To see the other types of publications on this topic, follow the link: Facility security.

Journal articles on the topic 'Facility security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Facility security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

HESS, GLENN. "CONGRESS MULLS FACILITY SECURITY." Chemical & Engineering News Archive 89, no. 17 (2011): 29–31. http://dx.doi.org/10.1021/cen-v089n017.p029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Preo, Lawrence S. "Facility Security — One Manager's View." Recreational Sports Journal 10, no. 3 (1986): 7–8. http://dx.doi.org/10.1123/nirsa.10.3.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Um, Seungchul, and Eunjung Kim. "A Study on the Improvement through the Analysis of Stress Factors in Apartment Buildings Security Guards." Korean Society of Private Security 23, no. 5 (2024): 359–82. https://doi.org/10.56603/jksps.2024.23.5.359.

Full text
Abstract:
The purpose of this study is to find various stress factors experienced by facility security guards and then to analyze realistic and specialized measures, aiming to improve facility security guards’ work-related stress. The survey was conducted using in-depth qualitative interviews on twelve experienced facility security guards and eight experts on their respective fields of expertise. The interview participants for this study were divided into four groups: facility security guards, facility security managers, security instructors, and university academics in the field of private security. Fi
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Tae Yeong, and Yong-eun Sung. "Research on Counter-terrorism Response to Facility Security at Multipurpose Facility." Korean Society of Private Security 23, no. 2 (2024): 187–208. http://dx.doi.org/10.56603/jksps.2024.23.2.187.

Full text
Abstract:
The purpose of this study is to investigate and analyze the status of counterterrorism operations by facility guards in charge of security in multipurpose buildings and/or facilities and to suggest ways to improve them. To carry out the currenty study, a qualitative research method was conducted through interviews with 7 terrorism response practitioners from a multipurpose building security company over a period of approximately 3 months from November 2023 to January 2024. As a result of the interview survey, the main problems were firstly, not practical level of terrorism training, secondly,
APA, Harvard, Vancouver, ISO, and other styles
5

Pavlík, Lukáš, Ekaterina Chytilová, and Jarmila Zimmermannová. "Security Aspects of Healthcare Organization from the Perspective of Digitization of Facility Management." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 18 (January 25, 2021): 360–66. http://dx.doi.org/10.37394/23207.2021.18.36.

Full text
Abstract:
Many healthcare organizations are exposed to various cyber threats. The increase in the frequency of these cyber threats can also be observed during the Covid-19 pandemic. The security of information systems in hospitals and their management is also not part of the management of facilities in these organizations. The paper presents the possibilities of securing facility management processes in healthcare organizations from a security point of view. There is an analysis of security aspects of a particular medical facility and its information system with emphasis on the application of regular fa
APA, Harvard, Vancouver, ISO, and other styles
6

Hayashi, Kazuhiro, Kazuo Narita, and Yoshihisa Suzuki. "Security Evaluation for Building and Facility." IEEJ Transactions on Industry Applications 124, no. 10 (2004): 1067–72. http://dx.doi.org/10.1541/ieejias.124.1067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Banks, Ron E. "Security Options for the Laboratory Animal Facility." Lab Animal 32, no. 4 (2003): 37–40. http://dx.doi.org/10.1038/laban0403-37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mitsutoshi, Suzuki, and Kazuyuki Demachi. "Security by facility design for sabotage protection." Journal of Nuclear Science and Technology 55, no. 5 (2017): 559–67. http://dx.doi.org/10.1080/00223131.2017.1417170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schramm, Christof. "Security of the MVS Authorized Program Facility." EDPACS 18, no. 4 (1990): 7–12. http://dx.doi.org/10.1080/07366989009451227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Downs, AA, BA, MS, CAS, Scott. "Active shooter in educational facility." Journal of Emergency Management 13, no. 4 (2015): 303. http://dx.doi.org/10.5055/jem.2015.0244.

Full text
Abstract:
The last decade has seen several of the most heinous acts imaginable committed against our educational facilities. In light of the recent shooting in Sandy Hook Elementary School in Monroe (Newtown), CT, which took the lives of 20 children and six employees, a new heightened sense of awareness for safety and security among our educational facilities was created.1 The law enforcement and public-safety community is now looking to work together with many of the educational representatives across the nation to address this issue, which affects the educational environment now and in the future. The
APA, Harvard, Vancouver, ISO, and other styles
11

Hidayat, Aji Nur, Endrawati Fatimah, and Anindita Ramadhani. "LIVING QUALITY SURROUNDING THE CIPINANG CORRECTIONAL FACILITY BASED ON THE RESIDENTS PERCEPTION." Journal of Synergy Landscape 2, no. 1 (2022): 1–10. http://dx.doi.org/10.25105/tjsl.v2i1.14852.

Full text
Abstract:
The Law of the Republic of Indonesia Number 12 of 1995 concerning Corrections mandates that Correctional Facility be established in every Regency and City. Meanwhile, several works of literature state that Correctional Facility must meet the criteria, namely having a certain distance or far from densely populated settlements to reasons for the safety and comfort of residents. This research was conducted in settlements around Cipinang Correctional Facility, DKI Jakarta. Cipinang Correctional Facility was initially established in 1912, located on the outskirts of Jakarta and far from residential
APA, Harvard, Vancouver, ISO, and other styles
12

Batiuk, Oleg, and Leonid Danylivskyi. "Ensuring the security of critical infrastructure facilities as a component of national security: National and international experience." Society and Security, no. 6(6) (January 15, 2025): 83–89. https://doi.org/10.26642/sas-2024-6(6)-83-89.

Full text
Abstract:
In the provisions of the scientific article, the authors using general scientific methods conduct a study of scientific views, normative and legal regulation of national and international fundamental principles of ensuring the security of critical infrastructure facilities as a component of national security. The authors substantiate the proposals for amendments to the current legislation of Ukraine and subordinate regulations in terms of development and implementation of the following elements at a CI facility: document security in the form of the Provision on Handling Restricted Information;
APA, Harvard, Vancouver, ISO, and other styles
13

Bjornard, T., and J. Morgan. "Integrating Safeguards and Security into Nuclear Facility Design." Nuclear Technology 179, no. 1 (2012): 143–49. http://dx.doi.org/10.13182/nt12-a14075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Sharipova, Umida. "AGRICULTURAL SECTOR AS A FOOD SECURITY FACILITY COUNTRY." Asian Journal of research 5, no. 5 (2017): 44–59. http://dx.doi.org/10.26739/2433-202x-2017-5-5-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Park, Su-Hyeon, and Cheol-Kyu Cho. "Effects of Physical Self-efficacy and Resilience of Facility Security on Service Quality." K Association of Education Research 9, no. 4 (2024): 197–207. https://doi.org/10.48033/jss.9.4.11.

Full text
Abstract:
This study is a study to identify the impact of the physical self-efficacy andresilience of facility guards on the quality of private security services, and conducted a finalanalysis of 358 facility guards working for facility security companies for two months fromJuly to September 2024. First of all, the results of the study. The physical self-efficacy offacility guards was found to have a significant positive (+) effect on resilience. Second, theresilience of facility guards was found to have a significant positive effect on the quality ofservice. Third, the physical self-efficacy of facilit
APA, Harvard, Vancouver, ISO, and other styles
16

Alghamdi, Turki, Fayez Gebali, and Fares Salem. "Multifactor Authentication for Smart Emergency Medical Response Transporters." International Journal of Telemedicine and Applications 2022 (September 23, 2022): 1–17. http://dx.doi.org/10.1155/2022/5394942.

Full text
Abstract:
Securing telehealth IoT infrastructure is essential to provide high-level medical care and prevent cyberattacks. A vulnerable stage in IoT telehealth is while the patient is being transported to a healthcare facility, the transporter could be an ambulance or an air ambulance. In this paper, we propose a multifactor authentication scheme to secure the system when the patient is in transit to the healthcare facility. We apply this scheme to an ambulance, using physical unclonable functions (PUFs) embedded in the ambulance to facilitate authentication and secure key exchange. We validated the sec
APA, Harvard, Vancouver, ISO, and other styles
17

Cornwall, Warren. "U.S. opens new high-security livestock laboratory." Science 380, no. 6647 (2023): 781. http://dx.doi.org/10.1126/science.adi8794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shirko, L. M. "The Economic Security Assessment of a Road Facility Enterprise." Administrative Consulting, no. 6 (August 24, 2021): 60–79. http://dx.doi.org/10.22394/1726-1139-2021-6-60-79.

Full text
Abstract:
The purpose of the article is to identify areas for improving the activities of a road enterprise based on a comprehensive assessment of the level of economic security of the enterprise.Methods. As research methods, the article uses analysis, synthesis, deduction, induction, system analysis, comparative analysis, strategic management tools.Results. The author proposes an interpretation of the economic security system as a type of functional strategy of an enterprise, substantiates indicators for assessing the level of eco-nomic security of an enterprise. Effectively for practice, the directions
APA, Harvard, Vancouver, ISO, and other styles
19

Shirko, Larisa M. "The Economic Security Assessment of a Road Facility Enterprise." Administrative consulting, no. 6 (150) (June 7, 2021): 60–79. https://doi.org/10.22394/1726-1139-2021-6-60-79.

Full text
Abstract:
The purpose of the article is to identify areas for improving the activities of a road enterprise based on a comprehensive assessment of the level of economic security of the enterprise. Methods. As research methods, the article uses analysis, synthesis, deduction, induction, system analysis, comparative analysis, strategic management tools.Results. The author proposes an interpretation of the economic security system as a type of functional strategy of an enterprise, substantiates indicators for assessing the level of economic security of an enterprise. Effectively for practice, the direction
APA, Harvard, Vancouver, ISO, and other styles
20

Maulana Zakaria, Danu, and Fitrah Satrya Fajar Kusumah. "Implementation of Web Service Security Using Oauth2 in the Financial Facility Search System." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 5, no. 2 (2022): 114. http://dx.doi.org/10.32832/inova-tif.v5i2.8506.

Full text
Abstract:
<p>Implementation Of Web Service Security Using Oauth2 In Financial Facility Search System. The financial facility search system is an application that makes it easier for people to find the nearest financial facility. A similar application is Google maps which have been widely used to search for financial facilities, but for completeness of information and features, it is incomplete. So financial institutions need applications that can manage data on their financial facilities without other vendor intermediaries. This financial facility search system will be built on a mobile platform a
APA, Harvard, Vancouver, ISO, and other styles
21

Diviziniuk, M. M., O. V. Farrakhov, I. S. Zinovieva, V. O. Kutsenko, and R. Shevchuk. "About the methodology to improve concept of maximum security of nuclear facility at minimum costs." IOP Conference Series: Earth and Environmental Science 1415, no. 1 (2024): 012123. https://doi.org/10.1088/1755-1315/1415/1/012123.

Full text
Abstract:
Abstract Given work describe proposals concerning Pampuro method use for improvement of the maximum security concept of nuclear facility at minimum costs. The main provisions of the maximum security concept ensuring for nuclear facility at minimum cost are analyzed. The meaning of the terms threat and risk in relation to critical infrastructure objects is considered. One of the directions for optimal management concept implementing of protected critical infrastructure object using the Pampuro method is proposed. The mathematical model was developed to ensure security of protected nuclear facil
APA, Harvard, Vancouver, ISO, and other styles
22

Ghosh, Ronie Adhiraaj. "Secure Distress Alarm System for Radiation Facility." Journal of Embedded Systems and Processing 7, no. 3 (2022): 6–13. http://dx.doi.org/10.46610/joesp.2022.v07i03.002.

Full text
Abstract:
In the world of today Security has become an element of prime importance. From banks to shopping centers, from dockyards to scientific laboratories, from schools to religious places, it is very important to maintain security. Real world threats of all kind are constantly in look out to gain access to places of prime importance to carry out their nefarious purpose. Different threats with different agenda viz. saboteurs, rioters, thieves, terrorists, mob etc. are becoming news events all over the world. But we do have a shield called security. Radiation and Nuclear facilities are of prime import
APA, Harvard, Vancouver, ISO, and other styles
23

Putra Ingpraja, Ariscynatha. "Political Implications of Turkey – Qatar Gas Pipeline Construction on European Union Energy Security." Journal of International Studies on Energy Affairs 1, no. 1 (2020): 43–61. http://dx.doi.org/10.51413/jisea.vol1.iss1.2020.43-61.

Full text
Abstract:
This paper will discuss the political implication caused by Turkey-Qatar Gas Pipeline to the European Union energy security. The development of a logistics facility in this program could be a double-edged sword for the European Union member. Using realism as the leading theory that emphasizes politics as the main power to gain the state's national interest, writers try to build analytical case studies. With its hold of the logistics facility, Turkey could control the distribution of natural gas exporting to Europe. European Union members need to import natural gas to strengthen the energy secu
APA, Harvard, Vancouver, ISO, and other styles
24

Csurgai, József, Máté Solymosi, Kristóf Horváth, and Gyula Vass. "Nuclear Security Culture Self-Assessment in a Radioactive Material Associated Facility." Academic and Applied Research in Military and Public Management Science 14, no. 3 (2015): 265–72. http://dx.doi.org/10.32565/aarms.2015.3.1.

Full text
Abstract:
The following publication summarizes the short history, fundamentals of Interna- tional Atomic Energy Agency’s Nuclear Security Culture programme in general and provides details of the recommended self-assessment methodology.A preliminary Nuclear Security Culture (NSC) self-assessment is presented on the basis of the 026 Nuclear Security Technical Document (NST) Draft in a special case of a radioactive material associated facility. Besides the purposes described in the 026 NST Draft, to test the level of the NSC level inside the facility and the problems, the roots of the problems and possible
APA, Harvard, Vancouver, ISO, and other styles
25

Janakiraman, Subramaniam. "CYBER SECURITY FOR INDUSTRIAL AUTOMATION & CONTROL SYSTEMS." Oil and Gas Business, no. 1 (March 6, 2024): 176–94. http://dx.doi.org/10.17122/ogbus-2024-1-176-194.

Full text
Abstract:
Cyber Security is an increasingly important subject while designing an Industrial Automation and Control System (IACS). IACS carries lot of data regarding a facility – Offshore production platform, process platform, Onshore Refinery, Petrochemical, Chemical plant etc. These data are very important to the end-users and stake holders in terms of assessment of production rate, quality of the produce, pros and cons in maintaining the facility, sales, profits and losses, future plans etc. This write-up provides an insight into the following topics:• What is a Cyber Security?• Types of Cyber Securit
APA, Harvard, Vancouver, ISO, and other styles
26

Chlenov, Anatoly, Tatyana Butcinskaya, and Nikolai Ryabtsev. "COMPLEX ASSESSMENT OF SECURITY LEVEL AT AN INDUSTRIAL FACILITY." Fire and Emergencies: prevention, elimination, no. 2 (2019): 5–8. http://dx.doi.org/10.25257/fe.2019.2.5-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wojtasik, Karolina. "Security Culture at Production Facility. Conclusions from Employees’ Training." Quality Production Improvement - QPI 1, no. 1 (2019): 19–25. http://dx.doi.org/10.2478/cqpi-2019-0003.

Full text
Abstract:
Abstract A high level of safety culture is a factor affecting the quality of production. The article contains conclusions and recommendations regarding creating a safety culture based on the awareness of threats and the ability to respond to them. The aim of the article is to analyze trainings on AT (antiterrorist) security procedures conducted in critical infrastructure (CI) enterprises and enterprises which are subject to mandatory protection. The theoretical system of reference is based on the issues regarding security culture and sociology of work. Observation of employee training, followe
APA, Harvard, Vancouver, ISO, and other styles
28

Onyeonoro, C. O.; Ononuju V. I.; Josiah K. C. &. Onyeonoro F. N. "Facility Security and Hotel Performance in Akwa-Ibom State." Otuoke Journal of Management Sciences 9, no. 1 (2025): 149–68. https://doi.org/10.5281/zenodo.15516248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Ramakrishnan, Rakesh, Balasubramanian Panneerselvan, Prabhagaran Rakkiappan, and Manikanta Rudrashetty. "Threat Modeling - Recommendations for a Health Care Facility." Journal of Global Humanities and Social Sciences 6, no. 3 (2025): 86–100. https://doi.org/10.61360/bonighss252017920303.

Full text
Abstract:
Seamless information exchange is crucial in healthcare due to the integration of computational systems. The increased use of Personally Identifiable Information (PII) in digital healthcare raises privacy and security concerns. Threat Modeling Methodologies (TMMs) have emerged to address these challenges by locating and resolving cyber security threats. Early implementation of TMMs equips organizations to combat breaches and understand potential attackers. Integrating techniques, these methodologies strengthen systems and create a comprehensive shield against cyber invasions. However, there is
APA, Harvard, Vancouver, ISO, and other styles
30

Gunawan, Eden, Soesilo Zauhar, Sarwono Sarwono, and Santoso Bambang. "The implementation of ship and port facility security policy based on ISPS code at PT Pelindo II (Cirebon branch)." Journal of Management History 25, no. 1 (2019): 67–96. http://dx.doi.org/10.1108/jmh-07-2018-0037.

Full text
Abstract:
Purpose This study aims to formulate the implementation model of Ship and Port Facility Security Policy based on ISPS Code in PT Pelindo II (Cirebon Branch). Design/methodology/approach The location of the study was the port area of PT Pelindo II (Cirebon Branch). It was because the controlling policy became the duties and responsibilities of each region in which it was the responsibility of PT Pelindo II (Cirebon Branch). However, because of the problem of controlling, it became a common responsibility that could be divided into other institutions such as Navy, Police, Kodim, Satpol PP and le
APA, Harvard, Vancouver, ISO, and other styles
31

Allan, T. "Maritime Security Amendments To Solas, and The International Ship and Port Facility Security Code." International Journal of Maritime Engineering 146, a1 (2004): 10. http://dx.doi.org/10.3940/rina.ijme.2004.a1.20042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Adiyono, Adiyono, Kiti Mandasari, Laila N.A, and Nyayu Yayu Suryani. "School Facility Security: An Evaluation Of Surveillance Technologies And Efforts To Improve Physical Security." International Education Trend Issues 2, no. 1 (2024): 67–79. http://dx.doi.org/10.56442/ieti.v2i1.430.

Full text
Abstract:
by Muhammadiyah SMP Tanah Grogot, an educational institution in Indonesia, and identify areas for improvement. The study uses a case study method, which involves data collection through observation, interviews with school authorities, and reviewing relevant documents. The findings reveal that while the school has made significant efforts to improve physical security by implementing surveillance technology and access control systems, there are still areas that require improvement. The study recommends implementing a comprehensive emergency response plan, regular security audits, and staff train
APA, Harvard, Vancouver, ISO, and other styles
33

Choi, Junho, Chong Soo Cheung, Dongkwan Lee, Seol A. Kwon, and Jae Eun Lee. "Policy Directions for Securing Food Security by Applying Critical Infrastructure in the Field of Agriculture." Crisis and Emergency Management: Theory and Praxis 13, no. 8 (2023): 17–27. http://dx.doi.org/10.14251/jscm.2023.8.17.

Full text
Abstract:
This study aims to suggest policy directions to promote food security by applying the concept of critical infrastructure in Korea. It designates the agricultural sector for food security through the functions, systems, and facilities of critical infrastructure and presents policy directions. The results of the analysis show that the functions of critical infrastructure can be implemented by establishing a food security manual. Due to the lack of relevant manuals in Korea, it is necessary to strengthen the response system on a regular basis through the designation of a department dedicated to f
APA, Harvard, Vancouver, ISO, and other styles
34

Kasum, Josip, Pero Vidan, and Krešimir Baljak. "Threats and New Protection Measures in Inland Navigation." PROMET - Traffic&Transportation 22, no. 2 (2012): 143–46. http://dx.doi.org/10.7307/ptt.v22i2.173.

Full text
Abstract:
The density of navigation in the world waterways is considerable, especially because it is more profitable, when compared to other forms of transport. In this paper the authors propose new measures for security protection of inland waterways and of ships and ports in inland navigation. Because of various kinds of threats in inland waterways navigation it is proposed to develop the International Ship and Port facility Security Code (ISPS) code suited to such navigation. Therefore the working title of the document is proposed as International Ship and Port Facility Security Code in Inland Waterw
APA, Harvard, Vancouver, ISO, and other styles
35

Teturan, Yohanis Endes, Sri Suwitri, Yacob Warella, and Hardi Warsono. "The Management of Border Area Between Indonesia Republic and Papua New Guinea in Sota Region of Merauke District." PRIZREN SOCIAL SCIENCE JOURNAL 3, no. 1 (2019): 18. http://dx.doi.org/10.32936/pssj.v3i1.76.

Full text
Abstract:
The border management in all of Indonesia areas is one of integral part of State management; it is implemented by comprehensive approach consist of three dimensions of border management as follows prosperity, security, and environmental management of State border area, implemented by applying an approach oriented to security and environment. This research aims to analyze security management and community prosperity of border area in Sota Region called RI-PING of Merauke District. Quantitative research is one of research method by collecting data and information gotten directly from informant t
APA, Harvard, Vancouver, ISO, and other styles
36

Kupriyanovich, M. S. "The Role and Place of the International Ship and Port Facility Security Code in the International Legal Mechanism for Ensuring Security in Maritime Transport." World of Transport and Transportation 21, no. 5 (2024): 142–48. http://dx.doi.org/10.30932/1992-3252-2023-21-5-16.

Full text
Abstract:
One of the measures taken by the International Maritime Organization to prevent terrorist acts at sea was adoption of amendments to the International Convention for the Safety of Life at Sea, aimed at ensuring that ships and their cargo do not become targets of terrorist activities.Complementing the amendments is the International Ship and Port Facility Security Code, which is reviewed in this article. The Code describes a specific mechanism for ensuring security in ports and related facilities, and establishes cooperation between government agencies, the shipping and port industries in identi
APA, Harvard, Vancouver, ISO, and other styles
37

Arafat, S. M. Yasir, Fahad Hussain, Md Saiful Alam, Md Intazar Rahman, and S. M. Hafiz Al Asad. "JOB SATISFACTION AMONG THE MEDICAL REPRESENTATIVES IN BANGLADESH: A Cross-Sectional Observation." Australian Journal of Business and Management Research 05, no. 01 (2015): 22–28. http://dx.doi.org/10.52283/nswrca.ajbmr.20150501a03.

Full text
Abstract:
Job satisfaction is one of the major factors leading towards heightening and expansion of monetary gain, lifestyle, work ethics, and happiness in personal, interpersonal, institutional and national domain. The factors determining the job satisfaction among medical representatives in Bangladesh were categorized into: a) role of person in question, b) accessibility to sufficient materials, c) payment status, d) performance based incentives, e) superior’s attitude, f) opportunity for personal development, g) job security, h) adequate welfare facilities, i) leave facility, and j) overall satisfact
APA, Harvard, Vancouver, ISO, and other styles
38

Beck, Marko. "Economic Factors Undermining National Security: Joint Defence Facility Pine Gap, Australia." RUDN Journal of Public Administration 7, no. 2 (2020): 135–40. http://dx.doi.org/10.22363/2312-8313-2020-7-2-135-140.

Full text
Abstract:
The article analyses Joint Defence Facility Pine Gap in Australia that is used by the United States to controls satellites pinpoint airstrikes around the world. The Joint Facility rises political controversy in Australia (especially after Edward Snowden’s revelations) as many doubt if it is in Australia’s best interests to contribute data for drone assassinations and targeting US nuclear weapons. Considering Australia’s policy towards Joint Defence Facility Pine Gap the author raises the question whether national security can be “outsourced” to save budget funds. The article concludes that in
APA, Harvard, Vancouver, ISO, and other styles
39

Andreevsky, E. V., P. I. Paderno, and A. I. Hudyakov. "Models of Correlation between Psychological Threats at Hazardous Industrial Facilities and Characteristics of Their Security." Bulletin of Irkutsk State University. Series Psychology 34 (2020): 3–14. http://dx.doi.org/10.26516/2304-1226.2020.34.3.

Full text
Abstract:
In the practical activity of institutions servicing hazardous industrial facilities, HR relations and aptitude screening should be carried out with due respect to the analysis of threats related to specificity of both the secured facility and security professionals (human factor). The paper considers a set of points of professional psychological testing at security departments. On the basis of the threat analysis technique proposed by the authors, a number of interrelated models (intruders and threats) have been revealed. The results obtained can be successfully used both for organizing profes
APA, Harvard, Vancouver, ISO, and other styles
40

Guo, Ming, Fei Wu, and Mohan Wang. "Design of Intelligent Security Management and Control System for a Large Nuclear Facility." Journal of Physics: Conference Series 2050, no. 1 (2021): 012010. http://dx.doi.org/10.1088/1742-6596/2050/1/012010.

Full text
Abstract:
Abstract There are many kinds of safety control sub-systems of a large nuclear facility, and their information is isolated from each other, so the overall safety control efficiency is low. To solve this problem, based on the original security control sub-system, an intelligent security management and control system is designed by using the technology of system integration and multi-sensor cooperative scheduling. Firstly, the web service interfaces of each security control sub-system are developed, and the interconnection and information sharing of each security control sub-system are realized
APA, Harvard, Vancouver, ISO, and other styles
41

Pretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA." International Journal of Cyber Warfare and Terrorism 6, no. 3 (2016): 1–16. http://dx.doi.org/10.4018/ijcwt.2016070101.

Full text
Abstract:
Industrial control systems (ICS) or supervisory, control, and data acquisition (SCADA) systems drive many key components of the national infrastructure. It makes these control systems targets for cyber-attacks by terrorists and nation-states who wish to damage their target economically and socially, and cyber-criminals who blackmail the companies operating the infrastructure. Despite the high risk of leaving these systems exposed, providing adequate cyber-security is often challenging. The Stuxnet worm illustrated how vulnerable control systems potentially are when it bypassed a number of secu
APA, Harvard, Vancouver, ISO, and other styles
42

Xia, Zhengyu, and Zhanming Li. "Research Progress in Facility Agriculture and Lighting by Bibliometric Analysis Based on CiteSpace." Advances in Applied Sciences 9, no. 1 (2024): 6–16. http://dx.doi.org/10.11648/j.aas.20240901.12.

Full text
Abstract:
Given the pressures of internation-al market competition, the dual constraints of domestic resources and the environment, and the uncertainties posed by climate change, bolstering agricultural infra-structure construction is a realistic demand and a crucial approach for implementing emerging grain security strat-egies, particularly in developing countries. Facility agriculture is characterized as a modern agricultural production mode that improves or creates favorable environmental conditions within a specific locality. With the rapid expansion of large-scale facility agriculture, there has be
APA, Harvard, Vancouver, ISO, and other styles
43

Ignac-Nowicka, Jolanta. "Improvement of security management in the warehouse space through the use of a vision system in a selected enterprise." Scientific Papers of Silesian University of Technology. Organization and Management Series 2023, no. 182 (2023): 99–115. http://dx.doi.org/10.29119/1641-3466.2023.182.6.

Full text
Abstract:
Purpose: The purpose of the presented research and analysis was to create design assumptions for a vision system supporting security supervision in the warehouse space to reduce threats. Design/methodology/approach: In the first phase of creating the project concept, two methods of hazard analysis (FTA and ETA) were used in the warehouse facility. Then, at the stage of selecting the devices included in the video surveillance system, a simple FOKUS program was used to scale the cameras. Findings: In order to create a vision system project for a selected warehouse facility, an analysis of its sp
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Shiyu, Yuan Zhang, Yaqing Song, et al. "EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics." Proceedings on Privacy Enhancing Technologies 2025, no. 1 (2025): 361–78. http://dx.doi.org/10.56553/popets-2025-0020.

Full text
Abstract:
Syndrome-based early epidemic warning plays a vital role in preventing and controlling unknown epidemic outbreaks. It monitors the frequency of each syndrome, issues a warning if some frequency is aberrant, identifies potential epidemic outbreaks, and alerts governments as early as possible. Existing systems adopt a cloud-assisted paradigm to achieve cross-facility statistics on the syndrome frequencies. However, in these systems, all symptom data would be directly leaked to the cloud, which causes critical security and privacy issues. In this paper, we first analyze syndrome-based early epide
APA, Harvard, Vancouver, ISO, and other styles
45

Yu, Byung Hu. "A Study on the Improvement of Apartment Security System for the Development of Private Security." Korean Society of Private Security 22, no. 5 (2023): 21–48. http://dx.doi.org/10.56603/jksps.2023.22.5.21.

Full text
Abstract:
In Korea, the private security industry, along with the police in charge of public security, plays an important part in maintaining social order and preventing crime. The private security industry is also developing along with economic growth, but the reality is that there are insufficient parts in terms of quality. Among the facility guards who perform most of the security work in Korea, the treatment of apartment security guards is still very poor. In 2020, the Apartment Housing Management Act was revised, and management tasks such as cleaning, separation collection, and assistance in manage
APA, Harvard, Vancouver, ISO, and other styles
46

Simpeh, Fredrick, and Mariam Akinlolu. "A comparative analysis of the provision of student housing safety measures." Journal of Facilities Management 19, no. 3 (2021): 377–92. http://dx.doi.org/10.1108/jfm-11-2020-0080.

Full text
Abstract:
Purpose Security, safety, environment and health have become an integral part of facility management (FM). Therefore, FM departments within organisations are required to put measures in place to safeguard facility users. This paper thus aims to investigate and compare the safety and security measures that are provided in the student housing of two universities in South Africa. Design/methodology/approach A mixed method approach was adopted; interview was used to collect qualitative data, whereas a questionnaire was used as an instrument to collect quantitative data. Content analysis was used t
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Jianxun, Kin Keung Lai, Yelin Fu, and Hai Shen. "Robust optimization approach to emergency mobile facility routing." Science Progress 104, no. 1 (2021): 003685042098268. http://dx.doi.org/10.1177/0036850420982685.

Full text
Abstract:
Emergency events such as natural disasters, environmental events, sudden illness, and social security events pose tremendous threats to people’s lives and property security. In order to meet emergency service demands by rationally allocating mobile facilities, an emergency mobile facility routing model is proposed to maximize the total served demand by the available mobile facilities. Based on the uninterruptible feature of emergency services, the model abstracts emergency events act as a combination of multiple uncertain variables. To overcome the computational difficulty, a robust optimizati
APA, Harvard, Vancouver, ISO, and other styles
48

Boytsov, B. V., V. V. Denisov, and L. V. Balanovsky. "Quality Management of Information Security of a Transport Infrastructure Facility." Quality and life 26, no. 2 (2020): 41–47. http://dx.doi.org/10.34214/2312-5209-2020-26-2-41-47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chung, Taehwang. "The Study on the Security Design Model for Court Facility." Journal of the Korean Society of Hazard Mitigation 17, no. 4 (2017): 209–13. http://dx.doi.org/10.9798/kosham.2017.17.4.209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Miller, Robert D., Gary J. Maier, and Michael S. Kaye. "Orienting the Staff of a New Maximum Security Forensic Facility." Psychiatric Services 39, no. 7 (1988): 780–81. http://dx.doi.org/10.1176/ps.39.7.780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!