Skip to Main Content
Bellevue University
LibGuides
Library
MSSM
Journal Articles
Search this Guide
Search
MSSM: Journal Articles
Home
MSSM 501
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 506
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 517
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 523
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 602
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 607
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 618
Toggle Dropdown
E-Books
Journal Articles
Videos
MSSM 624
Toggle Dropdown
E-Books
Journal Articles
Videos
Additional Resources
Libguide Curator
Lorraine Patrick
Email Me
Schedule Appointment
Contact:
Bellevue University
Freeman/Lozier Library
1000 Galvin Rd. S.
402-557-7313
MSSM 624 Journal Articles
Approaches for tsunami risk assessment and application to the city Cadiz, Spain.
by
Jelinek, R., Krausmann, E., Gonzalez, M., Alvarez-Gomez , J. A., Bikmann , J., & Welle, T
Natural Hazards (2012), Vol 60 (2), p. 273-
293.
Attack tree based security risk assessment method integrating enterprise objectives with vulnerabilities.
by
Karabey, B., & Baykal, N
International Arab Journal of Information Technology (IAJIT) (2013). Vol.10 (3), 297-304.
Critical infrastructure protection: DHS action needed to enhance integration and coordination of vulnerability assessment efforts.
by
United States Government Accountability Office (GAO)
(2014).
Federal insurance and mitigation administrative policy: Standards for flood risk analysis & mapping.
Federal Emergency Management Agency (FEMA), (2014).
Flood vulnerability assessment of residential buildings by explicit damage process modelling.
by
Custer, R., & Nishijima, K.
Natural Hazards (2015). Vol. 78(1), pgs. 461-496.
Implementation of an integrated vulnerability and risk assessment model.
by
Lummen, N., & Yamada, F.
Natural Hazards, (2014). Vol 73(2), pgs.1085-1117.
Missouri river flood 2011 vulnerabilities assessment report: Vol. 1: Summary.
United States Army Corps of Engineers, (2012).
Mitigating risk, ensuring safety and key healthcare security concerns.
by
Lasky, S.
Security Technology Executive (2014). Vol 24 Issue 1, p. 30-32.
Preparing for tomorrow’s high tide: Sea level rise vulnerability assessment for the State of Delaware
Delaware Coastal Programs, (2012).
Protecting the power grid: Target analysis and vulnerability assessment.
by
Labaj, L., & Barnes, B.
Journal of Counterterrorism & Homeland Security International.(2016). Vol. 22 (1), p. 26-28.
Results of technical network vulnerability assessment: EPA's region 6.
United States Environmental Protection Agency, Office of the Inspector General, (2012).
Terrorism and immigration: A risk analysis.
CATO Institute, 2016.
Three core activities toward relevant integrated vulnerability assessment: Validate, visualize and negotiate.
by
Rod, J. K., Opach, T., & Neset, T.
Journal of Risk Research. (2015.) Vol 18 Issue 7, 877-895.
The vulnerability sourcebook: Concept and guidelines for standardized vulnerability assessments.
BMZ Federal Ministry for Economic Cooperation and Development, (2014).
<<
Previous:
E-Books
Next:
Videos >>