Journal articles on the topic 'Staff security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Staff security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Smith, Martin R. "Computer versus security staff?" Computer Law & Security Review 5, no. 3 (1989): 14–16. http://dx.doi.org/10.1016/0267-3649(89)90032-0.
Full textMuhenda, Mary Basaasa, and Abraham Kule. "Perception Variances between Administrative and Academic Staff on Ethical Practices and Information Security: The Question of Students Examination Records in Public Universities in Uganda." Global Journal of Social Sciences Studies 8, no. 1 (2022): 19–26. http://dx.doi.org/10.55284/gjss.v8i1.640.
Full textPatterson, Patrick B., Penelope Hawe, Paul Clarke, et al. "The Worldview of Hospital Security Staff." Journal of Contemporary Ethnography 38, no. 3 (2008): 336–57. http://dx.doi.org/10.1177/0891241608318012.
Full textPounder, Chris. "Network Security staff are being overwhelmed." Computer Fraud & Security 2002, no. 3 (2002): 6. http://dx.doi.org/10.1016/s1361-3723(02)00313-5.
Full textSoukour, Anas Abdoul, Laure Devendeville, Corinne Lucet, and Aziz Moukrim. "Staff scheduling in airport security service." IFAC Proceedings Volumes 45, no. 6 (2012): 1413–18. http://dx.doi.org/10.3182/20120523-3-ro-2023.00169.
Full textKorobkova, O. K., and S. A. Matsuev. "CURRENT ISSUES OF THE ORGANIZATION STAFF SECURITY." Vestnik of Khabarovsk State University of Economics and Law, no. 4(114) (November 10, 2023): 58–62. http://dx.doi.org/10.38161/2618-9526-2023-4-058-062.
Full textArefyeva, O. V., and A. M. Kovalchuk. "Safeguarding the Economic Security of an Enterprise by Encouraging Staff to Strategic Changes." PROBLEMS OF ECONOMY 4, no. 46 (2020): 126–33. http://dx.doi.org/10.32983/2222-0712-2020-4-126-133.
Full textRowley, Elizabeth, Lauren Burns, and Gilbert Burnham. "Research Review of Nongovernmental Organizations’ Security Policies for Humanitarian Programs in War, Conflict, and Postconflict Environments." Disaster Medicine and Public Health Preparedness 7, no. 3 (2013): 241–50. http://dx.doi.org/10.1001/dmp.2010.0723.
Full textBarton, Debra. "Building security." Early Years Educator 24, no. 10 (2024): 1–2. http://dx.doi.org/10.12968/eyed.2024.24.10.4.
Full textFuller, Sarah, Emerie Sheridan, Jacinta Tan, and Dasha Nicholls. "‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study." BMJ Open 14, no. 12 (2024): e085955. https://doi.org/10.1136/bmjopen-2024-085955.
Full textDr., ADEDAPO Adesina Ajayi (Ph.D). "Recruitment and Job Security as Correlates of Academic Staff Productivity in Tertiary Institutions in Southwest, Nigeria." Euro Afro Studies International Journal, (EASIJ.COM), 2, no. 1 (2020): 24–33. https://doi.org/10.5281/zenodo.3969780.
Full textSollars, Marc. "Risk-based security: staff can play the defining role in securing assets." Network Security 2016, no. 9 (2016): 9–12. http://dx.doi.org/10.1016/s1353-4858(16)30087-3.
Full textKent, Katherine, Denis Visentin, Corey Peterson, et al. "Severity of Food Insecurity among Australian University Students, Professional and Academic Staff." Nutrients 14, no. 19 (2022): 3956. http://dx.doi.org/10.3390/nu14193956.
Full textEno Obi, Hilda. "Library Network Security Measures As Determinants of Archives Preservation in Public Libraries in Rivers State, Nigeria." Asian Journal of Information Science and Technology 13, no. 1 (2023): 41–48. http://dx.doi.org/10.51983/ajist-2023.13.1.3487.
Full textArik, Cheshin, Rafaeli Anat, and Eisenman Arie. "Encountering Anger in the Emergency Department: Identification, Evaluations and Responses of Staff Members to Anger Displays." Emergency Medicine International 2012 (2012): 1–5. http://dx.doi.org/10.1155/2012/603215.
Full textSaeed, Khalid Mohammed Osman. "ELEVATING INFORMATION SECURITY PRACTICES WITHIN SUDANESE HEALTHCARE ESTABLISHMENTS' STAFF." international journal of advanced research in computer science 13, no. 4 (2022): 6–8. http://dx.doi.org/10.26483/ijarcs.v13i4.6835.
Full textMcSweegan, Edward. "Lack of trained security staff delays US visas." Nature 423, no. 6936 (2003): 115–16. http://dx.doi.org/10.1038/423115c.
Full textStringer, Rob. "Council staff breach security of National ID database." Infosecurity 6, no. 2 (2009): 7–8. http://dx.doi.org/10.1016/s1754-4548(09)70017-8.
Full textBURKE, JOHN P. "The National Security Advisor and Staff: Transition Challenges." Presidential Studies Quarterly 39, no. 2 (2009): 283–321. http://dx.doi.org/10.1111/j.1741-5705.2009.03676.x.
Full textAbdulRahman, H. T., and S. O. Oladipupo. "Information Security Awareness among Non-Academic Staff in the University of Ibadan, Nigeria." Asian Journal of Computer Science and Technology 8, no. 2 (2019): 77–84. http://dx.doi.org/10.51983/ajcst-2019.8.2.2136.
Full textJURIK, NANCY C., and RUSSELL WINN. "Describing Correctional-Security Dropouts and Rejects." Criminal Justice and Behavior 14, no. 1 (1987): 5–25. http://dx.doi.org/10.1177/0093854887014001002.
Full textAyodele, Samuel Majekodunmi. "Job Security Strategy and Job Satisfaction of Non-Teaching Staff in Public Universities in Lagos State." Journal of Strategic Management 6, no. 3 (2022): 21–36. http://dx.doi.org/10.53819/81018102t4042.
Full textNaser Taha, Nasharawan, Hussam Mohammed Almasalha, and Amnah Abumqibl. "The Status Quo of Information Security from the Perspective of Information Technology Staff in Jordanian University Libraries." Journal of Information Security and Cybercrimes Research 4, no. 1 (2021): 55–80. http://dx.doi.org/10.26735/mwvl7997.
Full textOyaro, Moureen Moige, Paul Maku Gichohi, and Catherine Nzioka. "Securing Judicial Information: Assessment of Records Security in Nyahururu and Nakuru Law Courts." International Journal of Professional Practice 11, no. 5 (2023): 1–13. https://doi.org/10.71274/ijpp.v11i5.361.
Full textO'Connell, Suzanne. "Planning for school security." Headteacher Update 2020, no. 1 (2020): 18–19. http://dx.doi.org/10.12968/htup.2020.1.18.
Full textGraham, Margaret E., Michael G. Tunik, Brenna M. Farmer, et al. "Agent of Opportunity Risk Mitigation: People, Engineering, and Security Efficacy." Disaster Medicine and Public Health Preparedness 4, no. 4 (2010): 291–99. http://dx.doi.org/10.1001/dmp.2010.38.
Full textSarkisyants, A. A. "Influence of Gadget-Dependent Behavior of the Staff to Ensure Information Security." Contemporary problems of social work 1, no. 3 (2015): 85–93. http://dx.doi.org/10.17922/2412-5466-2015-1-3-85-93.
Full textMcKnight, David. "Broadcasting and the Enemy Within: Political Surveillance and the ABC, 1951–64." Media International Australia 87, no. 1 (1998): 35–48. http://dx.doi.org/10.1177/1329878x9808700107.
Full textKUPEPIN, Viacheslav, and Nadiia HRYSHCHENKO. "MOTIVATION AND CONTROL OF PERSONNEL IN THE PERSONNEL SAFETY SYSTEM OF AGRICULTURAL ENTERPRISES." Ukrainian Journal of Applied Economics 5, no. 3 (2020): 417–22. http://dx.doi.org/10.36887/2415-8453-2020-3-47.
Full textOlumoyo, A. E., O. A. Adegun, and M. A. Animasahun. "Security Matters and Academic Staff Service Delivery in Southwest, Nigerian Universities." British Journal of Education 10, no. 16 (2022): 41–50. http://dx.doi.org/10.37745/bje.2013/vol10n164150.
Full textKUREPIN, Viacheslav, and Lilia KHARCHEVNIKOVA. "Mechanisms and systems for human safety of agricultural enterprises." Actual problems of innovative economy, no. 2020/3 (June 25, 2020): 47–51. http://dx.doi.org/10.36887/2524-0455-2020-3-8.
Full textZachosova, Nataliia, Dmytro Kutsenko, Oleksii Koval, and Andrii Kovalenko. "Management of financial and economic security of critical infrastructure objects in the conditions of risks of quarantine restrictions: strategic and personnel aspects." SHS Web of Conferences 107 (2021): 02002. http://dx.doi.org/10.1051/shsconf/202110702002.
Full textAng, Shin Yin, Razali Siti Noor Asyikin Mohd, and Sie Long Kek. "OPTIMIZED PREFERENCE OF SECURITY STAFF SCHEDULING USING INTEGER LINEAR PROGRAMMING APPROACH." COMPUSOFT: An International Journal of Advanced Computer Technology 08, no. 04 (2019): 3103–11. https://doi.org/10.5281/zenodo.14823041.
Full textAbdullahi, Haruna Ishola. "Cloud Security And Electronic Transaction Security:." International Journal of Information Systems and Informatics 4, no. 2 (2023): 54–63. http://dx.doi.org/10.47747/ijisi.v4i2.1085.
Full textOtieno, Roy Ochieng’, and Elijah Onyango Standslause Odhiambo. "Impact of Electronic Cargo Tracking Systems on Cargo Security: A Case of the Inland Container Depot at Embakasi, Nairobi, Kenya." African Quarterly Social Science Review 2, no. 2 (2025): 45–54. https://doi.org/10.51867/aqssr.2.2.5.
Full textNasreen, Irfana, Kashif Rathore, and Kashif Ali. "WORKPLACE SECURITY;." Professional Medical Journal 24, no. 01 (2017): 150–65. http://dx.doi.org/10.29309/tpmj/2017.24.01.422.
Full textChebbe, Gabriel, Edwin Mkhganga, Robert Mutua Murungi, Lawrence Mwenda Muriira, and Patricia Kavuli Ndambuki. "Assessment of the Effectiveness of Non-Technical Approach to Cyber Security Management for NLIMS System in the Ministry of Lands and Physical Planning, in Kenya." International Journal of Professional Practice 12, no. 3 (2024): 15–30. https://doi.org/10.71274/ijpp.v12i3.389.
Full textLipley, Nick. "Survey on use of bank staff reveals poor security." Nursing Standard 15, no. 6 (2000): 7. http://dx.doi.org/10.7748/ns.15.6.7.s13.
Full textMAXIMOVA, Elena Alexandrovna, Anatoly Mikhaylovich TSYBULIN, Marina Nikolaevna SVISCHEVA, and Ekaterina Alexandrovna VITENBURG. "STAFF PERFORMANCE CONTROL AND SECURITY OF CORPORATE INFORMATION RESOURCES." Historical and social-educational ideas 6, no. 6_1 (2015): 200. http://dx.doi.org/10.17748/2075-9908-2014-6-6_1-200-203.
Full textWood, Charles Cresson. "How many information security staff people should you have?" Computers & Security 9, no. 5 (1990): 395–402. http://dx.doi.org/10.1016/0167-4048(90)90069-6.
Full textAbo Salih, Salwa, Safaa El Demerdash, Samer Ahmed, and Seham Mahmoud. "Nursing Staff Perception of Toxic Leadership and Job Security." Tanta Scientific Nursing Journal 29, no. 2 (2023): 101–13. http://dx.doi.org/10.21608/tsnj.2023.298499.
Full textBeryl, R., and B. Völlm. "Attitudes to personality disorder of staff working in high-security and medium-security hospitals." Personality and Mental Health 12, no. 1 (2017): 25–37. http://dx.doi.org/10.1002/pmh.1396.
Full textNguyen, Thai Hung, Hang Nguyet Van Nguyen, Van Sau Tran, and Hai Hoang. "KNOWLEDGE TOWARDS THE PREVENTION OF SURGICAL SITE INFECTION AND SOME ASSOCIATED FACTORS AMONG MEDICAL STAFF WORKING AT 19-8 HOSPITAL, MILITARY OF PUBLIC SECURITY IN 2020." VietNam Military Medical Unisversity 49, no. 5 (2024): 209–20. http://dx.doi.org/10.56535/jmpm.v49i5.817.
Full textBrugger, Patrick. "ICRC operational security: staff safety in armed conflict and internal violence." International Review of the Red Cross 91, no. 874 (2009): 431–45. http://dx.doi.org/10.1017/s1816383109990075.
Full textCahyanto, Hafid, Tanto G. Sumarsono, and Mokhamad Natsir. "Impact of Ability, Motivation and Work Discipline on Staff Performance." Innovation Business Management and Accounting Journal 3, no. 1 (2024): 112–21. https://doi.org/10.56070/ibmaj.2024.014.
Full textSrikonda, Khalid Ramesh. "Weak Link of University Library: Knowledge Protection and Reader Protection." Journal of Social Science and Humanities 7, no. 3 (2025): 82–84. https://doi.org/10.53469/jssh.2025.7(03).15.
Full textKorol, Inna Volodymyrivna, Maksym Anatoliiovych Slatvinskyi, and Hanna Mykolaivna Chyrva. "THEORETICAL AND METHODOLOGICAL FUNDAMENTALS OF THE STAFF COMPETITIVENESS MANAGEMENT IN PERSONNEL SECURITY ASPECT." SCIENTIFIC BULLETIN OF POLISSIA 1, no. 2(14) (2018): 173–79. http://dx.doi.org/10.25140/2410-9576-2018-2-2(14)-173-179.
Full textTrim, Peter R. J., and Yang-Im Lee. "The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement." Big Data and Cognitive Computing 5, no. 3 (2021): 32. http://dx.doi.org/10.3390/bdcc5030032.
Full textZvaková, Zuzana, and Martin Boroš. "Systém odbornej prípravy pracovníkov súkromných bezpečnostných služieb." Krízový manažment 23, no. 1 (2024): 57–61. https://doi.org/10.26552/krm.c.2024.1.57-61.
Full textPanchenko, Volodymyr. "EVALUATION OF COMPLEX INDICATOR OF ID-PROFILES OF ENTERPRISE STAFF: ECONOMIC APPROACH." ECONOMICS, FINANCE AND MANAGEMENT REVIEW, no. 3 (October 1, 2020): 103–13. http://dx.doi.org/10.36690/2674-5208-2020-3-103.
Full text