Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 88

Full-Text Articles in Social and Behavioral Sciences

Telemedicine Security: Challenges And Solutions, Crystal Fausett, Joseph R. Keebler, Megan C. Christovich, Jarod M. Parker, John M. Baker Jul 2021

Telemedicine Security: Challenges And Solutions, Crystal Fausett, Joseph R. Keebler, Megan C. Christovich, Jarod M. Parker, John M. Baker

Publications

The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthe-sizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) litera-ture. This methodology closes the gap between academic research and professional practice and aids in providing timely, practical insights related to cybersecurity and safety in virtual care environments. As …


Agent Based Modeling For Low-Cost Counter Uas Protocol In Prisons, Travis L. Cline, J. Eric Dietz Jan 2020

Agent Based Modeling For Low-Cost Counter Uas Protocol In Prisons, Travis L. Cline, J. Eric Dietz

International Journal of Aviation, Aeronautics, and Aerospace

Technological advances have led to the prevalence of small unmanned aerial systems (sUAS) which has proven to be a security concern for fixed facilities to include prisons, airports, and forward operating bases. This study explores if agent-based simulation modeling can serve as a useful tool for developing counter unmanned aerial system (C-UAS) parameters for a fixed facility. The relationship between threat speed and a hypothetical C-UAS is explored in an AnyLogic model designed to represent a prison and general sUAS smuggling threats that prisons have experienced in recent years. The data suggests there is a critical threat sUAS speed in …


Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri Sep 2019

Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri

Publications

This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …


Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor Jan 2019

Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor

International Bulletin of Political Psychology

There have been reports of a growing number of Transportation Security Administration (TSA) agents calling in sick and refusing to work for no pay (1). The immediate question becomes, what’s the impact on aviation security? The answer is a negative one, but not as negative as one might think, and one only adding to festering, pre-shutdown problems.


Airport Policing In Pakistan: Structure, Training, And Issue, Muhammad Israr, Muhammad Abrar Jan 2019

Airport Policing In Pakistan: Structure, Training, And Issue, Muhammad Israr, Muhammad Abrar

International Journal of Aviation, Aeronautics, and Aerospace

Airports are strategically and economically important installations of any country. Airports are the gateway of any country and any incidents at these gateways may harm the very aspects of a country in the comity of nations. What are the types of unlawful interferences that are faced by the aviation industry? The establishment as well as preparedness of the airport security force in Pakistan is described in the detail. The airports security is of prime importance in Pakistan because of the wave of terrorism and security situations all around the country. Airport Security Force (ASF) established in 1976, due to the …


A Realist Ethnography Of Nuclear Security Officer Culture, Douglas J. Evans Mar 2014

A Realist Ethnography Of Nuclear Security Officer Culture, Douglas J. Evans

Publications

This realist ethnography describes the heretofore unexamined culture of commercial nuclear power security officers over a one-year period from an active participant observer’s perspective. Data include field notes taken during observations at various sites and 15 interviews with security leaders working at or who had recently worked at 12 different commercial nuclear power plants and had previously worked at a dozen other commercial nuclear power plants, thus representing a broad overview of the commercial nuclear security culture. The data also include more than 58 unclassified documents from these sites, industry organizations, and regulatory agencies. An analysis of the data reveals …


Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling Jan 2014

Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling

Journal of Digital Forensics, Security and Law

Media and network systems capture and store data about electronic activity in new, sometimes unprecedented ways; computational systems make for new means of analysis and knowledge development. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional legal regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But autonomy, identity and authenticity concerns with electronic data raise issues of public policy, privacy and proper police oversight of civil society. We examine those issues and their implications for digital and computational forensics


The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor Jan 2011

The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the relevance of blame in the context of terrorism.


The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor Nov 2010

The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor

International Bulletin of Political Psychology

The author gives a psychological perspective on the security of aviation cargo shipments.


Are You Down With Ppp? A Look At Prohibited Personnel Practices In The United States Government, Ibpp Editor Aug 2010

Are You Down With Ppp? A Look At Prohibited Personnel Practices In The United States Government, Ibpp Editor

International Bulletin of Political Psychology

This article discusses the prevalence of identified proscribed personnel practices, and the power dynamics of such identifications among federal employees.


Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor May 2010

Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor

International Bulletin of Political Psychology

The United States Government Accountability Office (GAO) has recently Issued Efforts to Validate TSA’s Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Problems (May 2010, GAO-10-763). This IBPP article will describe and comment on the main GAO findings and additional data on which the findings are based. The article will end with some basic challenges to behavior detection as a useful security measure.


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan Jan 2006

Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan

Journal of Digital Forensics, Security and Law

Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …


When The Risk Is Strategically And Operationally Insignificant, Ibpp Editor Nov 2003

When The Risk Is Strategically And Operationally Insignificant, Ibpp Editor

International Bulletin of Political Psychology

The article discusses some of the dangers in labelling a risk as strategically and operationally insignificant in a security setting.


Trends. Non-Physical Approaches To Physical Security, Ibpp Editor Oct 2003

Trends. Non-Physical Approaches To Physical Security, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses the vulnerabilities of protecting physical assets with purely physical means, as well as the potential benefits of non-physical approaches.


The Psychology Of Intelligent Video Analysis, Ibpp Editor Oct 2003

The Psychology Of Intelligent Video Analysis, Ibpp Editor

International Bulletin of Political Psychology

This article examines issues surrounding software-enhanced video analysis in an intelligence context.


Trends. Car Bomb Explosion And An Explosion Of Truths, Ibpp Editor Sep 2003

Trends. Car Bomb Explosion And An Explosion Of Truths, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses multiple political psychological aspects of the August 29, 2003 car bomb explosion adjacent to the Imam Ali Mosque in Najaf, Iraq


Trends. The Federal Bureau Of Investigation Reform Act Of 2003 (S.1440): A Polygraph Update, Ibpp Editor Aug 2003

Trends. The Federal Bureau Of Investigation Reform Act Of 2003 (S.1440): A Polygraph Update, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses The Federal Bureau of Investigation Reform Act of 2003 (S.1440), and the continuing popularity of the polygraph with security bureaucracies.


Is Virtual Conferencing Virtually The Same?, Ibpp Editor Jun 2003

Is Virtual Conferencing Virtually The Same?, Ibpp Editor

International Bulletin of Political Psychology

The article discusses the pros and cons of virtual conferencing and the optimizing of decision making in a security context.


National Security And Multiple Selves, Ibpp Editor Jun 2003

National Security And Multiple Selves, Ibpp Editor

International Bulletin of Political Psychology

This article describes the positive and negative consequences for national security of the ontology and phenomenology of multiple selves.


Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor May 2003

Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor

International Bulletin of Political Psychology

The article evaluates the gain in security from no-fly zones from a security perspective.


Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor Apr 2003

Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses one aspect of sexual orientation – homosexuality - in a security and intelligence context.


Trends. Social Cognition And The Legal Adjudication Of Terrorism Cases, Ibpp Editor Apr 2003

Trends. Social Cognition And The Legal Adjudication Of Terrorism Cases, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses the impact of terrorism on the justice system and security.


Trends. Disclosure Of Post-9-11 Arrestees And Maslow’S Hierarchy Of Needs, Ibpp Editor Nov 2002

Trends. Disclosure Of Post-9-11 Arrestees And Maslow’S Hierarchy Of Needs, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses the Maslowian hierarchy of needs in the context of 9-11 terrorist attacks and the relationship between executive and judicial branches of American government.


The Societal Costs Of Surveillance: An Alternative View On Civil Liberties Constraints, Ibpp Editor Sep 2002

The Societal Costs Of Surveillance: An Alternative View On Civil Liberties Constraints, Ibpp Editor

International Bulletin of Political Psychology

This article explores some psychological phenomena bearing on the consequences of civil liberties constraints.


Trends. Personnel Security In An Age Of Terrorism With Global Reach, Ibpp Editor Sep 2002

Trends. Personnel Security In An Age Of Terrorism With Global Reach, Ibpp Editor

International Bulletin of Political Psychology

This Trends article discusses what an appropriate level of commitment to a security bureaucracy might look like.


Trends. Husbands, Wives, And Terrorism: The Validity Of Beliefs And The Threat Of Interpretive Strategies, Ibpp Editor Aug 2002

Trends. Husbands, Wives, And Terrorism: The Validity Of Beliefs And The Threat Of Interpretive Strategies, Ibpp Editor

International Bulletin of Political Psychology

This article discusses threat assessment via linguistic analysis.


Trends. Fetishism, Secrecy, And Security, Ibpp Editor May 2002

Trends. Fetishism, Secrecy, And Security, Ibpp Editor

International Bulletin of Political Psychology

This article discusses the Federation of American Scientists’ Secrecy News and how it characterized the Bush Administration’s stance towards the President’s Daily Brief as “fetishism.”


Trends. Personnel Security And Counterintelligence: No Evidence Of Racial Bias As Racism, Ibpp Editor Aug 2001

Trends. Personnel Security And Counterintelligence: No Evidence Of Racial Bias As Racism, Ibpp Editor

International Bulletin of Political Psychology

This article discusses the concepts of race and racial bias in the context of espionage investigations carried out by the US Department of Energy (DOE) and the US Federal Bureau of Investigation (FBI).


Trends. Border Security Legislation, Terrorism-Sponsoring Nations, And Evil, Ibpp Editor Jun 2001

Trends. Border Security Legislation, Terrorism-Sponsoring Nations, And Evil, Ibpp Editor

International Bulletin of Political Psychology

The IBPP editor discusses limiting temporary visas for visitors from alleged terrorism-sponsoring nations as a way of "tightening" the security of national borders.