Academic literature on the topic 'Staff security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Staff security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Staff security"
Smith, Martin R. "Computer versus security staff?" Computer Law & Security Review 5, no. 3 (1989): 14–16. http://dx.doi.org/10.1016/0267-3649(89)90032-0.
Full textMuhenda, Mary Basaasa, and Abraham Kule. "Perception Variances between Administrative and Academic Staff on Ethical Practices and Information Security: The Question of Students Examination Records in Public Universities in Uganda." Global Journal of Social Sciences Studies 8, no. 1 (2022): 19–26. http://dx.doi.org/10.55284/gjss.v8i1.640.
Full textPatterson, Patrick B., Penelope Hawe, Paul Clarke, et al. "The Worldview of Hospital Security Staff." Journal of Contemporary Ethnography 38, no. 3 (2008): 336–57. http://dx.doi.org/10.1177/0891241608318012.
Full textPounder, Chris. "Network Security staff are being overwhelmed." Computer Fraud & Security 2002, no. 3 (2002): 6. http://dx.doi.org/10.1016/s1361-3723(02)00313-5.
Full textSoukour, Anas Abdoul, Laure Devendeville, Corinne Lucet, and Aziz Moukrim. "Staff scheduling in airport security service." IFAC Proceedings Volumes 45, no. 6 (2012): 1413–18. http://dx.doi.org/10.3182/20120523-3-ro-2023.00169.
Full textKorobkova, O. K., and S. A. Matsuev. "CURRENT ISSUES OF THE ORGANIZATION STAFF SECURITY." Vestnik of Khabarovsk State University of Economics and Law, no. 4(114) (November 10, 2023): 58–62. http://dx.doi.org/10.38161/2618-9526-2023-4-058-062.
Full textArefyeva, O. V., and A. M. Kovalchuk. "Safeguarding the Economic Security of an Enterprise by Encouraging Staff to Strategic Changes." PROBLEMS OF ECONOMY 4, no. 46 (2020): 126–33. http://dx.doi.org/10.32983/2222-0712-2020-4-126-133.
Full textRowley, Elizabeth, Lauren Burns, and Gilbert Burnham. "Research Review of Nongovernmental Organizations’ Security Policies for Humanitarian Programs in War, Conflict, and Postconflict Environments." Disaster Medicine and Public Health Preparedness 7, no. 3 (2013): 241–50. http://dx.doi.org/10.1001/dmp.2010.0723.
Full textBarton, Debra. "Building security." Early Years Educator 24, no. 10 (2024): 1–2. http://dx.doi.org/10.12968/eyed.2024.24.10.4.
Full textFuller, Sarah, Emerie Sheridan, Jacinta Tan, and Dasha Nicholls. "‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study." BMJ Open 14, no. 12 (2024): e085955. https://doi.org/10.1136/bmjopen-2024-085955.
Full textDissertations / Theses on the topic "Staff security"
Hellin, Katherine. "Violence in a high security psychiatric service for women : its effects on nursing staff." Thesis, University of Leicester, 1999. http://hdl.handle.net/2381/31270.
Full textMcAdams, Marie. "What do nursing staff in an high security hospital perceive as (traumatic) critical incidents?" Thesis, University of Reading, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394208.
Full textMercer, Dave. "A discourse analysis of staff and patient accounts of pornography in a high-security hospital." Thesis, University of Liverpool, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.533963.
Full textБайстрюченко, Наталія Олегівна, Наталия Олеговна Байстрюченко, Nataliia Olehivna Baistriuchenko та В. В. Кудлай. "Значення кадрової безпеки у забезпеченні економічної безпеки суб’єкта господарювання". Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43697.
Full textSkott, Cissi. "Trygghet för äldre på särskilt boende : En studie av hur omsorgspersonal främjar äldres upplevelse av trygghet på särskilda boenden." Thesis, Högskolan i Gävle, Avdelningen för socialt arbete och psykologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-19970.
Full textBarrick, Nathan D. "For the Common Defense: The Evolution of National Security Strategy-Making Institutions & Impact on American Grand Strategy." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7739.
Full textMeakin, Susan Elizabeth. "Researching an overlooked workforce in a university : catering, caretaking and securtiy." Thesis, University of Wolverhampton, 2012. http://hdl.handle.net/2436/268772.
Full textNyabando, Chiwaraidzo Judith. "An Analysis of Perceived Faculty and Staff Ccomputing Behaviors That Protect or Expose Them or Others to Information Security Attacks." Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etd/1972.
Full textMoore, James Nicholas. "An examination of a possible health education and lifestyles strategy for staff of the Department of Social Security (DSS) in South Australia /." Title page, contents and synopsis only, 1990. http://web4.library.adelaide.edu.au/theses/09MO/09mom822.pdf.
Full textMazorodze, Tasara. "HIV-related stigma amongst service staff in Grahamstown a comparison of Hi-Tec security guards and Rhodes catering in the Eastern Cape." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1002525.
Full textBooks on the topic "Staff security"
Association, International Social Security, ed. Social security and staff training. International Social Security Association, 1985.
Find full textGoodman, John C. Social security and race: Staff report. National Center for Policy Analysis, 1987.
Find full textArmy War College (U.S.). Strategic Studies Institute, ed. A national security staff for the 21st century. Strategic Studies Institute, U.S. Army War College, 2012.
Find full textNational Center for Policy Analysis (U.S.), ed. Social security: Who gains? who loses? : staff report. National Center for Policy Analysis, 1987.
Find full textUniversity, of California Los Angeles Library. Patron relations: A manual for library staff. UCLA Libraries, 1986.
Find full textBrusstar, James H. Russia's peacetime battlefield: Presidential versus General Staff military reform. National Defense University, Institute for National Strategic Studies, 1998.
Find full textOffice, General Accounting. Social security : staff reductions and service quality: Report to Congressional reguesters. The Office, 1988.
Find full textOffice, General Accounting. Social security : staff reductions and service quality: Report to Congressional reguesters. The Office, 1988.
Find full textOffice, General Accounting. Social security : staff reductions and service quality: Report to Congressional reguesters. The Office, 1988.
Find full textShoemaker, Christopher C. Structure, function and the NSC staff: An officers' guide to the National Security Council. Strategic Studies Institute, U.S. Army War College, 1989.
Find full textBook chapters on the topic "Staff security"
Clarke, Joan Simeon. "The Staff Problem." In Social Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003263982-17.
Full textVolkamer, Melanie, Martina Angela Sasse, and Franziska Boehm. "Analysing Simulated Phishing Campaigns for Staff." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3_19.
Full text(Mac) Destler, I. M. "Toward a smaller White House national security staff." In US National Security Reform. Routledge, 2018. http://dx.doi.org/10.4324/9781351171564-7.
Full textAhmed, Imtiaz, ASM Ali Ashraf, and Niloy Ranjan Biswas. "Capacity Building of Prison Staff and CT Professionals." In SpringerBriefs in Environment, Security, Development and Peace. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-85807-9_4.
Full textJankowski, Barbara. "Information Sharing Among Military Operational Staff: The French Officers’ Experience." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42819-2_5.
Full textHorner, D. M. "Lieutenant-General Sir Vernon Sturdee: The Chief of the General Staff as Commander." In Routledge Library Editions: Historical Security. Routledge, 2021. https://doi.org/10.4324/b22759-98.
Full textKim, Guk-IL, and Jonghyeon Kim. "Development of Network Cyber Attack Training Curriculum for Security Staff." In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7605-3_35.
Full textButton, Mark, and Bruce George. "Why some organisations prefer in-house to contract security staff." In Crime At Work. Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1007/978-1-349-23551-3_15.
Full textMenges, Uta, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen Verret. "Why IT Security Needs Therapy." In Computer Security. ESORICS 2021 International Workshops. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_20.
Full textPadovani, Renato. "Optimisation of Patient and Staff Exposure in Interventional Radiology." In NATO Science for Peace and Security Series B: Physics and Biophysics. Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-94-007-0247-9_20.
Full textConference papers on the topic "Staff security"
R, Asha Rani N., T. Rajasri, Rvs Praveen, Dinesh Kalla, Shailesh Pramod Bendale, and Nookala Venu. "CAC Training - A Unified Cybersecurity Training Program for Military Staff." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064463.
Full textMiron, Claudia, Cristian Radeanu, Stefan Ilici, Dan Pintilie, and Ciprian Mateiu. "RISK ASSESSMENT AT DEMOLITION ACTIVITY OF INDUSTRIAL / CIVIL OBJECTIVES WITH THE EXPLOSIVES FOR CIVIL USES." In 24th SGEM International Multidisciplinary Scientific GeoConference 24. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/1.1/s03.47.
Full textMeng, Linglong, and Stefan Schaffer. "A Reporting Assistant for Railway Security Staff." In CUI '20: 2nd Conference on Conversational User Interfaces. ACM, 2020. http://dx.doi.org/10.1145/3405755.3406164.
Full text"STAFF LINE DETECTION AND REMOVAL WITH STABLE PATHS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001937802630270.
Full textWilkinson, Christer J. "Airport Staff Access Control: Biometrics at Last?" In 2018 International Carnahan Conference on Security Technology (ICCST). IEEE, 2018. http://dx.doi.org/10.1109/ccst.2018.8585592.
Full textVlah, Maria, and Ludmila Lapitkaia. "Accounting of settlements with staff." In International student scientific conference, ISSC 2025 "Challenges of accounting for young researchers", 9th Edition. Academy of Economic Studies, 2025. https://doi.org/10.53486/issc2025.78.
Full textGolchevskiy, Y. V., and N. R. Oleneva. "Conducting Interactive Activities to Enhance the Information Security Culture of the Organisation's Staff." In International scientific and practical conference “Smart cities and sustainable development of regions” (SMARTGREENS 2024). Crossref, 2025. https://doi.org/10.63550/iceip.2025.1.1.063.
Full textStone, Kyle, and Jan Spies. "Design and implementation of an automatic staff availability tracking system." In 2015 International Conference on Computing, Communication and Security (ICCCS). IEEE, 2015. http://dx.doi.org/10.1109/cccs.2015.7374198.
Full textJia, Lu, and Haolan Zhang. "Improving Managerial Efficiency Through Analyzing and Mining Resigned Staff Data." In 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE, 2017. http://dx.doi.org/10.1109/cis.2017.00078.
Full textMamatelashvili, O. V. "The Impact Of Corporate Management On Staff Development In The Security Strategy." In International Conference on Economic and Social Trends for Sustainability of Modern Society. European Publisher, 2020. http://dx.doi.org/10.15405/epsbs.2020.10.03.7.
Full textReports on the topic "Staff security"
LeCuyer, Jack A. A National Security Staff for the 21st Century. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada578549.
Full textMertz, Lynn. Career Pathways Program: Addressing Financial Security Within Your Staff. AARP Thought Leadership, 2024. http://dx.doi.org/10.26419/int.00056.013.
Full textShoemaker, Christopher C. The Decisional Dilemma: Structure, Function, and the NSC (National Security Council) Staff. Defense Technical Information Center, 1989. http://dx.doi.org/10.21236/ada209736.
Full textColeman, Katharina. Optimising national staff contributions in UN peacekeeping operations. Folke Bernadotte Academy, 2023. http://dx.doi.org/10.61880/nulo7273.
Full textNikkel, Daniel J., and Robert Meisner. Right Size Determining the Staff Necessary to Sustain Simulation and Computing Capabilities for Nuclear Security. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1120911.
Full textPilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk, and Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.31812/123456789/4374.
Full textFreed, Danielle. K4D Learning Journey Strengthens the Mainstreaming of Water Security. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.164.
Full textSzép, Viktor, Ester Sabatino, and Ramses Wessel. Developing Assessment Criteria for Security and Intelligence Cooperation in the EU. EsadeGeo. Center for Global Economy and Geopolitics, 2022. https://doi.org/10.56269/202206vs.
Full textSteeves, Brye. Classified library critical in Lab’s Annual Assessment of weapons to U.S. President National Security Resource Center’s collections are the foundation to stockpile confidence By the National Security Research Center staff. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1773326.
Full textAtuesta, Laura, María Aulet, Yuri Soares, et al. The Implementation Challenge: Lessons From Five Citizen Security Projects. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010574.
Full text