Search

Your search keyword '"Access Control"' showing total 254 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control" Journal security journal Remove constraint Journal: security journal
254 results on '"Access Control"'

Search Results

1. Business e-mail compromise scam, cyber victimization, and economic sustainability of corporate organizations in Nigeria.

2. The use of CPTED-based techniques to prevent shoplifting: a survey in Istanbul.

3. An exploratory study of failed mass shootings in America.

4. A systematic review of crime facilitated by the consumer Internet of Things.

5. Corporate security in the 21st century: Theory and practice in international perspective

6. Scan and rob! Convenience shopping, crime opportunity and corporate social responsibility in a mobile world

7. Social Learning Theory and the training of retail loss prevention officers

8. Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations

9. The role and importance of trust: A study of the conditions that generate and undermine sensitive information sharing

10. The threat management assessment and response model: A conceptual plan for threat management and training

11. The projection and measurement of cyberpower

12. Understanding crisis communications: Examining students’ perceptions about campus notification systems

13. Raising the bar: Professionalism and service delivery standards within New Zealand’s contract private security industry

14. The war on terror and accomplices: An exploratory study of individuals who provide material support to terrorists

15. Does training improve security decisions? A case study of airports

16. Functional redundancy as a response to employee theft within small businesses

17. A dedicated framework for weak biometrics in forensic science for investigation and intelligence purposes: The case of facial information

18. Understanding crime and fostering security using forensic science: The example of turning false identity documents into forensic intelligence

19. Deterring rational fanatics

21. Homeland security: Policy and politics

22. Targeting strategies in single-issue bomb attacks

23. Human Factors in security: User-centred and socio-technical perspectives

27. Elder crimes, elder justice

28. The EU’s internal security strategy: A historical perspective

30. Terrorism and homeland security

31. Policing cybercrime and cyberterror

32. Fear of crime in the United States

34. Security officers’ attitudes towards training and their work environment

35. Disruption management in the defense ammunition industrial base

36. Does gender matter in the virtual world? Examining the effect of gender on the link between online social network activity, security and interpersonal victimization

37. ‘Acting like chameleons’: On the McDonaldization of private security

38. Searching for legitimacy – Private military and security companies (PMSCs) overcoming ingrained stereotypes

39. Automating social network analysis: A power tool for counter-terrorism

40. The private security industry in Turkey: Officer characteristics and their perception of training sufficiency

41. The impact of the Private Security Industry Act 2001

42. The future of video analytics for surveillance and its ethical implications

43. Discretion and fairness in airport security screening

44. CCTV: A challenging case for threat image projection implementation

45. Evaluating private security sector market perceptions in Finland

46. The purposes and meanings of surveillance: A case study in a shopping mall in Ankara, Turkey

47. Digital information warfare trends in Eurasia

48. Social Network Analysis: A case study of the Islamist terrorist network

49. An evaluation of CCTV in a car park using police and insurance data

50. Usage of data validation techniques in online banking: A perspective and case study

Catalog

Books, media, physical & digital resources