Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

2022

Security

Discipline
Institution
Publication

Articles 1 - 13 of 13

Full-Text Articles in Social and Behavioral Sciences

Strategic Petroleum Reserve: Origins And Evolution, Bert Chapman Dec 2022

Strategic Petroleum Reserve: Origins And Evolution, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

The U.S. Strategic Petroleum Reserve (SPR) is located on the Texas and Louisiana Gulf Coasts and has served as a national emergency petroleum supply resource since 1975. Contents of this report include:

  • Information on the historical origins of U.S. national petroleum reserves dating back to 1910.
  • The U.S.’ increasing growth as a petroleum consumer and its energy policy interactions with other countries.
  • How the 1973 Arab Oil Embargo forced drastic changes in U.S. energy policy leading to the SPR’s establishment.
  • The SPR’s legal purpose being creating and maintaining a strategic oil reserve to mitigate against future oil import interruptions or …


Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha Oct 2022

Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha

Library Philosophy and Practice (e-journal)

This study was on the security of information resources in academic libraries in Kwara State, Nigeria. Academic libraries in Kwara State include both private and public institutions. The libraries were predominantly selected for academic purposes, such as Kwara State University, University of Ilorin, Al-Hikmah University, and Kwara State Polytechnic Ilorin. Four research questions and four corresponding objectives of the study were framed. The case study design was approved for research. Targeted sampling was used to select 25 respondents from a pool of 115 professionals in all four academic libraries in Kwara State. Semi-structured interview guides were used to collect data …


Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari Oct 2022

Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari

Library Philosophy and Practice (e-journal)

This paper presents the results of a study conducted on the engineering student’s awareness of social media privacy and security issues. For this purpose, the survey method was adopted and a questionnaire was administered among the engineering students. The results revealed that majority of the respondents (60.8 percent) are reading the privacy policies on social media Majority of the respondents (76.31 percent) are avoiding friend requests from unknown persons. The study recommends that the users of social media should not assume that all privacy policies are identical; they vary from one platform to another; also, they do not provide sufficient …


Multi-Functional Job Roles To Support Operations In A Multi-Faceted Jewel Enabled By Ai And Digital Transformation, Steven M. Miller Oct 2022

Multi-Functional Job Roles To Support Operations In A Multi-Faceted Jewel Enabled By Ai And Digital Transformation, Steven M. Miller

Research Collection School Of Computing and Information Systems

In this story, we highlight the way in which the use of AI enabled support systems, together with work process digital transformation and innovative approaches to job redesign, have combined to dramatically change the nature of the work of the front-line service staff who protect and support the facility and visitors at the world’s most iconic airport mall and lifestyle destination.


Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori Jul 2022

Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori

Library Philosophy and Practice (e-journal)

No abstract provided.


Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa Jun 2022

Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa

Library Philosophy and Practice (e-journal)

Abstract

Librarians across Nigeria are gradually more concerned with the safety and physical integrity of important intellectual property or properties. Security and prevention of crimes in libraries more specifically academic libraries are necessary library duties for librarians to accomplish. Due to security breaches in university libraries, users at times are not able to get the information resources needed and this makes the library ineffective in satisfying users’ information needs. The security of collections in a library embraces a large number of responsibilities. The cost of acquiring processing, and maintaining collections are soaring. If information materials are stolen or damaged or …


Protecting Our Community From The Hidden Vulnerabilities Of Today’S Intelligent Transportation Systems, Shahab Tayeb May 2022

Protecting Our Community From The Hidden Vulnerabilities Of Today’S Intelligent Transportation Systems, Shahab Tayeb

Mineta Transportation Institute

The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the network. The research team initially performed a simulation of CAN traffic generation followed by hardware implementation …


Digital Privacy In The Home, Kelley Flannery Rowan Apr 2022

Digital Privacy In The Home, Kelley Flannery Rowan

Works of the FIU Libraries

This workshop covers how to stay safe in a digital environment while using the many conveniences a smart home offers. The first half focuses on understanding where the risks are in the digital environment and how to stay safe by creating secure networks and employing strong security tactics with biometrics, passwords, and other available features. The second half focuses on the Internet of Things, covering everything you are likely to find in a smart home. The presentation offers tips on how to reduce the risk of hackers invading your privacy through smart speakers and TVs, as well as addressing the …


Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels Apr 2022

Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels

Student Publications

The global expansion of armed private contractors has led to a revived interest in researching armed private contracting firms, especially investigating how their personnel have functioned as an extension of state foreign policy. However, the literature on the industry contains a confusing diversity of terms when reviewing such firms, whether private military company, private security company, private military security company, or even just mercenary. Using the Singer (2010) ‘tip of the spear’ typology, I analyze the distinctions across armed private contracting firms and discuss the differences between armed private contractors and conventional militaries, armed private contractors and mercenaries, and highlight …


Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Mar 2022

Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz Jan 2022

Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz

VMASC Publications

Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …


Testing The Limits Of International Society? Trust, Aukus And Indo-Pacific Security, Jamal Barnes, Samuel M. Makinda Jan 2022

Testing The Limits Of International Society? Trust, Aukus And Indo-Pacific Security, Jamal Barnes, Samuel M. Makinda

Research outputs 2022 to 2026

When Australia reneged on a AUD$90 billion submarine contract with France in 2021 as it joined AUKUS, a new trilateral military partnership between Australia, the UK and the US, it was accused of lying and breaching France's trust. This perceived act of betrayal not only led to a deterioration in the diplomatic relationship between Australia and France, but it also drew attention to the consequences of violating the norm of pacta sunt servanda—agreements must be kept. Although it is recognized that breaches of trust undermine relationships, what has been underexplored is how a violation of norms can also undermine the …


Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai Jan 2022

Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai

Library Philosophy and Practice (e-journal)

The Internet of Things (IoT) is the internetworking of physical devices which consists of an embedded system with sensors, actuators and network connectivity that enable collection and exchange of data. Each day, we are witnessing the emergence of new technologies that have the capability to embed into our environment and measure the physical, social and contextual phenomenon. The technology behind IOT is driven by various technological forces such as smart devices, wireless network, and pervasive connectivity among others. Data collection, management and accessibility are made easy with Internet of Things IOT. The Internet of Things (IoT) is aimed at formulating …