Command, Control, and Charisma: Reflections on Police Bureaucracy
نویسندگان
چکیده
منابع مشابه
Crime Prevention and Control in Nigeria: a Study of Ogun State Police Command
This study investigated the activities of the police in crime prevention and control with specific focus on the Ogun State Police Command. The objectives of the study include (1) an examination of the factors responsible for the high crime incidence in Nigeria as well as in Ogun state (2) an investigation of the strategies adopted by the police in crime prevention and control (3) an assessment ...
متن کاملLegislatures and Statutory Control of Bureaucracy
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]. Midwest Political Science Association is collaborating wit...
متن کاملOn Optimizing Command and Control Structures
This paper uses information theory to investigate the utility of alternative Command and Control (C2) structures and strategies. Specifically we use information theoretic metrics complexity, entropic drag and evolutionary entropy. Complexity measures the amount of information required to fully express a situation. Entropic drag measures the rate at which situational information becomes obsolete...
متن کاملAugustine on Manichaeism and Charisma
Augustine was suspicious of charismatics‘ claims to superior righteousness, which supposedly authorized them to relay truths about creation and redemption. What follows finds the origins of that suspicion in his disenchantment with celebrities on whom Manichees relied, specialists whose impeccable behavior and intellectual virtuosity were taken as signs that they possessed insight into the mean...
متن کاملOn Cyber Warfare Command and Control Systems
As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: American Journal of Sociology
سال: 1966
ISSN: 0002-9602,1537-5390
DOI: 10.1086/224261