To see the other types of publications on this topic, follow the link: Staff security.

Journal articles on the topic 'Staff security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Staff security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Smith, Martin R. "Computer versus security staff?" Computer Law & Security Review 5, no. 3 (1989): 14–16. http://dx.doi.org/10.1016/0267-3649(89)90032-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Muhenda, Mary Basaasa, and Abraham Kule. "Perception Variances between Administrative and Academic Staff on Ethical Practices and Information Security: The Question of Students Examination Records in Public Universities in Uganda." Global Journal of Social Sciences Studies 8, no. 1 (2022): 19–26. http://dx.doi.org/10.55284/gjss.v8i1.640.

Full text
Abstract:
Investigations on the ethical practices and information security variance perceptions between academic and administrative staff were confirmed in Public Universities in Uganda. Four data collection phases included: testing the impact of ethical practices on information security among administrative staff; their ranking of factors likely to improve loyalty; academic staffs’ perception on the highly ranked factors that impact loyalty and, key informant interviews to substantiate key findings. Results confirmed loyalty as a stronger predictor of information security among administrative staff, wh
APA, Harvard, Vancouver, ISO, and other styles
3

Patterson, Patrick B., Penelope Hawe, Paul Clarke, et al. "The Worldview of Hospital Security Staff." Journal of Contemporary Ethnography 38, no. 3 (2008): 336–57. http://dx.doi.org/10.1177/0891241608318012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pounder, Chris. "Network Security staff are being overwhelmed." Computer Fraud & Security 2002, no. 3 (2002): 6. http://dx.doi.org/10.1016/s1361-3723(02)00313-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Soukour, Anas Abdoul, Laure Devendeville, Corinne Lucet, and Aziz Moukrim. "Staff scheduling in airport security service." IFAC Proceedings Volumes 45, no. 6 (2012): 1413–18. http://dx.doi.org/10.3182/20120523-3-ro-2023.00169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Korobkova, O. K., and S. A. Matsuev. "CURRENT ISSUES OF THE ORGANIZATION STAFF SECURITY." Vestnik of Khabarovsk State University of Economics and Law, no. 4(114) (November 10, 2023): 58–62. http://dx.doi.org/10.38161/2618-9526-2023-4-058-062.

Full text
Abstract:
The scientific article is devoted to the study of topical issues of employee safety in organizations. Within the framework of the research topic, the concepts of "personnel security", "shadow employment", "staff turnover" are considered. In the course of the research, a generalized classification of personnel security is proposed.
APA, Harvard, Vancouver, ISO, and other styles
7

Arefyeva, O. V., and A. M. Kovalchuk. "Safeguarding the Economic Security of an Enterprise by Encouraging Staff to Strategic Changes." PROBLEMS OF ECONOMY 4, no. 46 (2020): 126–33. http://dx.doi.org/10.32983/2222-0712-2020-4-126-133.

Full text
Abstract:
Strategic changes involve new challenges and threats to the economic security of an enterprise. Resource components of economic security, i.e., the staff and finances, remain particularly sensitive to such changes. The staff as a resource of an enterprise, its professionalism and skills is one of the main factors influencing economic security, so it is advisable to form a motivational system for staff management as a component of economic security management in the context of the enterprise strategic development. The article aims at studying the staff’s motivation to strategic change and devel
APA, Harvard, Vancouver, ISO, and other styles
8

Rowley, Elizabeth, Lauren Burns, and Gilbert Burnham. "Research Review of Nongovernmental Organizations’ Security Policies for Humanitarian Programs in War, Conflict, and Postconflict Environments." Disaster Medicine and Public Health Preparedness 7, no. 3 (2013): 241–50. http://dx.doi.org/10.1001/dmp.2010.0723.

Full text
Abstract:
AbstractObjectivesTo identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages.MethodsThe authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security
APA, Harvard, Vancouver, ISO, and other styles
9

Barton, Debra. "Building security." Early Years Educator 24, no. 10 (2024): 1–2. http://dx.doi.org/10.12968/eyed.2024.24.10.4.

Full text
Abstract:
Attachment is crucial for child development, but when a parent or carer is absent for periods of time this can be difficult to achieve. Debra Barton, EY specialist lead for the MOD Armed Forces Families & Safeguarding team, discusses the importance of EY staff building strong attachments with children from service families.
APA, Harvard, Vancouver, ISO, and other styles
10

Fuller, Sarah, Emerie Sheridan, Jacinta Tan, and Dasha Nicholls. "‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study." BMJ Open 14, no. 12 (2024): e085955. https://doi.org/10.1136/bmjopen-2024-085955.

Full text
Abstract:
ObjectiveTo gain insights into the experience, and impact, of using security staff to facilitate physical restraints for nasogastric tube feeding.DesignA cross-sectional design using 39 individual interviews, three online focus groups and three written submissions involving young people with lived experience (PWLE), parents/carers, paediatric staff and security staff involved in nasogastric feeding under restraint in paediatric settings in England. Qualitative semistructured interviews were transcribed and thematically analysed.Participants53 individuals participated: seven security staff (all
APA, Harvard, Vancouver, ISO, and other styles
11

Dr., ADEDAPO Adesina Ajayi (Ph.D). "Recruitment and Job Security as Correlates of Academic Staff Productivity in Tertiary Institutions in Southwest, Nigeria." Euro Afro Studies International Journal, (EASIJ.COM), 2, no. 1 (2020): 24–33. https://doi.org/10.5281/zenodo.3969780.

Full text
Abstract:
The study examined recruitment and job security as correlates of academic staff productivity in tertiary institutions in Southwest, Nigeria. The descriptive research design of the survey type was adopted in the study. The population consisted of academic staff of the public tertiary institutions (Universities, Polytechnics and Colleges of Education) in Southwest, Nigeria. The sample for this study consisted of 1324 academic staff selected from 12 public federal and state tertiary institutions in the Southwest, Nigeria. Multi – stage sampling procedure was used in the selection of the sam
APA, Harvard, Vancouver, ISO, and other styles
12

Sollars, Marc. "Risk-based security: staff can play the defining role in securing assets." Network Security 2016, no. 9 (2016): 9–12. http://dx.doi.org/10.1016/s1353-4858(16)30087-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kent, Katherine, Denis Visentin, Corey Peterson, et al. "Severity of Food Insecurity among Australian University Students, Professional and Academic Staff." Nutrients 14, no. 19 (2022): 3956. http://dx.doi.org/10.3390/nu14193956.

Full text
Abstract:
Assessments of the severity of food insecurity within Australian university students are lacking, and the experience of food insecurity in Australian university staff is unknown. A cross-sectional online survey in March 2022 aimed to characterize the severity of food insecurity in students, professional and academic staff at the University of Tasmania (UTAS). The Household Food Security Survey Module six-item short form assessed food security status in addition to seven demographic and education characteristics for students and six demographic and employment characteristics for staff. Particip
APA, Harvard, Vancouver, ISO, and other styles
14

Eno Obi, Hilda. "Library Network Security Measures As Determinants of Archives Preservation in Public Libraries in Rivers State, Nigeria." Asian Journal of Information Science and Technology 13, no. 1 (2023): 41–48. http://dx.doi.org/10.51983/ajist-2023.13.1.3487.

Full text
Abstract:
This study examined available library network security measures as determinants of archives preservation in public libraries in Rivers state. The descriptive survey design was adopted for this study. The target population of the study comprised 514 library staff drawn from Rivers State library board and staff from Jubilee library Port Harcourt. The sample size for this study was 399 library staff comprising 227 staff from Rivers state library board and 172 library staff from Jubilee library Port Harcourt. An instrument titled library network security measures for archives preservation question
APA, Harvard, Vancouver, ISO, and other styles
15

Arik, Cheshin, Rafaeli Anat, and Eisenman Arie. "Encountering Anger in the Emergency Department: Identification, Evaluations and Responses of Staff Members to Anger Displays." Emergency Medicine International 2012 (2012): 1–5. http://dx.doi.org/10.1155/2012/603215.

Full text
Abstract:
Background. Anger manifestations in emergency departments (EDs) occur daily, interrupting workflow and exposing staff to risk.Objectives. How staff assess and recognize patients’ angry outbursts in EDs and elucidate responses to anger expressions, while considering effects of institution guidelines.Methods. Observations of staff patient interaction in EDs and personal interviews of staff (n=38) were conducted. Two questionnaires were administered (n=80&n=144). Assessment was based mainly on regression statistic tests.Results. Staff recognizes two types of anger displays. Magnitude of anger
APA, Harvard, Vancouver, ISO, and other styles
16

Saeed, Khalid Mohammed Osman. "ELEVATING INFORMATION SECURITY PRACTICES WITHIN SUDANESE HEALTHCARE ESTABLISHMENTS' STAFF." international journal of advanced research in computer science 13, no. 4 (2022): 6–8. http://dx.doi.org/10.26483/ijarcs.v13i4.6835.

Full text
Abstract:
: In today’s digital era healthcare establishments find information technologies invaluable in daily tasks. The paper strongly based upon a research that is currently being conducted by the author and according to the results from the research survey only 20% of healthcare establishments in Sudan has security initiatives for their employees and make use of electronic security systems or even physical instruments to protect their assets and patients’ information, whilst on the contrary, 80% have no security measures or any security policies. This is due to there is a lack of academic and profes
APA, Harvard, Vancouver, ISO, and other styles
17

McSweegan, Edward. "Lack of trained security staff delays US visas." Nature 423, no. 6936 (2003): 115–16. http://dx.doi.org/10.1038/423115c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Stringer, Rob. "Council staff breach security of National ID database." Infosecurity 6, no. 2 (2009): 7–8. http://dx.doi.org/10.1016/s1754-4548(09)70017-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

BURKE, JOHN P. "The National Security Advisor and Staff: Transition Challenges." Presidential Studies Quarterly 39, no. 2 (2009): 283–321. http://dx.doi.org/10.1111/j.1741-5705.2009.03676.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

AbdulRahman, H. T., and S. O. Oladipupo. "Information Security Awareness among Non-Academic Staff in the University of Ibadan, Nigeria." Asian Journal of Computer Science and Technology 8, no. 2 (2019): 77–84. http://dx.doi.org/10.51983/ajcst-2019.8.2.2136.

Full text
Abstract:
This study applied the established factors from the existing literatures on information security awareness to investigate information security awareness among non-academic staff in the University of Ibadan, Nigeria. The objectives of this study are; to identify the factors that influence information security awareness and to determine the level of information security awareness among non-academic staff. This study employed a survey design. Stratified random sampling technique was utilized to select the respondents for the study. The study participants consist of non-academic staff in the Unive
APA, Harvard, Vancouver, ISO, and other styles
21

JURIK, NANCY C., and RUSSELL WINN. "Describing Correctional-Security Dropouts and Rejects." Criminal Justice and Behavior 14, no. 1 (1987): 5–25. http://dx.doi.org/10.1177/0093854887014001002.

Full text
Abstract:
High turnover among correctional workers is a chronic problem in today's prisons. Despite the concern surrounding this issue, there is little empirical research that deals with the instability of prison staffs. This article attempts to identify the major predictors of correctional officer turnover in one minimum-medium security prison in the western United States. Multivariate discriminant analyses suggest that three factors are of primary importance in distinguishing continuing from terminating officers—race, opportunities to influence institutional policy decisions, and most important, satis
APA, Harvard, Vancouver, ISO, and other styles
22

Ayodele, Samuel Majekodunmi. "Job Security Strategy and Job Satisfaction of Non-Teaching Staff in Public Universities in Lagos State." Journal of Strategic Management 6, no. 3 (2022): 21–36. http://dx.doi.org/10.53819/81018102t4042.

Full text
Abstract:
As institutions’ global environment becomes increasingly complex and inconsistent, the non-teaching staff agitations get intensified, thus, today’s institutions require dedicated focus. In the light of this, it is needful to identify and evaluate the issue of non-teaching staff agitations. Interestingly, studies are not forthcoming in Nigeria to address the above concern. Thus, this study examined job security strategy and job satisfaction of non-teaching staff in the public universities in Lagos State. The study used a mixed-method, and the population consisted of 4,800 non-teaching staff. Th
APA, Harvard, Vancouver, ISO, and other styles
23

Naser Taha, Nasharawan, Hussam Mohammed Almasalha, and Amnah Abumqibl. "The Status Quo of Information Security from the Perspective of Information Technology Staff in Jordanian University Libraries." Journal of Information Security and Cybercrimes Research 4, no. 1 (2021): 55–80. http://dx.doi.org/10.26735/mwvl7997.

Full text
Abstract:
This study aims to explore the status quo of information security from the perspective of information technology (IT) staff in Jordanian university libraries and to discuss the most prominent difficulties they face. Moreover, it aims to identify the effect of the variables (years of experience, type of university, job level, and specialization) on the staff estimation of the status quo of information security and the difficulties they face. The study population consisted of all (96) staff members of the IT departments in the libraries of public and private Jordanian universities for the academ
APA, Harvard, Vancouver, ISO, and other styles
24

Oyaro, Moureen Moige, Paul Maku Gichohi, and Catherine Nzioka. "Securing Judicial Information: Assessment of Records Security in Nyahururu and Nakuru Law Courts." International Journal of Professional Practice 11, no. 5 (2023): 1–13. https://doi.org/10.71274/ijpp.v11i5.361.

Full text
Abstract:
Records play an integral role in the administration of justice and overall protection of human rights. Court records provide information, testimonies and evidence about cases presented; thereby, impacting the promptness and fairness of judgments rendered by judicial officials. Nonetheless, security breaches in handling of court records have resulted in the occurrence of missing files and inadvertent exposure of confidential information. These breaches have led to delays and significantly impacted the efficient administration of justice. This study examined the measures put in place to secure r
APA, Harvard, Vancouver, ISO, and other styles
25

O'Connell, Suzanne. "Planning for school security." Headteacher Update 2020, no. 1 (2020): 18–19. http://dx.doi.org/10.12968/htup.2020.1.18.

Full text
Abstract:
Headteachers are very much aware of the need to protect pupils and staff. However, navigating the guidance and legal obligations can be difficult. Suzanne O'Connell looks at new online advice to help those responsible for policy and practice
APA, Harvard, Vancouver, ISO, and other styles
26

Graham, Margaret E., Michael G. Tunik, Brenna M. Farmer, et al. "Agent of Opportunity Risk Mitigation: People, Engineering, and Security Efficacy." Disaster Medicine and Public Health Preparedness 4, no. 4 (2010): 291–99. http://dx.doi.org/10.1001/dmp.2010.38.

Full text
Abstract:
ABSTRACTBackground: Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk.Methods: Qualita
APA, Harvard, Vancouver, ISO, and other styles
27

Sarkisyants, A. A. "Influence of Gadget-Dependent Behavior of the Staff to Ensure Information Security." Contemporary problems of social work 1, no. 3 (2015): 85–93. http://dx.doi.org/10.17922/2412-5466-2015-1-3-85-93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

McKnight, David. "Broadcasting and the Enemy Within: Political Surveillance and the ABC, 1951–64." Media International Australia 87, no. 1 (1998): 35–48. http://dx.doi.org/10.1177/1329878x9808700107.

Full text
Abstract:
For many years, Australia's internal securtity agency, ASIO, ran security checks on potential and actual ABC staff and monitored ABC radio and TV broadcasts, noting examples of left-wing influence. This was done with the cooperation of ABC senior management and the encouragement of the conservative federal government. These facts, long suspected, are now confirmed by the use of recently released archives which give specific instances of security surveillance and vetting.
APA, Harvard, Vancouver, ISO, and other styles
29

KUPEPIN, Viacheslav, and Nadiia HRYSHCHENKO. "MOTIVATION AND CONTROL OF PERSONNEL IN THE PERSONNEL SAFETY SYSTEM OF AGRICULTURAL ENTERPRISES." Ukrainian Journal of Applied Economics 5, no. 3 (2020): 417–22. http://dx.doi.org/10.36887/2415-8453-2020-3-47.

Full text
Abstract:
Introduction. Improving the process of staff motivation in order to increase staff loyalty is an important step in the context of ensuring personnel safety. Thus, an effective system of intangible motivation allows to reduce the rate of fluidity of vapors, gives a sense of significance of each member of the team for everything, supports. Loyalty - a set of measures to establish a positive attitude of employees to the employer. From what the employee of the enterprise feels, garbage or a part of a joint business, a replaceable "cog" or a respectable one depends the functioning of the enterprise
APA, Harvard, Vancouver, ISO, and other styles
30

Olumoyo, A. E., O. A. Adegun, and M. A. Animasahun. "Security Matters and Academic Staff Service Delivery in Southwest, Nigerian Universities." British Journal of Education 10, no. 16 (2022): 41–50. http://dx.doi.org/10.37745/bje.2013/vol10n164150.

Full text
Abstract:
The study examined the relationship between security matters and academic staff service delivery in Southwest Nigeria universities. It determined the levels of academic staff service delivery and the level of security in Southwest Nigeria universities. The study adopted the descriptive survey research and correlational research designs. The population of the study comprised of all the 8724 academic staff in all the 18 Southwest Nigeria universities. The sample for this study was 880 respondents; comprising 800 academic staff and 80 heads of departments from 8 universities in four states in Sou
APA, Harvard, Vancouver, ISO, and other styles
31

KUREPIN, Viacheslav, and Lilia KHARCHEVNIKOVA. "Mechanisms and systems for human safety of agricultural enterprises." Actual problems of innovative economy, no. 2020/3 (June 25, 2020): 47–51. http://dx.doi.org/10.36887/2524-0455-2020-3-8.

Full text
Abstract:
Introduction. In accordance with modern trends, which are characterized by variability and unpredictability of the external and internal environment, it is important to use adapted and flexible management tools that will be aimed at ensur-ing and guaranteeing the economic security of the enterprise. Given the fact that personnel security remains the main ele-ment of the security system, because the staff is involved in all business processes at the enterprise, the issues of its formation and provision in changing business conditions become relevant. The purpose of the article is to develop and
APA, Harvard, Vancouver, ISO, and other styles
32

Zachosova, Nataliia, Dmytro Kutsenko, Oleksii Koval, and Andrii Kovalenko. "Management of financial and economic security of critical infrastructure objects in the conditions of risks of quarantine restrictions: strategic and personnel aspects." SHS Web of Conferences 107 (2021): 02002. http://dx.doi.org/10.1051/shsconf/202110702002.

Full text
Abstract:
The purpose of the study was to develop theoretical and methodological background and to make practical offers for solving the problem of financial and economic security management of critical infrastructure in terms of personnel and strategic aspects. The list of reasons and circumstances of necessity of maintenance of financial and economic security of objects of critical infrastructure and its management is established. The definition of financial and economic security of a critical infrastructure object is offered. The peculiarities of the interpretation of the concept of financial and eco
APA, Harvard, Vancouver, ISO, and other styles
33

Ang, Shin Yin, Razali Siti Noor Asyikin Mohd, and Sie Long Kek. "OPTIMIZED PREFERENCE OF SECURITY STAFF SCHEDULING USING INTEGER LINEAR PROGRAMMING APPROACH." COMPUSOFT: An International Journal of Advanced Computer Technology 08, no. 04 (2019): 3103–11. https://doi.org/10.5281/zenodo.14823041.

Full text
Abstract:
This paper proposes an optimized schedule for security staff using integer linear programming approach. It is important to improve the life quality of the security staff since the negative social life such as family problems, less social support or even stress following from a poor work schedule. Therefore, this study aims to maximize the preference satisfaction of the security staff by allowing them to choose their preferred shift and day off while taking into consideration the restrictions of the university rules. The mathematical model of integer linear programming approach is developed and
APA, Harvard, Vancouver, ISO, and other styles
34

Abdullahi, Haruna Ishola. "Cloud Security And Electronic Transaction Security:." International Journal of Information Systems and Informatics 4, no. 2 (2023): 54–63. http://dx.doi.org/10.47747/ijisi.v4i2.1085.

Full text
Abstract:
The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken
APA, Harvard, Vancouver, ISO, and other styles
35

Otieno, Roy Ochieng’, and Elijah Onyango Standslause Odhiambo. "Impact of Electronic Cargo Tracking Systems on Cargo Security: A Case of the Inland Container Depot at Embakasi, Nairobi, Kenya." African Quarterly Social Science Review 2, no. 2 (2025): 45–54. https://doi.org/10.51867/aqssr.2.2.5.

Full text
Abstract:
Kenya has implemented numerous reforms to enhance cargo security, with a strong focus on technological innovations. One such initiative is the Regional Electronic Cargo Tracking System (RECTS), introduced by the Kenya Revenue Authority (KRA) at the Inland Container Depot (ICD) in Embakasi, Nairobi. RECTS was designed to address persistent challenges such as cargo theft, tax evasion, and the illegal diversion of goods. However, the effectiveness of this system in securing cargo remains under-explored in the Kenyan context. Despite the technological advancements, KRA still faces obstacles, inclu
APA, Harvard, Vancouver, ISO, and other styles
36

Nasreen, Irfana, Kashif Rathore, and Kashif Ali. "WORKPLACE SECURITY;." Professional Medical Journal 24, no. 01 (2017): 150–65. http://dx.doi.org/10.29309/tpmj/2017.24.01.422.

Full text
Abstract:
Introduction: This study is about female nursing staff whose mission is toprovide professional care to ailing patients, but who are also vulnerable to bullying, harassment,and even assault while they perform their duties. Objectives: The study attempts to describethe level of perceived workplace security among the nurses and investigate relationshipbetween theoretically identified predictors and the perceived workplace security of nursesworking in public hospitals in Lahore city. Study Design: Factors such as civility in co-workerbehavior, clarity of norms of communication with co-workers, int
APA, Harvard, Vancouver, ISO, and other styles
37

Chebbe, Gabriel, Edwin Mkhganga, Robert Mutua Murungi, Lawrence Mwenda Muriira, and Patricia Kavuli Ndambuki. "Assessment of the Effectiveness of Non-Technical Approach to Cyber Security Management for NLIMS System in the Ministry of Lands and Physical Planning, in Kenya." International Journal of Professional Practice 12, no. 3 (2024): 15–30. https://doi.org/10.71274/ijpp.v12i3.389.

Full text
Abstract:
The study determined whether NLIMS has adequately addressed the social aspect of their information security system. The study was conducted at Ministry of Land and Physical Planning Headquarters in Nairobi. The study adopted descriptive research design, and utilized stratified sampling technique to select respondents. Close-ended questionnaires were used to collect quantitative on social engineering cyber threats. Results indicated that 70% of staff using NLIMS system lack knowledge about social engineering attacks, their conduct, weaknesses, and the skills necessary to prevent or stop cyber t
APA, Harvard, Vancouver, ISO, and other styles
38

Lipley, Nick. "Survey on use of bank staff reveals poor security." Nursing Standard 15, no. 6 (2000): 7. http://dx.doi.org/10.7748/ns.15.6.7.s13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

MAXIMOVA, Elena Alexandrovna, Anatoly Mikhaylovich TSYBULIN, Marina Nikolaevna SVISCHEVA, and Ekaterina Alexandrovna VITENBURG. "STAFF PERFORMANCE CONTROL AND SECURITY OF CORPORATE INFORMATION RESOURCES." Historical and social-educational ideas 6, no. 6_1 (2015): 200. http://dx.doi.org/10.17748/2075-9908-2014-6-6_1-200-203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Wood, Charles Cresson. "How many information security staff people should you have?" Computers & Security 9, no. 5 (1990): 395–402. http://dx.doi.org/10.1016/0167-4048(90)90069-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Abo Salih, Salwa, Safaa El Demerdash, Samer Ahmed, and Seham Mahmoud. "Nursing Staff Perception of Toxic Leadership and Job Security." Tanta Scientific Nursing Journal 29, no. 2 (2023): 101–13. http://dx.doi.org/10.21608/tsnj.2023.298499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Beryl, R., and B. Völlm. "Attitudes to personality disorder of staff working in high-security and medium-security hospitals." Personality and Mental Health 12, no. 1 (2017): 25–37. http://dx.doi.org/10.1002/pmh.1396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Nguyen, Thai Hung, Hang Nguyet Van Nguyen, Van Sau Tran, and Hai Hoang. "KNOWLEDGE TOWARDS THE PREVENTION OF SURGICAL SITE INFECTION AND SOME ASSOCIATED FACTORS AMONG MEDICAL STAFF WORKING AT 19-8 HOSPITAL, MILITARY OF PUBLIC SECURITY IN 2020." VietNam Military Medical Unisversity 49, no. 5 (2024): 209–20. http://dx.doi.org/10.56535/jmpm.v49i5.817.

Full text
Abstract:
Objectives: To assess knowledge and some associated factors toward surgical site infection (SSI) prevention among medical staff working at 19-8 Hospital, Ministry of Public Security in 2020. Methods: A cross-sectional descriptive study analysing 189 medical staff in 10 surgical departments in 19-8 Hospital, Ministry of Public Security by direct interview. Results: The percentage of medical staff that had good knowledge about SSI prevention was found to be 83.6%. 75.1% of participants had good preoperative knowledge while 72% of them had good postoperative knowledge. Taking more than 3 times on
APA, Harvard, Vancouver, ISO, and other styles
44

Brugger, Patrick. "ICRC operational security: staff safety in armed conflict and internal violence." International Review of the Red Cross 91, no. 874 (2009): 431–45. http://dx.doi.org/10.1017/s1816383109990075.

Full text
Abstract:
AbstractHumanitarian work, especially in conflict areas, has become more dangerous and every humanitarian organization is affected by serious security problems, constituting a threat to their staff and hampering much-needed activities on behalf of the victims of armed conflicts and other situations of collective armed violence. The article outlines the general approach of the ICRC to security issues and describes the pillars of the security policy it has adopted in the field to protect its operational staff.
APA, Harvard, Vancouver, ISO, and other styles
45

Cahyanto, Hafid, Tanto G. Sumarsono, and Mokhamad Natsir. "Impact of Ability, Motivation and Work Discipline on Staff Performance." Innovation Business Management and Accounting Journal 3, no. 1 (2024): 112–21. https://doi.org/10.56070/ibmaj.2024.014.

Full text
Abstract:
This research aims to describe the work abilities, work motivation, work discipline, and performance of Air Base (Lanud) Abd. Saleh Military security staff. Saleh Analyzes the significance level of the influence of workability, work motivation, and work discipline simultaneously, partially, and dominantly on the performance of Air Base (Lanud) Abd. Saleh Military security staff. This research includes quantitative research with comparative causal and explanatory research types. This research was conducted at Air Base (Lanud) Abd. Saleh. The choice of location for this research is based on the
APA, Harvard, Vancouver, ISO, and other styles
46

Srikonda, Khalid Ramesh. "Weak Link of University Library: Knowledge Protection and Reader Protection." Journal of Social Science and Humanities 7, no. 3 (2025): 82–84. https://doi.org/10.53469/jssh.2025.7(03).15.

Full text
Abstract:
Academic libraries are treasuries of knowledge and information, yet they face threats and vulnerabilities that disrupt the library environment, affecting both staff and users. This article explores these academic library threats and suggests strong protective measures. Various issues, such as theft, mutilation, and cybercrimes, pose distinctive threats. Theft compromises resources and educational experiences, while cybercrimes imperil digital assets and sensitive data. To mitigate these challenges, preventive tactics involve security, staff training, user education, and cybersecurity. Security
APA, Harvard, Vancouver, ISO, and other styles
47

Korol, Inna Volodymyrivna, Maksym Anatoliiovych Slatvinskyi, and Hanna Mykolaivna Chyrva. "THEORETICAL AND METHODOLOGICAL FUNDAMENTALS OF THE STAFF COMPETITIVENESS MANAGEMENT IN PERSONNEL SECURITY ASPECT." SCIENTIFIC BULLETIN OF POLISSIA 1, no. 2(14) (2018): 173–79. http://dx.doi.org/10.25140/2410-9576-2018-2-2(14)-173-179.

Full text
Abstract:
Urgency of the research. The importance of analyzing and solving the existing problems of the staff competitiveness is a matter of current interest as it is the main factor of enterprise development. Target setting. It is reasonable to study the tools of the staff competitiveness management for revealing opportunities of its application at domestic enterprises. Actual scientific researches and issues analysis. In the scientific work such of scholars as Sotnikova, S. I., Krotova, N. V., Molodchik, A. V. and others; the theoretical and practical aspects of the staff competitiveness management ar
APA, Harvard, Vancouver, ISO, and other styles
48

Trim, Peter R. J., and Yang-Im Lee. "The Global Cyber Security Model: Counteracting Cyber Attacks through a Resilient Partnership Arrangement." Big Data and Cognitive Computing 5, no. 3 (2021): 32. http://dx.doi.org/10.3390/bdcc5030032.

Full text
Abstract:
In this paper, insights are provided into how senior managers can establish a global cyber security model that raises cyber security awareness among staff in a partnership arrangement and ensures that cyber attacks are anticipated and dealt with in real time. We deployed a qualitative research strategy that involved a group interview involving cyber security and intelligence experts. The coding approach was used to identify the themes in the data and, in addition, a number of categories and subcategories were identified. The mind map approach was utilized to identify the thought processes of s
APA, Harvard, Vancouver, ISO, and other styles
49

Zvaková, Zuzana, and Martin Boroš. "Systém odbornej prípravy pracovníkov súkromných bezpečnostných služieb." Krízový manažment 23, no. 1 (2024): 57–61. https://doi.org/10.26552/krm.c.2024.1.57-61.

Full text
Abstract:
The article describes the content of the concept of private security and the tasks of the personnel in charge of physical protection under the Private Security Act. The aim of the article is to describe the training system of private security staff set up by law and to identify shortcomings in this system. The training is described through the professional topics that are the content of the training and the associated hourly subsidy. The weaknesses in the system are then described in relation to the private security service, to the customer and to the physical security staff. The article is pr
APA, Harvard, Vancouver, ISO, and other styles
50

Panchenko, Volodymyr. "EVALUATION OF COMPLEX INDICATOR OF ID-PROFILES OF ENTERPRISE STAFF: ECONOMIC APPROACH." ECONOMICS, FINANCE AND MANAGEMENT REVIEW, no. 3 (October 1, 2020): 103–13. http://dx.doi.org/10.36690/2674-5208-2020-3-103.

Full text
Abstract:
The article presents the author's method of estimating the complex indicator of ID-profiles of the company's personnel, developed on the basis of the economic approach. It is proved that the concept of "personnel security" is a process of identifying and neutralizing the impact on the economic security of the enterprise of various risks and threats associated with the actions and / or inaction of staff. It is established that the "personnel security system" is a set of interrelated relations between staff and owners (managers) to neutralize threats to the economic security of the enterprise. T
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!