Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Human Resources Management

PDF

2016

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 300

Full-Text Articles in Business

Gerald Davis, The Vanishing American Corporation (2016), James R. Blair Dec 2016

Gerald Davis, The Vanishing American Corporation (2016), James R. Blair

Markets, Globalization & Development Review

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall Dec 2016

Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall

International Journal of Nuclear Security

Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …


Developing And Promoting A Nuclear Security Curriculum At Amity University, India: Beginnings, Successes And Challenges, Ms. Kawalpreet Kalra, Ms. Archana Yadav, Dr. Alpana Goel Dec 2016

Developing And Promoting A Nuclear Security Curriculum At Amity University, India: Beginnings, Successes And Challenges, Ms. Kawalpreet Kalra, Ms. Archana Yadav, Dr. Alpana Goel

International Journal of Nuclear Security

Amity University is one of India’s leading research- and innovation-driven private universities. The Amity Institute of Nuclear Science and Technology (AINST), established in 2009, contribute to Amity’s mission to promote national development through philanthropy, education and research. Very recently, courses related to nuclear security and security culture have been added to the existing AINST curriculum. The purpose of introducing this course was to enhance the understanding of technical, policy, and regulatory challenges associated with nuclear security and to create a nuclear security culture among relevant local institutions. This paper describes the process involved in establishing nuclear security as an elective …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga Dec 2016

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa Dec 2016

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk Dec 2016

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath Dec 2016

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr Dec 2016

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Stunting Higher-Ed Reforms: Arrogance And Ignorance, Aaron W. Hughey Dec 2016

Stunting Higher-Ed Reforms: Arrogance And Ignorance, Aaron W. Hughey

Counseling & Student Affairs Faculty Publications

No abstract provided.


The Impact Of Authentic Leadership Behavior On Employee Engagement And Organizational Ethical Culture In Nigeria, Adayehi B. Peter Dec 2016

The Impact Of Authentic Leadership Behavior On Employee Engagement And Organizational Ethical Culture In Nigeria, Adayehi B. Peter

Human Resource Development Theses and Dissertations

Authenticity in leadership is an old phenomenon that has recently sparked a new research interest in management and the human resource development (HRD) literature (Peus, Wesche, Streicher, Braun, & Frey, 2012). An upswing in highly publicized corporate scandals, management malfeasance, and broader societal challenges facing public and private organizations has contributed to the recent attention placed on authenticity and authentic leadership (Walumbwa, Avolio, Gardner, Wernsing, & Peterson, 2008). Authentic leadership behavior allows leaders and organizations meet the raised expectations of fairness, morality, and social responsibility held by employees and organizational stakeholders (Kiersch, 2012).

The primary purpose of this study was …


Improving Employee Engagement Through The Development Of An Enterprise Performance Management System, Carlton D. Abner Dec 2016

Improving Employee Engagement Through The Development Of An Enterprise Performance Management System, Carlton D. Abner

Doctor of Nursing Practice (DNP) Projects

There is ample evidence of our health care delivery system relying heavily on value-based outcomes. The increased focus on outcomes has required health care organizations to adjust how they approach data and how they successfully implement performance management systems. These performance management systems help the organization identify, measure, and report the organization’s performance at an enterprise level using key performance indicators clearly linked to the organization’s overall strategy. As one organization began implementing an enterprise performance management system, the goal of this project was to show how participating in projects with that level of strategic impact can lead to improved …


Effects Of Management-Development Practices On Hospitality Management Graduates' Job Satisfaction And Intention To Stay, Edwin Torres, Howard Adler Dec 2016

Effects Of Management-Development Practices On Hospitality Management Graduates' Job Satisfaction And Intention To Stay, Edwin Torres, Howard Adler

Edwin Torres

Companies have long recognized the importance of training and developing their managers to prepare them for their short- and long-term careers. Formal management-development programs and other less formal means of management development abound in the hospitality industry. Therefore, one may ask whether the entry-level managers for whom these programs are designed perceive them to be effective. The present study explores management-development practices, procedures, and techniques, and their effects on job satisfaction and organizational commitment


A Five-Year Integration Plan For Syrian Refugees Residing In Italian Refugee Camps, Megan Vander Boon Dec 2016

A Five-Year Integration Plan For Syrian Refugees Residing In Italian Refugee Camps, Megan Vander Boon

Honors Theses

The Syrian War is drastically affecting the European Migration Crisis and the number of misplaced people in the world. With nearly five million Syrians seeking asylum outside the country’s borders, neighboring countries are being pressured to find new ways to absorb the refugees. In the last two years, Italy has been challenged more than other countries because of entrance methods through the Mediterranean Sea. Italy has the ability to absorb the growing number of refugees if it implements integration plans. The purposed method suggests Syrian refugees, specifically children, will apply for Italian citizenship once they arrive to a refugee camp. …


Incorporating Experiential Theory Into Virtual Strategic Planning Processes, Chris Perkins Dec 2016

Incorporating Experiential Theory Into Virtual Strategic Planning Processes, Chris Perkins

Capstone Collection

Experiential learning theories, such as David Kolb’s Experiential Learning Cycle (2015) contribute to more than just learning environments. In this Training Course Linked Capstone I facilitated a six-week strategic planning workshop for the Diversity and Inclusion Advisory Group (DIAG) of AFS-USA, an intercultural youth exchange organization. Kolb’s cycle acted as framework for the workshop. The DIAG operates as a virtual team, with members across the United States, therefore I designed the workshop for implementation via the internet and telephone conversation. I consulted research on virtual team structure and participatory practices in strategic planning in order to design a program which …


Leadership Styles, Organisational Culture And Learning Organisational Capability In Education Industry: Evidence From Egypt, Dr. Maha Ahmed Zaki Dajani, Dr. Mohamed Saad Mohamed Dec 2016

Leadership Styles, Organisational Culture And Learning Organisational Capability In Education Industry: Evidence From Egypt, Dr. Maha Ahmed Zaki Dajani, Dr. Mohamed Saad Mohamed

Business Administration

We aim in this study to explore the interaction between three constructs: leadership style, organisational culture, and organisational learning capacity. In addition to that, we investigated the validity of this trio relationship in both public and private Egyptian universities situated in Greater Cairo area. A quota sampling procedure was used to recruit 298 academicians - 186 from public universities and 112 from private universities. Significant correlations were obtained between transformational and transactional leadership style and organisational learning capacity dimensions. However, the moderating effect of organisational culture in the relationship between leadership styles and organisational learning capacity was not reported. Lastly, …


Five Potential Barriers To Lms Usage, John Contrado Dec 2016

Five Potential Barriers To Lms Usage, John Contrado

Instructional Design Capstones Collection

This paper began as a needs assessment investigating low Learning Management System (LMS) usage at a worldwide technology corporation. Subsequently, the company in question underwent a number of personnel changes and decide to forgo the needs assessment. As such, this paper became a review of research literature related to LMS usage barriers, with the intentions of identifying potential causes of low LMS usage in corporate environments. The review of the existing literature identified five major potential barriers to LMS usage. Because of the nature of the process, these are generalized broad barriers that can easily be identified and discovered in …


Three Essays On Friend Recommendation Systems For Online Social Networks, Jiaxi Luo Dec 2016

Three Essays On Friend Recommendation Systems For Online Social Networks, Jiaxi Luo

Theses and Dissertations

Social networking sites (SNSs) first appeared in the mid-90s. In recent years, however, Web 2.0 technologies have made modern SNSs increasingly popular and easier to use, and social networking has expanded explosively across the web. This brought a massive number of new users. Two of the most popular SNSs, Facebook and Twitter, have reached one billion users and exceeded half billion users, respectively.

Too many new users may cause the cold start problem. Users sign up on a SNS and discover they do not have any friends. Normally, SNSs solve this problem by recommending potential friends. The current major methods …


The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko Dec 2016

The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko

School of Professional Studies

In the last decade, the School of Professional Studies at Clark University has witnessed a sharp increase in international students. More and more international students in the millennial generation have entered the School of Professional Studies pursuing one of the two-year graduate programs: Master of Science in Professional Studies, Master of Science in Public Administration, and Master of Science in Information Technology. In the past, working adult student dominant the program. These students already had a career outside the classrooms before them came to study. The millennial international students have generated new adjustment problems. Some of the transition issues of …


Job Applicants' Information Privacy Protection Responses: Using Socia Media For Candidate Screening, John R. Drake, Dianne Hall, J. Bret Becton, Clay Posey Dec 2016

Job Applicants' Information Privacy Protection Responses: Using Socia Media For Candidate Screening, John R. Drake, Dianne Hall, J. Bret Becton, Clay Posey

Faculty Publications

For human resource (HR) departments, screening job applicants is an integral role in acquiring talent. Many HR departments have begun to turn to social networks to better understand job candidates’ character. Using social networks as a screening tool might provide insights not readily available from resumes or initial interviews. However, requiring access to an applicants’ social networks and the private activities occurring therein—a practice currently legal in 29 U.S. states (Deschenaux, 2015)—could induce strong moral reactions from the job candidates because of a perceived loss of information privacy. Subsequently, such disclosure requests could induce job candidates to respond in a …