Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Dayton (55)
- Walden University (43)
- Kennesaw State University (36)
- Selected Works (34)
- University of Tennessee, Knoxville (34)
-
- Singapore Management University (22)
- University of Nevada, Las Vegas (19)
- Clark University (11)
- Western Kentucky University (11)
- Nova Southeastern University (6)
- Purdue University (6)
- California State University, Monterey Bay (4)
- University of Wisconsin Milwaukee (4)
- Embry-Riddle Aeronautical University (3)
- New Jersey Institute of Technology (3)
- Ouachita Baptist University (3)
- Santa Clara University (3)
- Washington University in St. Louis (3)
- World Maritime University (3)
- Air Force Institute of Technology (2)
- Butler University (2)
- DePaul University (2)
- Edith Cowan University (2)
- La Salle University (2)
- Old Dominion University (2)
- Pace University (2)
- Salve Regina University (2)
- Southern Illinois University Carbondale (2)
- Technological University Dublin (2)
- The University of Akron (2)
- Keyword
-
- Stander Symposium project (55)
- Sustainability (13)
- Management (9)
- Education (6)
- MPA (6)
-
- School of Education and Health Sciences (6)
- Student affairs (6)
- Environment (5)
- Information security (5)
- MSIT (5)
- Research (5)
- Small Business (5)
- Surveys (5)
- Agriculture (4)
- Applied sciences (4)
- Business (4)
- California ranchos (4)
- Cultural resources (4)
- Diseños (4)
- Early California maps (4)
- Expediente (4)
- Gambling (4)
- Historical resources (4)
- Information systems (4)
- Information technology (4)
- Land grants (4)
- Land patents (4)
- Land tenure (4)
- Leadership (4)
- Natural resources (4)
- Publication
-
- Stander Symposium Projects (55)
- Walden Dissertations and Doctoral Studies (43)
- International Journal of Nuclear Security (34)
- KSU Proceedings on Cybersecurity Education, Research and Practice (28)
- Research Collection School Of Computing and Information Systems (20)
-
- International Conference on Gambling & Risk Taking (19)
- School of Professional Studies (11)
- Theses and Dissertations (7)
- Toko Surabaya (7)
- CCE Theses and Dissertations (6)
- Dissertations (6)
- Journal of Cybersecurity Education, Research and Practice (6)
- Undergraduate Research Award (5)
- Donald Wynn (4)
- Individual Ranchos in Monterey and SLO Counties (4)
- Harvey Enns (3)
- Mahurin Honors College Capstone Experience/Thesis Projects (3)
- Open Access Theses (3)
- Santa Clara Magazine (3)
- Scholars Day (3)
- Thomas Ferratt (3)
- World Maritime University Dissertations (3)
- Arts & Sciences Electronic Theses and Dissertations (2)
- Butler Journal of Undergraduate Research (2)
- Information Systems Faculty Publications and Presentations (2)
- Leila A. Halawi (2)
- Mark A. Jacobs (2)
- Michael F. Gorman (2)
- Publications (2)
- Student Research Conference Select Presentations (2)
- Publication Type
- File Type
Articles 1 - 30 of 369
Full-Text Articles in Business
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Student Competition Cover
International Journal of Nuclear Security
No abstract provided.
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
International Journal of Nuclear Security
No abstract provided.
Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall
Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall
International Journal of Nuclear Security
Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
International Journal of Nuclear Security
The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.
Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
International Journal of Nuclear Security
No abstract provided.
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
International Journal of Nuclear Security
No abstract provided.
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
Welcome to the second issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Journal of Cybersecurity Education, Research and Practice
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt
Journal of Cybersecurity Education, Research and Practice
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.
Four Functions Of Statistical Significance Tests, Xinshu Zhao
Four Functions Of Statistical Significance Tests, Xinshu Zhao
Professor Xinshu ZHAO
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
International Journal of Nuclear Security
Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
International Journal of Nuclear Security
Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).
The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
International Journal of Nuclear Security
Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.
From The Editor’S Desk
International Journal of Nuclear Security
No abstract provided.
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
International Journal of Nuclear Security
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.
Nike Considered: Getting Traction On Sustainability, Christopher Lyddy, Rebecca Henderson, Richard M. Locke, Cate Reavis
Nike Considered: Getting Traction On Sustainability, Christopher Lyddy, Rebecca Henderson, Richard M. Locke, Cate Reavis
Christopher J. Lyddy
No abstract provided.
Can They Use It? Studying The Usability Of The Canvas Learning Management System At Bowling Green State University, James Faisant
Can They Use It? Studying The Usability Of The Canvas Learning Management System At Bowling Green State University, James Faisant
Honors Projects
Students’ use of the Canvas learning management system (LMS) as implemented by Bowling Green State University (BGSU) is a substantial part of their learning experience. A well designed and easy to use LMS not only allows students to be more efficient, it allows students to engage effectively with their coursework. Students’ ability to effectively use the LMS is examined to understand whether the system is usable, and if not, what changes should be made. Research included two distinct elements. First, students were asked to complete nine tasks identified as common tasks within Canvas, while being timed. Additionally, students responded to …
Minerva 2016, The Honors College
Minerva 2016, The Honors College
Minerva
This issue of Minerva includes the article "Dear Bill and Betsy," documenting student gratitude for generous Honors donors Bill and Betsy Leitch; an interview with former professor and Honors Preceptor, Walter Macdougall; and an article on Honors student Emily Illingworth and her experiences in Honors. Other highlights include an article on distinguished Honors graduates Mark Pettegrow and Mark Haskell; and an article on the 2016 election as covered by UMaine Journalism students.
Bringing The Outside In: Examining The Impacts That Climate, Exchange, And Identity Processes Have On Organizationally-Beneficial Employee Green Behavior, Sashi C. Sekhar
Bringing The Outside In: Examining The Impacts That Climate, Exchange, And Identity Processes Have On Organizationally-Beneficial Employee Green Behavior, Sashi C. Sekhar
Theses and Dissertations
My dissertation contributes to growing practitioner and researcher interest in the corporate social responsibility topic of employee green behavior, a key strategic input to organizational environmental sustainability efforts. While it has been recognized that employee behavior can significantly impact sustainability efforts (Daily, Bishop, and Govindarajulu, 2009; Ones and Dilchert, 2012), the psychological mechanisms through which this occurs and the precise nature of these behaviors have not been rigorously examined. To address the gaps, my research investigates the interrelationship between organizational and individual factors in motivating organizational citizenship behavior directed toward the natural environment (OCB-E). The model, which derives from social …
The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko
The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko
School of Professional Studies
In the last decade, the School of Professional Studies at Clark University has witnessed a sharp increase in international students. More and more international students in the millennial generation have entered the School of Professional Studies pursuing one of the two-year graduate programs: Master of Science in Professional Studies, Master of Science in Public Administration, and Master of Science in Information Technology. In the past, working adult student dominant the program. These students already had a career outside the classrooms before them came to study. The millennial international students have generated new adjustment problems. Some of the transition issues of …
A Mixed Methods Study: Evaluating The Relationship Of Project Manager Competencies And It Project Management Methodologies, Keith A. Mcdermott
A Mixed Methods Study: Evaluating The Relationship Of Project Manager Competencies And It Project Management Methodologies, Keith A. Mcdermott
Open Access Theses
Determining skillsets that are particularly important to the development of an effective project manager can be useful for a variety of applications. These applications range from the hiring of a new project manager for an organization to continued training for current employees. Past research has called upon current project managers to rate what skillsets they see as important to the cultivation of an optimal or effective project manager. Additional research has expanded this idea to determine how skillsets vary between project managers and functional managers (El-Sabaa, 2001). While this research is certainly important, skillset grouping can be further explored. This …
Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo
Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard J. Oentaryo, Philips K. Prasetyo, Casey Vu, Ee-Peng Lim, David Lo
Research Collection School Of Computing and Information Systems
The advent of the Web brought about major changes in the way people search for jobs and companies look for suitable candidates. As more employers and recruitment firms turn to the Web for job candidate search, an increasing number of people turn to the Web for uploading and creating their online resumes. Resumes are often the first source of information about candidates and also the first item of evaluation in candidate selection. Thus, it is imperative that resumes are complete, free of errors and well-organized. We present an automated resume evaluation tool called 'CareerMapper'. Our tool is designed to conduct …
A Traders Guide To The Predictive Universe- A Model For Predicting Oil Price Targets And Trading On Them, Jimmie Harold Lenz
A Traders Guide To The Predictive Universe- A Model For Predicting Oil Price Targets And Trading On Them, Jimmie Harold Lenz
Doctor of Business Administration Dissertations
At heart every trader loves volatility; this is where return on investment comes from, this is what drives the proverbial “positive alpha.” As a trader, understanding the probabilities related to the volatility of prices is key, however if you could also predict future prices with reliability the world would be your oyster. To this end, I have achieved three goals with this dissertation, to develop a model to predict future short term prices (direction and magnitude), to effectively test this by generating consistent profits utilizing a trading model developed for this purpose, and to write a paper that anyone with …