{"title":"Agent-Based Simulations for Disaster Decision Support","authors":"L. Yin","doi":"10.1300/J460v01n04_15","DOIUrl":"https://doi.org/10.1300/J460v01n04_15","url":null,"abstract":"Abstract Agent-based simulation is a potentially useful tool to examine and understand how observed social entities respond efficiently to interventions for defense against sudden and destructive events. Agents can be coded as objects with properties (e.g., age, gender) to mimic the behavior patterns of individuals during an emergency. In this paper, I discuss the potential application of agent-based models on decision making related to evacuation plan. Specifically, I focus on using such models to learn how at-risk populations interact with each other and respond to interventions during evacuation, so that scenarios can be built to study how interventions might optimize evacuation process.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114147959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planning for Community Health Emergencies","authors":"E. Sternberg","doi":"10.1300/J460v01n04_12","DOIUrl":"https://doi.org/10.1300/J460v01n04_12","url":null,"abstract":"Abstract After initially defining “community health-emergency planning,” this paper proposes research directions that would contribute to the security of healthcare systems, by mitigating disastrous emergencies and by preparing for them. The topics covered are: (1) Hazard-resistant healthcare facilities, (2) biodetection and syndrome surveillance, (3) diagnosis and investigation, (4) stockpiling, (5) disease containment, (6) patient movement, (7) mass decontamination and prophylaxis, (8) mass care, and (9) information and communication.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130128744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the Resilience of Communities Against Extreme Events from an Earthquake Engineering Perspective","authors":"M. Bruneau","doi":"10.1300/J460v01n04_14","DOIUrl":"https://doi.org/10.1300/J460v01n04_14","url":null,"abstract":"Abstract This paper outlines a general disaster resilience concept that has been developed in the field of earthquake engineering but that is applicable to any type of disaster. Consistently, a few examples are presented of technologies that could be expanded to be applicable in a multiple hazards perspective, either for preparedness, mitigation, or response and recovery. It is also emphasized that integrated and coordinated multidisciplinary research teams are key to developing the new knowledge needed to achieve significant advances toward the goal of more resilient communities.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Policing Global Challenges","authors":"Korni Swaroop Kumar, Mahesh K. Nalla","doi":"10.1300/J460v01n04_08","DOIUrl":"https://doi.org/10.1300/J460v01n04_08","url":null,"abstract":"Abstract The concept of global crime and policing is an important topic and has assumed new meaning since the terrorist events such as the attacks in New York City, Madrid, and more recently in London. The focus of this current research is an exploratory and descriptive analysis of the general elements of international police cooperation. The emphasis will be on regional, national, and agency wide cooperative efforts and challenges to such endeavors. This analysis attempts to help researchers and practitioners understand the current efforts of international police cooperation in some regions of the world, as well as the best ways in which lessons learned could strengthen global police cooperation.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114715175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Portfolio Theory for Regional Disaster Analysis and Policy","authors":"S. Cole","doi":"10.1300/J460v01n04_02","DOIUrl":"https://doi.org/10.1300/J460v01n04_02","url":null,"abstract":"Abstract My paper describes a portfolio theoretic framework for exploring the causes and consequences of major disruptions on regions and communities. The approach can be related to theories of financial portfolio management, optimal insurance, moral hazard, and ambiguous uncertainty, and the empirical literature on sustainable livelihoods, robust engineering, and disaster management. The present paper explains how Markowitz (1959) portfolio management theory may be adapted to the situation of a small region facing periodic and irregular disruptions in local and export markets, and used to select a portfolio of disaster mitigating strategies that maximize societal utility. This theory is implemented empirically using a computer simulation model. Model simulations show how the potential for major disruptions varies with economic policy, increasing rapidly with the risk-propensity of policy-makers or policies that increase the likelihood of concatenated events. Moreover, strategies that reduce ambiguity or protect critical elements in cascading disasters provide far more robust policy.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Qualitative Analysis of Computer Security Education and Training in the United States","authors":"M. Basham, Angel L. Rosado","doi":"10.1300/J460v01n02_07","DOIUrl":"https://doi.org/10.1300/J460v01n02_07","url":null,"abstract":"Abstract Ever since September 11th there has been an almost constant bombardment of articles written about the need for every aspect of security. The news stories are in newspapers, magazines, and on television. You just cannot pick up any medium and not find one. The resulting President's Critical Infrastructure Committee on homeland security has determined computer security education and training to be paramount for the security of America. This paper examines relevant literature about computer security education and training, examines similar programs at other community colleges, and proposes the creation of two certificate training programs, in criminal justice and computer protection. The authors then argue that these two programs are unlike any other program in the country. These two certificates present a two-headed attack to the problem in ways never approached by other community colleges, colleges, or universities. The paper then proposes logistical information and value added impact outcomes for implementing these certificates at St. Petersburg College. The authors conclude by looking at the future for computer security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Security in Academic Institutions","authors":"Steffani A. Burd, Scott Cherkin, J. Concannon","doi":"10.1300/J460v01n02_05","DOIUrl":"https://doi.org/10.1300/J460v01n02_05","url":null,"abstract":"Abstract Academic institutions face unique information security threats as well as increasingly frequent and severe incidents, yet they have invested relatively few resources to define and address these issues. Incidents such as information theft, data tampering, viruses, worms, and terrorist activity constitute significant threats to the security of academic institutions. Adverse impacts on academic institutions and the general public include compromised private data, potential attacks on U.S. critical infrastructure, and substantial financial losses. Strategies to remediate these issues must be identified, developed and implemented to curb the trend of increasingly frequent and severe information security incidents as well as the damage they incur. The purpose of this article is to define these emerging information security issues and to propose strategies to remediate them. First, empirically based knowledge of information security in academic institutions must be developed and shared, including quantification of issues, use of appropriate metrics, and identification of best and worst practices. Second, policies for information security must be developed, promulgated and implemented. These policies must balance learning, experimentation, and openness with adequate security measures. Third, the current narrow and fragmented approach to information security practices must be expanded to a holistic, integrated view and the current reactive stance must be changed to a proactive, prescriptive orientation toward information security. Directions for future research, suggestions for policy and practice, and recommendations for information sharing between universities, research institutions, government and law enforcement are provided.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128467787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Simple Classroom Laboratory Internet Worm","authors":"Christopher Church, Tim Schmoyer, H. Owen","doi":"10.1300/J460v01n02_04","DOIUrl":"https://doi.org/10.1300/J460v01n02_04","url":null,"abstract":"Abstract Beginners to Internet security research require an understanding of the inner workings of worms. A simple research worm designed to run on a test network facilitates this understanding. This paper explains the design and implementation of a simple research worm. A discussion of worm structure is provided. Design decisions made in creating our research worm are then given with an emphasis on how they relate to real Internet worms.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"26 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114043967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapting Advanced Computer Networking Technologies for Curricula Models in Security Education","authors":"T. Posillico","doi":"10.1300/J460v01n02_02","DOIUrl":"https://doi.org/10.1300/J460v01n02_02","url":null,"abstract":"Abstract This paper addresses the issues facing curriculum development of new and current technology in security education. In particular, areas of networking technologies are considered for analysis by examining trends at the university level and comparing case studies of individual curricula models that are currently in use. Effects of “reverse engineering” and deviation from traditional academic development are identified and discussed.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Use of Honeynets to Increase Computer Network Security and User Awareness","authors":"S. Krasser, J. Grizzard, H. Owen, J. Levine","doi":"10.1300/J460v01n02_03","DOIUrl":"https://doi.org/10.1300/J460v01n02_03","url":null,"abstract":"Abstract In this paper, we address how honeynets, networks of computers intended to be compromised, can be used to increase network security in a large organizational environment. We outline the current threats Internet security is facing at present and show how honeynets can be used to learn about those threats for the future. We investigate issues researchers have to take into account before deploying or while running a honeynet. Moreover, we describe how we tied honeynet research into computer security classes at Georgia Tech to successfully train students and spark interest in computer security.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129236802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}