Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Social and Behavioral Sciences

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran Nov 2016

The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran

International Journal of Nuclear Security

In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Overcoming Fraud & Dishonesty In The Hospitality Industry, James Peter Murphy Feb 2016

Overcoming Fraud & Dishonesty In The Hospitality Industry, James Peter Murphy

Conference papers

The licensed industry is an increasingly competitive market place, many bars have responded by empowering staff and undertaking structural and management reforms in recent years. Undoubtedly, these changes have significantly raised the levels of customer service and enhanced customer satisfaction. Paradoxically these changes, combined with the responsibilities allocated to bar staff and management to supervise and manage bars with autonomous control have created more fertile conditions, scope and opportunity for dishonest actions by staff members.

The way licensed premises approach the issue of staff fraud is changing in response to the increased risk. Many bars have historically been anxious to …


Identifications Of Challenges And Success Factors Of Females Entering And Advancing In The Profession Of Emergency Management, Audra Cronen Jan 2016

Identifications Of Challenges And Success Factors Of Females Entering And Advancing In The Profession Of Emergency Management, Audra Cronen

Online Theses and Dissertations

This thesis focuses on how women in the emergency management field have identified and overcome challenges when entering and advancing in the profession. The two research questions were:

• What barriers have females experienced when entering and advancing in the field of emergency management?

• In what ways have females overcome barriers when entering and advancing in the field of emergency management?

These questions were answered by five women who work in the field of emergency management and responded to a series of interview questions. These women made it clear that while this is a predominately male-dominated field of work, …