The Experts below are selected from a list of 31092 Experts worldwide ranked by ideXlab platform
Humayun Zafar - One of the best experts on this subject based on the ideXlab platform.
-
addressing emerging information Security Personnel needs a look at competitions in academia do cyber defense competitions work research in progress
2013Co-Authors: Andrew W Green, Humayun ZafarAbstract:REQUIRED) This paper is part of a proposed study that looks at the emerging information Security Personnel needs of organizations. We are attempting to explore the correlation between components of a regional cyber defense competition and an organization's needs in terms of employing adequately trained information Security Personnel. We look to identify some unique characteristics of a regional academic cyber defense competition via the critical success factors method.
-
addressing emerging information Security Personnel needs a look at competitions in academia do cyber defense competitions work
Americas Conference on Information Systems, 2013Co-Authors: Andrew W Green, Humayun ZafarAbstract:REQUIRED) This paper is part of a proposed study that looks at the emerging information Security Personnel needs of organizations. We are attempting to explore the correlation between components of a regional cyber defense competition and an organization’s needs in terms of employing adequately trained information Security Personnel. We look to identify some unique characteristics of a regional academic cyber defense competition via the critical success factors method.
Andrew W Green - One of the best experts on this subject based on the ideXlab platform.
-
addressing emerging information Security Personnel needs a look at competitions in academia do cyber defense competitions work research in progress
2013Co-Authors: Andrew W Green, Humayun ZafarAbstract:REQUIRED) This paper is part of a proposed study that looks at the emerging information Security Personnel needs of organizations. We are attempting to explore the correlation between components of a regional cyber defense competition and an organization's needs in terms of employing adequately trained information Security Personnel. We look to identify some unique characteristics of a regional academic cyber defense competition via the critical success factors method.
-
addressing emerging information Security Personnel needs a look at competitions in academia do cyber defense competitions work
Americas Conference on Information Systems, 2013Co-Authors: Andrew W Green, Humayun ZafarAbstract:REQUIRED) This paper is part of a proposed study that looks at the emerging information Security Personnel needs of organizations. We are attempting to explore the correlation between components of a regional cyber defense competition and an organization’s needs in terms of employing adequately trained information Security Personnel. We look to identify some unique characteristics of a regional academic cyber defense competition via the critical success factors method.
Emily E Tannersmith - One of the best experts on this subject based on the ideXlab platform.
-
social control in schools the relationships between school Security measures and informal social control mechanisms
Journal of School Violence, 2019Co-Authors: Benjamin W. Fisher, Joseph H Gardella, Emily E TannersmithAbstract:ABSTRACTSocial control and procedural justice theories indicate that informal social control reduces problem behaviors. However, many schools have implemented formal control mechanisms such as school Security measures. This study examines the association between school Security measures (Security Personnel, metal detectors, and surveillance cameras) and students’ perceptions of informal social control (relationships with teachers, other school adults, and the fairness and consistency of school rules). We used structural equation modeling to examine these relationships in a nationally representative sample of 6,547 secondary students surveyed as part of the School Crime Supplement to the National Crime Victimization Survey (M age = 14.94; 51% male, 60% White non-Hispanic, 14% Black non-Hispanic, 20% Hispanic). The results indicated that the presence of Security Personnel in schools was associated with poorer student relationships with teachers. Findings for the other school Security measures were nonsignif...
Cynthia L King - One of the best experts on this subject based on the ideXlab platform.
-
enactment and implementation of the national Security Personnel system policy made and policy unmade
Public Administration Review, 2011Co-Authors: Douglas A Brook, Cynthia L KingAbstract:This case study reviews the enactment and implementation of the National Security Personnel System (NSPS) in the U.S. Department of Defense. Proponents of reform seized the opportunity to enact reform in the aftermath of 9/11, basing their arguments on national Security concerns. However, the policy-making process did not produce a consensus for reform among key stakeholders in the Personnel management policy community. Instead, the NSPS angered and alienated the Office of Personnel Management, the public employee unions, and a number of congressional Democrats. Implementation of the NSPS became problematic as Defense Department officials attempted to move quickly and independently to get the new system online, eventually forcing the department to put the system on hold. In the end, Congress imposed limits on its implementation, advocates for the system disappeared, and a new president supported the repeal of NSPS. This case provides useful insights into the formulation of future strategies for Personnel management reform.
-
federal Personnel management reform from civil service reform act to national Security reforms
Review of Public Personnel Administration, 2008Co-Authors: Douglas A Brook, Cynthia L KingAbstract:In what ways are current civil service reform efforts similar to and different from the qualities that characterize the Civil Service Reform Act of 1978 (CSRA)? These issues are explored by examining the new Personnel authorities granted to the Department of Homeland Security (DHS) and to the Department of Defense (DoD) in the National Security Personnel System (NSPS). In many respects, current reforms preserve some of the ideas behind CSRA or they derive from the authorities included in the CSRA. In other respects, current reform departs from the CSRA model and new ideas related to enactment, design, and implementation of civil service reform have emerged. Furthermore, a new argument emerged in DHS and NSPS that had never before appeared in any public discourse on Personnel management reform: the link between federal Personnel management policy and national Security.
Hsiaoming Wang - One of the best experts on this subject based on the ideXlab platform.
-
contingency planning emergency preparedness for terrorist attacks
IEEE Aerospace and Electronic Systems Magazine, 2004Co-Authors: Hsiaoming WangAbstract:The terrorist attack is one type of tragedy caused by humans. Although rare, it has catastrophic effects. In the aftermath of 9-11, it is the responsibility of Security Personnel to help every employee get back to business as normal, while being prepared for possible future terrorist attacks. An up-to-date contingency plan is expected to help Security managers fulfill this role. Security managers should reassess or develop this contingency plan using FEMA's guidebook. They are encouraged to adopt the Homeland Security Advisory System, or to develop alternative, simple colour-coded systems to respond to the threat of terrorist attack. They are also encouraged to consider three factors in planning: top management's commitment; adequate training; and coordination with public agencies.
-
contingency planning emergency preparedness for terrorist attacks
IEEE Aerospace and Electronic Systems Magazine, 2004Co-Authors: Hsiaoming WangAbstract:The terrorist attack is one type of tragedy caused by humans. Although rare, it has catastrophic effects. In the aftermath of 9-11, it is the responsibility of Security Personnel to help every employee get back to business as normal, while being prepared for possible future terrorist attacks. An up-to-date contingency plan is expected to help Security managers fulfill this role. Security managers should reassess or develop this contingency plan using FEMA's guidebook. They are encouraged to adopt the Homeland Security Advisory System, or to develop alternative, simple colour-coded systems to respond to the threat of terrorist attack. They are also encouraged to consider three factors in planning: top management's commitment; adequate training; and coordination with public agencies.