Skip to main content
    • by 
    •   14  
      BusinessManagementColombiaInternational HRM
    • by 
    •   9  
      Computer ScienceInformation SecurityCyberspaceCyberwarfare
Sovereign debt is financial (dis)advantage with several implications for economy and defense, in general. It affects directly military capabilities transformation and supports defense policy development taking into account defense costs... more
    • by 
    •   6  
      GeopoliticsSovereign DebtGeoeconomicsNational Security Studies
The workplace poster has been designed by the security team at a retail company to raise awareness and increased attention after some electronic equipment being noticed missing from the company stores. The poster will be used as staff... more
    • by 
    •   8  
      SecurityWorkplace LearningPrivate Security FirmsSecurity Management
Risk management is becoming a well established discipline, with its own body of knowledge and domain practitioners. States worldwide now have their own risk management standards and in many, it is the company director’s responsibility to... more
    • by 
    •   4  
      Risk ManagementSecurity Risk ManagementCorporate Security ManagementSecurity Threat Groups
This study determines various threat vectors of cyber-attacks on smart grid of the United States. The smart grid relatively a new initiative by the Department of Energy. It started in 2007 (DOE 2007). In December 2007, Congress passed,... more
    • by 
    •   5  
      Information SecuritySmart GridSecurity Risk ManagementPower System - SCADA and Smart Grid Applications
Security is a function of Risk Management that requires intentional planning, strategy and design. This is in contrast to fairly common thinking that security is about a collection of things — anti-malware, data encryption, security... more
    • by 
    •   9  
      Information SecuritySecurityRisk ManagementStrategic Security
The global security guard industry has experienced tremendous growth in the past five decades and there is every indication it will continue. Many government and private sector bodies have created mandatory and recommended training... more
    • by 
    •   7  
      Inefficient Training Programs for Security GuardsSecurity Risk ManagementPhysical securityCPTED (Crime Prevention Through Environmental Design)
The purpose of this essay will be to discuss the role of a security and crime risk manager in an organization and to analyze how useful the knowledge of crime patterns could be to assist his/her role.
    • by 
    •   2  
      CriminologySecurity Risk Management
[co-editor] The articles contained in this publication are dispatches from a new frontline in humanitarian action: the digital frontier. The publication brings together 17 authors who analyse in 11 articles how communications technology... more
    • by 
    •   7  
      HumanitarianismHumanitarian InterventionRisk ManagementCyber Security
Succinct description of migration from DIACAP to RMF
    • by 
    •   6  
      Information SecurityIT Project Risk ManagementSecurity Risk ManagementDIACAP
In today's global and complex business environment, security is a major issue for any organization. All organizations should have the capability to plan and respond to incidents and business disruptions. Business continuity management is... more
    • by 
    •   13  
      BusinessBusiness AdministrationInformation SecurityInformation Security and Privacy
This essay will discuss workplace crime of ‘Staff Dishonesty’, as one of the important workplace offences. It will outline the extent of the problem and the causes which possibly lead to staff dishonesty. An attempt would be made to... more
    • by 
    •   3  
      CriminologySecurity Risk ManagementDishonest Behavior
[co-author] Security risk management strategies aim to ensure safer access to communities in need of humanitarian aid. In Iraq, the link between humanitarian access and security risk management is even stronger. This article explores... more
    • by 
    •   9  
      HumanitarianismIraqHumanitarian Emergency AidSectarianism
    • by 
    •   9  
      Computer ScienceInformation SecurityCyberspaceCyberwarfare
    • by 
    • Security Risk Management
The security industry operates within a diverse and multi-disciplined knowledge base, with risk management as a fundamental knowledge domain within security to mitigate its risks. Nevertheless, there has been limited research in... more
    • by 
    •   6  
      PsychometricsSecuritySecurity Risk ManagementThreats
Terrorism threat increased globally in the recent years and Bangladesh is no difference to that. Many research and publications shows significant increase in terrorism in the last 18-24 months. Many of the lone wolf attackers are... more
    • by 
    • Security Risk Management
    • by 
    •   6  
      Social MediaCase StudySecurity Risk ManagementInformation Diffusion
According to Kaspersky Lab research, APT – Advanced Persistent Threats – are one of the biggest threats in IT as of 2016. Organised groups, keeping contact in various languages, have attacked the IT systems of financial institutions,... more
    • by 
    •   4  
      Information SecurityCyber SecuritySecurity Risk ManagementThreats
—Risk analysis is a complex and critical activity in various contexts, ranging from strategic planning to IT systems operation. Given its complexity, several Enterprise Architecture (EA) frameworks and modeling languages have been... more
    • by  and +2
    •   61  
      Information SystemsRisk Management and InsuranceInformation ScienceInformation Systems (Business Informatics)
    • by 
    •   2  
      Security ManagementSecurity Risk Management
Service Oriented Architecture is an architectural paradigm and discipline that may be used to build infrastructures enabling those with needs (consumers) and those with capabilities (providers) to interact via services across disparate... more
    • by 
    •   5  
      Service Oriented ArchitectureWeb ServicesSecurity RequirementsSecurity Risk Management
The research project seeks to explore how corporate social responsibility can be used as a strategic tool to mitigate risk within increasingly dynamic and turbulent business environments. As such, this research hopes to create a... more
    • by 
    •   7  
      Business AdministrationCorporate Social ResponsibilityConflictRisk Management
Internet of Things (IoT) refers to heterogeneous systems and devices (often referred to as smart objects) that connect to the internet, and is an emerging and active area of research with tremendous technological, social, and economical... more
    • by 
    •   20  
      Network SecuritySecurityTransformationRisk Management
Prirejanje iger na srečo ima dolgo zgodovino, od igranja s kockami, kartami do sodobnih pojavnih oblik, ko se igre na srečo selijo v virtualni svet – na splet. Od klasičnega prirejanja iger na srečo v igralnicah in igralnih salonih v igre... more
    • by  and +1
    •   5  
      Young PeopleGamblingBetting Mathematics and OptimizationsSecurity Risk Management
When risk assessments are conducted by project managers, information technology professionals, or engineers, often efforts are put into calculating a definite conclusion about the likelihood of disruptions that prevent completion of a... more
    • by 
    •   9  
      Modal LogicPhilosophyLogicAristotle
    • by 
    •   7  
      Information SystemsRisk ManagementApplied EconomicsUser Participation
Does current data protection legislation achieve a satisfactory balance between the interests of the security manager and the individual? 3978 Word Security and individual privacy provide an important perspective for analyzing the Data... more
    • by 
    •   2  
      Security StudiesSecurity Risk Management
    • by 
    •   5  
      Information SystemsComputer ScienceInformation SecurityComputer Security
Organisations that allow employees to Bring Your Own Device (BYOD) in the workplace trade off the convenience of allowing employees to use their own device against higher risks to the confidentiality, integrity, and availability of... more
    • by 
    •   7  
      BusinessPolitical ScienceComputer SecuritySecurity Risk Management
Our paper aims to question the limits of scientific knowledge and its use in the protection of employees exposed to chemical risks. In doing so, it will also question safety management in the light of real work situations studied during a... more
    • by 
    •   5  
      Security Risk ManagementChsctPorts & Maritime SecurityChemical Health Risk Assessment
Modeling real-world social situations has proven to be one of the most daunting challenges in computational social science. With the exception of simplistic, single-domain scenarios, most computational models are quickly overwhelmed with... more
    • by 
    •   13  
      Group BehaviorBehavioural SciencesComputer ModelBehavior Modeling
    • by 
    •   5  
      Computer VisionSecurity Risk ManagementElectronic mailSpace Use
An Professional Security Consultant puts the realities of physically securing educational facilities from the "Active Shooter". A must read for school administrators, staff, parents and others having interest in the subject.
    • by 
    •   7  
      Security Risk ManagementPhysical securityActive Shooter Emergency Operations PlanPhysical security, risk management, security management
This study explores the impact of openness on contemporary Danish intelligence agencies. While ‘the openness of intelligence agencies’ may strike many readers as an apparent oxymoron, this study argues that openness has become a defining... more
    • by 
    •   6  
      Discourse AnalysisIntelligence StudiesSecurity StudiesCritical Security Studies
    • by 
    •   20  
      Software EngineeringObject Oriented ProgrammingSoftware TestingMetrics
This paper proposes a study corroborated by preliminary experiments on the inference of social relations based on the analysis of interpersonal distances, measured with on obtrusive computer vision techniques. The experiments have been... more
    • by 
    •   5  
      Computer VisionSecurity Risk ManagementElectronic mailSpace Use
Cultural bias will influence risk perceptions and may breed ‘security complacency’, resulting in the decay of risk mitigation efficacy. Cultural Cognition theory provides a methodology to define how people perceive risks in a grid/group... more
    • by  and +1
    •   5  
      PerceptionCultural TheoryRisk ManagementSecurity Risk Management
... This relatively simplistic, but nonetheless central equation in the criminological vocabulary conceals a ... management methodologies, which seen in a societal context of disaster equate risk ... overarching state-centric governmental... more
    • by 
    •   6  
      ResilienceRisk ManagementCritical infrastructure protectionCybercrime
The Asia Pacific (APAC) region encompasses a heterogeneous group of nation-states. Like the APAC region, the security industry operates within a diverse and multi-disciplined knowledge base, with risk management being a fundamental... more
    • by 
    •   8  
      Risk ManagementSupply ChainSecurity ManagementFactor analysis
    • by 
    •   13  
      Computer ScienceGame TheoryHuman FactorsBiometrics
    • by 
    •   12  
      ColombiaInternational HRMEmerging MarketsMexico
    • by 
    • Security Risk Management
This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care... more
    • by 
    •   6  
      ColombiaInternational HRMMexicoSecurity Risk Management
This chapter explores the trend of bunkerized international aid interventions in conflict-torn spaces. In response to insecurity, aid agencies and other organizations that operate in conflict-torn spaces increasingly attempt to protect... more
    • by 
    •   6  
      Peace and Conflict StudiesSecurityHumanitarian InterventionStatebuilding
Public and private sector have the need to be as much as possible entrepreneurial and innovative-minded, even more than many commercial enterprises. The thing management needs to pay special attention to is the security of the existing... more
    • by 
    •   6  
      Crisis ManagementRisk ManagementPublic sectorSecurity Risk Management
    • by 
    •   9  
      Social MediaUser InterfaceTelevisionUser Interface Adaptation
    • by 
    •   13  
      Machine LearningSocial Network Analysis (SNA)Online social networksInterdisciplinary research