Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Coordination Of Inter-Agency Action For Nuclear Security In Uganda, Richard Sseggane Jul 2020

Coordination Of Inter-Agency Action For Nuclear Security In Uganda, Richard Sseggane

International Journal of Nuclear Security

Despite the dynamic threats to the nuclear security of the East and Central African region, and the decision of the Government of Uganda to embark on a nuclear power programme, there was not much put in place as a coordination and cooperation mechanisms among the stakeholders in the nuclear security activities.

This work confirmed the need in Uganda for the major nuclear security stakeholder agencies with roles and mandates for nuclear security including the regulator, security and intelligence agencies, police, border control, transport control, customs agencies and others to work together as necessary in the different nuclear security activities in …


Challenges And Opportunities For Sharing Threat Information With Radioactive Materials Operators, Raphael Duguay Jul 2020

Challenges And Opportunities For Sharing Threat Information With Radioactive Materials Operators, Raphael Duguay

International Journal of Nuclear Security

Operators are required to implement security measures to address requirements set by the regulatory body or competent authority. These security requirements are generally based on the national threat level and information provided by the relevant law enforcement authority, intelligence agencies and other relevant stakeholders. However, not all States can share this information with radioactive materials holders (e.g., operators), especially if they take a more prescriptive approach to regulation on security. The same situation often exists when a performance-based approach is used because there are multiple barriers that restrict the competent authority from sharing threat information. For example, competent authorities need …