We Have Root最新文献

筛选
英文 中文
Business and Economics of Security 安全的商业和经济
We Have Root Pub Date : 2019-08-19 DOI: 10.1002/9781119653554.ch7
{"title":"Business and Economics of Security","authors":"","doi":"10.1002/9781119653554.ch7","DOIUrl":"https://doi.org/10.1002/9781119653554.ch7","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126253306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leaking, Hacking, Doxing, and Whistleblowing 泄密、黑客、Doxing和告密
We Have Root Pub Date : 2019-08-19 DOI: 10.1002/9781119653554.ch9
{"title":"Leaking, Hacking, Doxing, and Whistleblowing","authors":"","doi":"10.1002/9781119653554.ch9","DOIUrl":"https://doi.org/10.1002/9781119653554.ch9","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133897778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Aspects of Security 安全的人的方面
We Have Root Pub Date : 2019-08-19 DOI: 10.1002/9781119653554.ch8
{"title":"Human Aspects of Security","authors":"","doi":"10.1002/9781119653554.ch8","DOIUrl":"https://doi.org/10.1002/9781119653554.ch8","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132697604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security, Policy, Liberty, and Law 安全、政策、自由和法律
We Have Root Pub Date : 2019-08-19 DOI: 10.1002/9781119653554.ch10
{"title":"Security, Policy, Liberty, and Law","authors":"","doi":"10.1002/9781119653554.ch10","DOIUrl":"https://doi.org/10.1002/9781119653554.ch10","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127984350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Technology 保安及科技
We Have Root Pub Date : 2019-08-19 DOI: 10.1002/9781119653554.ch4
G. L. Powell
{"title":"Security and Technology","authors":"G. L. Powell","doi":"10.1002/9781119653554.ch4","DOIUrl":"https://doi.org/10.1002/9781119653554.ch4","url":null,"abstract":"SECURITY: Throughout my visits to different tribes within the last year, I have asked the question, who is going to take over and run the casino/resort when the elders are ready to retire? It is time to start training the youth, with the passion to learn, on what their elders have worked so hard to build. The youth should be slowly worked into the different areas of running a resort/casino through proper training and mentoring. The lack of teamwork between security and surveillance is industry wide. I feel this is often due to improper management. Since surveillance does not get involved physically on the casino property, security can be considered the enforcement arm of surveillance. This type of liaison must start with the department heads by training both departments on how and why teamwork is beneficial in increasing the protection of the property's assets and liabilities as well as opening up a communication flow. Subsequently, proper teamwork is essential in overall guest protection and liability claims. There is probably more money paid out in lawsuits than actual cheating losses.","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime, Terrorism, Spying, and War 犯罪、恐怖主义、间谍和战争
We Have Root Pub Date : 2019-08-19 DOI: 10.1002/9781119653554.ch1
{"title":"Crime, Terrorism, Spying, and War","authors":"","doi":"10.1002/9781119653554.ch1","DOIUrl":"https://doi.org/10.1002/9781119653554.ch1","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Travel and Security 旅游及保安
We Have Root Pub Date : 2019-08-19 DOI: 10.1002/9781119653554.ch2
{"title":"Travel and Security","authors":"","doi":"10.1002/9781119653554.ch2","DOIUrl":"https://doi.org/10.1002/9781119653554.ch2","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133369402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things 物联网
We Have Root Pub Date : 2014-09-05 DOI: 10.1002/9781119653554.ch3
S. LukeshSusan
{"title":"Internet of Things","authors":"S. LukeshSusan","doi":"10.1002/9781119653554.ch3","DOIUrl":"https://doi.org/10.1002/9781119653554.ch3","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Surveillance 私隐及监察
We Have Root Pub Date : 2009-01-07 DOI: 10.1002/9781119653554.ch6
L. Firth
{"title":"Privacy and Surveillance","authors":"L. Firth","doi":"10.1002/9781119653554.ch6","DOIUrl":"https://doi.org/10.1002/9781119653554.ch6","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121632955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elections and Voting 选举及投票
We Have Root Pub Date : 2006-01-06 DOI: 10.1002/9781119653554.ch5
H. Oakley
{"title":"Elections and Voting","authors":"H. Oakley","doi":"10.1002/9781119653554.ch5","DOIUrl":"https://doi.org/10.1002/9781119653554.ch5","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信