A comparison between two leadership models for security checkpoints | IEEE Conference Publication | IEEE Xplore