Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Remote Laboratory For Nuclear Security Education, Anthony R. Galindo, Craig Marianno Oct 2023

Remote Laboratory For Nuclear Security Education, Anthony R. Galindo, Craig Marianno

International Journal of Nuclear Security

Laboratory experiences for online students are very limited. To fill this gap, educators in the Department of Nuclear Engineering at Texas A&M University developed a series of radiation detection experiments for their remote students. Radiation detection is only one piece of nuclear security. The objective of the current research is to describe the development and execution of three online laboratories that investigate the basic application of physical security sensors that use light, ultrasonics, and heat to detect adversaries. This laboratory complements lecture material from the department’s Nuclear Security System and Design course. Using the Remote Desktop Application, students connect to …


Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D Apr 2022

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle Jan 2019

Comprehending The Safety Paradox And Privacy Concerns With Medical Device Remote Patient Monitoring, Marc Doyle

CCE Theses and Dissertations

Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring.

There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this …


Qualitative Collective Case Study Of Targeted Violence Preparedness At Institutions Of Higher Education, Tim Gunter Dec 2016

Qualitative Collective Case Study Of Targeted Violence Preparedness At Institutions Of Higher Education, Tim Gunter

Doctoral Dissertations and Projects

An increase in targeted violence incidents (TVIs), primarily active shooter events, at institutions of higher education (IHEs) has exposed gaps in campus security plan preparation and exercises. The purpose of this qualitative collective case study was to discover barriers to and best practices of universities and colleges conducting security preparedness activities for TVIs. The theory that guided this study was vested interest theory which predicts how attitudes will influence behavior in a commitment to preparedness fundamentals. The setting for this study was two institutions of higher education along the East Coast of the United States. Data collection techniques included site …


The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran Nov 2016

The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran

International Journal of Nuclear Security

In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …


Team Training In Safety And Security Via Simulation: A Practical Dimension Of Maritime Education And Training, Michael Baldauf, Dimitrios Dalaklis, Aditi Kataria Jan 2016

Team Training In Safety And Security Via Simulation: A Practical Dimension Of Maritime Education And Training, Michael Baldauf, Dimitrios Dalaklis, Aditi Kataria

Conference Papers

In the rather extended maritime domain, a term that should be the epicentre of any successful careerbuilding path is tailor-made training via cutting-edge simulators. To cut a long story short, the breadth of operations on the various types of ships has expanded to such a large extent that extensive practical training drills are becoming a compelling need to contribute to competent seafarers. This type of training can guarantee the positive outcome in their decision-making process and help the seafarers often being under continuous pressure, to suitably respond to the various safety and security threats on-board a vessel. The several conventions …


Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev Jul 2015

Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev

Doctoral Dissertations

Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of production, business, and entertainment. ICSs are commonly split into two subsystems - Programmable Logic Controllers (PLCs) and Supervisory Control And Data Acquisition (SCADA) systems - to achieve high safety, allow engineers to observe states of an ICS, and perform various configuration updates. Before wide adoption of the Internet, ICSs used "air-gap" security measures, where the ICS network was isolated from other networks, including the Internet, by a physical disconnect [1]. This level of security allowed ICS protocol designers to concentrate on the availability and safety of …


The Value Of Professional Security Industry Certifications, Daniel Benny Ph.D Jan 2015

The Value Of Professional Security Industry Certifications, Daniel Benny Ph.D

Aviation / Aeronautics / Aerospace International Research Conference

In the security and aviation community there are many professional security certifications that can be achieved in all disciplines of security. Those pertinent to aviation will be explored.


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …