Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Risk Factors For Workplace Encounters With Weapons By Hospital Employees, James Blando, Chalsie Paul, Mariana Szklo-Coxe Jan 2020

Risk Factors For Workplace Encounters With Weapons By Hospital Employees, James Blando, Chalsie Paul, Mariana Szklo-Coxe

Community & Environmental Health Faculty Publications

Objective:The specific aim of this study was to determine which risk factors were associated with frequent weapons confiscation in a healthcare facility. This study investigated the hypothesis that hospital-related factors impact the frequency of weapons confiscation.

Study design:Cross-sectional.

Methods:A cross-sectional survey was administered on-line to hospital security directors and assessed the associations of organizational factors with the frequency of weapons confiscation.

Results:It was found that hospitals with metal detectors were more than 5 times as likely to frequently confiscate weapons, suggesting this intervention is effective. It was also found that hospitals with psychiatric units were more likely to have frequent …


Identity Authentication Security Management In Mobile Payment Systems, Feng Wang, Ge Bao Shan, Yong Chen, Xianrong Zheng, Hong Wang, Sun Mingwei, Li Haihua Jan 2020

Identity Authentication Security Management In Mobile Payment Systems, Feng Wang, Ge Bao Shan, Yong Chen, Xianrong Zheng, Hong Wang, Sun Mingwei, Li Haihua

Information Technology & Decision Sciences Faculty Publications

Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the …