Academic literature on the topic 'Staff security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Staff security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Staff security"

1

Smith, Martin R. "Computer versus security staff?" Computer Law & Security Review 5, no. 3 (1989): 14–16. http://dx.doi.org/10.1016/0267-3649(89)90032-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Muhenda, Mary Basaasa, and Abraham Kule. "Perception Variances between Administrative and Academic Staff on Ethical Practices and Information Security: The Question of Students Examination Records in Public Universities in Uganda." Global Journal of Social Sciences Studies 8, no. 1 (2022): 19–26. http://dx.doi.org/10.55284/gjss.v8i1.640.

Full text
Abstract:
Investigations on the ethical practices and information security variance perceptions between academic and administrative staff were confirmed in Public Universities in Uganda. Four data collection phases included: testing the impact of ethical practices on information security among administrative staff; their ranking of factors likely to improve loyalty; academic staffs’ perception on the highly ranked factors that impact loyalty and, key informant interviews to substantiate key findings. Results confirmed loyalty as a stronger predictor of information security among administrative staff, wh
APA, Harvard, Vancouver, ISO, and other styles
3

Patterson, Patrick B., Penelope Hawe, Paul Clarke, et al. "The Worldview of Hospital Security Staff." Journal of Contemporary Ethnography 38, no. 3 (2008): 336–57. http://dx.doi.org/10.1177/0891241608318012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pounder, Chris. "Network Security staff are being overwhelmed." Computer Fraud & Security 2002, no. 3 (2002): 6. http://dx.doi.org/10.1016/s1361-3723(02)00313-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Soukour, Anas Abdoul, Laure Devendeville, Corinne Lucet, and Aziz Moukrim. "Staff scheduling in airport security service." IFAC Proceedings Volumes 45, no. 6 (2012): 1413–18. http://dx.doi.org/10.3182/20120523-3-ro-2023.00169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Korobkova, O. K., and S. A. Matsuev. "CURRENT ISSUES OF THE ORGANIZATION STAFF SECURITY." Vestnik of Khabarovsk State University of Economics and Law, no. 4(114) (November 10, 2023): 58–62. http://dx.doi.org/10.38161/2618-9526-2023-4-058-062.

Full text
Abstract:
The scientific article is devoted to the study of topical issues of employee safety in organizations. Within the framework of the research topic, the concepts of "personnel security", "shadow employment", "staff turnover" are considered. In the course of the research, a generalized classification of personnel security is proposed.
APA, Harvard, Vancouver, ISO, and other styles
7

Arefyeva, O. V., and A. M. Kovalchuk. "Safeguarding the Economic Security of an Enterprise by Encouraging Staff to Strategic Changes." PROBLEMS OF ECONOMY 4, no. 46 (2020): 126–33. http://dx.doi.org/10.32983/2222-0712-2020-4-126-133.

Full text
Abstract:
Strategic changes involve new challenges and threats to the economic security of an enterprise. Resource components of economic security, i.e., the staff and finances, remain particularly sensitive to such changes. The staff as a resource of an enterprise, its professionalism and skills is one of the main factors influencing economic security, so it is advisable to form a motivational system for staff management as a component of economic security management in the context of the enterprise strategic development. The article aims at studying the staff’s motivation to strategic change and devel
APA, Harvard, Vancouver, ISO, and other styles
8

Rowley, Elizabeth, Lauren Burns, and Gilbert Burnham. "Research Review of Nongovernmental Organizations’ Security Policies for Humanitarian Programs in War, Conflict, and Postconflict Environments." Disaster Medicine and Public Health Preparedness 7, no. 3 (2013): 241–50. http://dx.doi.org/10.1001/dmp.2010.0723.

Full text
Abstract:
AbstractObjectivesTo identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages.MethodsThe authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security
APA, Harvard, Vancouver, ISO, and other styles
9

Barton, Debra. "Building security." Early Years Educator 24, no. 10 (2024): 1–2. http://dx.doi.org/10.12968/eyed.2024.24.10.4.

Full text
Abstract:
Attachment is crucial for child development, but when a parent or carer is absent for periods of time this can be difficult to achieve. Debra Barton, EY specialist lead for the MOD Armed Forces Families & Safeguarding team, discusses the importance of EY staff building strong attachments with children from service families.
APA, Harvard, Vancouver, ISO, and other styles
10

Fuller, Sarah, Emerie Sheridan, Jacinta Tan, and Dasha Nicholls. "‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study." BMJ Open 14, no. 12 (2024): e085955. https://doi.org/10.1136/bmjopen-2024-085955.

Full text
Abstract:
ObjectiveTo gain insights into the experience, and impact, of using security staff to facilitate physical restraints for nasogastric tube feeding.DesignA cross-sectional design using 39 individual interviews, three online focus groups and three written submissions involving young people with lived experience (PWLE), parents/carers, paediatric staff and security staff involved in nasogastric feeding under restraint in paediatric settings in England. Qualitative semistructured interviews were transcribed and thematically analysed.Participants53 individuals participated: seven security staff (all
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Staff security"

1

Hellin, Katherine. "Violence in a high security psychiatric service for women : its effects on nursing staff." Thesis, University of Leicester, 1999. http://hdl.handle.net/2381/31270.

Full text
Abstract:
Seventy five nursing staff working in a high-security psychiatric service for women completed the Maslach Burnout Inventory and a measure of emotional reactions in response to one of three vignettes depicting a commonly experienced violent siutation: an attack by a patient on a patient, on a member of staff and an episode of self-harm. An attack on a member of staff was associated with more negative feelings but less Depersonalisation than an attack on a patient, and with more negative feelings than self-harm. However, staff felt more Personal Accomplishment in the case of an attack on a membe
APA, Harvard, Vancouver, ISO, and other styles
2

McAdams, Marie. "What do nursing staff in an high security hospital perceive as (traumatic) critical incidents?" Thesis, University of Reading, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mercer, Dave. "A discourse analysis of staff and patient accounts of pornography in a high-security hospital." Thesis, University of Liverpool, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.533963.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Байстрюченко, Наталія Олегівна, Наталия Олеговна Байстрюченко, Nataliia Olehivna Baistriuchenko та В. В. Кудлай. "Значення кадрової безпеки у забезпеченні економічної безпеки суб’єкта господарювання". Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43697.

Full text
Abstract:
Ефективність діяльності будь-якого суб’єкта господарювання може поставити під загрозу наявність економічних ризиків. Ризик асоціюється перш за все, з непередбачуваними, негативними умовами та ситуаціями в зовнішньому та внутрішньому середовищі підприємства, він може привести до непоправних наслідків і навіть до банкрутства. Тому необхідним є вивчення та впровадження методів економічної безпеки, що допоможуть захиститись від різних негативних чинників: діяльність конкурентів, недобросовісність контрагентів, несприятлива політики держави тощо.
APA, Harvard, Vancouver, ISO, and other styles
5

Skott, Cissi. "Trygghet för äldre på särskilt boende : En studie av hur omsorgspersonal främjar äldres upplevelse av trygghet på särskilda boenden." Thesis, Högskolan i Gävle, Avdelningen för socialt arbete och psykologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-19970.

Full text
Abstract:
The purpose of this study was to examine how retirement home staff promotes the sense of security of older persons receiving care in retirement homes. In qualitative interviews with staff the following research questions were studied: which factors are described as central for older people’s sense of security? How does retirement home staff promote security for older people in their daily work? Which potentials and difficulties is retirement home staff identifying in promoting security? Theoretical perspectives used in the analysis: the salutogenic perspective and the life-course perspective.
APA, Harvard, Vancouver, ISO, and other styles
6

Barrick, Nathan D. "For the Common Defense: The Evolution of National Security Strategy-Making Institutions & Impact on American Grand Strategy." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7739.

Full text
Abstract:
This dissertation applies a Neoclassical Realism model to examine how the evolution of United States (U.S.) national security strategy-making institutions has resulted in a path dependent accrual of autonomy and increasing influence over the formulation of American grand strategy. Once U.S. national security strategy-making institutions were created, their existence inexorably led to increasing autonomy, the creation of new strategy-making institutions, and subtle influence in shaping American grand strategy by preferential focus on a militarized foreign policy. Additionally, the more autono
APA, Harvard, Vancouver, ISO, and other styles
7

Meakin, Susan Elizabeth. "Researching an overlooked workforce in a university : catering, caretaking and securtiy." Thesis, University of Wolverhampton, 2012. http://hdl.handle.net/2436/268772.

Full text
Abstract:
The people who service the physical needs of university populations and maintain their built environment are barely acknowledged in the research into university life. An observed dissonance between university staff encountered on the ground and those appearing in the literature prompted this research into the work experience of university catering, caretaking and security staff. This thesis is based on a case study which investigated perceptions of this experience in an English university. Consideration was given to the contribution of these staff to the social and learning aspects of the inst
APA, Harvard, Vancouver, ISO, and other styles
8

Nyabando, Chiwaraidzo Judith. "An Analysis of Perceived Faculty and Staff Ccomputing Behaviors That Protect or Expose Them or Others to Information Security Attacks." Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etd/1972.

Full text
Abstract:
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either protect or expose data at academic institutions to information security attacks. This study focused on computing practices at two academic institutions: East Tennessee State University and Milligan College. Interviews with six information technology professionals and online surveys were used to assess faculty and staff members' awareness and practice of safe computing behaviors. The constant comparison method was used to analyze qualitative data. Descriptive statistics and univariate and multiv
APA, Harvard, Vancouver, ISO, and other styles
9

Moore, James Nicholas. "An examination of a possible health education and lifestyles strategy for staff of the Department of Social Security (DSS) in South Australia /." Title page, contents and synopsis only, 1990. http://web4.library.adelaide.edu.au/theses/09MO/09mom822.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mazorodze, Tasara. "HIV-related stigma amongst service staff in Grahamstown a comparison of Hi-Tec security guards and Rhodes catering in the Eastern Cape." Thesis, Rhodes University, 2011. http://hdl.handle.net/10962/d1002525.

Full text
Abstract:
Despite the acknowledged reality that HIV-related stigma is a major barrier to effective HIV prevention and treatment, and perhaps because it is complex in nature, few local empirical scales have been developed to measure stigma and to be able evaluate the impact of anti-stigma interventions. Whilst the development of two recent South African HIV-related stigma scales can be celebrated as a major breakthrough, the reliability and validity of these scales across contexts remains largely unknown. This research project employs these two local, and competing, HIV-related personal stigma scales - t
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Staff security"

1

Association, International Social Security, ed. Social security and staff training. International Social Security Association, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goodman, John C. Social security and race: Staff report. National Center for Policy Analysis, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Army War College (U.S.). Strategic Studies Institute, ed. A national security staff for the 21st century. Strategic Studies Institute, U.S. Army War College, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

National Center for Policy Analysis (U.S.), ed. Social security: Who gains? who loses? : staff report. National Center for Policy Analysis, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

University, of California Los Angeles Library. Patron relations: A manual for library staff. UCLA Libraries, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brusstar, James H. Russia's peacetime battlefield: Presidential versus General Staff military reform. National Defense University, Institute for National Strategic Studies, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, General Accounting. Social security : staff reductions and service quality: Report to Congressional reguesters. The Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Social security : staff reductions and service quality: Report to Congressional reguesters. The Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Social security : staff reductions and service quality: Report to Congressional reguesters. The Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shoemaker, Christopher C. Structure, function and the NSC staff: An officers' guide to the National Security Council. Strategic Studies Institute, U.S. Army War College, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Staff security"

1

Clarke, Joan Simeon. "The Staff Problem." In Social Security. Routledge, 2021. http://dx.doi.org/10.4324/9781003263982-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Volkamer, Melanie, Martina Angela Sasse, and Franziska Boehm. "Analysing Simulated Phishing Campaigns for Staff." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66504-3_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

(Mac) Destler, I. M. "Toward a smaller White House national security staff." In US National Security Reform. Routledge, 2018. http://dx.doi.org/10.4324/9781351171564-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmed, Imtiaz, ASM Ali Ashraf, and Niloy Ranjan Biswas. "Capacity Building of Prison Staff and CT Professionals." In SpringerBriefs in Environment, Security, Development and Peace. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-85807-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jankowski, Barbara. "Information Sharing Among Military Operational Staff: The French Officers’ Experience." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42819-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Horner, D. M. "Lieutenant-General Sir Vernon Sturdee: The Chief of the General Staff as Commander." In Routledge Library Editions: Historical Security. Routledge, 2021. https://doi.org/10.4324/b22759-98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Guk-IL, and Jonghyeon Kim. "Development of Network Cyber Attack Training Curriculum for Security Staff." In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7605-3_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Button, Mark, and Bruce George. "Why some organisations prefer in-house to contract security staff." In Crime At Work. Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1007/978-1-349-23551-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Menges, Uta, Jonas Hielscher, Annalina Buckmann, Annette Kluge, M. Angela Sasse, and Imogen Verret. "Why IT Security Needs Therapy." In Computer Security. ESORICS 2021 International Workshops. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_20.

Full text
Abstract:
AbstractOver the past decade, researchers investigating IT security from a socio-technical perspective have identified the importance of trust and collaboration between different stakeholders in an organisation as the basis for successful defence. Yet, when employees do not follow security rules, many security practitioners attribute this to them being “weak” or “careless”; many employees in turn hide current practices or planned development because they see security as “killjoys” who “come and kill our baby”. Negative language and blaming others for problems are indicators of dysfunctional re
APA, Harvard, Vancouver, ISO, and other styles
10

Padovani, Renato. "Optimisation of Patient and Staff Exposure in Interventional Radiology." In NATO Science for Peace and Security Series B: Physics and Biophysics. Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-94-007-0247-9_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Staff security"

1

R, Asha Rani N., T. Rajasri, Rvs Praveen, Dinesh Kalla, Shailesh Pramod Bendale, and Nookala Venu. "CAC Training - A Unified Cybersecurity Training Program for Military Staff." In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI). IEEE, 2025. https://doi.org/10.1109/iccsai64074.2025.11064463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miron, Claudia, Cristian Radeanu, Stefan Ilici, Dan Pintilie, and Ciprian Mateiu. "RISK ASSESSMENT AT DEMOLITION ACTIVITY OF INDUSTRIAL / CIVIL OBJECTIVES WITH THE EXPLOSIVES FOR CIVIL USES." In 24th SGEM International Multidisciplinary Scientific GeoConference 24. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/1.1/s03.47.

Full text
Abstract:
The paper presents a theoretical and practical approach to the concept of risk assessment specific for the demolition of the industrial civil objectives with the help of explosives in terms of ensuring security premises for the effects generated following the blasting demolition work of this type of constructions. Blasting realization of industrial civil objectives to be demolished involves a series of operations that generate health and safety risks to economic operator employees which are carrying out work and for people in neighborhoods and the environment. The primary goal of occupational
APA, Harvard, Vancouver, ISO, and other styles
3

Meng, Linglong, and Stefan Schaffer. "A Reporting Assistant for Railway Security Staff." In CUI '20: 2nd Conference on Conversational User Interfaces. ACM, 2020. http://dx.doi.org/10.1145/3405755.3406164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"STAFF LINE DETECTION AND REMOVAL WITH STABLE PATHS." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001937802630270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wilkinson, Christer J. "Airport Staff Access Control: Biometrics at Last?" In 2018 International Carnahan Conference on Security Technology (ICCST). IEEE, 2018. http://dx.doi.org/10.1109/ccst.2018.8585592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vlah, Maria, and Ludmila Lapitkaia. "Accounting of settlements with staff." In International student scientific conference, ISSC 2025 "Challenges of accounting for young researchers", 9th Edition. Academy of Economic Studies, 2025. https://doi.org/10.53486/issc2025.78.

Full text
Abstract:
This article will explore in detail the accounting for payroll calculations and employee-related payments in the Republic of Moldova. The topic will also cover the calculation of travel expenses and the taxation process concerning wages. Specific examples from the practice of the company "Aeroport Handling" will be considered to illustrate how these processes are implemented in a real business context. The discussion will provide insights into how payroll accounting works in Moldova, acknowledging tax and social security contributions.
APA, Harvard, Vancouver, ISO, and other styles
7

Golchevskiy, Y. V., and N. R. Oleneva. "Conducting Interactive Activities to Enhance the Information Security Culture of the Organisation's Staff." In International scientific and practical conference “Smart cities and sustainable development of regions” (SMARTGREENS 2024). Crossref, 2025. https://doi.org/10.63550/iceip.2025.1.1.063.

Full text
Abstract:
Social engineering is one of the most common threats to the information security of commercial firms, government and other organisations. Various technical and administrative protection mechanisms can be applied to reduce the risks associated with social engineering. This paper proposes an approach to designing measures to improve information security culture based on employee training and behavioural monitoring. Employees in the financial and IT sectors were tested using the proposed framework. Training and subsequent series of coordinated test attacks were used to simulate the actual activit
APA, Harvard, Vancouver, ISO, and other styles
8

Stone, Kyle, and Jan Spies. "Design and implementation of an automatic staff availability tracking system." In 2015 International Conference on Computing, Communication and Security (ICCCS). IEEE, 2015. http://dx.doi.org/10.1109/cccs.2015.7374198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jia, Lu, and Haolan Zhang. "Improving Managerial Efficiency Through Analyzing and Mining Resigned Staff Data." In 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE, 2017. http://dx.doi.org/10.1109/cis.2017.00078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mamatelashvili, O. V. "The Impact Of Corporate Management On Staff Development In The Security Strategy." In International Conference on Economic and Social Trends for Sustainability of Modern Society. European Publisher, 2020. http://dx.doi.org/10.15405/epsbs.2020.10.03.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Staff security"

1

LeCuyer, Jack A. A National Security Staff for the 21st Century. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada578549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mertz, Lynn. Career Pathways Program: Addressing Financial Security Within Your Staff. AARP Thought Leadership, 2024. http://dx.doi.org/10.26419/int.00056.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shoemaker, Christopher C. The Decisional Dilemma: Structure, Function, and the NSC (National Security Council) Staff. Defense Technical Information Center, 1989. http://dx.doi.org/10.21236/ada209736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Coleman, Katharina. Optimising national staff contributions in UN peacekeeping operations. Folke Bernadotte Academy, 2023. http://dx.doi.org/10.61880/nulo7273.

Full text
Abstract:
How can the UN optimise the contributions that locally recruited ‘national staff’ make to peacekeeping operations? Especially given intense pressure to reduce costs through ‘lighter footprints’, peacekeeping operations need to mobilise the full potential of all their personnel to accomplish mandated tasks. This includes civilian staff, of whom 61% are national staff. Missions depend on national staff both for cost savings (since national staff typically earn less than international staff) and for local expertise and access. Yet tensions arising from status inequalities between national and int
APA, Harvard, Vancouver, ISO, and other styles
5

Nikkel, Daniel J., and Robert Meisner. Right Size Determining the Staff Necessary to Sustain Simulation and Computing Capabilities for Nuclear Security. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1120911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pilkevych, Ihor, Oleg Boychenko, Nadiia Lobanchykova, Tetiana Vakaliuk, and Serhiy Semerikov. Method of Assessing the Influence of Personnel Competence on Institutional Information Security. CEUR Workshop Proceedings, 2021. http://dx.doi.org/10.31812/123456789/4374.

Full text
Abstract:
Modern types of internal threats and methods of counteracting these threats are analyzed. It is established that increasing the competence of the staff of the institution through training (education) is the most effective method of counteracting internal threats to information. A method for assessing the influence of personnel competence on institutional information security is proposed. This method takes into account violator models and information threat models that are designed for a specific institution. The method proposes to assess the competence of the staff of the institution by three
APA, Harvard, Vancouver, ISO, and other styles
7

Freed, Danielle. K4D Learning Journey Strengthens the Mainstreaming of Water Security. Institute of Development Studies, 2022. http://dx.doi.org/10.19088/k4d.2022.164.

Full text
Abstract:
This K4D Impact Story shares how a K4D’s Water Security Learning Journey supported an extensive set of activities and products to engage stakeholders and increase awareness of water security and its cross-cutting nature. Evidence indicates that the learning journey has provided a valuable vehicle for participants to deepen knowledge on the topic, share experiences, build networks, and develop their ability to integrate water security into policy and programming. This case study was made possible through the contribution of the K4D Programme team, staff at the Foreign, Commonwealth and Developm
APA, Harvard, Vancouver, ISO, and other styles
8

Szép, Viktor, Ester Sabatino, and Ramses Wessel. Developing Assessment Criteria for Security and Intelligence Cooperation in the EU. EsadeGeo. Center for Global Economy and Geopolitics, 2022. https://doi.org/10.56269/202206vs.

Full text
Abstract:
This working paper proposes a set of assessment criteria for security and intelligence cooperation at the EU level and presents the limits that prevent more effective cooperation in this field. The research team conducted interviews with experts and officials involved in this work, which lends the report rare insights into the area of security and intelligence cooperation. The working paper first provides a summary of the current institutional architecture and presents an analysis of the main bodies involved in the provision of analysis, early warning and situational awareness at the EU level,
APA, Harvard, Vancouver, ISO, and other styles
9

Steeves, Brye. Classified library critical in Lab’s Annual Assessment of weapons to U.S. President National Security Resource Center’s collections are the foundation to stockpile confidence By the National Security Research Center staff. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1773326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Atuesta, Laura, María Aulet, Yuri Soares, et al. The Implementation Challenge: Lessons From Five Citizen Security Projects. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010574.

Full text
Abstract:
Successful implementation is necessary for projects and programs to be effective. In this comparative project evaluation, OVE analyzes the effectiveness of the implementation strategy of five IDB-supported citizen security projects in Central America and the Caribbean. The evaluation uses evidence and best practices from implementation research, multisectoral work, and donor supervision as evaluative benchmarks. The findings reveal that projects showing the most successful implementation also included most of the elements identified in the specialized literature: participatory preparation lead
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!