To see the other types of publications on this topic, follow the link: Security technician.

Journal articles on the topic 'Security technician'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security technician.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

MURILLO, DE OLIVEIRA DIAS. "TEACHING MATERIALS ON SECURITY TECHNICIAN BUSINESS NEGOTIATION." GPH-International Journal of Educational Research 06, no. 08 (2023): 12–27. https://doi.org/10.5281/zenodo.8367744.

Full text
Abstract:
<strong>The current study focuses on a case analysis of a security business negotiation in Brazil. The primary aim of this program is to enhance the negotiating skills of business negotiators, academics, and practitioners. This finding is achieved via a role-play simulation that involves two sides and several topics. The current legal issue concerns a government-owned firm and a privately-owned software manufacturer, arising within a month before their two-year contractual arrangement is terminated. The primary findings emphasized the need to improve integrative strategies, which include understanding the opposing party&#39;s underlying interests and creating value to achieve mutually advantageous agreements. The research suggests that the results have the potential to be replicated in other business environments, especially ones that exhibit power imbalances. The present research article culminates in a comprehensive discussion and offers suggestions for further investigations.</strong>
APA, Harvard, Vancouver, ISO, and other styles
2

Castillo Escalante, Irma Cecilia, and Adán Guillermo Ramírez García. "Curricular Innovation for Food Security." Education Sciences 13, no. 4 (2023): 374. http://dx.doi.org/10.3390/educsci13040374.

Full text
Abstract:
The curriculum is a dynamic and continuous process that must be adapted to the requirements and needs of specific contexts to respond to current problems. Currently, it is estimated that more than 828 million people in the world suffer from hunger, so food security must be based on the production and availability of food and physical and economic access to food, as well as its safety. For the above, this research aims to propose a curricular innovation to the professional competences of the study program of the Agricultural Technician (TAP) that is offered in the Agricultural Technological Baccalaureate Centers to train technicians who contribute to food security in the region. A methodology with a mixed perspective with a qualitative approach and descriptive exploratory character was used. Based on the primary information and data collection, it was possible to specify and substantiate a curricular proposal according to the training needs of specialized technicians, who develop professional skills to promote food security, the establishment of agricultural production system, management of livestock production systems, operation of agro-industrial production system, and the design and execution of projects to promote the cultivation of food from small-scale families.
APA, Harvard, Vancouver, ISO, and other styles
3

Angelia Merdiyanti, Nabila Dwi Lestari, and Yulius Jatmiko Nuryatno. "ANALISIS BEBAN KERJA KARYAWAN PADA DEPARTEMEN AFTERSALES KIA HARAPAN INDAH." Journal of Social and Economics Research 5, no. 2 (2023): 318–33. http://dx.doi.org/10.54783/jser.v5i2.135.

Full text
Abstract:
Penelitian ini bertujuan mengukur beban kerja dan jumlah tenaga kerja optimal untuk menyelesaikan pekerjaan pada Departemen Aftersales KIA Harapan Indah. Metode penelitian yang digunakan adalah Full Time Equivalent (FTE) pada 6 jabatan, yaitu part admin, service advisor, technician, foreman, cashier dan security. Pengukuran nilai FTE dilakukan dengan menghitung beban kerja seluruh karyawan dalam satu jabatan selama periode waktu tertentu. Untuk itu diperlukan data frekuensi setiap unit pekerjaan, waktu untuk menyelesaikan suatu pekerjaan, dan jumlah orang yang melakukan suatu pekerjaan. Hasil pengukuran menunjukkan total beban kerja untuk jabatan part admin, service advisor, technician, foreman, cashier dan security masing-masing sebesar 70202 menit, 262766 menit, 640965 menit, 296685 menit, 105512 menit, dan 114672 menit. Adapun nilai FTE untuk jabatan part admin, cashier dan security berturut-turut sebesar 0,75, 1,02, dan 1,08 yang menunjukkan beban kerja berada pada kriteria normal. Sedangkan indeks FTE untuk jabatan service advisor, technician, dan foreman menunjukkan beban kerja pada kriteria overload dengan nilai masing-masing sebesar 2,21, 5,07, dan 2,46. Berdasarkan perhitungan kebutuhan tenaga kerja diperoleh jumlah karyawan optimal untuk jabatan Part Admin dan cashier masing-masing 1 orang, untuk jabatan Service Advisor dan Foreman masing-masing sebanyak 3 orang, untuk jabatan Technician sebanyak 7 orang, dan untuk jabatan Security sebanyak 2 orang.
APA, Harvard, Vancouver, ISO, and other styles
4

Rushikesh, Patil. "A Review: Artificial Intelligence and Expert Systems for Cyber Security Authors." BOHR International Journal of Engineering 1, no. 1 (2022): 53–57. http://dx.doi.org/10.54646/bije.010.

Full text
Abstract:
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The system uses various datasets like a machine and deep learning as well as reinforced learning in order to make intelligent decisions. The Internet of things (IoT) is one of the major concerns for cyber security because it is potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest and potentially the weakest link in the cyber security environment. This review intends to present AI and expert systems for cyber security.
APA, Harvard, Vancouver, ISO, and other styles
5

Rushikesh, Patil. "A review: Artificial intelligence and expert systems for cyber security." BOHR International Journal of Engineering 1, no. 1 (2022): 52–56. http://dx.doi.org/10.54646/bije.2022.10.

Full text
Abstract:
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The system uses various datasets like a machine and deep learning as well as reinforced learning in order to make intelligent decisions. The Internet of Things (IoT) is one of the major concerns for cyber security because it is potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest and potentially the weakest link in the cyber security environment. This review intends to present AI and expert systems for cyber security.
APA, Harvard, Vancouver, ISO, and other styles
6

Kazarinoff, Peter. "Letter From Editor JATE." Journal of Advanced Technological Education 1, no. 1 (2022): 1–2. https://doi.org/10.5281/zenodo.6366329.

Full text
Abstract:
Welcome to the Journal of Advanced Technological Education! Or, as we like to call it, J ATE. On behalf of our Editors, we are pleased to launch the inaugural issue of J ATE. J ATE is a peer-reviewed technical journal focused on community college faculty and staff who work primarily with technician education. J ATE is a platform for dissemination of peerreviewed work that furthers the development of technician education. J ATE is cross-discipline. J ATE covers all technologies under the National Science Foundation (NSF) Advanced Technological Education (ATE) Program. An incomplete list of disciplines covered by J ATE is below: &bull; Micro Nano &bull; Biotechnology &bull; Autonomous Technology &bull; Cyber Security &bull; Advanced Manufacturing &bull; Earth Sciences &bull; Agriculture Technology &bull; Energy &bull; Welding
APA, Harvard, Vancouver, ISO, and other styles
7

Dr., Vinod Varma Vegesna. "Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security." Asian Journal of Basic Science & Research 5, no. 1 (2023): 85–102. https://doi.org/10.38177/AJBSR.2023.5110.

Full text
Abstract:
Instead of depending on a technology&#39;s apparently positive qualities, we always have made it a priority to first examine its flaws. In addition to individuals and robots, now there are things that connect with the online platform without our input. These Things are continuously engaging with the Web, whether it&#39;s a refrigerator delivering an alarm about the foodstuff inside it or our vehicles sending signals to the technician about their fuel conditions. In many respects, the Internet of Things is brilliant. Unfortunately, the software has not yet been developed fully and is not totally safe. This paper summarizes the security risks and challenges associated with the internet of things, as well as offers suggestions for a few solutions for safeguarding the internet of things.
APA, Harvard, Vancouver, ISO, and other styles
8

CARTER, CELESTE. "Invited Letter: Welcome to the Journal of Advanced Technological Education." Journal of Advanced Technological Education 1, no. 1 (2022): 3. https://doi.org/10.5281/zenodo.6363578.

Full text
Abstract:
Welcome to the Journal of Advanced Technological Education! As the Lead Program Director of the National Science Foundation&rsquo;s Advanced Technological Education Program (ATE), I am pleased to introduce the Journal of Advanced Technological Education (J ATE) to the technician education community. Technician Education programs at two-year Community and Technical Colleges across the United States now have a peerreviewed journal to learn about the newest advancements in technician education produced and reviewed by their peers. J ATE covers two-year community and technical colleges with technician education programs in advanced technology industries. These industries include: Micro- and Nanotechnologies, Biotechnologies, Autonomous Technologies, Advanced Manufacturing, Cyber Security, Environmental Technologies, Energy, Engineering and the shared technician education space such as mentoring and evaluation. J ATE is a peer-reviewed journal for all Advanced Technological Education (ATE) faculty. The Micro Nano Technology Education Center (MNT-EC), the national Center for Micro and Nano Technician Education MNT-EC proposed a peer-reviewed Journal as one of their activities Center activities. Since then, the Journal has grown to encompass all sub-disciplines under the ATE umbrella. In addition to community college faculty and staff, the Journal welcomes submission from students doing undergraduate research and industry members involved with community colleges and K-12 teachers and administrators. My publishing journey started when I was a technician and was given the opportunity to lead and carry out a research project characterizing viral mutations. I continued publishing as a graduate student, post-doctoral fellow, and published during my tenure as a community college faculty. Publishing provides a way for the greater STEM community to be aware of advances made both in research and teaching. The advances made at two-year community and technical colleges often remain either at the institution or, at best, within the region where the institution is located. I highly recommend two-year faculty, staff, and students publish in J ATE for multiple reasons. These includes knowledge sharing, professional advancement, collaboration opportunities, and dissemination of results that can impact faculty and students at community and technical colleges across the United States. I am proud to support technician education, the ATE grant program and J ATE. You can support J ATE by submitting articles, serving as a peer reviewer and reading and sharing articles with your colleagues
APA, Harvard, Vancouver, ISO, and other styles
9

Vegesna, Dr Vinod Varma. "Methodology for Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security." Asian Journal of Basic Science & Research 05, no. 01 (2023): 85–102. http://dx.doi.org/10.38177/ajbsr.2023.5110.

Full text
Abstract:
Instead of depending on a technology's apparently positive qualities, we always have made it a priority to first examine its flaws. In addition to individuals and robots, now there are things that connect with the online platform without our input. These Things are continuously engaging with the Web, whether it's a refrigerator delivering an alarm about the foodstuff inside it or our vehicles sending signals to the technician about their fuel conditions. In many respects, the Internet of Things is brilliant. Unfortunately, the software has not yet been developed fully and is not totally safe. This paper summarizes the security risks and challenges associated with the internet of things, as well as offers suggestions for a few solutions for safeguarding the internet of things
APA, Harvard, Vancouver, ISO, and other styles
10

Choirunisa, Ristyna. "Hearing Loss And Health Complaints In Technicians Air Skadron 3 Iswahjudi Airport And Its Association With Aircraft Noise." JURNAL KESEHATAN LINGKUNGAN 11, no. 1 (2019): 61. http://dx.doi.org/10.20473/jkl.v11i1.2019.61-68.

Full text
Abstract:
Aviation is the most significant part of Indonesian Air Force duty. Air Force’s aircraft takes a role not only as Indonesian army agency transportation vehicle but also crucial for Indonesian air territory security protection. However the level of noises resulted from Air Force aviation operation activity such as take off of aircraft reached 130 dBA, so the operation can causes auditory and non auditory adverse effects such as communication, physiological disorder, and psycological disorder. The aim of this study is to analyze factors induced to the hearing loss and analyze the effects of aircraft noises to technician health complaints. This research using case control approach and it was conducted by recruiting subject respondents group randomly of 20 officers includes of 10 technician as study group and 10 non technician as control group. The measurement of aircraft noise level was performed 4 times during 8 hours used Sound Level Meter. The results of aircraft noise measurement in flightline area was exceeding the threshold value of 95,56 dBA. The results of the study shows that aircraft noise significantly associated with to technician hearing loss p-value=0,026 (Spearman correlation test, p&lt;0,05). Other factors that are associated significantly with technician hearing loss include aged p-value=0,023 (Pearson correlation test, p&lt;0,05). Insignificant association is showed for work period with p-value=0,038 (spearman correlation test, p&lt;0,05). In addition, the aircraft noise is associated to health complaint as psychological disorder p-value=0,033 (simple logistic regression test, p-value &lt;0,05). The conclusion of research is that aircraft activities affected hearing loss and technician psychological disorder.
APA, Harvard, Vancouver, ISO, and other styles
11

Ahmed, Zainab. "Role of Augmented Reality in Improving Remote Technical Support in Nigeria." International Journal of Technology and Systems 9, no. 3 (2024): 1–11. http://dx.doi.org/10.47604/ijts.2812.

Full text
Abstract:
Purpose: The aim of the study was to evaluate the role of augmented reality in improving remote technical support in Nigeria. Methodology: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries. Findings: The integration of Augmented Reality (AR) in remote technical support in Nigeria has significantly enhanced troubleshooting efficiency by allowing technicians to visualize issues in real-time, providing immediate and interactive guidance. This technology has improved customer satisfaction by reducing downtime and accelerating resolution processes, making support more accessible, especially in remote areas. Additionally, AR has contributed to cost reduction by minimizing the need for physical technician visits and extensive in-person training sessions. Unique Contribution to Theory, Practice and Policy: Technology acceptance model (TAM), media richness theory (MRT) &amp; cognitive load theory (CLT) may be used to anchor future studies on role of augmented reality in improving remote technical support in Nigeria. Implement AR solutions to provide remote technicians with detailed, real-time visual overlays that guide diagnostic and repair processes. Formulate policies that establish standards for AR technology in remote technical support. This includes guidelines for data security, privacy, and interoperability to ensure that AR solutions are safe, reliable, and can work seamlessly with other technologies.
APA, Harvard, Vancouver, ISO, and other styles
12

Lopes, Luiz Patricio, and Sandra Márcia Tietz Marques. "Cães operacionais no sistema prisional do Rio Grande do Sul, Brasil." Revista Agraria Academica 5, no. 2 (2022): 11–25. http://dx.doi.org/10.32406/v5n2/2022/11-25/agrariacad.

Full text
Abstract:
Intervention dogs in prison units are fundamental in helping operations that demand action in situations of stress and controlled force with the prison population. The prison system is an area where the dog can be used the most, whether for intervention, scent, searching and operations to inhibit drug trafficking. This mission is performed by the canine technician and his dogs. Dogs are distinguished by racial types, temperament and learning characteristics, which make them excellent working partners. This article contributes with the description of specifications for the use of the dog in the prison system of the state of Rio Grande do Sul, Brazil, regarding the regulation and the legal foundation, the profile of the operational dog, the training, the security of the dog-police binomial in routine tasks, with the dog playing a supporting role in tactical employment and the talent of the canine technician who leads him on a leash.
APA, Harvard, Vancouver, ISO, and other styles
13

Alharbi, Alhumaidi Mohammed, Waleed Khalaf Alhafy, ‏‎‏Mohammed Biday Alharbi, et al. "The importance of health information technicians in the transformation of digital health." International journal of health sciences 8, S1 (2024): 1468–83. http://dx.doi.org/10.53730/ijhs.v8ns1.15292.

Full text
Abstract:
Background: The "digital health" or "Healthcare 4.0 (H4.0)" movement has grown, especially after the COVID-19 pandemic. Digitalization promises better data processing and decision-making for efficiency, effectiveness, and patient care, yet research shows limitations. Many studies concentrate on individual digital technology or conceptual assessments, ignoring the larger influence of digital transformation on hospital administration and support workers. A few studies have examined the drivers and challenges to digital technology adoption in non-clinical professions like management and administration, which are essential for healthcare efficiency. This article aims to examine the impact of digital technologies on healthcare administration and highlight the essential role of health information. Methods: This literature review examined health information technicians in healthcare's digital revolution. Out of 150 papers found in PubMed, Scopus, and IEEE Xplore, 70 satisfied the inclusion criteria. Key data elements such study methodology, sample size, and noteworthy health information technician outcomes in digital health were extracted. Thematic analysis was used to discover themes and patterns in data management, patient information security, health information technicians in healthcare technology, and administrative efficiency. Results: Health information technicians are crucial to digital health's problems and prospects, according to the report.
APA, Harvard, Vancouver, ISO, and other styles
14

Cooper, K. "Neutralization of Osmium Tetroxide in Case of Accidental Spillage and for Disposal." Microscopy Today 2, no. 7 (1994): 3–5. http://dx.doi.org/10.1017/s1551929500066633.

Full text
Abstract:
In October 1979, a technician in the electron microscopy laboratory of one of the teaching hospitals in Toronto spilled a bottle containing approximately 500 ml of 2% osmium tetroxide. He asked for help, and four other technicians were involved in the cleanup. They all were exposed to osmium tetroxide vapours for long enough to show signs of acute intoxication. They developed redness and swelling of the conjunctiva, impaired vision, chest pains, breathing difficulties and skin irritation and were taken into Emergency Care at the hospital. The occular symptoms disappeared after two days, but the chest pains and breathing difficulty persisted for approximately one week.This accident could have had more serious consequences. It has been reported that exposure to osrruum vapour could lead to blindness and serious respiratory trouble. At McMaster University Medical Centre, the safety committee gives precise procedures to be followed in case of accidents with dangerous chemicals. All the occupants of the laboratory have to leave immediately and phone the safety and security team.
APA, Harvard, Vancouver, ISO, and other styles
15

QORDJA, Florian, and Sulejman HAXHI. "The role of the radiotherapy technician during prostate radiation treatment." Medicus 7, no. 2 (2023): 14–23. http://dx.doi.org/10.58944/zxbh5669.

Full text
Abstract:
Introduction: Increasing positioning security is one of the main challenges of radiotherapy. The main movements of the prostate during radiotherapy are as a result of poor positioning of the patient, as well as by bladder and rectum volumes. These movements can be detected using various visualization techniques such as CBCT and radiographic images before each treatment session. Purpose: The purpose of this work is to highlight the role of radiotherapy technician in the management of the patient’s movements during prostate treatment. Methods: 8 patients after customized positioning and immobilization performed the treatment with Varian TrueBeam HD linear accelerator. CBCT’s were performed on different days during the course of treatment as well as radiographic images on other days to verify the position. These positions were compared with the positions planned by the simulation scanner and the daily movements of the patient and the prostate were corrected, thus creating a new isocenter. In cases where and with the new isocenter the prostate and seminal vesicles are located outside the planned PTV, it is performed a new simulation CT scan and a new treatment plan. Results: From 8 patients with primary prostate cancer, 42 CBCT controls and 207 MV-KV controls were considered. Patients required an average movement of 0.27 cm in the vertical direction, 0.28 cm in the longitudinal direction, and a displacement of 0.17 cm in the lateral one. Regarding the rotation of the bed according to the X; Y; Z axes, we have an average Pitch of 1.32°, Roll of 0.5° and Rotation of 0.63°. Conclusions: 50% of these patients, needed a rescanning and replanning of treatment, and 12.5% more than one rescan. Key words: Prostate cancer, Radiotherapy technician, Movement, CBCT, Radiographic imaging.
APA, Harvard, Vancouver, ISO, and other styles
16

Yacob, Azliza, Noraida Hj Ali, Aimi Dalila Roslim, et al. "EMPIRICAL ANALYSIS OF A UTAUT-BASED DIGITAL LEARNING SECURITY MODEL IN HIGHER EDUCATION." International Journal of Modern Education 7, no. 24 (2025): 1292–303. https://doi.org/10.35631/ijmoe.724091.

Full text
Abstract:
To improve privacy and data protection while maintaining an efficient learning environment, this research aims to tackle these challenges by applying the UTAUT framework to examine the acceptance of a new digital security model by using secured e-learning. The research model maintains the original UTAUT constructs and items of Performance Expectancy (PE), Effort Expectancy (EE), Social Influence (SI), Facilitating Conditions (FC) and Behavioural Intention (BI) and the additional construct of Technological Knowledge (TK), Pedagogical Knowledge (PK) and Technological Pedagogical Knowledge (TPK). Data was collected among Higher Education Institutions educator, technician and administrator of the e-Learning management system. The data is analysed using SmartPLS 4 using structural equation modelling. The finding shows that only facilitating conditions significantly influence behavioural intention, which supports the H2 hypothesis. The hypothesis testing results indicate that Facilitating Conditions (FC) have a significant positive effect on BI, suggesting that individuals are more likely to engage in a behaviour when they perceive sufficient external resources and support. Additionally, Performance Expectancy (PE) exhibits a marginally significant effect on BI, indicating a potential influence that warrants further investigation.
APA, Harvard, Vancouver, ISO, and other styles
17

Harefa, Lusi, and Sasa Ani Arnomo. "RANCANG BANGUN SISTEM INFORMASI PELAPORAN MAINTENANCE MESIN PT SCHNEIDER." Computer and Science Industrial Engineering (COMASIE) 10, no. 1 (2024): 93–101. https://doi.org/10.33884/comasiejournal.v10i1.8425.

Full text
Abstract:
In order to improve the quality of maintenance reports produced by PT.Schneider, a maintenance report information system that is easy to use and operates instantly is required. Accordingly, it is anticipated that this system would be able to provide users with security data reports and generate accurate information that can be used to support the process of developing technician training materials. where reports are now manually entered, written down, and then re-entered into an Excel file at the conclusion of the workday. This process is extremely inefficient. The goal of this project is to create a more user-friendly and efficient web-based machine maintenance reporting information system.
APA, Harvard, Vancouver, ISO, and other styles
18

Aguirre Vicuña, David. "Prevención del Delito desde la óptica del Agente de Seguridad Penitenciaria basado en la formación dual y la vinculación con la sociedad." Atenas Revista Científica Técnica y Tecnológica 1, no. 1 (2021): 60–73. http://dx.doi.org/10.36500/atenas.1.000.

Full text
Abstract:
The article deals with a crime prevention project from the perspective of the Penitentiary Security Agent based on dual training and connection with society. This aimed to contribute to the implementation of the public policy of comprehensive security, through the communication of experiential experiences in the work environment in the prison context regarding the life regime of persons deprived of liberty, to the student population of the Turi Educational Unit of the Cuenca canton, to identify and learn about the main causes and circumstances that are linked to criminal activity in the national reality, as well as its consequences within the framework of the National Social Rehabilitation System. To achieve the proposed purpose, the participation of the students of the Higher Technician in Penitentiary Security (SP) career is proposed, who, from their training and experience, with the guidance and support of the teaching staff, will provide theoretical and experiential knowledge that allow the achievement of the project objectives, generating a transcendent contribution to social development that promotes the improvement of the living conditions of the target population, through the different activities proposed by the project, such as the gathering of information and dissemination of human rights, crime prevention and non-consumption of psychotropic substances and narcotics.
APA, Harvard, Vancouver, ISO, and other styles
19

Aguirre Vicuña, David. "Prevención del Delito desde la óptica del Agente de Seguridad Penitenciaria basado en la formación dual y la vinculación con la sociedad." Atenas Revista Científica Técnica y Tecnológica 1, no. 1 (2021): 60–73. http://dx.doi.org/10.36500/atenas.1.001.

Full text
Abstract:
The article deals with a crime prevention project from the perspective of the Penitentiary Security Agent based on dual training and connection with society. This aimed to contribute to the implementation of the public policy of comprehensive security, through the communication of experiential experiences in the work environment in the prison context regarding the life regime of persons deprived of liberty, to the student population of the Turi Educational Unit of the Cuenca canton, to identify and learn about the main causes and circumstances that are linked to criminal activity in the national reality, as well as its consequences within the framework of the National Social Rehabilitation System. To achieve the proposed purpose, the participation of the students of the Higher Technician in Penitentiary Security (SP) career is proposed, who, from their training and experience, with the guidance and support of the teaching staff, will provide theoretical and experiential knowledge that allow the achievement of the project objectives, generating a transcendent contribution to social development that promotes the improvement of the living conditions of the target population, through the different activities proposed by the project, such as the gathering of information and dissemination of human rights, crime prevention and non-consumption
APA, Harvard, Vancouver, ISO, and other styles
20

Anggoro, Rifqi Lucky, and Walid Jumlad. "Analysis of the Reliability of Security Check Point Equipment in Inspecting Passenger Luggage at Juanda International Airport, Surabaya." JETISH: Journal of Education Technology Information Social Sciences and Health 2, no. 1 (2023): 276–91. http://dx.doi.org/10.57235/jetish.v2i1.366.

Full text
Abstract:
In accordance with SKEP/2765/XII/2010 regulations, all those who will enter the airport area must first be checked through the Security Check Point. The problem is with the equipment used to check passenger goods through the Security Check Point. Work equipment with adequate conditions in a condition suitable for use and properly maintained can make it easier for the operation process to run smoothly so that items that are prohibited or not allowed to enter the aircraft cabin are prevented from escaping. The research uses a qualitative descriptive method, which is arranged systematically from interviews, observation and documentation. Qualitative research is research that is applied to conduct investigations, make discoveries, describe and explain the quality of influence without being able to give a description, measure or describe using a quantitative approach. Based on the results of the interviews and observations, it can be explained that the Security Check Point equipment must be checked regularly and recorded starting from the Aviation Security officer's report to the Airport Electronics technician officer. 4 X-ray equipment only 1 X-ray has problems so the inspection process is sometimes closed, 4 WalkTrough Metal Detector equipment is safely under control for inspection. In some HandHeld Metal Detector tools, problems often occur, the HandHeld Metal Detector report is not attached because if the sensor from the HandHeld Metal Detector equipment experiences problems, the equipment is immediately replaced with a new one.
APA, Harvard, Vancouver, ISO, and other styles
21

Tsang, Ton, and Cheung Yip Kan. "Circuit Break Connect Monitoring to 5G Mobile Application." International Journal of Computer Science and Information Technology 13, no. 5 (2021): 59–74. http://dx.doi.org/10.5121/ijcsit.2021.13505.

Full text
Abstract:
Along by a continuous improvement to composite electronic devices, a safety to technicians takes additionally become the matter to good concern, as a result to technicians' lives is in jeopardy while their work through shutting down circuit breakers, even that even once the breaker takes been switched off, someone will inadvertently flip to while a technician remains working. That should be a system to guarantee safety that technicians. Also, individuals do not love switching all the time toward turn on / off appliances like fans/lighting/air conditioners. It ends in wasted energy thanks to unnecessarily placing the instrument. To address these issues, we tend to come up through the system through mobile app-controlled circuit breakers that degrade wireless management to home appliances to hunt down a golem app. That replaces a traditional breaker through the mobile app-controlled system in the on / off system, where no one will activate the breaker, while not the word. The remote of home appliances helps a user to save electricity. That enhances a quality of life and luxury. Additionally, a system includes the home security mechanism against drone intrusion using the mobile app-controlled door lock system besides the mechanism that sleuthing dangerous gas leaks. A formation of the system subtracts the degree of victim associate ESP 32 microcontroller, the Bluetooth module, matrix 4x4 keyboards, and the paraffin gas detector associate with a golem mobile application. The entire system is usually compact systems.
APA, Harvard, Vancouver, ISO, and other styles
22

Siconolfi, Richard M. "A Toxicologist's Viewpoint of the Quality of Computer-Captured Data and Data Audits." Journal of the American College of Toxicology 8, no. 2 (1989): 323–31. http://dx.doi.org/10.3109/10915818909019557.

Full text
Abstract:
As computers become more common in toxicology laboratories, the need of handwritten data decreases. The good laboratory practice standards taught the toxicology community to prepare adequate standard operating procedures and how to document all phases of a nonclinical laboratory study. Have computers helped us with our SOPs or documentation? Maybe. Computers have streamlined many of the mundane tasks in data collection. However, they have also opened up a whole list of problems: data security, data audits, computer-generated backups, technician training and periodic updates, system validation (software, hardware, and data), and “data thieves.” A system of checks and balances must be developed, implemented, and reviewed constantly to assure the quality of data collected. This cannot be the responsibility of one person or one department but requires input from many, the cooperation of all, and support from management, without which quality would suffer.
APA, Harvard, Vancouver, ISO, and other styles
23

Gibler, Brian, Grace Hayes, Fred Raleigh, Barbara Levenson, Sheryl Heber, and Ann Tham. "Forensic Psychiatric Pharmacy Practice at Atascadero State Hospital." Journal of Pharmacy Practice 9, no. 4 (1996): 222–28. http://dx.doi.org/10.1177/089719009600900403.

Full text
Abstract:
Atascadero State Hospital (ASH) is the nation's largest maximum security forensic psychiatric hospital. Most patients are committed under penal codes as psychiatrically unstable prisoners, mentally disordered parolees, individuals found not guilty by reason of insanity, or individuals deemed incompetent to stand trial. Pharmacists' involvement in patient care and supportive activities at ASH are varied. Direct patient care activities include attendance at interdisciplinary treatment teams, medication consultation upon request of physicians or other staff, and follow-up on adverse drug reactions. Pharmacists may also be involved in discharge planning, especially for patients on clozapine treatment. Patient medication education is provided by pharmacists through medication management classes and discharge counseling. Indirect patient care activities include verification of data entry for automation of physician orders and drug regimen review (DRR) audits. Drug Use Evaluations (DUEs) and the Annual Survey allow tracking and improvement of prescribing patterns. Committees and Continuous Quality Improvement (CQI) activities throughout the hospital often include pharmacist members. Teaching is another important function of the pharmacist. Pharmacology classes are given to psychiatric technician students. Drug-induced movement disorder classes are provided to new employees. Additionally, pharmacy students on clinical clerkship rotations are trained and assist in providing clinical services. Capable technicians play a key role in allowing greater emphasis of time on clinical and administrative pharmacist functions. ASH provides the somewhat unique combination of clinically-oriented pharmacist positions in a rural community.
APA, Harvard, Vancouver, ISO, and other styles
24

Dilmurodov, G'olibbek Sobirjon o'g'li. "BURG'ILASH ISHLARINI BAJARISHDA SANOAT XAVFSIZLIGI." Innovative Development in Educational Activities 2, no. 8 (2023): 260–65. https://doi.org/10.5281/zenodo.7884778.

Full text
Abstract:
<em>Labor protection activities are aimed at creating healthy and safe working conditions, preventing occupational diseases and improving their health. Creating healthy and safe working conditions in all enterprises, organizations and institutions is entrusted to the managers of the enterprise, office, organization. The administration is obliged to prevent industrial injuries and to introduce improved safe technical means, to ensure sanitary-hygienic conditions, to use tools to prevent the occurrence of occupational diseases among workers.</em>
APA, Harvard, Vancouver, ISO, and other styles
25

Gustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.

Full text
Abstract:
Abstrak - Dishub Bandung merupakan kantor dilingkungan Pemkot Bandung, kantor ini memiliki komputer yang masih terdapat user yang terpisah secara fisik dari jaringan Lan dan teknisi setiap monitoring komunikasi data dengan mengakses mikrotik dan access point untuk mengetahui kondisi jaringan, dan hanya dapat dilakukan teknisi ketika sedang berada dalam jaringan lokal. Masalahnya ketika teknisi sedang berada pada jaringan publik, maka tidak dapat mengakses mikrotik dan access point tersebut. Penelitian menggunakan metode NDLC dengan penggabungan sistem protokol VPN L2TP dan port forward yang ada di mikrotik. VPN L2TP yang dapat membantu menghubungkan dua mikrotik yang berbeda dalam satu jaringan private yang aman dan memungkingkan data terenkripsi dengan aman. Teknisi mendapatkan IP Public kantor sehingga dapat di port forward untuk membuka akses terhadap perangkat pada jaringan lokal agar dapat diakses melalui jaringan publik melalui remote address VPN. Keamanan data dan ketertutupan transmisi data dari akses yang tidak berhak dalam transmisinya pada internet menjadi standar utama dalam VPN, sehingga dalam VPN selalu disertakan akan fitur utama yaitu enkripsi dan tunneling.Kata Kunci : VPN, L2TP, Mikrotik, Remote, Port Forward Abstract - Dishub Bandung is an office within the Bandung City Government, this office has a computer that still has a user who is physically separated from the Lan network and technicians every monitoring data communication by accessing mikrotik and access points to find out network conditions, and can only be done by technicians when they are in the local network. The problem is that when the technician is on the public network, it cannot access the proxy and access point. The study used the NDLC method by combining the L2TP VPN protocol system and the forward port in mikrotik. L2TP VPN that can help connect two different mikrotik in one secure private network and securely stop encrypted data. Technicians get a public IP of the office so that it can be ported forward to open access to devices on the local network so that they can be accessed through the public network through a VPN remote address. Data security and the ability to transmit data from unauthorized access to the internet are the main standards in VPNs, so in VPNs there are always included the main features of encryption and tunneling.Keywords : VPN, L2TP, Mikrotik, Remote, Port Forward
APA, Harvard, Vancouver, ISO, and other styles
26

Nakanishi, Yuko, Kibeum Kim, Yavuz Ulusoy, and Andrew Bata. "Assessing Emergency Preparedness of Transit Agencies: Focus on Performance Indicators." Transportation Research Record: Journal of the Transportation Research Board 1822, no. 1 (2003): 24–32. http://dx.doi.org/10.3141/1822-04.

Full text
Abstract:
In any emergency situation, a certain degree of confusion and chaos occurs. The more organized and orderly the response effort, the more likely that lives may be saved and property preserved. Emergency preparedness can enable transit agencies to react to an emergency on or off transit property. Evacuations and transport of emergency police, fire, and emergency medical technician personnel to and from the incident site may be facilitated by using transit vehicles. Because emergencies do not occur frequently, it is unadvisable to wait until they happen to evaluate a transit agency’s level of emergency preparedness. Instead, proposed is the development of performance indicators that measure the achievement of emergency preparedness goals and policies of a transit agency. An emergency preparedness assessment flowchart incorporating performance indicators was developed. Overall emergency preparedness indicators and sample performance indicators for each component are suggested along with standards and data sources for the indicators. In addition, the use of cost–benefit analysis is suggested to facilitate security-related investment decisions by agency management.
APA, Harvard, Vancouver, ISO, and other styles
27

Al-Ansary, Mohammad Yaqub, Mohammad Habibur Rahman, Samena Akter Kakuli, Mohammad Feroz Kabir, and Mohammad Ershad Ali. "Association between BMI and plantar fasciitis among hospital staff in a selected hospital of Dhaka city." International Journal Of Community Medicine And Public Health 10, no. 4 (2023): 1298–301. http://dx.doi.org/10.18203/2394-6040.ijcmph20230903.

Full text
Abstract:
Background: Plantar fasciitis described as the inflammation of planter fascia, particularly hampering an individual’s daily living activities related to ankle and foot that impact on quality of life. The study aimed to identify the association between BMI and planter fasciitis among hospital staff in a selected hospital in Dhaka city. Methods: A descriptive cross-sectional study. Results: Mean±SD age of the respondents were 29.03±6.56 years. Among the hospital staff, the majority of the respondents were nurses 31.25%, 13.02% respondents were physician and 2.07% of respondents were physiotherapists, others were pharmacist, lab technician, administration staff, cleaner, security, information technologists and officers from the maintenance department of selected hospital. According to BMI scale the 65% were normal weight, 23% were overweight and only 12% were obese. In this study respondents who have only two family members, have strong relationships with BMI (p&lt;0.00). Besides, the duration of work has a slightly significant relation with BMI (p&lt;0.03) and BMI has a strong impact on level of pain (p&lt;0.01) among respondents. Conclusions: The recommendation for risk variables that have a strong correlation with plantar fasciitis is the working status, duration, and BMI.
APA, Harvard, Vancouver, ISO, and other styles
28

Putti, Nandan, Asmath Qureshi, Latha Sarma, and Mohit Chilana KA. "Monitoring of pulmonary function in people dwelling and working in and near cement factory area." Journal of Medical and Scientific Research 3, no. 1 (2015): 33–36. http://dx.doi.org/10.17727/jmsr.2015/3-6.

Full text
Abstract:
Indian cement industry is the second largest in the world. With growing industrialization more and more people are involved in industrial occupation, who are prone to serious health hazards. In the present study we focus on pulmonary function tests (PFT) the changed values correlating with the duration of stay and type of occupation in the cement factory area. A base line demographic and patient data of work and stay was taken with the help of questionnaires designed as data collection form. Patients were sent for pulmonary function test which was done by an experienced PFT technician. Mean age of study subjects was found out to be 40.54 years (± 8.91). The different occupations of subjects staying in the said areas can be summarized as 8 house wives, 22 technicians, 4 hospital workers, 6 mine workers, 6 security personnel and 3 drivers. Mean duration of work and stay was found out to be 13.08 years (± 10.55) and 16.78 years (± 13.32) respectively. The mean forced expiratory volume in the first second (FEV1) was found out to be 71.28 (± 20.74) whereas peak expiratory flow rate (PEFR) was found to be 68.1 (± 17.20). 6 subjects had a history of asthma, 13 had dust allergy, 18 had shortness of breath functional class (FC) - grade III, and 2 patients working in mines had silicosis. There was a negative correlation between duration of stay and FEV1, PEFR with a co-efficient of correlation being -0.4 (p-value 0.29) &amp; -0.43 (p-value 0.1) also the duration of work and FEV1, PEFR with a co-efficient of correlation being -0.51 (p-value 0.4) &amp; -0.3 (p-value 0.7). Key words: Cement factory; pulmonary function tests; forced expiratory volume; peak expiratory flow rate; occupational lung diseases.
APA, Harvard, Vancouver, ISO, and other styles
29

Merah, A. "A case study of foundation failure of a residential building: From diagnosis to reparation." Journal of Building Materials and Structures 8, no. 1 (2021): 9–18. http://dx.doi.org/10.34118/jbms.v8i1.772.

Full text
Abstract:
The pathology that appears in reinforced concrete structures, old and new, is inevitable and involves all stakeholders at all levels of responsibility, from the technician to the decision maker at the highest level. It also concerns engineers from design offices and experts from offices responsible for diagnosing existing structures, as well as engineers from repair companies. Like all countries in the world, the study of the pathology and safety of civil engineering buildings is one of the big problems encountered in the field of construction in Algeria. The foundations are among of the structural elements of the buildings most affected by this damage, these constitute the link between the structure and the soil, they allow the transmission of loads from the structure to the soil. If these structural elements are damaged, they affect the general stability of the building. Depending on the severity of the damage, it can cause the building collapse. The main objective of this paper is to study a pathological case of foundation failure of a residential building: from diagnosis to reparation. This repair was carried out according to an intervention plan comprising stages spread over time, this allowed the strengthening of the infrastructure and gave the building an acceptable level of security.
APA, Harvard, Vancouver, ISO, and other styles
30

Parameshwarappa Rajendra Patel, Gowrav M P, Borra Vamsi, and Hemanth kumar S. "A Review on Modern Drug Packaging in Pharmaceutical Industries." International Journal of Research in Pharmaceutical Sciences 11, no. 2 (2020): 1486–92. http://dx.doi.org/10.26452/ijrps.v11i2.2022.

Full text
Abstract:
Pharmaceutical packing is one of the markets throughout the world that is progressing at continuous pace. It’s predictable that market can grow to price $78.79 Billion by 2018. Packaging may be a key available for sale, protection and accomplishment. Like different grocery, prescribed drugs packaging got to be in such a fashion that it'll give quick packaging, safety, identification, goods superiority, patient safety, display and desires of security. Packaging is an art of science where several considerations are involved from the basic development of the design and the technology implemented to pack the product without any instability and providing protection, presentation and observance of manufactured goods during transportation, storage until it reaches the Consumed. Packaging technician design containers which would maintain the physiochemical, and biological stability about the drug and package would be able to withstand the pressures that would be inflicted the entire supply and transport process. Advancement in analysis of prescribed drugs development had perpetually being obsessed with the packaging skill. Maintaining truthfulness of prescribed drugs throughout storing, cargo and transport is guaranteed by quality of packing available. This current evaluation provides an in depth study of the pharmaceutical packaging trends and forecasting the packing outcomes in future.
APA, Harvard, Vancouver, ISO, and other styles
31

Ahmed, Merah. "A case study of foundation failure of a residential building: From diagnosis to reparation." Journal of Building Materials and Structures 8, no. 1 (2020): 9–18. https://doi.org/10.5281/zenodo.4281291.

Full text
Abstract:
<strong>Abstract.</strong> &nbsp;The pathology that appears in reinforced concrete structures, old and new, is inevitable and involves all stakeholders at all levels of responsibility, from the technician to the decision maker at the highest level. It also concerns engineers from design offices and experts from offices responsible for diagnosing existing structures, as well as engineers from repair companies. Like all countries in the world, the study of the pathology and safety of civil engineering buildings is one of the big problems encountered in the field of construction in Algeria. The foundations are among of the structural elements of the buildings most affected by this damage, these constitute the link between the structure and the soil, they allow the transmission of loads from the structure to the soil. If these structural elements are damaged, they affect the general stability of the building. Depending on the severity of the damage, it can cause the building collapse. The main objective of this paper is to study a pathological case of foundation failure of a residential building: from diagnosis to reparation. This repair was carried out according to an intervention plan comprising stages spread over time, this allowed the strengthening of the infrastructure and gave the building an acceptable level of security.
APA, Harvard, Vancouver, ISO, and other styles
32

Rasmila, Rasmila, and Dilla Nafasari. "Designing a Service Provision Website Using the Design Thinking Method." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 12, no. 2 (2024): 409–18. http://dx.doi.org/10.33558/piksel.v12i2.9972.

Full text
Abstract:
Berkarya Abdi Sejahtera is a company that operates in the field of Outsourcing services such as Administration, Data Input, Operator, Warehouse, Labor, Security, Office Boy/Grill, Driver, Technician, Mechanic, and others. One way to increase company development is by using the website. Websites are increasing rapidly along with the number of websites that are used as a tool to promote companies to make them better known. Based on previous research conducted regarding Thrifdoor Business Website Design Using the Design Thinking Approach Method, it states that the creation process uses the Design Thinking method. The aim of this research is to create a website design by innovating using the Design Thinking method. and it is hoped that the design of this website will make it easier for companies to introduce their company. Observation is a process of observing and then recording systematically, logically, objectively and rationally regarding various phenomena in real situations, as well as artificial situations. The author collects and reviews data obtained by direct review and monitoring. Interviews are conducted to obtain data and information in the form of questions and answers from people who are directly involved with the system that is the object of research. Interviews will be conducted with members of PT Berkarya Abdi Sejahtera at the design stage. The 5 stages of design thinking: empathize, define, ideate, prototype, and test.
APA, Harvard, Vancouver, ISO, and other styles
33

Dávila-Conn, Vanessa, Maribel Soto-Nava, Yanink N. Caro-Vega, et al. "Seroepidemiology of SARS-CoV-2 in healthcare personnel working at the largest tertiary COVID-19 referral hospitals in Mexico City." PLOS ONE 17, no. 3 (2022): e0264964. http://dx.doi.org/10.1371/journal.pone.0264964.

Full text
Abstract:
Introduction We performed a longitudinal SARS-CoV-2 seroepidemiological study in healthcare personnel of the two largest tertiary COVID-19 referral hospitals in Mexico City. Methods All healthcare personnel, including staff physicians, physicians in training, nurses, laboratory technicians, researchers, students, housekeeping, maintenance, security, and administrative staff were invited to voluntarily participate, after written informed consent. Participants answered a computer-assisted self-administered interview and donated blood samples for antibody testing every three weeks from October 2020 to June 2021. Results A total of 883 participants (out of 3639 registered employees) contributed with at least one blood sample. The median age was 36 years (interquartile range: 28–46) and 70% were women. The most common occupations were nurse (28%), physician (24%), and administrative staff (22%). Two hundred and ninety participants (32.8%) had a positive-test result in any of the visits, yielding an overall adjusted prevalence of 33.5% for the whole study-period. Two hundred and thirty-five positive tests were identified at the baseline visit (prevalent cases), the remaining 55 positive tests were incident cases. Prevalent cases showed associations with both occupational (institution 2 vs. 1: adjusted odds ratio [aOR] = 2.24, 95% confidence interval [CI]: 1.54–3.25; laboratory technician vs. physician: aOR = 4.38, 95% CI: 1.75–10.93) and community (municipality of residence Xochimilco vs. Tlalpan: aOR = 2.03, 95% CI: 1.09–3.79) risk-factors. The incidence rate was 3.0 cases per 100 person-months. Incident cases were associated with community-acquired risk, due to contact with suspect/confirmed COVID-19 cases (HR = 2.45, 95% CI: 1.21–5.00). Conclusions We observed that between October 2020 and June 2021, healthcare workers of the two largest tertiary COVID-19 referral centers in Mexico City had similar level of exposure to SARS-CoV-2 than the general population. Most variables associated with exposure in this setting pointed toward community rather than occupational risk. Our observations are consistent with successful occupational medicine programs for SARS-CoV-2 infection control in the participating institutions but suggest the need to strengthen mitigation strategies in the community.
APA, Harvard, Vancouver, ISO, and other styles
34

Cussans, Amelia. "Ecosia: Bringing a Greener Search Engine to the NHS." BJPsych Open 9, S1 (2023): S84. http://dx.doi.org/10.1192/bjo.2023.263.

Full text
Abstract:
AimsThe objective of this project was to switch the default search engine used on CNWL computers from Google/Bing to Ecosia. Both Google and Bing have poor ethical and environmental credentials. Ecosia, in contrast, is a not-for-profit, certified B-Corporation which funds tree planting and community projects around the world. Ecosia searches display ads (just like any other search engine) however it donates 100% of its profits towards high-impact agroforestry, tree planting and forest protection.MethodsThe first step was to pitch the proposal to the Trust's Sustainability Lead. Then, information governance and cyber security teams performed assessments and gave clearance. An ICT technician was allocated the task and they configured the switch for a pilot group of 38 staff, with the help of step-by-step guides produced by Ecosia. After a short trial, the pilot group completed a questionnaire. Following satisfactory feedback, the ICT technician switched the default search engine to Ecosia for the entire Trust staff group. A Trust-wide email informed staff of the change and provided opportunity for feedback to be given via an online survey.ResultsA CNWL tree count is sent monthly from Ecosia. Over the first four months, an estimated 32,872 trees were planted using the funding generated by CNWL.The pilot survey showed 80% of participants agreed that CNWL should use Ecosia as its default search engine (0% = should not; 20% = undecided). 62% felt Ecosia performed the same as the previous search engine (14% = much better; 5% = somewhat better; 20% = somewhat worse; 0% = much worse). 86% said they would use Ecosia on their personal devices. Further comments included:“"This is a great initiative from the trust, who in many realms benefit private profit enterprises to the detriment of our planet.”;“"As a Trust, in addition to using Ecosia, we should look for other similar measures, on the grounds that every step towards sustainability makes a cumulative impact”"; “Google performs better than Ecosia”. It is noted that if an Ecosia search does not yield the required results, it can easily be switched to Google by clicking ‘More’ —&gt; ‘Google’.ConclusionSwitching to Ecosia is an achievable action that health organisations can take. Collectively we can fund the protection and regeneration of forests, which benefits people and the planet, and engages staff in climate action. The next step is for other Trusts to switch, with an ultimate goal of all NHS organisations using Ecosia.
APA, Harvard, Vancouver, ISO, and other styles
35

Garcia, Augusto C. F., Sandro V. Soares, Thiago C. Soares, Carlos R. M. Lima, Raimundo N. Lima Filho, and José B. S. O. A. Guerra. "Perceived Quality of Information System Support Service of an Education Institution and Its Relationship with the Users’ Characteristics." International Journal of Business and Management 19, no. 5 (2024): 57. http://dx.doi.org/10.5539/ijbm.v19n5p57.

Full text
Abstract:
Technological resources as a tool used to generate information and optimise processes are increasingly present in organisations. Among these resources are the information systems, which are used to generate competitive advantage. However, for these resources to represent an effective competitive advantage in the organisation, it is necessary to have support which should be evaluated. Therefore, the study sought to assess the quality of support service provided to the information system for academic management at an education institution according to docents&amp;rsquo; and administrative technician&amp;rsquo;s perception. The Servqual scale was used for such assessment with adaptations made considering the application. As for the form of approach, this is a quantitative study in which data collection was performed by using electronic questionnaire and the sample was of convenience with 194 respondents. Data analysis was performed by using descriptive statistics, normality test, median difference test and regression analysis. As a result, the study revealed that the respondents&amp;rsquo; perception on the quality is higher with the dimension &amp;ldquo;security&amp;rdquo;, whereas the dimension &amp;ldquo;responsiveness&amp;rdquo; had the largest gap. Regression analysis allowed identifying that variables &amp;ldquo;gender&amp;rdquo; and &amp;ldquo;age&amp;rdquo; have a statistically significant influence on certain Servqual items. According to the respondents&amp;rsquo; perception, there is a gap in the service quality regarding items and dimensions addressed in the study.
APA, Harvard, Vancouver, ISO, and other styles
36

Bloshchynskyi, Ihor. "Peculiarities of Professional Training of the us Border Patrol Special Operations Group’s Agents." Comparative Professional Pedagogy 7, no. 3 (2017): 42–48. http://dx.doi.org/10.1515/rpp-2017-0034.

Full text
Abstract:
Abstract Professional training of the agents of the US Border Patrol Special Operations Groups has been substantiated in the article. Special attention has been paid to revealing Selection and Training Course (STC) of the Border Patrol Tactical Unit (BORTAC) and the Border Patrol Search, Trauma, and Rescue Unit (BORSTAR). It has been determined that BORTAC STC lasts over a month and candidates who pass the initial testing must then complete a timed, six-mile ruck march with a weighted pack, swimming, treading water and drown-proofing. As indicated in the article, in case of successful completion of the testing phase, candidates undergo weeks of intense training in tactics and airmobile operations, operational planning and weapon skills. As mentioned further, BORSTAR STC foresees a physical abilities test: a minimum of 7 pull-ups, 40 push-ups, 60 sit-ups (in 2 minutes), 1,5 mile run in 11 minutes or less, and a 250-yard swim. The following disciplines are taught during the course: the basic incident management system and incident command system, technical rescue framing, land navigation, tactical medicine framing, swift-water rescue technician framing etc. Besides, the curricula of such disciplines as “Tactics and special training”, “Topography”, “Weapons practice", “Tactical medicine", “Physical framing” (104 academic hours and 88 hours of classrooms lessons) for the State Border Guard Service of Ukraine mobile forces framing have been presented. The SBGSU mobile personnel framing program lies in a thorough study of the specifics of service management and carrying out of service duties, as well as learning of the SBGSU mobile units ’ personnel actions during protection of the state border, personal security and the use of force. The main objective of the framing course is to acquire the special knowledge and practical skills necessary for performing the main tasks on the state border protection, which are prescribed by professional duties. At the same time, the focus is made on the practical component of the actions of the border guards. In addition, they improve knowledge and skills during the framing process.
APA, Harvard, Vancouver, ISO, and other styles
37

Srinivas, Adilapuram. "Unveiling Modern Authentication Strategies for Java APIs: Exploring OAuth 2.0, JWT, API Keys, and Basic Authentication." Journal of Scientific and Engineering Research 9, no. 9 (2022): 119–25. https://doi.org/10.5281/zenodo.14631323.

Full text
Abstract:
Authentication mechanisms are essential for securing Java APIs. They safeguard sensitive data and restrict unauthorized access. OAuth 2.0 provides a comprehensive framework that allows third-party providers to manage authentication. It simplifies user experience while enhancing security. JWT offers a stateless and compact way to share data securely. However, its implementation demands careful consideration to prevent token misuse. API keys are simple but prone to security risks if mismanaged. Basic authentication, despite its simplicity, lacks strength due to plain-text credentials. Selecting the right mechanism requires understanding the trade-offs between usability and security. This article explores these mechanisms, their technical aspects, and challenges.
APA, Harvard, Vancouver, ISO, and other styles
38

Mathew Sebastian. "Securing IoT devices: A comprehensive technical framework." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 334–40. https://doi.org/10.30574/wjarr.2025.26.2.1620.

Full text
Abstract:
This article presents a comprehensive technical framework for securing Internet of Things (IoT) devices across various deployment scenarios. As IoT technology proliferates throughout industrial, critical infrastructure, and consumer environments, it creates an expanded attack surface that malicious actors increasingly target. The framework addresses security challenges through multiple defensive layers, including robust authentication infrastructure, secure communication protocols, hardware security components, and operational security measures. By examining implementation patterns, security effectiveness, and adoption disparities between different IoT sectors, the article provides actionable guidance for organizations seeking to protect their IoT ecosystems against unauthorized access and data compromise. The integrated approach described combines cryptographic technologies, network protections, hardware security mechanisms, and lifecycle management practices to create a defense-in-depth strategy appropriate for the evolving threat landscape facing interconnected devices.
APA, Harvard, Vancouver, ISO, and other styles
39

Talluri Durvasulu, Mohan Babu. "Security in Storage Area Networks: A Technical Overview." International Journal of Advances in Engineering and Management 7, no. 2 (2025): 368–76. https://doi.org/10.35629/5252-0702368376.

Full text
Abstract:
Storage Area Network (SAN) security has emerged as a critical component of modern enterprise infrastructure, addressing the challenges posed by exponential data growth and evolving cyber threats. This technical article examines the fundamental components and implementation strategies for securing SAN environments, encompassing access control management, data protection mechanisms, network security infrastructure, physical security controls, compliance frameworks, and best practices. The comprehensive article covers advanced technologies including artificial intelligence-driven monitoring systems, quantumresistant encryption protocols, and automated incident response capabilities, while highlighting the importance of maintaining a balance between security measures and operational efficiency. Through the integration of multiple security layers and automated controls, organizations can establish robust defense mechanisms against emerging threats while ensuring optimal performance of their storage infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
40

Soundararajan, Balaji. "Implementing Payment System Security: A Technical Deep Dive." International Journal of Multidisciplinary Research and Growth Evaluation. 3, no. 5 (2022): 615–21. https://doi.org/10.54660/.ijmrge.2022.3.5.615-621.

Full text
Abstract:
The rapid transition from cash-based to digital payment systems underscores the critical need for robust security frameworks to safeguard sensitive financial data and maintain public trust. This paper explores the foundational principles of payment system security that includes data integrity, confidentiality, and availability and examines key technologies and methodologies designed to mitigate risks, including encryption, tokenization, and authentication mechanisms. Symmetric and asymmetric encryption techniques are analyzed for their roles in securing transactional data, while tokenization is highlighted as a method to reduce exposure of sensitive information. Secure communication protocols such as TLS and multi-factor authentication (MFA), including biometric verification, are discussed as essential layers of defense against evolving cyber threats. The challenges of securing mobile payment systems and compliance with regulations like PCI DSS are also addressed. The study concludes that a multi-layered security approach, coupled with adherence to evolving standards and user education, is vital to sustaining trust in digital payment ecosystems.
APA, Harvard, Vancouver, ISO, and other styles
41

BRYANT, BRIAN. "Consultants with Military Background." International Oil Spill Conference Proceedings 2017, no. 1 (2017): 2017082. http://dx.doi.org/10.7901/2169-3358-2017.1.000082.

Full text
Abstract:
The smallest of the nation's uniformed armed services, the United States Coast Guard's basic missions relate to maritime safety, mobility, and security; national defense, and natural resources protection. It is responsible for enforcement of maritime laws and marine environmental pollution response. The Coast Guard offers many career opportunities for enlisted personnel, including Marine Science Technician (MST). MSTs conduct marine-safety activities such as investigating pollution incidents and monitoring pollution clean-ups. Possible scientific duties include responding to oil and hazardous-materials spills, observing and forecasting weather. An increasing number of civilian employers are becoming more aware of the unique strengths former military personnel can bring with them to a consultant position. A consultant is someone who has expertise in a specific area or areas and offers unbiased opinions and advice for a fee. There are many reasons why the private and public sector need consultants for problem solving. One very important reason; Government regulatory compliance. Government regulations at all levels are constantly changing, and companies are frequently not prepared or trained to comply. Consultants may be retained to provide expertise to assist a company in complying economically, efficiently, and with the least amount of trauma to the organization. They can also be hired to provide in-house training to keep staff informed of new management and supervisory techniques or technical knowledge and to improve employee safety. Successful consultants often possess certain attributes. They can be identified with good physical and mental health, professional etiquette and courtesy, stability of behavior and self-confident. In addition to these skills, here are two military-related attributes that most companies find attractive and will help any organization simplify the task at hand. Loyalty to the Team. Military personnel bring with them an intrinsic understanding of how loyalty adds to team proficiency and builds trust in a work environment. For business leaders looking to make an improvement in their company, military personnel often outperform other candidates as proven team players, as demonstrated by hard work, motivation, and dedication. Reliable Work Ethic. Knowing the importance of adhering to a schedule and consistently performing well at work demonstrates professional maturity. One of the most difficult challenges to hiring professionals is being able to accurately judge candidates in these areas. Through service, training, and lifestyle, former military personnel will typically have the work ethic that any business owner would be thrilled to replicate in all of the organization's employees.
APA, Harvard, Vancouver, ISO, and other styles
42

Rishabh Gupta. "Securing Distributed Systems in Government and Public Sector: A Technical Overview." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 441–50. https://doi.org/10.32628/cseit25112378.

Full text
Abstract:
This article explores the critical aspects of securing distributed systems within government and public sector organizations. It examines the implementation of comprehensive security frameworks, including Zero Trust Architecture, Artificial Intelligence-driven threat detection, and advanced identity management solutions. The article discusses the challenges faced by federal agencies in protecting sensitive data across interconnected systems while maintaining operational efficiency. It addresses key areas including identity verification, network segmentation, and resource protection, along with practical applications in digital identity platforms and emergency response systems. Through detailed analysis of security controls, compliance requirements, and emerging technologies, the article demonstrates how modern security approaches enhance the protection of government digital infrastructure while enabling secure inter-agency collaboration and public service delivery.
APA, Harvard, Vancouver, ISO, and other styles
43

Koto, Tabrani, Basir Basir, and Riska Sri Handayani. "Analysis of Technical Training Needs for the Pioneer Battalion of Brimob Polda Metro Jaya in The Context of Securing The National Capital." International Journal of Social Service and Research 3, no. 11 (2023): 2834–41. http://dx.doi.org/10.46799/ijssr.v3i11.589.

Full text
Abstract:
This research analyzes the technical training needs required by the Mobile Brigade Pioneer Battalion of Polda Metro Jaya in securing the National Capital City. Securing the National Capital is a complex challenge and requires high readiness and competence from the police, especially the Pioneer Battalion. In this research, the author uses a qualitative approach with the Training Need Analysis (TNA) analysis method, which involves questionnaires and a literature study. The results of the analysis show that the Pioneer Battalion is widely applied in various security tasks, which include handling high-intensity crime threats and managing natural disasters. The involvement of the Vanguard Battalion generally plays a role in supporting regional police when the intensity of the threat reaches a high escalation. Training uses a training manual published by the Foster Police Department. The research results show that there is still potential to improve training. In this analysis, the author emphasizes training based on actual needs for securing the National Capital, enhancing services to the community, and preparing to face future threats. In conclusion, this research identifies the importance of technical training in securing the National Capital by the Mobile Brigade Pioneer Battalion of Polda Metro Jaya. Based on the analysis, it is recommended to provide training that is not only related to the tasks and duties of the Pioneer Battalion in the context of securing the capital. Because the involvement of the pioneer battalion was extensive and not only related to security. The development and improvement of technical training that is relevant to the actual needs for security of the National Capital will strengthen the readiness and competence of Pioneer Battalion members in carrying out complex security tasks involving various other security aspects.
APA, Harvard, Vancouver, ISO, and other styles
44

Adesina, Thomas Kehinde, and Ogunnowo Aderonke Adunola. "Perceived Effects of Sand Dredging on Livelihood Diversification of Artisanal Fisher Folks in Lagos State, Nigeria." Agricultura Tropica et Subtropica 50, no. 2 (2017): 71–79. http://dx.doi.org/10.1515/ats-2017-0008.

Full text
Abstract:
AbstractThe study examined perceived effects of sand dredging activities on livelihood diversification of artisanal fisher folks in Lagos State, Nigeria. Multi-stage sampling procedure was used to select respondents for the study. Purposively, Eti-Osa, Ibeju-Lekki, Epe and Ikorodu local Government Areas (LGAs) were selected for intensive dredging activities. Registered artisanal fishermen in these LGAs were 310, 350, 380 and 320, respectively. Twenty percent of the population in each LGAs were selected using simple random sampling technique to arrive at 272 respondents interviewed for the study. An interview schedule guide was used to elicit information on respondents’ socio-economic characteristics, knowledge, livelihood diversification and perception of the sand dredging effect on fishing activities. Data were analyzed using descriptive statistics, Pearson Product Moment Correlation and independent sample t-test. The mean age of fisher folks was 37 ± 8 years, 92.1 % of them were males, 81.4 % were married and had households’ size ranging from 1 to 16 persons. Over 50 % of the respondents had no formal education. Monthly income of fisher folks in the study area ranged from ₦5, 000 to ₦60, 000 with a mean income of ₦22, 892 ± 13,564 and majority (92.9 %)were members of a social group. Respondents diversified most into off-farm activities such as commercial bike riding, security and technician services. Slightly above half (55.7 %) perceived sand dredging as having a negative effect on fishing activities. Results on inferential statistic revealed that a significant relationship existed between knowledge of sand dredging effect on fishing activities (r = 0.35), monthly income (r = −0.181) and social group (χ2= 2.886) and perceived effects of sand dredging on fishing activities. Deliberate policy drive to mitigate sand dredging practices is required to forestall the negative effect on livelihood diversification of the artisanal fisher folks. Consequently, the artisanal fishery contribution to total Gross Domestic Product (GDP), employment generation and total domestic fish production will be enhanced.
APA, Harvard, Vancouver, ISO, and other styles
45

Mohit, Thodupunuri. "The Right Way to Manage SSL/TLS Certificates in Modern Applications and Infrastructure." European Journal of Advances in Engineering and Technology 11, no. 3 (2024): 30–37. https://doi.org/10.5281/zenodo.15607021.

Full text
Abstract:
SSL/TLS certificates are foundational to securing modern application and infrastructure communications. Yet despite their ubiquity, poor certificate management remains a leading cause of service disruptions, security breaches, and compliance failures. As systems become more distributed&mdash;spanning containerized workloads, service meshes, and hybrid clouds&mdash;the challenge of managing certificate lifecycles grows exponentially. Static provisioning, hardcoded secrets, and manual renewals no longer scale in environments demanding agility and automation. This article explores best practices for securely managing TLS certificates across both infrastructure and application layers. Topics include secure secret storage, automated issuance and renewal, runtime injection strategies, and integration with CI/CD pipelines. We also examine mutual TLS for east-west traffic, monitoring strategies for expiration and revocation, and tools supporting short-lived, identity-bound certificates. Drawing from industry standards and operational patterns, we present a technical guide for building resilient, scalable certificate management strategies that align with modern deployment models and evolving security requirements.
APA, Harvard, Vancouver, ISO, and other styles
46

Abdullahi, Wada, Alhaji Idi Babate, and Ali Garba Jakwa. "Cloud Computing: Technical, Non-Technical and Security Issues." International Journal of Computer Applications Technology and Research 3, no. 3 (2014): 169–75. http://dx.doi.org/10.7753/ijcatr0303.1008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zhu, Quanyan. "Technical Committee on Security and Privacy [Technical Activities]." IEEE Control Systems 44, no. 2 (2024): 16–17. http://dx.doi.org/10.1109/mcs.2024.3358560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Uffen, Jörg, and Michael H. Breitner. "Management of Technical Security Measures." International Journal of Social and Organizational Dynamics in IT 3, no. 1 (2013): 14–31. http://dx.doi.org/10.4018/ijsodit.2013010102.

Full text
Abstract:
Organizations are investing substantial resources in technical security measures that aim at preventively protecting their information assets. The way management – or information security executives – deals with potential security measures varies individually and depends on personality traits and cognitive factors. Based on the Theory of Planned Behavior, the authors examine the relationship between the personality traits of conscientiousness, neuroticism and openness with attitudes and intentions towards managing technical security measures. The highly relevant moderating role of compliance factors is also investigated. The hypothesized relationships are analyzed and validated using empirical data from a survey of 174 information security executives. Findings suggest that conscientiousness is important in determining the attitude towards the management of technical security measures. In addition, the findings indicate that when executives are confronted with information security standards or guidelines, the personality traits of conscientiousness and openness will have a stronger effect on attitude towards managing security measures than without moderators.
APA, Harvard, Vancouver, ISO, and other styles
49

Hoving, Per. "System security: The technical challenge." Computers & Security 5, no. 1 (1986): 74–79. http://dx.doi.org/10.1016/0167-4048(86)90121-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bhalla, Neelam. "Information Security: A Technical Review." IETE Technical Review 19, no. 1-2 (2002): 47–59. http://dx.doi.org/10.1080/02564602.2002.11417010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography