The Journal of
Physical Security
ISSN 2157-8443

R.G. Johnston, Ph.D., CPP
Vulnerability Assessment
Argonne National Laboratory
9700 South Cass Ave. Argonne, IL 60439-4814
USA
phone: 630-252-6168
fax: 630-252-7323
email:
Roger Johnston on LinkedIn

Volume 2 (2007)

Table of Contents

Editor's Comments (Updated: April 2008)
Roger G. Johnston

DOWNLOAD: PDF document PDF [4 pages, 115KB]

CITE as: Journal of Physical Security, Vol. 2 no. 1, 2007, http://jps.anl.gov/

Paper 1 - Perceptions and the Social-Political Aspects of Nuclear Power and Nuclear Waste Disposal
James D. Ballard

The problems that many nuclear engineers, energy policy makers, industry officials, and risk regulators face when discussing the social and political aspects of their field can be summarized by one word: perception...

DOWNLOAD: PDF document PDF [22 pages, 95KB]

CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 1, 2007, http://jps.anl.gov/

Paper 2 - Culture Shock: Securing the Bomb is Hard to Do
James E. Doyle

Hundreds of organizations throughout the world, from secret directorates within national armed forces to university engineering departments have the responsibility of keeping nuclear weapons or nuclear materials safe from theft or misuse. How well can they do this critical job? Are there legal requirements for certain measurable security standards? How do they develop and maintain "best practices"? Will they be shut down or have their nuclear materials confiscated if poor security is proven?

DOWNLOAD: PDF document PDF [2 pages, 51KB]

CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 2, 2007, http://jps.anl.gov/

Paper 3 - The Ineffectiveness of the Correlation Coefficient for Image Comparisons
Eugene K. Yen and Roger G. Johnston

Pearson's r linear correlation coefficient is widely used for comparing images. Image processing experts appear to be cognizant of its serious limitations. This information, however, has not been communicated well to non-experts (including those working on security applications), who sometimes use the correlation coefficient without being aware of its problems. We discuss the disadvantages of the correlation coefficient and show specific examples of strikingly poor performance in the context of security.

DOWNLOAD: PDF document PDF [14 pages, 549KB]

CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 3, 2007, http://jps.anl.gov/

Paper 4 - Psychology in the Study of Physical Security
Edward George Bitzer and Andrew Hoffman

Considering the current global security environment the importance of good physical security is difficult to underestimate. And increasingly, physical security services are becoming a private rather than public service...

DOWNLOAD: PDF document PDF [18 pages, 102KB]

CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 4, 2007, http://jps.anl.gov/

Paper 5 - Creative Adversarial Vulnerability Assessments
Edward George Bitzer and Roger Johnston

DOWNLOAD: PDF document PDF [7 pages, 87KB]

CITE as: Journal of Physical Security, Vol. 2 no. 1, Paper 5, 2007, http://jps.anl.gov/

NOTES
The articles are all in PDF format.
Download Adobe's Reader (free) to view documents in PDF format. Problem with PDF files?

HOW TO CITE JPS PAPERS
Each paper in the Journal of Physical Security is page numbered separately, starting with page 1 or i. Papers are best cited by Volume number, issue number, and Paper Number, plus date and the Journal’s Web address (http://jps.anl.gov/).