgraduate School Publicador: Monterey, California: Naval Postgraduate School
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
57.083716%
Approved for public release; distribution is unlimited.; Terrorism has become the one of the major threats facing many states. Understanding the potential sources of and preventing the financial support of terrorist organizations takes an important place in countering terrorism. This thesis focuses on the Kurdistan Workers Party (PKK) financing activities through the land border of Turkey. In doing so, this study mainly examines how the Turkish border security system can stop the trans-border financial activities of PKK along its land borders with Iran, Iraq and Syria. This thesis also takes the U.S. as a case study in terms of border security measures, and within that framework, makes recommendations for safeguarding Turkeys land borders to prevent financial activities of the PKK terrorist organization without affecting free trade and the economic flow of services. Presently, the Turkish border security system is fragmented and poorly coordinated. Border management is currently split between the army, gendarmerie, police and coast guard. Moreover, international and interdepartmental collaborations are extremely limited. The prevention of cross-border financial activities of the PKK might be accomplished by forming an independent border security agency...

Information Security and Wireless alternate approaches for controlling access to critical information

Nandram, Winsome
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: xiv, 75 p. : ill. (some col.) ;
Português
Relevância na Pesquisa
57.490796%
Approved for public release; distribution is unlimited; The advent of Wireless Local Area Networking (WLAN) has seen a widespread adoption of its technology and functionality in many different areas. Many studies show more and more organizations are extending their networks to incorporate wireless devices and their applications. Permitting wireless devices to access private networks however, further complicates the tasks of protecting the network and its resources from unauthorized access. Now that they have become a significant element in today's networks, selecting and deploying adequate security measures have become the focus of many research efforts. Typically, network managers implement countermeasures to augment security. The goal of this thesis is to research approaches that compliment existing security measures with fine grain access control measures. The Extensible Markup Language (XML) is adopted to accommodate such granular access control as it provides the mechanisms for scaling security down to the document content level.; Captain, United States Marine Corps

The economic impact of the Homeland Security Advisory System the cost of heightened border security

Cockrum, Jason J.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: xii, 69 p. ;
Português
Relevância na Pesquisa
57.34981%
Approved for public release; distribution is unlimited; The majority of literature written on the economic impact of border security has indicated that the increased security following 9/11 has had adverse effects on the flow of foreign imports. This study measures the direct cost the Homeland Security Advisory System (HSAS) had on U.S. Customs and Border Protection (CBP) overtime spending and the indirect cost on the U.S. economy by reducing the daily flow of imports. Three case studies were conducted at the United States' largest ports of entry. Each compared CBP overtime spending and the daily flow of imports during the seven periods the HSAS was elevated to ORANGE between 2002 and 2005. The study found that increased threat levels of the HSAS resulted in 50% more overtime spending by CBP. However, the HSAS had no impact on the daily flow of imports into the United States during the seven periods of elevated security between 2002 and 2005.; Outstanding Thesis; US Air Force (USAF) author.

Public/private partnerships with hazardous material motor carriers creating incentives to increase Security Through Assessed Risk (STAR)

Colsky, Andrew E.
Fonte: Monterey California. Naval Postgraduate School Publicador: Monterey California. Naval Postgraduate School
Tipo: Tese de Doutorado Formato: xvi, 91 p. ;
Português
Relevância na Pesquisa
47.389263%
CHDS State/Local; On September 11, 2001, terrorists used commercial airliners as weapons of terror inside the United States, and America's approach to security was forever changed. While commercial airliners were the weapons of choice on that day, the 9/11 Commission recognized that Al Qaeda and other groups had, prior to the use of airlines, used suicide vehicles, namely, truck bombs, to commit terrorist acts. The threat from hazmat trucks continues today. There can be no doubt that terrorists are interested in using hazmat trucks as weapons within the borders of the United States. In 2004, Defense Secretary Donald Rumsfeld's visit to Iraq was punctuated by a fuel-truck attack that burned a section of Baghdad. More recently, terrorists in Iraq have used chlorine-based truck bombs repeatedly as a weapon in the Iraq war. The Department of Transportation (DOT) recognizes that hazmat trucks are "dangerous and ready-made weapons" and are "especially attractive" to terrorists. Stephen Gale, a University of Pennsylvania professor and terrorism expert, agrees that hazmat trucks are essentially ready-made bombs that are "tailor-made" for terrorists to conduct an attack at the lowest cost and with the greatest impact. In fact...

A importância da aplicação das medidas de segurança orgânica no corpo de Bombeiros Militar do Distrito Federal

Fernandes Júnior, Milton Mendes
Fonte: Universidade Católica de Brasília Publicador: Universidade Católica de Brasília
Tipo: Trabalho de Conclusão de Curso Formato: Texto
Português
Relevância na Pesquisa
47.445264%
Este trabalho foi elaborado a fim de analisar a aplicabilidade das medidas de Segurança Orgânica nas Unidades Administrativas e Operacionais do Corpo de Bombeiros Militar do Distrito Federal (CBMDF), voltadas para a proteção dos recursos humanos, materiais, de informática, documentação, comunicações e instalações. Para a aplicação das medidas de segurança orgânica na Instituição é indispensável que se conheça as forças, fraquezas, vulnerabilidades e principalmente as ameaças que a cercam, para então planejar qual o tipo e o nível de proteção a ser utilizada. Cabe ressaltar que a utilização diária das medidas adequadas de segurança contribuem para minimizar qualquer tipo de ameaça à Corporação e Proteção do Conhecimento. A elaboração da fundamentação teórica objetiva identificar tópicos a respeito do assunto, os quais estão dispostos na matriz de risco, para efetuação de correlacionamento, visando alcançar um resultado o qual indicará o grau de risco a que a Corporação está sujeita, além de indicar para a autoridade tomadora de decisões do CBMDF, a necessidade da implantação de uma política de Segurança Orgânica para a proteção Institucional.; This work aims at analyzing the applicability of Private Security measures at Administrative and Operational Units of the Military Fire Brigade of the Federal District (CBMDF)...

Equivocations, Exponents and Second-Order Coding Rates under Various R\'enyi Information Measures

Hayashi, Masahito; Tan, Vincent Y. F.
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
47.429917%
In this paper, we evaluate the asymptotics of equivocations, their exponents as well as their second-order coding rates under various R\'enyi information measures. Specifically, we consider the effect of applying a hash function on a source and we quantify the level of non-uniformity and dependence of the compressed source from another correlated source when the number of copies of the sources is large. Unlike previous works that use Shannon information measures to quantify randomness, information or uniformity, in this paper, we define our security measures in terms of a more general class of information measures---the R\'enyi information measures and their Gallager-type counterparts. A special case of these R\'enyi information measure is the class of Shannon information measures. We prove tight asymptotic results for the security measures and their exponential rates of decay. We also prove bounds on the second-order asymptotics and show that these bounds match when the magnitudes of the second-order coding rates are large. We do so by establishing new classes non-asymptotic bounds on the equivocation and evaluating these bounds using various probabilistic limit theorems asymptotically.; Comment: 40 pages, 7 figures; To be presented at the 2015 International Symposium on Information Theory; Submitted to the IEEE Transactions on Information Theory; v2: fixed typos and added some clarifications to the proofs

Reforma psiquiátrica nas medidas de segurança: a experiência goiana do paili; Psychiatric reform of the security measures: the experience of paili in goiás

Silva, Haroldo Caetano da
Fonte: Universidade de São Paulo. Faculdade de Saúde Pública Publicador: Universidade de São Paulo. Faculdade de Saúde Pública
Tipo: info:eu-repo/semantics/article; info:eu-repo/semantics/publishedVersion; ; ; ; ; Formato: application/pdf
Publicado em 01/04/2010 Português
Relevância na Pesquisa
67.413706%
A Lei nº 10.216/2001 humaniza o atendimento à saúde mental, transferindo o foco do tratamento para serviços comunitários e abertos. A Lei da Reforma Psiquiátrica ou Lei Antimanicomial, como é conhecida, alcança a internação compulsória determinada pela justiça criminal como medida de segurança. Agora, deve o juiz preferir o tratamento ambulatorial, somente optando pela internação "quando os recursos extra-hospitalares se mostrarem insuficientes", caso em que será precedida de "laudo médico circunstanciado que caracterize os seus motivos". A figura da periculosidade perde força. A medida de segurança não tem natureza retributiva. A permanência do paciente em cadeia pública ou em manicômio judiciário configura crime de tortura (Lei nº 9.455/97). O Programa de Atenção Integral ao Louco Infrator contempla a execução das medidas de segurança de acordo com a Lei nº 10.216, acolhendo os seus pacientes nos serviços de saúde. Com autonomia, as equipes de saúde colocam em prática a melhor terapêutica, sem a necessidade de prévia deliberação judicial. O Programa leva a pessoa submetida à medida de segurança para o ambiente universal do Sistema Único de Saúde, o que favorece sobremaneira a inclusão à família e à sociedade...

ADOPTION OF INFORMATION SECURITY MEASURES IN PUBLIC RESEARCH INSTITUTES; ADOÇÃO DE MEDIDAS DE SEGURANÇA DA INFORMAÇÃO EM INSTITUTOS DE PESQUISA PÚBLICOS

Albuquerque Junior, Antonio Eduardo de; Santos, Ernani Marques dos
Fonte: Universidade de São Paulo. Faculdade de Economia, Administração e Contabilidade Publicador: Universidade de São Paulo. Faculdade de Economia, Administração e Contabilidade
Tipo: info:eu-repo/semantics/article; info:eu-repo/semantics/publishedVersion; ; Formato: application/pdf
Publicado em 01/08/2015 Português
Relevância na Pesquisa
47.54302%
There are several Information Security measures recommended by international standards and literature, but the adoption by the organizations should be designated by specific needs identified by Information Security Governance structure of each organization, although it may be influenced by forces of the institutional environment in which organizations are inserted. In public research institutes, measures may be adopted as a result of pressure from Government and other agencies that regulate their activities, or by the influence of Information Security professionals, or simply adopting the same measures of leading organizations in the organizational field. This study aimed to investigate whether in public research institutes the adoption of Information Security measures is influenced by organizational factors relating to Information Security Governance, and by external factors relating to its institutional environment. The results show that these organizations are subject to institutional influences more than organizational influences.; As organizações dispõem de uma série de medidas de Segurança da Informação recomendadas por normas internacionais e pela literatura, mas a adoção deve ser balizada pelas necessidades específicas identificadas pela Governança da Segurança da Informação de cada organização...

An Analysis of open security issues of Android interfaces to cloud computing platforms

Beres, Corey
Fonte: Rochester Instituto de Tecnologia Publicador: Rochester Instituto de Tecnologia
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
47.37147%
Smartphone usage is on the rise and some may argue that these devices are ubiquitous in today's society, even among non-technical users. To remain competitive, mobile devices and applications need to quickly perform tasks with as minimal as possible impact on battery life. The emergence of cloud computing, open-source cloud platforms, and cloud-supported ventures such as Apple iCloud and Amazon Silk provide new and promising methods to improve device and application performance. However, little work has been done to examine the security of offloading processing from mobile devices to cloud services and the performance effects of implementing security features. This work aims to answer the questions that arise in securing mobile applications that communicate with the cloud. Via a proof-of-concept application that offloaded resource-intensive computations to an open-source cloud computing platform, the security of cloud computing and Android was studied. It was found that, by following recommended coding practices, the cloud-smartphone security landscape could be significantly improved. Further security enhancements were also recommended and summarized. Additionally, performance was analyzed, and it was found that mobile device applications benefit heavily from cloud support and that features such as secure authentication and encryption do not noticeably impact application performance.

Usefulness of teaching security awareness for middle school students

Alhejaili, Hani
Fonte: Rochester Instituto de Tecnologia Publicador: Rochester Instituto de Tecnologia
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
47.322866%
Technology and the Internet bring many benefits to students. Studies show that technology and the available online resources encourage inquiry and support student success in schools. However, there are many threats to middle school students as a result of the misuse of technology. I believe that teaching security awareness for middle school students through an online interactive program is essential for reducing the risks that could affect them. The online interactive program should be multilingual, completely visual, continually updating, and suitable for both students and their families. Since many efforts have been made to minimize the risks, it has become necessary to examine the current state of security awareness among students and their families. The involvement of technology should be analyzed if it would play a role in the incidents that are committed by and to middle school students. Also, there should be an investigation of whether schools offer procedures and plans to ensure online safety. Lastly, parents should be surveyed to test their knowledge about security awareness. Results show that incidents where technology is involved are growing and could affect the entire nation. Moreover, surveys indicate that middle school students...

Policy driven security architectures for eBusiness

Cutts, Marcus
Fonte: Rochester Instituto de Tecnologia Publicador: Rochester Instituto de Tecnologia
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
47.54203%
The dawning of the twenty-first century and genesis of a new millennium has been extremely kind to technological advance. Industries and society alike have reaped the extreme benefits of technology at its finest. Technological progress has also proven to be extraordinarily beneficial to businesses and their bottom lines when properly employed. The need for automated business logic and functionality has spawned numerous concepts and efforts to capitalize on advanced business requirements. Probably the most popular and revolutionary to date of all initiatives is the advent of eBusiness. A direct descendant of Electronic Data Interchange (EDI), eBusiness has and continues to evolve into more than a phenomenon, but rather a sound component of successful corporations and organizations. The evolution and acceptance of eBusiness has created a ripple effect throughout the technical and business worlds. The promise of this wonderful concept and its accompanying technology has forced companies to completely rethink strategic planning efforts, and to sit up and pay full attention to this ever-growing development. One area that has been extremely affected by the wide spread acceptance of eBusiness and its counterparts are the architectures and infrastructures now utilized to support these efforts. Enterprise architectures that had originally been designed to shield internal business activities from the public eye of the Internet and other domains have been either replaced...

Network security: Risk assessment of information systems

Lurain, Sher
Fonte: Rochester Instituto de Tecnologia Publicador: Rochester Instituto de Tecnologia
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
57.40414%
This paper investigates fundamental security issues and the growing impact of security breaches on computer networks. Cost-effective security measures, such as asset-threat analysis, enable monitoring of security levels in complex systems. An evaluation of one technique, called the Livermore Risk Analysis Methodology (LRAM) is documentedC 1 ] . Untrusted communication lines, unauthorized access and unauthorized dissemination of information must be contained. The complexity and corresponding sophistication of todays' systems and the reliance of management on information generated by these systems make them attractive targets for computer related crimes. A profile of computer criminals and their crimes emphasize the importance of management involvement and social ethics as determents to crime. An overview of system security, control concepts, communication and transmission security, and a discussion of threats, vulnerabilities, and countermeasures is provided. The growing need for risk management models is presented as well as an overview of LRAM. Risk assessment of a specific system case study and risk profiles are developed using LRAM.

The Development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration

Mitchell, Marsha
Fonte: Rochester Instituto de Tecnologia Publicador: Rochester Instituto de Tecnologia
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
47.389263%
Digital identities are being utilized more than ever as a means to authenticate computer users in order to control access to systems, web services, and networks. To maintain these digital identities, administrators turn to Identity Management solutions to offer protection for users, business partners, and networks. This paper proposes an analysis of Identity Management to be accomplished in the form of a graduate level course of study for a ten-week period for the Networking, Security, and Systems Administration department at Rochester Institute of Technology. This course will be designed for this department because of its emphasis on securing, protecting, and managing the identities of users within and across networks. Much of the security-related courses offered by the department focus primarily on security within enterprises. Therefore, Identity Management, a topic that is becoming more popular within enterprises each day, would compliment these courses. Students that enroll in this course will be more equipped to satisfy the needs of modern enterprises when they graduate because they will have a better understanding of how to address security issues that involve managing user identities across networks, systems, and enterprises. This course will focus on several aspects of Identity Management and its use in enterprises today. Covered during the course will be the frameworks of Identity Management...

A panoramic view of the social security and social protection provisioning in Lesotho

Mosito,KE
Fonte: PER: Potchefstroomse Elektroniese Regsblad Publicador: PER: Potchefstroomse Elektroniese Regsblad
Tipo: Artigo de Revista Científica Formato: text/html
Publicado em 01/01/2014 Português
Relevância na Pesquisa
47.40414%
Social security is one of the most important areas of social policy. As part of its social policy, the government of Lesotho has promulgated various pieces of legislation and introduced an assortment of public assistance programmes for the benefit of the people of the country. There are also various informal social security measures which are the result of coordinated activities by individuals and groupings in Lesotho. These initiatives together provide a broad spectrum of social security provisioning for the people of Lesotho. This article sets out to discuss the said social security provisioning measures and appraises the efficacy of their interventions. Lesotho is a constitutional state. The Constitution of Lesotho came into force on 2 April 1993. It provides for a Bill of Rights as well as principles of state policy. There is, however, no express provision in the Constitution for a right to social security. This is regrettable. Thus, the intersection between constitutional law and social security within the context of Lesotho can be achieved only through the interpretation of the fundamental rights as well as the principles of state policy provided in the Constitution. While the provisions relating to fundamental rights help to establish entitlements to social security...