NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hirst, Russel – Journal of Technical Writing and Communication, 2020
This article considers best practices for writing articles in science, technology, and policy, focusing on writing for international scholarly journals in nuclear security. Its two main audiences are technical communication educators/researchers and internationals wishing to publish their work in English-medium scholarly journals. I discuss…
Descriptors: Content Area Writing, Writing for Publication, Best Practices, Periodicals
Peer reviewed Peer reviewed
Direct linkDirect link
Moran, Matthew; Hobbs, Christopher – British Journal of Educational Studies, 2018
In recent years, nuclear security has gained prominence on the international security agenda. Driven by post 9/11 anxieties and the politicization of fears regarding nuclear terrorism, concerns in this area have spawned a wealth of initiatives, which seek to counter this threat. Principal among these have been efforts to promote nuclear security…
Descriptors: Communities of Practice, Professional Development, Nuclear Energy, Cooperative Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Ambrose, Don – Roeper Review, 2016
Clair J. Sullivan is an assistant professor in the Department of Nuclear, Plasma and Radiological Engineering at the University of Illinois at Urbana-Champaign (UIUC). Her research interests include radiation detection and measurements; gamma-ray spectroscopy; automated isotope identification algorithms; nuclear forensics; nuclear security;…
Descriptors: STEM Education, Interviews, Engineering, Technical Occupations
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kuru, Hüseyin – Journal of Learning and Teaching in Digital Age, 2023
After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has…
Descriptors: Terrorism, Information Technology, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
Direct linkDirect link
Eschleman, Kevin J.; Mathieu, Michael; Cooper, Jehangir – Creativity Research Journal, 2017
The activities workers engage in during their personal time are likely to influence whether workers return to work feeling reenergized, refreshed, and fully rested. Two longitudinal studies were conducted to examine the importance of nonwork creative activity during the weekend on workers' state of feeling recovered at work on Monday. Job titles…
Descriptors: Creative Activities, Longitudinal Studies, Creativity, Correlation
Peer reviewed Peer reviewed
Direct linkDirect link
Konkankit, Chilaluck C.; Marker, Sierra C.; Bigham, Nicholas P.; Dale, Darren S.; Zax, David B.; Lorey, Daniel R., II; Wilson, Justin J. – Journal of Chemical Education, 2021
There currently exists a significant deficiency in the nuclear chemistry workforce within the United States, despite its importance in areas of medicine, national security, and energy. Poor coverage of this topic across many chemistry departments at the undergraduate level likely contributes to this shortage. Increasing interest and hands-on…
Descriptors: Science Experiments, Science Instruction, Chemistry, Nuclear Energy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
Direct linkDirect link
Kenneth J. Saltman – Review of Education, Pedagogy & Cultural Studies, 2024
From climate disaster to the specter of nuclear annihilation to the rise of fascism and destruction of democracy to the advent of AI and other potentially destructive technologies, a number of material threats are matched by symbolic threats that undermine the capacities of people to respond. The war on public and critical education and the public…
Descriptors: Ecology, Privatization, Environmental Education, Climate
Peer reviewed Peer reviewed
Direct linkDirect link
Braiko, Bohdan – Comparative Professional Pedagogy, 2019
The article deals with the content of training Masters in National Security at the UK universities. The problem of the state's national security in the context of the state's general development and the realization of its national interests has been actualized. It is noted that maintaining the national interests of any state world provides an…
Descriptors: Foreign Countries, Professional Training, Masters Programs, Masters Degrees
Peer reviewed Peer reviewed
Direct linkDirect link
Minnich, Brian G. – State Education Standard, 2019
School leaders are feeling conflicted about their school buildings. On the one hand, they want to provide children with safe, secure spaces. On the other, they want to provide open, collaborative, and exceptional 21st century learning environments. By taking a holistic approach, they can have both. It's important to remember that many current…
Descriptors: Educational Facilities Design, School Safety, Educational Environment, Holistic Approach
Morsey, Christopher – ProQuest LLC, 2017
In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…
Descriptors: Information Security, Computer Security, National Security, Energy
Peer reviewed Peer reviewed
Direct linkDirect link
Matzen, Laura E.; Stites, Mallory C.; Gastelum, Zoe. N. – Cognitive Research: Principles and Implications, 2021
Eye tracking is a useful tool for studying human cognition, both in the laboratory and in real-world applications. However, there are cases in which eye tracking is not possible, such as in high-security environments where recording devices cannot be introduced. After facing this challenge in our own work, we sought to test the effectiveness of…
Descriptors: Eye Movements, Identification, Measurement Equipment, Accuracy
Peer reviewed Peer reviewed
Direct linkDirect link
Hirst, Russel – Journal of Technical Writing and Communication, 2016
This article describes how a special kind of academe-industry collaboration--based on a joint appointment agreement between a university and an industry site--was set up, promoted, and experienced by a professor of technical communication and his student interns. To illustrate the nature and value of this kind of collaboration, the article…
Descriptors: School Business Relationship, Universities, Nuclear Energy, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Preston, John – Race, Ethnicity and Education, 2017
In the 1960s federal agencies in the US encouraged the building of protected schools designed to survive a nuclear attack. A number of designs, including underground schools, were constructed. In order to promote the building of protected schools, the US government produced a number of propaganda films for school boards and governors. In addition…
Descriptors: Educational History, United States History, War, National Security