The security industry comprises of diverse and multidisciplined practitioners, originating from many disciplines. It has been suggested that the industry has an undefined knowledge structure, although security experts contain a rich knowledge structure. There has also been limited research mapping security expert knowledge structure, reducing the ability of tertiary educators to provide industry focused teaching and learning. The study utilized multidimensional scaling (MDS) and expert interviews to map the consensual knowledge structure of security experts in their understanding of security risk. Security risk concepts were extracted and critiqued from West Australian university courses. Linguistic analysis categorised the more utilized se...
Background: Neuropathic pain is an increasingly prevalent condition and has a major impact on health...
In recognition of the central importance of surveillance and epidemiology in the control of antimicr...
Introduction. The aim of this paper is to identify and characterize the routes by which research may...
AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gat...
This exploratory study provides evidence about factors associated with the overall impact of enterpr...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Records management practices are mandatory in many business and government operations. Records manag...
Scientific software takes on an increasingly prominent role in research. In particular in the scien...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Information systems are used in overt and covert conflict and information operations target an oppon...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Metacognitive ability - proficiency in analyzing ones own thought processes - is related to the abil...
Information systems are used in overt and covert conflict and information operations target an oppon...
In recognition of the central importance of surveillance and epidemiology in the control of antimicr...
Background: Neuropathic pain is an increasingly prevalent condition and has a major impact on health...
In recognition of the central importance of surveillance and epidemiology in the control of antimicr...
Introduction. The aim of this paper is to identify and characterize the routes by which research may...
AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gat...
This exploratory study provides evidence about factors associated with the overall impact of enterpr...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Identity and identification are linked by variable meanings and applications and are essential in ma...
Records management practices are mandatory in many business and government operations. Records manag...
Scientific software takes on an increasingly prominent role in research. In particular in the scien...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Information systems are used in overt and covert conflict and information operations target an oppon...
IT security outsourcing is the establishment of a contractual relationship between an organization w...
Metacognitive ability - proficiency in analyzing ones own thought processes - is related to the abil...
Information systems are used in overt and covert conflict and information operations target an oppon...
In recognition of the central importance of surveillance and epidemiology in the control of antimicr...
Background: Neuropathic pain is an increasingly prevalent condition and has a major impact on health...
In recognition of the central importance of surveillance and epidemiology in the control of antimicr...
Introduction. The aim of this paper is to identify and characterize the routes by which research may...