Volume 2 (2007)
Table of Contents
Editor's Comments (Updated: April 2008)
Roger G. Johnston
DOWNLOAD: PDF [4 pages, 115KB]
CITE as: Journal of Physical Security, Vol. 2 no. 1, 2007, http://jps.anl.gov/
Paper 1 - Perceptions and the Social-Political Aspects of Nuclear Power and Nuclear Waste Disposal
James D. Ballard
The problems that many nuclear engineers, energy policy makers, industry officials, and risk regulators face when discussing the social and political aspects of their field can be summarized by one word: perception...
DOWNLOAD: PDF [22 pages, 95KB]
CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 1, 2007, http://jps.anl.gov/
Paper 2 - Culture Shock: Securing the Bomb is Hard to Do
James E. Doyle
Hundreds of organizations throughout the world, from secret directorates within national armed forces to university engineering departments have the responsibility of keeping nuclear weapons or nuclear materials safe from theft or misuse. How well can they do this critical job? Are there legal requirements for certain measurable security standards? How do they develop and maintain "best practices"? Will they be shut down or have their nuclear materials confiscated if poor security is proven?
DOWNLOAD: PDF [2 pages, 51KB]
CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 2, 2007, http://jps.anl.gov/
Paper 3 - The Ineffectiveness of the Correlation Coefficient for Image Comparisons
Eugene K. Yen and Roger G. Johnston
Pearson's r linear correlation coefficient is widely used for comparing images. Image processing experts appear to be cognizant of its serious limitations. This information, however, has not been communicated well to non-experts (including those working on security applications), who sometimes use the correlation coefficient without being aware of its problems. We discuss the disadvantages of the correlation coefficient and show specific examples of strikingly poor performance in the context of security.
DOWNLOAD: PDF [14 pages, 549KB]
CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 3, 2007, http://jps.anl.gov/
Paper 4 - Psychology in the Study of Physical Security
Edward George Bitzer and Andrew Hoffman
Considering the current global security environment the importance of good physical security is difficult to underestimate. And increasingly, physical security services are becoming a private rather than public service...
DOWNLOAD: PDF [18 pages, 102KB]
CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 4, 2007, http://jps.anl.gov/
Paper 5 - Creative Adversarial Vulnerability Assessments
Edward George Bitzer and Roger Johnston
DOWNLOAD: PDF [7 pages, 87KB]
CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 5, 2007, http://jps.anl.gov/
The articles are all in PDF format.
Download Adobe's Reader (free) to view documents in PDF format. Problem with PDF files?
HOW TO CITE JPS PAPERS
Each paper in the Journal of Physical Security is page numbered separately, starting with page 1 or i. Papers are best cited by Volume number, issue number, and Paper Number, plus date and the Journal’s Web address (http://jps.anl.gov/).