Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Social and Behavioral Sciences
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
International Journal of Nuclear Security
In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Overcoming Fraud & Dishonesty In The Hospitality Industry, James Peter Murphy
Overcoming Fraud & Dishonesty In The Hospitality Industry, James Peter Murphy
Conference papers
The licensed industry is an increasingly competitive market place, many bars have responded by empowering staff and undertaking structural and management reforms in recent years. Undoubtedly, these changes have significantly raised the levels of customer service and enhanced customer satisfaction. Paradoxically these changes, combined with the responsibilities allocated to bar staff and management to supervise and manage bars with autonomous control have created more fertile conditions, scope and opportunity for dishonest actions by staff members.
The way licensed premises approach the issue of staff fraud is changing in response to the increased risk. Many bars have historically been anxious to …
Identifications Of Challenges And Success Factors Of Females Entering And Advancing In The Profession Of Emergency Management, Audra Cronen
Identifications Of Challenges And Success Factors Of Females Entering And Advancing In The Profession Of Emergency Management, Audra Cronen
Online Theses and Dissertations
This thesis focuses on how women in the emergency management field have identified and overcome challenges when entering and advancing in the profession. The two research questions were:
• What barriers have females experienced when entering and advancing in the field of emergency management?
• In what ways have females overcome barriers when entering and advancing in the field of emergency management?
These questions were answered by five women who work in the field of emergency management and responded to a series of interview questions. These women made it clear that while this is a predominately male-dominated field of work, …