{"title":"Fraud Risk Management: Using Fraud Analytics to Combat External and Insider Threats","authors":"P. Pomerleau, Mathieu Auger-Perreault","doi":"10.1007/978-3-319-69891-5_296-1","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_296-1","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fire: Prescriptive and Performance Based Design","authors":"Joshua Reichert","doi":"10.1007/978-3-319-69891-5_51-3","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_51-3","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigations: Terrorism","authors":"J. Duggan, J. Forest","doi":"10.1007/978-3-319-69891-5_185-1","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_185-1","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132509406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geographic Information Systems (GIS) Applications in Emergency Management","authors":"Hung-Lung Wei","doi":"10.1007/978-3-319-69891-5_13-1","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_13-1","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Airport Security: Incidents That Changed Procedures","authors":"Heather A. Panter","doi":"10.1007/978-3-319-69891-5_278-1","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_278-1","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131031236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Terrorism: International","authors":"Jared Dmello, A. Perliger","doi":"10.1007/978-3-319-69891-5_251-1","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_251-1","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Airport Security: Procedures in Secured Areas for TSA and Private Security","authors":"Heather A. Panter","doi":"10.1007/978-3-319-69891-5_2-1","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_2-1","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124159879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maritime Security: Acceptable Risks","authors":"Michael A. Edgerton","doi":"10.1007/978-3-319-69891-5_262-1","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_262-1","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128945388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Executive Protection","authors":"Robert E Matthiessen","doi":"10.1007/978-3-319-69891-5_38-1","DOIUrl":"https://doi.org/10.1007/978-3-319-69891-5_38-1","url":null,"abstract":"","PeriodicalId":340182,"journal":{"name":"Encyclopedia of Security and Emergency Management","volume":"13 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126924794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}