Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Social and Behavioral Sciences
Coordination Of Inter-Agency Action For Nuclear Security In Uganda, Richard Sseggane
Coordination Of Inter-Agency Action For Nuclear Security In Uganda, Richard Sseggane
International Journal of Nuclear Security
Despite the dynamic threats to the nuclear security of the East and Central African region, and the decision of the Government of Uganda to embark on a nuclear power programme, there was not much put in place as a coordination and cooperation mechanisms among the stakeholders in the nuclear security activities.
This work confirmed the need in Uganda for the major nuclear security stakeholder agencies with roles and mandates for nuclear security including the regulator, security and intelligence agencies, police, border control, transport control, customs agencies and others to work together as necessary in the different nuclear security activities in …
Challenges And Opportunities For Sharing Threat Information With Radioactive Materials Operators, Raphael Duguay
Challenges And Opportunities For Sharing Threat Information With Radioactive Materials Operators, Raphael Duguay
International Journal of Nuclear Security
Operators are required to implement security measures to address requirements set by the regulatory body or competent authority. These security requirements are generally based on the national threat level and information provided by the relevant law enforcement authority, intelligence agencies and other relevant stakeholders. However, not all States can share this information with radioactive materials holders (e.g., operators), especially if they take a more prescriptive approach to regulation on security. The same situation often exists when a performance-based approach is used because there are multiple barriers that restrict the competent authority from sharing threat information. For example, competent authorities need …