The use of tabletop exercises in nuclear security education

2018 ◽  
Vol 10 (3) ◽  
pp. 344-356
Author(s):  
Michael Shattan ◽  
Adam Seybert ◽  
Robert Boone Gilbreath ◽  
Stephen Dahunsi ◽  
Howard L. Hall

Purpose The purpose of this paper is to explore the role of tabletop exercises (TTXs) in graduate nuclear security education, their effectiveness and their relationship to traditional forms of classroom instruction. The paper highlights both the benefits and challenges of TTX implementation—the former including higher student motivation and material retention, and the latter including motivational shifts toward “winning” and possible student exclusionary behavior. Design/methodology/approach Survey results from 49 former students in a US university were collected electronically and combined with anecdotal evidence from student, facilitator and teaching assistant interviews following five iterations of a specifically designed, semester-long, TTX case study. The case study focused on securing a fictional nuclear facility. Findings Students found the TTX more memorable and retained more course material when asked to compare the TTX’s effectiveness to long-term course projects in other courses. Their in-class motivations tended to shift from traditional classroom motivations toward “winning,” and “not letting down their classmates.” In some iterations, students also observed classmates becoming more tempted to cheat or otherwise violate academic ethics. Mitigation strategies to prevent such temptations (e.g. removing direct student vs student TTX structures) were found to be effective. Originality/value This is the first report on the effective use of a semester-long TTX in a graduate nuclear security classroom. The flexibility of this instructional tool demonstrates its applicability to other classroom subjects including homeland security, emergency management, disease outbreak management and public policy among others.

2019 ◽  
Vol 27 (3) ◽  
pp. 393-410 ◽  
Author(s):  
Maria Bada ◽  
Jason R.C. Nurse

PurposeThe purpose of this study is to focus on organisation’s cybersecurity strategy and propose a high-level programme for cybersecurity education and awareness to be used when targeting small- and medium-sized enterprises/businesses (SMEs/SMBs) at a city-level. An essential component of an organisation’s cybersecurity strategy is building awareness and education of online threats and how to protect corporate data and services. This programme is based on existing research and provides a unique insight into an ongoing city-based project with similar aims.Design/methodology/approachTo structure this work, a scoping review was conducted of the literature in cybersecurity education and awareness, particularly for SMEs/SMBs. This theoretical analysis was complemented using a case study and reflecting on an ongoing, innovative programme that seeks to work with these businesses to significantly enhance their security posture. From these analyses, best practices and important lessons/recommendations to produce a high-level programme for cybersecurity education and awareness were recommended.FindingsWhile the literature can be informative at guiding education and awareness programmes, it may not always reach real-world programmes. However, existing programmes, such as the one explored in this study, have great potential, but there can be room for improvement. Knowledge from each of these areas can, and should, be combined to the benefit of the academic and practitioner communities.Originality/valueThe study contributes to current research through the outline of a high-level programme for cybersecurity education and awareness targeting SMEs/SMBs. Through this research, literature in this space was examined and insights into the advances and challenges faced by an on-going programme were presented. These analyses allow us to craft a proposal for a core programme that can assist in improving the security education, awareness and training that targets SMEs/SMBs.


2020 ◽  
Vol 48 (2) ◽  
pp. 243-257
Author(s):  
Rebecca Hill Renirie

Purpose The purpose of this study is to examine teaching intent of information literacy threshold concepts via asynchronous reference transactions. Instructional content in academic librarians’ replies to research requests are analyzed for and mapped to threshold concepts contained in the Association of College and Research Libraries (ACRL) framework. Design/methodology/approach The author mapped the instructional content of a research request reply template to the content of the ACRL framework, then took a random sample of research requests using the template during the calendar year 2016. Additional instructional content provided in the sample replies was also mapped to the framework. Findings In providing written instruction for students to create searches from keywords and search subject-specific databases, every frame is at least partially addressed in the template except Scholarship as Conversation. However, individual librarians adapt the template to teach as needed and there are examples in this case study of teaching aspects of all six frames asynchronously. Practical implications This study provides support for librarians to teach the threshold concepts of the ACRL framework asynchronously at the point of need during virtual reference, and the effective use of a research reply template to accomplish this instruction. Originality/value Few recent studies examine instructional intent in asynchronous/email reference. This study examines teaching the ACRL framework via reference rather than instructional sessions. A portion of this research was presented as a poster at the 2017 ACRL Conference in Baltimore, Maryland.


2017 ◽  
Vol 15 (2) ◽  
pp. 153-169 ◽  
Author(s):  
Collins Ameyaw ◽  
Hans Wilhelm Alfen

Purpose The purpose of this paper is to identify the risks associated with private sector participation (PSP) in power generation (PG) projects, how they were allocated and the strategies used to mitigate their likely adverse effects. Design/methodology/approach The paper adopts case study research method and cross-case analyses to unearth the key risks and the contractual instruments used to manage them. Findings The paper identified 30 risk factors associated with four major private sector PG projects in Ghana. The allocation and mitigation strategies of these risks are also reported. Originality/value This is the first study to create a risk register of PSP PG projects. Private investors and government have been provided with a comprehensive list of risks associated with PG infrastructure. Would-be investors have also been armed with some potential risk management strategies for proper project structuring.


2013 ◽  
Vol 3 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Lori K. Long ◽  
Patricia A. Meglich

PurposeThe proliferation of inexpensive and accessible internet communication tools coupled with an increasingly geographically dispersed workforce has increased the use of virtual collaboration in the workplace. To prepare students for a virtual work environment, educators must provide classroom‐related opportunities to build students’ virtual collaboration skills. The purpose of this paper is to examine the use of virtual collaboration in the workplace, the implications for today's college graduates, and the need to provide students with experience in virtual collaboration. Finally, the paper provides a case study example of a course assignment to build virtual collaboration skills.Design/methodology/approachThis paper explores preparing students to collaborate virtually through a literature review that builds an understanding of the challenges of virtual collaboration in today's workplace and the skills students must develop in order to effectively collaborate virtually. The paper then provides a case study example of a course assignment to help students build these skills.FindingsThis paper finds that virtual collaboration skills are needed for today's college graduates. Further the case study presented provides evidence that authentic course‐based assignments can help build those skills.Originality/valueWhile research has started to explore the effective use of virtual collaboration in the workplace, the current literature lacks direction for educators to help build the skills of future workers to prepare them for virtual collaboration.


2017 ◽  
Vol 7 (4) ◽  
pp. 404-425 ◽  
Author(s):  
Leah Gillooly ◽  
Philip Crowther ◽  
Dominic Medway

Purpose The purpose of this paper is to explore the application of event design principles in the creation and execution of effective experiential sponsorship activations (ESAs) by B2B brands and examine the challenges posed by the sponsorship context to sponsors seeking to create ESAs, with proposed potential solutions. Design/methodology/approach A case study of Cisco’s ESA activities as part of its London 2012 Olympic and Paralympic Games sponsorship activation is developed, drawing on interviews with key Cisco employees and secondary sources of data, both internal and external to Cisco. Findings Blending the event design principles typically associated with B2B events with those more commonly found in corporate hospitality or B2C events enables sponsors to address the cognitive needs of attendees as business representatives, while also satisfying their needs as individuals seeking more sensorial experiences. Effective use of event design principles, creative marketing and promotion, and collaboration with other sponsors allow brands to overcome constraints placed on them by the unpredictable nature of sponsorship, sponsorship rights agreements and the increased clutter in the sponsorship environment. Research limitations/implications Existing knowledge on sponsorship activation is extended, drawing on principles of event design to offer a sponsor-focused perspective on the creation and execution of effective ESAs for B2B brands. Existing thinking around B2B event design is challenged and augmented when considering its application to ESA design. Practical implications Inter-sponsor collaboration and the blending of cognitive and sensorial elements of event design are important for sponsors seeking to create and deliver effective ESAs. Originality/value The paper draws on the event design literature to appraise the execution of ESA by B2B brands within the context of event sponsorship.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Erick B. Knezek ◽  
Thevu Vu ◽  
Jim Lee

PurposeThe purpose of this case study is to develop a lean six sigma (LSS) define–measure–analyze–improve–control (DMAIC) procedure to optimize the willingness to respond (WTR) of Louisiana-based law enforcement officials (LEO) to disasters.Design/methodology/approachVarious LSS tools were used to implement DMAIC to clearly define the problem of WTR, measure the self-reported WTR through a survey, perform statistical analysis on the measured data to identify significant variables to WTR, brainstorm issues and improvements with stakeholders, develop mitigation strategies, implement a pilot solution survey and develop control measures.FindingsLouisiana LEO showed an average of 73.9% of WTR to all disasters. Seven significant variables influenced WTR, which are prior experience, transportation, duty to organization, risk to self, conflicting roles, training and incentive pay. The results from pilot solutions showed that utilizing incentive pay, adequate training and personal protective equipment (PPE) increased WTR from 0.5% up to 16%.Originality/valueThis study developed and validated a unique procedure to improve LEO WTR to disasters, providing a set of DMAIC tools and concepts that can be used by other emergency response agencies. This research was performed during the COVID-19 pandemic and after Hurricane Laura impacted Louisiana.


2016 ◽  
Vol 9 (1) ◽  
pp. 2-14 ◽  
Author(s):  
Krishna Venkitachalam ◽  
Hugh Willmott

Purpose – The purpose of this paper is to indicate that managers responsible for decision making often have a limited appreciation of strategic shifts between codification and personalization of knowledge in different operational environments. This study is motivated by a concern to illuminate the influence of diverse business environments in the shift between strategies of knowledge in organizations. Design/methodology/approach – A qualitative multiple case-study method was adopted to research four case organizations drawn from multiple industries – manufacturing, research, education and consulting – that are positioned within contrasting operating environments (i.e. local, national, international and multinational, respectively). Findings – Results from the case studies suggest that four factors condition shifts between codification and personalization strategies in different operational environments that are of critical significance for the effective use of knowledge in organizations. The authors have also found that strategic shifts between codification and personalization are continuous and emergent. Originality/value – The study suggests that the combination of multi-operational types and four elements (i.e. competition, organizational size, organizational structure and information technology) are highly relevant for determining the shifts between codification and personalization strategies in organizations.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Yi Liu ◽  
Wei Wang ◽  
Zuopeng (Justin) Zhang

PurposeTo better understand the role of industrial big data in promoting digital transformation, the authors propose a theoretical framework of industrial big-data-based affordance in the form of an illustrative metaphor – what the authors call the “organizational drivetrain.”Design/methodology/approachThis study investigates the effective use of industrial big data in the process of digital transformation based on the technology affordance–actualization theoretical lens. A software platform and services provider with more than 4,000 industrial enterprise clients in China was selected as the case study object for analyzing the digital affordance and actualization driven by industrial big data.FindingsDrawing on a revelatory case study, the authors identify three affordances of industrial big data in the organization, namely developing data-driven customized projects, provisioning equipment-data-driven life cycle services, establishing data-based trust and determining affordance actualization actions driven by technology and market. In addition, the authors reveal the underlying drivetrain mechanisms to advance industrial big data affordance and actualization: stabilizing, enriching and pioneering.Originality/valueThis study builds a drivetrain model on digital transformation by industrial big data affordance actualization. The authors also provide practical implications that can help practitioners to implement digital transformation effectively and extract value from their investment.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Bersisa Berri ◽  
Rory Donnelly

Purpose Making effective use of the knowledge available to a charitable organization is crucial to the achievement of its strategic objectives and the outcomes of its humanitarian interventions. This study aims to explore the integration of knowledge at an international development charity from the perspective of its workforce. Design/methodology/approach Rich primary data were collected through an in-depth case study of a large international development charity actively embracing the management of knowledge using semi-structured interviews (n = 42), participant observation and organizational documentation. The data were integrated and analyzed thematically. Findings The analysis of the empirical data sheds light on how a more systematic framework for knowledge integration and application could enhance the capabilities and strategic effectiveness of a charitable organization. Originality/value The findings enable important contributions to the strategic management and effective use of knowledge in charitable organizations by empirically uncovering how a more coherent and structured approach to knowledge management could enhance the focus, efficiency, flexibility and relevance of its actions and those of its members. Accordingly, this paper advances a new integrated schema to meet the goals of charities and their stakeholders for broader application and testing by charities and future researchers.


2014 ◽  
Vol 17 (1) ◽  
pp. 43-57 ◽  
Author(s):  
Sylvie M. Lacoste

Purpose – The paper aims to investigate how business-to-business key accounts deal with the consequent tension between cooperation and competition, and how they can resolve that relational paradox, using framework contracts. Design/methodology/approach – The paper argues that the role played by framework contracts can be ambivalent: as a tool to define cooperation with suppliers while simultaneously organising competition within suppliers, but by formalising such ambivalence, it does help to ease the tensions that may arise. To clarify such a conceptual and counter-intuitive ambivalence, the paper uses a case study that shows how framework contracts are used to solve the inherent tensions between cooperation with “preferred suppliers” and their price competition with invited “challengers”, in a competitive bidding situation. Findings – This study is a first step in an investigation of the role of framework contracts in a customer-supplier relationship, aiming to explain their use as they highlight the “coopetitive” nature of the relationship, turning it into something tangible and psychologically acceptable. Research limitations/implications – Because of the complexity of vertical “coopetition” and the research method adopted, the findings may not be generally applicable. Practical implications – This research offers an enlarged perspective for suppliers as well as customers to think over their own relationships (in an industrial setting). Originality/value – Little research has been conducted to date on vertical coopetition and the role and effects of framework contracts in the context of such complex customer-supplier relationships. This case study offers insights for practising managers and academics into the effective use of framework contracts.


Sign in / Sign up

Export Citation Format

Share Document