Skip to Main Content
Bellevue University
LibGuides
Library
MSSM
Journal Articles
Search this Guide
Search
MSSM: Journal Articles
Home
MSSM 501
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 506
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 517
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 523
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 602
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 607
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 618
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 624
Toggle Dropdown
E-Books
Journal Articles
Videos
Additional Resources
Libguide Curator
Lorraine Patrick
Email Me
Schedule Appointment
Contact:
Bellevue University
Freeman/Lozier Library
1000 Galvin Rd. S.
402-557-7313
MSSM 602 Journal Articles
Adapting healthcare security officer training to changing times.
by
Demming, JM.
Journal of Healthcare Protection Management (2016), Vol. 32(1), pgs. 6-9.
A decision framework for managing risk to airports from terrorist attack.
by
Shafieezadeh, A. & Cha EJ.
Risk Analysis (2015). Vol. 35(2), p. 292-306.
Don't skip your security risk assessment.
by
Gross, A.
Medical Economics (2016). Vol. 93(10), p. 53.
Evaluation of a comprehensive security system for public transport - A methodological approach.
by
Hagen, J.M. and Valdal, A.K.
Journal of Risk Research, (2015). Vol. 18(7).
Explaining lone wolf target selection in the United States.
by
Becker, M.
Studies in Conflict & Terrorism (2014). Vol. 37(11), pgs. 959-978.
Improving organisational resilience through enterprise security risk management.
by
Petruzzi, J. & Loyear, R.
Journal of Business Continuity & Emergency Planning, (2016.) Vol. 10(1), p.44-56.
An integrative approach to threat assessment and management: Security and mental health response to a threatening client.
by
Menendez, C. Chaumont & Farkas, Gary M.
Vol. 42(1): 9-14. (2012).
The management of security incidents by private security.
by
Govender, D.
African Security Review. (2015). Vol. 24 Issue 3, p291-306.
On the value of terrorist’s private information in a government’s defensive resource allocation problem.
by
Nikoofal, M. E. & Gumus, M.
IIE Transactions (2015). Vol. 47 Issue 6,
p533-555.
Phishing for suitable targets in The Netherlands: Routine activity theory and phishing victimization.
by
Leukfeldt, E.
CyberPsychology, Behavior & Social Networking (2014).
Safety and risk management.
by
Lisenkov, V. M. and Bestemyanov, P.F
Journal of Information Technology & Applications. (2015). Vol. 5 Issue 1, p42-54.
Security management systems: An opportunity for airport operators.
by
Goodwin, S. & Christensen, K.
Journal of Airport Management. (2013.) Vol. 7 Issue 4, p326-331.
Sustainable safety management: Incident management as a cornerstone for a successful safety culture.
by
Freibott, B.
EHS Today. (2014). Vol. 7 Issue 5, p22-28.
Using genetic algorithm for optimal security hardening in risk flow attack graph.
by
Fangfang D. & Kangfeng Z.
KSII Transactions on Internet & Information Systems. (2015). Vol. 9 (5), p1920-1937.
<<
Previous:
E-Books
Next:
Videos >>