Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (3)
- Social and Behavioral Sciences (3)
- Defense and Security Studies (2)
- E-Commerce (2)
- Engineering Education (2)
-
- Human Resources Management (2)
- International Relations (2)
- Law (2)
- National Security Law (2)
- Nuclear (2)
- Nuclear Engineering (2)
- Physical Sciences and Mathematics (2)
- Physics (2)
- Political Science (2)
- Public Affairs, Public Policy and Public Administration (2)
- Training and Development (2)
- Business Intelligence (1)
- Chemistry (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Data Storage Systems (1)
- Digital Communications and Networking (1)
- Education (1)
- Educational Methods (1)
- Higher Education and Teaching (1)
- Information Literacy (1)
- Library and Information Science (1)
- Institution
Articles 1 - 4 of 4
Full-Text Articles in Business
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
International Journal of Nuclear Security
In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Security Risk And Social Presence In E-Commerce, Amy I. Wright
Security Risk And Social Presence In E-Commerce, Amy I. Wright
Butler Journal of Undergraduate Research
The object is to investigate the relationship between consumers’ sense of security of a store and their purchasing intention from the store. This was investigated by evaluating how perceptions of security vary among pure play websites with no social presence on the one hand and with social presence on the other; and click and mortar websites with no social presence on the one hand, and social presence on the other. It was also investigated by evaluating how social presence might mitigate the risk of security perceived by consumers. The research method included a scenario given to each participant which requires …