Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Security

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 35

Full-Text Articles in Social and Behavioral Sciences

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini Dec 2016

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Deepwater Port Act Of 1974: Some International And Environmental Implications, James H. Gnann Jr. Dec 2016

Deepwater Port Act Of 1974: Some International And Environmental Implications, James H. Gnann Jr.

Georgia Journal of International & Comparative Law

No abstract provided.


Use It Or Lose It: Canadian Identity And The Construction Of Arctic Security Policy, Michael P. Mccormack Dec 2016

Use It Or Lose It: Canadian Identity And The Construction Of Arctic Security Policy, Michael P. Mccormack

FIU Electronic Theses and Dissertations

This dissertation investigates the specific factors that drive state action in Canadian Arctic security policy, particularly in relation to securitization of the Arctic region and historical factors that influence decision-making. The purpose of this research is to develop stronger linkages between securitization processes and actual policymaking. When studying the Arctic as a defined geographical space, we see considerable differences between Arctic states when it comes to how cultural and historical attachment to the Arctic region may serve as a selling point for the ability of national governments to justify allocation of defense resources to their respective publics. Using the Canadian …


Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi Dec 2016

Vulnerability Analysis And Security Framework For Zigbee Communication In Iot, Charbel Azzi

UNLV Theses, Dissertations, Professional Papers, and Capstones

Securing IoT (Internet of Things) systems in general, regardless of the communication technology used, has been the concern of many researchers and private companies. As for ZigBee security concerns, much research and many experiments have been conducted to better predict the nature of potential security threats. In this research we are addressing several ZigBee vulnerabilities by performing first hand experiments and attack simulations on ZigBee protocol. This will allow us to better understand the security issues surveyed and find ways to mitigate them. Based on the attack simulations performed and the survey conducted, we have developed a ZigBee IoT framework …


The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran Nov 2016

The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran

International Journal of Nuclear Security

In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …


Flight Emergency Advice Works Just As Well Back On The Ground, Carolyn Massiah Nov 2016

Flight Emergency Advice Works Just As Well Back On The Ground, Carolyn Massiah

UCF Forum

Save yourself first!

This one sentence is a valuable piece of advice I wish I had received and fully embraced so much earlier in life. In fact, it is still a notion that I struggle with because it is one that sounds selfish in nature. However, now more than at any other point in my life, I realize that in order to be selfless and to be able to assist others, you must first truly work on thinking of your own self first.


Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Web Application Penetration Testing, Besnik Qehaja, Gazmend Krasniqi, Ardian Bajraliu, Amet Shabani Oct 2016

Web Application Penetration Testing, Besnik Qehaja, Gazmend Krasniqi, Ardian Bajraliu, Amet Shabani

UBT International Conference

Safety of information is needed either in private sector or business for protection from market with competitive secrets or only for privacy. Advantages of internet and web applications is that they are accessible from everyone, but in business word data should be safe, reliable accessible. Although these are not new problems and always had different solutions to these problems, we always need to be on the cutting edge with new attacks that appear every day and to try to achieve a greater security. In this paper we present some of the most dangerous forms of risk which are risking web …


Schizorevolutions Vs. Microfascisms: The Fear Of Anarchy In State Securitization, Athina Karatzogianni, Andy Robinson Oct 2016

Schizorevolutions Vs. Microfascisms: The Fear Of Anarchy In State Securitization, Athina Karatzogianni, Andy Robinson

Athina Karatzogianni


This article examines how hierarchy operates as a productive political structure in state securitization, within the third logic of Mattern and Zarakol’s (2016: 623) three logics of hierarchy operationalized in International Relations scholarship: Hierarchy as an institutional function bargain between actors (a logic of trade-offs); hierarchy as differentiated social and political roles shaping behavior (a logic of positionality); and hierarchy as a productive political space or structure (a logic of productivity). In Mattern and Zarakol (2016), ‘the feature of hierarchies most central to the logic of productivity is their practical or performative, ontology’ (p. 641) with the focal point ‘disclosing the mechanisms of …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


China And Africa’S Peace And Security Agenda: The Burgeoning Appetite, Oita Etyang, Simon Oswan Panyako Sep 2016

China And Africa’S Peace And Security Agenda: The Burgeoning Appetite, Oita Etyang, Simon Oswan Panyako

Journal of African Conflicts and Peace Studies

China and Africa have had contacts since time immemorial. It is, however, in the last two decades that China vastly increased its engagement with Africa, following the first Ministerial Conference of the Forum on China-Africa Cooperation (FOCAC) that took place in 2000 and the Beijing Summit held in 2006. China has skillfully utilized its international strategy of multipolarity and non-interference to champion its economic interests as well as its hegemonic quest. It is undeniable that China has heavily invested in Africa through Foreign Direct Investments (FDI), and infrastructure development. China has also increased its appetite on matters peace and security. …


Security And Foreign Policy Of Landlocked States, Samiullah Mahdi Aug 2016

Security And Foreign Policy Of Landlocked States, Samiullah Mahdi

Graduate Masters Theses

Wealth and stability of the region have a direct influence on the foreign policy and security of landlocked states. Landlocked states residing in poor and unstable neighborhoods, consequently, experience instability and have more limited foreign policy options compared to those landlocked states which are located in the rich and stable regions of the world. Besides those, two other factors, nationalism and the nature of the export product, extensively influence foreign policy and security of some landlocked countries. However, they are exceptions to the rule. Wealth and stability of the neighborhood determine the direction and fate of landlocked countries foreign policies …


Rebuilding Security And Peace For Women: Exploring Women’S Security Challenges And Activism For Security And Peace Building In Northeast India, Rubi Devi Aug 2016

Rebuilding Security And Peace For Women: Exploring Women’S Security Challenges And Activism For Security And Peace Building In Northeast India, Rubi Devi

Dissertations

Women have been affected by violence and conflicts ever since the wars were first waged on earth. Woman as a grieving mother or widow is a common portrayal of war and conflict. However, the common portrayal of women as passive victims does not recount the whole story of women’s experience in conflict/post conflict scenario. Women face countless security challenges in the form of physical, psychological abuses, economic burden and most importantly sexual violence- rape, murder, molestation, kidnapping and sex trafficking. The gendered nature of conflict, thus, increases women’s security challenges and places them at a critical juncture of experiencing and …


Geopolitics Of The 2016 Australian Defense White Paper And Its Predecessors, Bert Chapman Apr 2016

Geopolitics Of The 2016 Australian Defense White Paper And Its Predecessors, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Australia released the newest edition of its Defense White Paper, describing Canberra’s current and emerging national security priorities, on February 25, 2016. This continues a tradition of issuing defense white papers since 1976. This work will examine and analyze the contents of this document as well as previous Australian defense white papers, scholarly literature, and political statements assessing their geopolitical significance. It will also examine public input into Australian defense white papers and the emerging role of social media in this public involvement. It concludes by evaluating whether Australia has the political will and economic resources necessary to fulfill its …


Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali Apr 2016

Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali

Information Technology Master Theses

In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …


History, Identity Politics And Securitization: Religion's Role In The Establishment Of Indian-Israeli Diplomatic Relations And Future Prospects For Cooperation, Michael Mclean Bender Mar 2016

History, Identity Politics And Securitization: Religion's Role In The Establishment Of Indian-Israeli Diplomatic Relations And Future Prospects For Cooperation, Michael Mclean Bender

FIU Electronic Theses and Dissertations

This dissertation aims to provide an understanding of the historical and contemporary dynamics of India’s foreign policy towards Israel within the context of religious identity from 1947 to 2015. A historical analysis of the relationship between India and Israel exhibits the ways that religious identity has served as a primary factor impeding as well as facilitating relations between the two nations.

The analysis was done within the context of the historical Hindu-Muslim relationship in India and how the legacy of this relationship, in India’s effort to maintain positive relations with the Arab-Muslim world, worked to inhibit relations with Israel prior …


Value-Inspired Service Design In Elderly Home-Monitoring Systems, Na Liu, Sandeep Purao, Hwee-Pink Tan Mar 2016

Value-Inspired Service Design In Elderly Home-Monitoring Systems, Na Liu, Sandeep Purao, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

The provision of elderly home-monitoring systems to enhance aging-in-place requires the service to meet the needs of both the elderly and their caregivers. The design of such IT services requires interdisciplinary efforts to look beyond the technical requirements. Taking a value-inspired design perspective, the study argues that service design for promoting aging-in-place needs to reconcile the values of both the elderly and caregivers. Drawn from the framework of basic human values and the unique experience of the SHINESeniors project, the study extracts the core values for elderly and caregivers using a multi-method case analysis. We suggest that both system and …


Overcoming Fraud & Dishonesty In The Hospitality Industry, James Peter Murphy Feb 2016

Overcoming Fraud & Dishonesty In The Hospitality Industry, James Peter Murphy

Conference papers

The licensed industry is an increasingly competitive market place, many bars have responded by empowering staff and undertaking structural and management reforms in recent years. Undoubtedly, these changes have significantly raised the levels of customer service and enhanced customer satisfaction. Paradoxically these changes, combined with the responsibilities allocated to bar staff and management to supervise and manage bars with autonomous control have created more fertile conditions, scope and opportunity for dishonest actions by staff members.

The way licensed premises approach the issue of staff fraud is changing in response to the increased risk. Many bars have historically been anxious to …


Promoting Corporate Intelligence In Italy To Improve Stability In The Middle East, Antonio Giuseppe Di Pietro Jan 2016

Promoting Corporate Intelligence In Italy To Improve Stability In The Middle East, Antonio Giuseppe Di Pietro

Capstone and Graduation Projects

Most national and international legislative instruments impose a duty to conduct appropriate due diligence when doing business, in order to hold each company accountable for the malicious activities of its partners. This project’s main argument is that formal due diligence is not enough when it comes to preventing corrupt business behavior, particularly when dealing with highly corrupt environments. Starting with an analysis of the Italian legislative efforts, this project demonstrates how the promotion of corporate intelligence into standard business practice could fill the gaps left by due diligence. Emphasis is placed upon the adoption of corporate intelligence among SMEs, given …


A Survey Of Social Media Users Privacy Settings & Information Disclosure, Mashael Aljohani, Alastair Nisbet, Kelly Blincoe Jan 2016

A Survey Of Social Media Users Privacy Settings & Information Disclosure, Mashael Aljohani, Alastair Nisbet, Kelly Blincoe

Australian Information Security Management Conference

This research utilises a comprehensive survey to ascertain the level of social networking site personal information disclosure by members at the time of joining the membership and their subsequent postings to the sites. Areas examined are the type of information they reveal, their level of knowledge and awareness regarding how their information is protected by SNSs and the awareness of risks that over-sharing may pose. Additionally, this research studies the effect of gender, age, education, and level of privacy concern on the amount and kind of personal information disclosure and privacy settings applied. A social experiment was then run for …


An Analysis Of The Migration Policies Of The European Union And Their Effectiveness In Managing The Current Migration Crisis, Michael Blair Jan 2016

An Analysis Of The Migration Policies Of The European Union And Their Effectiveness In Managing The Current Migration Crisis, Michael Blair

MA IDS Thesis Projects

The current migration of individuals into the European Union is creating an unparalleled and unprecedented crisis that has completely overwhelmed the EU Member States. Migrants entering the European Union have done so via dangerous and deadly sea and land routes, resulting in a devastating humanitarian crisis throughout Europe. As conflicts and instability around the world continue to evolve and escalate, larger flows of migrants continue to pour into the European Union causing the irregular migration of people across Europe’s borders. To counter this, European Union officials have attempted to create migration policies based on border management and security ideals. However, …


Mindfulness And Emotional Regulation As Sequential Mediators In The Relationship Between Attachment Security And Depression, Judith A. Pickard, Peter Caputi, Brin F. S Grenyer Jan 2016

Mindfulness And Emotional Regulation As Sequential Mediators In The Relationship Between Attachment Security And Depression, Judith A. Pickard, Peter Caputi, Brin F. S Grenyer

Faculty of Social Sciences - Papers (Archive)

Depression is a significant global health issue that has previously been associated with negative early care experiences and insecure attachment styles. This has led to much interest in identifying variables that may interrupt this relationship and prevent detrimental personal, social and economic outcomes. Recent research has indicated associations between the two seemingly distinct constructs of secure attachment and mindfulness, with similar positive outcomes. One hundred and forty eight participants completed an online survey exploring a possible sequential cognitive processing model, which predicted that higher levels of mindfulness and then emotional regulation would mediate the relationship between attachment and depression. Full …


Two-Factor Data Security Protection Mechanism For Cloud Storage System, Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang Jan 2016

Two-Factor Data Security Protection Mechanism For Cloud Storage System, Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we propose a two-factor data security protection mechanism with factor revocability for cloud storage system. Our system allows a sender to send an encrypted message to a receiver through a cloud storage server. The sender only needs to know the identity of the receiver but no other information (such as its public key or its certificate). The receiver needs to possess two things in order to decrypt the ciphertext. The first thing is his/her secret key stored in the computer. The second thing is a unique personal security device which connects to the computer. It is impossible …


Faroosh And Elina, Faroosh, Elina, Tsos Jan 2016

Faroosh And Elina, Faroosh, Elina, Tsos

TSOS Interview Gallery

Faroosh was a cameraman for a private television program in Afghanistan working on a documentary about the Taliban. When he and his crew were discovered, the Taliban attacked them and he and his wife fled to Turkey, walking 12 hours to get there. Upon arrival the police arrested and harassed them. Turkey was not a safe place. After several suicide bombings in the area, they decided to move on to Greece, where they are in a refugee camp without any progress in their situation. They have no money to move forward and no ability to work and the economic situation …


Evaluation And Comparison Of Job Stress Among Security Workers With Fixed And Shift Work Schedules In Municipality Of Tehran, A Chaichi, Shahnaz Bakand, R Yarahmadi Jan 2016

Evaluation And Comparison Of Job Stress Among Security Workers With Fixed And Shift Work Schedules In Municipality Of Tehran, A Chaichi, Shahnaz Bakand, R Yarahmadi

Faculty of Social Sciences - Papers (Archive)

Municipality of Tehran with huge number of employees and with the aim to reduce stress and promote the work efficiency, seriously wants to achieve suitable and utilizable studies. Osipow's job stress test is one of the best tools to reach this aim. Data population includes securities building of municipality of Tehran (88 persons from region 18 and 72 persons from region 20), who were randomly chosen to be participated in the current survey. For this purpose three types of working hours schedule such as full time shift ( 24 hrs work, 24 hrs rest ), day-shift and night-shift workers, were …


To Continued Success: Reforming Internal Tunisian Security Policy, Thomas Eli Banghart V Jan 2016

To Continued Success: Reforming Internal Tunisian Security Policy, Thomas Eli Banghart V

Electronic Theses and Dissertations

Tunisia's reputation as the success story from the Arab Spring rests on the integration of a stable democratic regime. Domestic as well as regional threats continue to push the boundaries of this fledgling democracy. Development measures, and reform of the Tunisian Internal Security Forces are paramount for the state's survival. This work presents measures for Security Sector Reform within Tunisia, then proceeds to create a map a developmental intervention aimed at securing stability through several drivers. Understanding that development is a security threat for Tunisia will help allies, other regional actors, NGO's, and other organizations furthers the unique situation where …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández Jan 2016

An Empirical Assessment Of Employee Cyberslacking In The Public Sector, Wilnelia Hernández

CCE Theses and Dissertations

With the increasing use of the Internet, new challenges are presented to employees in the workplace. Employees spend time during work hours on non-work related activities including visiting e-commerce Websites, managing personal email accounts, and engaging in e-banking. These types of actions in the workplace are known as cyberslacking. Cyberslacking affects the employees’ productivity, presents legal concerns, and undermines the security of the organization’s network. This research study addressed the problem of cyberslacking in the public sector, by assessing the ethical severity of cyberslacking activities, as well as how employees perceived that the frequency of such activities occurred by their …


Using Graphic Methods To Challenge Cryptographic Performance, Brian Cusack, Erin Chapman Jan 2016

Using Graphic Methods To Challenge Cryptographic Performance, Brian Cusack, Erin Chapman

Australian Information Security Management Conference

Block and stream ciphers have formed the traditional basis for the standardisation of commercial ciphers in the DES, AES, RC4, and so on. More recently alternative graphic methods such as Elliptic Curve Cryptography (ECC) have been adopted for performance gains. In this research we reviewed a range of graphic and non-graphic methods and then designed our own cipher system based on several graphic methods, including Visual Cryptography (VC). We then tested our cipher against RC4 and the AES algorithms for performance and security. The results showed that a graphics based construct may deliver comparable or improved security and performance in …