We Have RootPub Date : 2019-08-19DOI: 10.1002/9781119653554.ch7
{"title":"Business and Economics of Security","authors":"","doi":"10.1002/9781119653554.ch7","DOIUrl":"https://doi.org/10.1002/9781119653554.ch7","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126253306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2019-08-19DOI: 10.1002/9781119653554.ch9
{"title":"Leaking, Hacking, Doxing, and Whistleblowing","authors":"","doi":"10.1002/9781119653554.ch9","DOIUrl":"https://doi.org/10.1002/9781119653554.ch9","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133897778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2019-08-19DOI: 10.1002/9781119653554.ch8
{"title":"Human Aspects of Security","authors":"","doi":"10.1002/9781119653554.ch8","DOIUrl":"https://doi.org/10.1002/9781119653554.ch8","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132697604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2019-08-19DOI: 10.1002/9781119653554.ch10
{"title":"Security, Policy, Liberty, and Law","authors":"","doi":"10.1002/9781119653554.ch10","DOIUrl":"https://doi.org/10.1002/9781119653554.ch10","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127984350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2019-08-19DOI: 10.1002/9781119653554.ch4
G. L. Powell
{"title":"Security and Technology","authors":"G. L. Powell","doi":"10.1002/9781119653554.ch4","DOIUrl":"https://doi.org/10.1002/9781119653554.ch4","url":null,"abstract":"SECURITY: Throughout my visits to different tribes within the last year, I have asked the question, who is going to take over and run the casino/resort when the elders are ready to retire? It is time to start training the youth, with the passion to learn, on what their elders have worked so hard to build. The youth should be slowly worked into the different areas of running a resort/casino through proper training and mentoring. The lack of teamwork between security and surveillance is industry wide. I feel this is often due to improper management. Since surveillance does not get involved physically on the casino property, security can be considered the enforcement arm of surveillance. This type of liaison must start with the department heads by training both departments on how and why teamwork is beneficial in increasing the protection of the property's assets and liabilities as well as opening up a communication flow. Subsequently, proper teamwork is essential in overall guest protection and liability claims. There is probably more money paid out in lawsuits than actual cheating losses.","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2019-08-19DOI: 10.1002/9781119653554.ch1
{"title":"Crime, Terrorism, Spying, and War","authors":"","doi":"10.1002/9781119653554.ch1","DOIUrl":"https://doi.org/10.1002/9781119653554.ch1","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2019-08-19DOI: 10.1002/9781119653554.ch2
{"title":"Travel and Security","authors":"","doi":"10.1002/9781119653554.ch2","DOIUrl":"https://doi.org/10.1002/9781119653554.ch2","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133369402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2014-09-05DOI: 10.1002/9781119653554.ch3
S. LukeshSusan
{"title":"Internet of Things","authors":"S. LukeshSusan","doi":"10.1002/9781119653554.ch3","DOIUrl":"https://doi.org/10.1002/9781119653554.ch3","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2009-01-07DOI: 10.1002/9781119653554.ch6
L. Firth
{"title":"Privacy and Surveillance","authors":"L. Firth","doi":"10.1002/9781119653554.ch6","DOIUrl":"https://doi.org/10.1002/9781119653554.ch6","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121632955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We Have RootPub Date : 2006-01-06DOI: 10.1002/9781119653554.ch5
H. Oakley
{"title":"Elections and Voting","authors":"H. Oakley","doi":"10.1002/9781119653554.ch5","DOIUrl":"https://doi.org/10.1002/9781119653554.ch5","url":null,"abstract":"","PeriodicalId":268576,"journal":{"name":"We Have Root","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}