首页 > 最新文献

Journal of Security Education最新文献

英文 中文
Information Security Education and Research at Nova Southeastern University 诺瓦东南大学信息安全教育与研究
Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_10
J. Cannady
Abstract In the last few years Nova Southeastern University (NSU) has embarked on the development of a comprehensive education and research program in information security. The university offers traditional and distance-learning graduate educational opportunities to information security professionals and those interested in pursuing careers in this critical field. In addition to a variety of educational programs, NSU faculty and students are also pursuing a variety of research efforts in information security which are addressing the current and emerging problems in securing critical information infrastructures. This article provides an overview of the educational programs and research initiatives in information security at NSU.
在过去的几年里,诺瓦东南大学(NSU)已经着手开发一个全面的信息安全教育和研究计划。该大学为信息安全专业人员和有兴趣在这一关键领域从事职业的人提供传统和远程学习的研究生教育机会。除了各种各样的教育项目外,NSU的教师和学生还在信息安全方面进行各种研究工作,以解决当前和新出现的关键信息基础设施安全问题。本文概述了NSU在信息安全方面的教育计划和研究计划。
{"title":"Information Security Education and Research at Nova Southeastern University","authors":"J. Cannady","doi":"10.1300/J460v01n02_10","DOIUrl":"https://doi.org/10.1300/J460v01n02_10","url":null,"abstract":"Abstract In the last few years Nova Southeastern University (NSU) has embarked on the development of a comprehensive education and research program in information security. The university offers traditional and distance-learning graduate educational opportunities to information security professionals and those interested in pursuing careers in this critical field. In addition to a variety of educational programs, NSU faculty and students are also pursuing a variety of research efforts in information security which are addressing the current and emerging problems in securing critical information infrastructures. This article provides an overview of the educational programs and research initiatives in information security at NSU.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavior Pattern Recognition and Aviation Security 行为模式识别与航空安全
Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_06
B. Seymour
Abstract New and evolving threats to aviation security require innovative and proactive solutions. Boston's Logan International Airport is adopting new methods to screen passengers based on techniques developed in Israel over the past 30 years. Behavior pattern recognition is a form of profiling passengers based not on race or religion but on suspicious and deceitful behavior. This technique is being used in addition to other aviation security measures in an attempt to form a more proactive approach to preventing future terrorist attacks at American airports.
航空安全面临的新威胁和不断演变的威胁需要创新和主动的解决方案。波士顿洛根国际机场(Logan International Airport)正在采用以色列过去30年来开发的技术为基础的新方法来筛查乘客。行为模式识别是一种基于可疑和欺骗行为而不是基于种族或宗教的乘客特征分析形式。这项技术正在与其他航空安全措施一起使用,试图形成一种更积极主动的方法,以防止未来在美国机场发生恐怖袭击。
{"title":"Behavior Pattern Recognition and Aviation Security","authors":"B. Seymour","doi":"10.1300/J460v01n02_06","DOIUrl":"https://doi.org/10.1300/J460v01n02_06","url":null,"abstract":"Abstract New and evolving threats to aviation security require innovative and proactive solutions. Boston's Logan International Airport is adopting new methods to screen passengers based on techniques developed in Israel over the past 30 years. Behavior pattern recognition is a form of profiling passengers based not on race or religion but on suspicious and deceitful behavior. This technique is being used in addition to other aviation security measures in an attempt to form a more proactive approach to preventing future terrorist attacks at American airports.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117271883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS 安全教育工作者和培训师新闻学院
Pub Date : 2005-03-03 DOI: 10.1300/j460v01n02_01
Richard W. Kobetz
Since 1981, the Academy of Security Educators and Trainers (A.S.E.T.) has been conducting the most difficult, honored, and prestigious program in the entire security industry. No other program, and there have been dozens of certifications created over the decades, can make the claims of this professional certification process. To begin with, there are no “grandfathers” or “grandfathering” processes in the entire history of this program since the very first class. The creator of the program, Dr. Richard W. Kobetz, and the elected academy officers in 1981 went through the entire program process with an independent faculty conducting the first session. All candidates from the first class in August 1981 through class 28, in November 2004, have submitted to the entire program process. This legitimate program was created in an attempt to counter the training deficiencies noted and continuing in the security field through the creation of performance standards for security trainers. The Academy created a formal and valid process for men and women who desired to be recognized in a professional manner. As a result, in the history of the Certified Security Trainer (C.S.T.) Program, only 200 candidates have successfully completed the process, including some of the most prominent and recognized authors, professors, practitioners, and research professionals in the field.
自1981年以来,安全教育和培训师学院(A.S.E.T.)一直在整个安全行业开展最困难、最光荣、最负盛名的项目。没有其他程序,几十年来已经创建了几十个认证,可以使这种专业认证过程的要求。首先,从第一堂课开始,在这个程序的整个历史中就没有“祖父”或“祖父”过程。该项目的创始人理查德·w·科贝茨博士和1981年当选的学院官员一起完成了整个项目过程,由一个独立的教员主持了第一次会议。从1981年8月的第1班到2004年11月的第28班,所有考生都提交了全部入学申请。创建这一合法计划是为了通过创建安全培训师的绩效标准来解决安全领域注意到并继续存在的培训缺陷。学院为那些希望以专业方式得到认可的男女创造了一个正式而有效的程序。因此,在认证安全培训师的历史上计划,只有200名候选人成功完成了这一过程,其中包括一些最杰出和公认的作者,教授,从业者和研究领域的专业人士。
{"title":"ACADEMY OF SECURITY EDUCATORS AND TRAINERS NEWS","authors":"Richard W. Kobetz","doi":"10.1300/j460v01n02_01","DOIUrl":"https://doi.org/10.1300/j460v01n02_01","url":null,"abstract":"Since 1981, the Academy of Security Educators and Trainers (A.S.E.T.) has been conducting the most difficult, honored, and prestigious program in the entire security industry. No other program, and there have been dozens of certifications created over the decades, can make the claims of this professional certification process. To begin with, there are no “grandfathers” or “grandfathering” processes in the entire history of this program since the very first class. The creator of the program, Dr. Richard W. Kobetz, and the elected academy officers in 1981 went through the entire program process with an independent faculty conducting the first session. All candidates from the first class in August 1981 through class 28, in November 2004, have submitted to the entire program process. This legitimate program was created in an attempt to counter the training deficiencies noted and continuing in the security field through the creation of performance standards for security trainers. The Academy created a formal and valid process for men and women who desired to be recognized in a professional manner. As a result, in the history of the Certified Security Trainer (C.S.T.) Program, only 200 candidates have successfully completed the process, including some of the most prominent and recognized authors, professors, practitioners, and research professionals in the field.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interview with James D. Calder, PhD, CPP 采访詹姆斯·d·考尔德,博士,CPP
Pub Date : 2005-03-03 DOI: 10.1300/J460V01N02_09
John Kostanoski
Abstract This new column will introduce readers to those educators and trainers whose contributions and scholarly outputs have an enduring quality, and are or promise to be part of the discipline's literature. The column will take the reader on a tour of the theories and practices of security, and the tour guides will be those individuals whose work has shaped the discipline's methods, procedures, processes, and technologies. We are indeed fortunate to be able to launch the column with an interview of James D. Calder, PhD, CPP, from the University of Texas at San Antonio.
这个新专栏将向读者介绍那些教育工作者和培训师,他们的贡献和学术成果具有持久的质量,并且已经或有望成为该学科文献的一部分。本专栏将带领读者了解安全的理论和实践,导游将是那些其工作塑造了该学科的方法、程序、过程和技术的个人。我们确实很幸运,能够以来自圣安东尼奥德克萨斯大学的詹姆斯·d·考尔德(James D. Calder)博士的采访作为专栏的开始。
{"title":"Interview with James D. Calder, PhD, CPP","authors":"John Kostanoski","doi":"10.1300/J460V01N02_09","DOIUrl":"https://doi.org/10.1300/J460V01N02_09","url":null,"abstract":"Abstract This new column will introduce readers to those educators and trainers whose contributions and scholarly outputs have an enduring quality, and are or promise to be part of the discipline's literature. The column will take the reader on a tour of the theories and practices of security, and the tour guides will be those individuals whose work has shaped the discipline's methods, procedures, processes, and technologies. We are indeed fortunate to be able to launch the column with an interview of James D. Calder, PhD, CPP, from the University of Texas at San Antonio.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"6 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132372884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Carnegie Mellon University's CERT Coordination Center 卡内基梅隆大学CERT协调中心
Pub Date : 2005-03-03 DOI: 10.1300/J460v01n02_12
J. Totans
Abstract In this article, we review the World Wide Web site offerings of Carnegie Mellon's CERT Coordination Center (www.cert.org) with respect to its mission to encourage and foster Internet security strategies and practices. The Web site hosts the Computer Emergency Readiness Team-Internet security computer alert warning system and advanced research in computing security threats and mitigation practices.
在这篇文章中,我们回顾了卡耐基梅隆大学CERT协调中心(www.cert.org)关于其鼓励和促进互联网安全战略和实践的使命所提供的万维网服务。该网站拥有计算机应急准备小组——互联网安全计算机警报预警系统和计算机安全威胁与缓解实践的高级研究。
{"title":"Carnegie Mellon University's CERT Coordination Center","authors":"J. Totans","doi":"10.1300/J460v01n02_12","DOIUrl":"https://doi.org/10.1300/J460v01n02_12","url":null,"abstract":"Abstract In this article, we review the World Wide Web site offerings of Carnegie Mellon's CERT Coordination Center (www.cert.org) with respect to its mission to encourage and foster Internet security strategies and practices. The Web site hosts the Computer Emergency Readiness Team-Internet security computer alert warning system and advanced research in computing security threats and mitigation practices.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132203402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Using Game Theory in Managing the Risks of Terrorism 运用博弈论管理恐怖主义风险
Pub Date : 2004-11-11 DOI: 10.1300/J460v01n01_09
B. Seymour
Abstract The purpose of this paper is to explore how innovative ideas based on game theory can be useful to security professionals and governments in managing the risks posed by a terrorist attack.
本文的目的是探讨基于博弈论的创新思想如何有助于安全专业人员和政府管理恐怖袭击带来的风险。
{"title":"Using Game Theory in Managing the Risks of Terrorism","authors":"B. Seymour","doi":"10.1300/J460v01n01_09","DOIUrl":"https://doi.org/10.1300/J460v01n01_09","url":null,"abstract":"Abstract The purpose of this paper is to explore how innovative ideas based on game theory can be useful to security professionals and governments in managing the risks posed by a terrorist attack.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURITY ACADEMIC PROGRAMS 安全学术课程
Pub Date : 2004-11-11 DOI: 10.1300/J460V01N01_12
S. Lancaster, Oneil Cross
The methodology that I employed in developing this United Statesbased academic program list involved gathering information directly from college Websites, and alphabetizing and categorizing by location (state). Also, there are separate sections for online degree programs and international security-related degree programs (English speaking). Many sites did not have a distinct classification for security-related degree programs. Often, information was buried under criminal justice or the computer sciences program listings. There is no single, comprehensive site that displays all the degrees offered in security. It is my intention to remedy this situation and provide a straightforward comprehensive resource with information about new degree programs in this field. Information about the listed institutions was taken from their respective Websites. I do not claim that these descriptions are an original creation, nor does this information necessarily reflect my opinion. Also, I cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.
我在开发这个基于美国的学术项目列表时采用的方法包括直接从大学网站收集信息,并按位置(州)按字母顺序排序和分类。此外,在线学位课程和国际安全相关学位课程(英语授课)也有单独的部分。许多网站对与安全相关的学位课程没有明确的分类。通常情况下,信息被隐藏在刑事司法或计算机科学项目列表中。没有一个单一的、全面的网站显示所有提供的安全学位。我的意图是纠正这种情况,并提供有关该领域新学位课程信息的直接全面的资源。有关列明机构的资料来自其各自的网站。我并不认为这些描述是我的原创,这些信息也不一定反映我的观点。此外,我不能保证该列表没有错误。此列表仅提供认证学位课程的信息。
{"title":"SECURITY ACADEMIC PROGRAMS","authors":"S. Lancaster, Oneil Cross","doi":"10.1300/J460V01N01_12","DOIUrl":"https://doi.org/10.1300/J460V01N01_12","url":null,"abstract":"The methodology that I employed in developing this United Statesbased academic program list involved gathering information directly from college Websites, and alphabetizing and categorizing by location (state). Also, there are separate sections for online degree programs and international security-related degree programs (English speaking). Many sites did not have a distinct classification for security-related degree programs. Often, information was buried under criminal justice or the computer sciences program listings. There is no single, comprehensive site that displays all the degrees offered in security. It is my intention to remedy this situation and provide a straightforward comprehensive resource with information about new degree programs in this field. Information about the listed institutions was taken from their respective Websites. I do not claim that these descriptions are an original creation, nor does this information necessarily reflect my opinion. Also, I cannot guarantee that the list is free of errors. This list only provides information on accredited degree programs.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121341161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing Corporate Security Departments' Internal Relationships and Linkages with Other Business Functions 评估公司安全部门与其他业务部门的内部关系和联系
Pub Date : 2004-11-11 DOI: 10.1300/J460v01n01_04
Mahesh K. Nalla
Abstract During the past decade there has been extensive research that has addressed corporate security departments' external relationships with law enforcement. However, little is known about the internal relationships of corporate security with the other business functions in the organization. Security directors and managers from the Fortune 500 and Fortune Service 500 companies were surveyed to assess the corporate security departments' relationship to other business functions and departments within the organization. The major categories of respondents included chemical/pharmaceutical, financial, manufacturing, service, and utilities companies. Respondents were asked about the corporate security departments' relationship to other business functions as well as which executives and departments are closely associated or allied with corporate security. Findings suggest that corporate security is closely aligned with other business functions and works well with other departments. However, the extent to which executives and departments that are associated with corporate security to ensure security within the company varies among the types of industries.
在过去的十年中,有广泛的研究已经解决了企业安全部门与执法部门的外部关系。然而,企业安全与组织中其他业务功能之间的内部关系却鲜为人知。来自财富500强和财富服务500强公司的安全主管和经理接受了调查,以评估公司安全部门与组织内其他业务职能和部门的关系。受访者的主要类别包括化学/制药、金融、制造业、服务业和公用事业公司。受访者被问及公司安全部门与其他业务职能的关系,以及哪些高管和部门与公司安全密切相关或结盟。调查结果表明,企业安全与其他业务职能密切相关,并与其他部门合作良好。然而,与公司安全相关的高管和部门确保公司内部安全的程度因行业类型而异。
{"title":"Assessing Corporate Security Departments' Internal Relationships and Linkages with Other Business Functions","authors":"Mahesh K. Nalla","doi":"10.1300/J460v01n01_04","DOIUrl":"https://doi.org/10.1300/J460v01n01_04","url":null,"abstract":"Abstract During the past decade there has been extensive research that has addressed corporate security departments' external relationships with law enforcement. However, little is known about the internal relationships of corporate security with the other business functions in the organization. Security directors and managers from the Fortune 500 and Fortune Service 500 companies were surveyed to assess the corporate security departments' relationship to other business functions and departments within the organization. The major categories of respondents included chemical/pharmaceutical, financial, manufacturing, service, and utilities companies. Respondents were asked about the corporate security departments' relationship to other business functions as well as which executives and departments are closely associated or allied with corporate security. Findings suggest that corporate security is closely aligned with other business functions and works well with other departments. However, the extent to which executives and departments that are associated with corporate security to ensure security within the company varies among the types of industries.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Serving Security 安全服务
Pub Date : 2004-11-11 DOI: 10.1300/J460V01N01_08
Robert D. McCrie
Abstract John Jay College has offered a degree in security management since 1972. The program now includes three degrees (AS, BS, and MS in Protection Management), two non-matriculate certificate programs, and a facility to provide education and training to the community at large, the Security Management Institute. The article describes the origin of the programs. Emphasis on research and international connections are also discussed. Since the blow to the city and the nation on 9/ 11/01, courses have been revised to include more emphasis on counter-terrorism, cybercrime, and emergency response and mitigation.
自1972年以来,约翰杰伊学院开设了安全管理学位。该计划现在包括三个学位(保护管理学士学位、学士学位和硕士学位)、两个非预科证书课程,以及一个为整个社区提供教育和培训的机构——安全管理研究所。文章描述了程序的起源。重点研究和国际联系也进行了讨论。自2001年11月9日纽约市和全国遭受打击以来,课程已经修订,更加强调反恐、网络犯罪以及应急响应和缓解。
{"title":"Serving Security","authors":"Robert D. McCrie","doi":"10.1300/J460V01N01_08","DOIUrl":"https://doi.org/10.1300/J460V01N01_08","url":null,"abstract":"Abstract John Jay College has offered a degree in security management since 1972. The program now includes three degrees (AS, BS, and MS in Protection Management), two non-matriculate certificate programs, and a facility to provide education and training to the community at large, the Security Management Institute. The article describes the origin of the programs. Emphasis on research and international connections are also discussed. Since the blow to the city and the nation on 9/ 11/01, courses have been revised to include more emphasis on counter-terrorism, cybercrime, and emergency response and mitigation.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of Introductory Security Courses on the Career Choices of Criminal Justice Students 安全入门课程对刑事司法专业学生职业选择的影响
Pub Date : 2004-11-11 DOI: 10.1300/J460V01N01_05
Brandon R. Kooi, Mahesh K. Nalla
Abstract This article discusses the results from 189 pre- and posttest questionnaires that were administered to students taking private security courses at six higher educational institutions. Questions assessed the impact of introductory security courses on students' perceptions of the security occupation and also their desire to take security courses within a traditional criminal justice curriculum. Results showed significant changes in their perceptions of the security occupation, as well as their career aspirations, as a result of having taken a class in private security.
摘要本文对6所高等院校的私人保安课程学生进行了189份问卷调查。问题评估了安全入门课程对学生对安全职业的看法的影响,以及他们在传统刑事司法课程中学习安全课程的愿望。结果显示,由于参加了私人保安课程,他们对保安职业的看法以及职业抱负发生了重大变化。
{"title":"Impact of Introductory Security Courses on the Career Choices of Criminal Justice Students","authors":"Brandon R. Kooi, Mahesh K. Nalla","doi":"10.1300/J460V01N01_05","DOIUrl":"https://doi.org/10.1300/J460V01N01_05","url":null,"abstract":"Abstract This article discusses the results from 189 pre- and posttest questionnaires that were administered to students taking private security courses at six higher educational institutions. Questions assessed the impact of introductory security courses on students' perceptions of the security occupation and also their desire to take security courses within a traditional criminal justice curriculum. Results showed significant changes in their perceptions of the security occupation, as well as their career aspirations, as a result of having taken a class in private security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of Security Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1