Sample records for national cybersecurity center

  1. 78 FR 16471 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-15

    ...-02] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...) National Cybersecurity Center of Excellence (NCCoE) invited organizations to provide products and technical.... companies to enter into ``National Cybersecurity Excellence Partnerships'' (NCEPs) in furtherance of the...

  2. 78 FR 2953 - National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-15

    ...-01] National Cybersecurity Center of Excellence (NCCoE) Secure Exchange of Electronic Health... the National Cybersecurity Center of Excellence (NCCoE) in the Secure Exchange of Electronic Health... accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE will bring...

  3. The NSF Cybersecurity Center of Excellence: Translating Identity Management and Cybersecurity into Scientific Collaboration

    NASA Astrophysics Data System (ADS)

    Welch, V.

    2016-12-01

    Scientists care deeply about their collaborations: who is a member, who can access, produce, and correct data, and manager instruments critical to their science missions. The communities of cybersecurity and identity management professionals develop tools to support collaborations and the undertaking of trustworthy science, but there are large cultural and linguistic gaps between these communities and the scientists they service. The National Science Foundation has recently funded a NSF Cybersecurity Center of Excellence to help its community of projects by providing leadership and addressing the challenges of trustworthy science. A key goal of this NSF Center has been translating between the goals of the science community into requirements and risks understood by identity management and cybersecurity communities. This talk will give an update on the Center's efforts and other services it provides to the NSF community to bridge these cultures.

  4. 78 FR 61807 - National Cybersecurity Awareness Month, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-04

    ... National Cybersecurity Awareness Month, 2013 By the President of the United States of America A... public awareness about cybersecurity, and we recommit to enhancing the security and resilience of our... best practices for cybersecurity, increase information sharing between the Federal Government and...

  5. A Model for Establishing a Cybersecurity Center of Excellence

    ERIC Educational Resources Information Center

    Moskal, Edward J.

    2015-01-01

    In order to effectively ensure our continued technical advantage and future cybersecurity, we need a technologically skilled and cyber savvy workforce and an effective pipeline of future employees. Our Government has identified Cybersecurity as one of the most serious economic and national security challenges we face as a nation and has ear-marked…

  6. Professionalizing the Nation's Cybersecurity Workforce?: Criteria for Decision-Making

    ERIC Educational Resources Information Center

    National Academies Press, 2013

    2013-01-01

    "Professionalizing the Nation's Cybersecurity Workforce? Criteria for Decision-Making" considers approaches to increasing the professionalization of the nation's cybersecurity workforce. This report examines workforce requirements for cybersecurity and the segments and job functions in which professionalization is most needed;…

  7. National Electric Sector Cybersecurity Organization Resource (NESCOR)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    The goal of the National Electric Sector Cybersecurity Organization Resource (NESCOR) project was to address cyber security issues for the electric sector, particularly in the near and mid-term. The following table identifies the strategies from the DOE Roadmap to Achieve Energy Delivery Systems Cybersecurity published in September 2011 that are applicable to the NESCOR project.

  8. Subject Matter Expert Workshop to Identify Cybersecurity ...

    EPA Pesticide Factsheets

    Report In recognition of the growing need to better address cyber risk and cyber management, the U.S. Environmental Protection Agency’s (EPA) National Homeland Security Research Center (NHSRC) held a Subject Matter Expert Workshop to Identify Cybersecurity Research Gaps and Needs of the Nation’s Water and Wastewater Systems Sector on March 30th and 31st, 2016, at the Ronald Reagan Building in Washington, D.C. The workshop was designed to create a forum for subject matter experts (SMEs) to exchange ideas and address important cybersecurity challenges facing the water sector.

  9. Distributed Energy Resource (DER) Cybersecurity Standards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Saleem, Danish; Johnson, Jay

    This presentation covers the work that Sandia National Laboratories and National Renewable Energy Laboratory are doing for distributed energy resource cybersecurity standards, prepared for NREL's Annual Cybersecurity & Resilience Workshop on October 9-10, 2017.

  10. Cybersecurity Strategy in Developing Nations: A Jamaica Case Study

    ERIC Educational Resources Information Center

    Newmeyer, Kevin Patrick

    2014-01-01

    Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…

  11. Cybersecurity Dynamics

    DTIC Science & Technology

    2014-08-20

    of Cybersecurity Dynamics emerged. Intuitively, Cybersecurity Dynamics describes the evolution of cybersecurity state as caused by cyber attack...Dynamics emerged. Intuitively, Cybersecurity Dynamics describes the evolution of cybersecurity state as caused by cyber attack-defense interactions...evolution of cyberse- curity state as caused by cyber attack-defense interactions. By studying Cybersecurity Dynamics, we can characterize the

  12. Cybersecurity for Critical Infrastructure

    DTIC Science & Technology

    2015-04-01

    cybersecurity methods, attackers would have to use different methods to take down a dam in Alabama from the methods to take down the Hoover Dam ...i AU/ACSC/BAKER/AY15 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY CYBERSECURITY FOR CRITICAL INFRASTRUCTURE by Christopher J...Authority………………………………………………………………..13 Current National Guard Cybersecurity Utilization………………………………………14 Leveraging the Guard……………………………………………………………………17

  13. 78 FR 18954 - Incentives To Adopt Improved Cybersecurity Practices

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-28

    ... [Docket Number 130206115-3115-01] Incentives To Adopt Improved Cybersecurity Practices AGENCY: U.S... infrastructure and other interested entities of the Cybersecurity Framework being developed by the National... on the Internet Policy Task Force Web page at http://www.ntia.doc.gov/category/cybersecurity . For...

  14. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours.

    PubMed

    Hadlington, Lee

    2017-07-01

    The present study explored the relationship between risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, Internet addiction, and impulsivity. 538 participants in part-time or full-time employment in the UK completed an online questionnaire, with responses from 515 being used in the data analysis. The survey included an attitude towards cybercrime and cybersecurity in business scale, a measure of impulsivity, Internet addiction and a 'risky' cybersecurity behaviours scale. The results demonstrated that Internet addiction was a significant predictor for risky cybersecurity behaviours. A positive attitude towards cybersecurity in business was negatively related to risky cybersecurity behaviours. Finally, the measure of impulsivity revealed that both attentional and motor impulsivity were both significant positive predictors of risky cybersecurity behaviours, with non-planning being a significant negative predictor. The results present a further step in understanding the individual differences that may govern good cybersecurity practices, highlighting the need to focus directly on more effective training and awareness mechanisms.

  15. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office, DHS. ACTION: 30-Day Notice and request for comments; New Collection (Request for...

  16. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-12

    ... Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office, DHS. ACTION: 60-Day Notice and request for comments; New Collection (Request for...

  17. National Institute of Standards and Technology (NIST) cybersecurity risk management framework applied to modern vehicles

    DOT National Transportation Integrated Search

    2014-10-01

    The primary objective of the work described in this report is to review the National Institute of Science and Technology (NIST) guidelines and foundational publications from an automotive : cybersecurity risk management stand-point. The NIST approach...

  18. National Cyberethics, Cybersafety, Cybersecurity Baseline Study

    ERIC Educational Resources Information Center

    Education Digest: Essential Readings Condensed for Quick Review, 2009

    2009-01-01

    This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…

  19. 75 FR 27006 - Toward a Federal Cybersecurity Research Agenda: Three Game-Changing Themes

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-13

    ... NATIONAL SCIENCE FOUNDATION Toward a Federal Cybersecurity Research Agenda: Three Game- Changing... cybersecurity game-change research and development agenda. This request for information will be active from May... to exemplify and motivate future Federal cybersecurity game-change research activities: (a) Tailored...

  20. 75 FR 27007 - Toward a Federal Cybersecurity Research Agenda: Three Game-changing Themes

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-13

    ... NATIONAL SCIENCE FOUNDATION Toward a Federal Cybersecurity Research Agenda: Three Game- changing... development (R&D) themes to exemplify and motivate future Federal game-change cybersecurity research... these Federal cybersecurity game-change R&D objectives and will provide insights into the priorities...

  1. 78 FR 37521 - Proposed Establishment of a Federally Funded Research and Development Center-Second Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-21

    ... collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies. This..., Gaithersburg, MD 20899-1640. SUPPLEMENTARY INFORMATION: The National Cybersecurity Center of Excellence (NCCoE... cybersecurity tools and technologies. The NCCoE will bring together experts from industry, government and...

  2. Applying the Scientific Method of Cybersecurity Research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tardiff, Mark F.; Bonheyo, George T.; Cort, Katherine A.

    The cyber environment has rapidly evolved from a curiosity to an essential component of the contemporary world. As the cyber environment has expanded and become more complex, so have the nature of adversaries and styles of attacks. Today, cyber incidents are an expected part of life. As a result, cybersecurity research emerged to address adversarial attacks interfering with or preventing normal cyber activities. Historical response to cybersecurity attacks is heavily skewed to tactical responses with an emphasis on rapid recovery. While threat mitigation is important and can be time critical, a knowledge gap exists with respect to developing the sciencemore » of cybersecurity. Such a science will enable the development and testing of theories that lead to understanding the broad sweep of cyber threats and the ability to assess trade-offs in sustaining network missions while mitigating attacks. The Asymmetric Resilient Cybersecurity Initiative at Pacific Northwest National Laboratory is a multi-year, multi-million dollar investment to develop approaches for shifting the advantage to the defender and sustaining the operability of systems under attack. The initiative established a Science Council to focus attention on the research process for cybersecurity. The Council shares science practices, critiques research plans, and aids in documenting and reporting reproducible research results. The Council members represent ecology, economics, statistics, physics, computational chemistry, microbiology and genetics, and geochemistry. This paper reports the initial work of the Science Council to implement the scientific method in cybersecurity research. The second section describes the scientific method. The third section in this paper discusses scientific practices for cybersecurity research. Section four describes initial impacts of applying the science practices to cybersecurity research.« less

  3. Comparing Canadian and American cybersecurity awareness levels: Educational strategies to increase public awareness

    NASA Astrophysics Data System (ADS)

    Hoggard, Amy

    Cybersecurity awareness is an important issue that affects everyone who uses a computer or a mobile device. Canada and the United States both recognize the value of mitigating cybersecurity risks in terms of national safety, economic stability and protection of their citizens. The research performed compared the levels of cybersecurity awareness in Canadian and American Internet users. Canadian and American users were equally aware of cybersecurity measures, but were not implementing best practices to keep themselves safe. The research suggested users needed to understand why a cybersecurity measure was important before being motivated to implement it. Educational strategies were reviewed in both Canada and the United States and it was determined that although there were significant resources available, they were not being utilized by both the educators and the public. In order to increase cybersecurity awareness levels, nations should focus on increasing the public's awareness by using various types of messaging, such as cartoons, in media. One possible consideration is a compulsory awareness model before accessing the Internet. Cybersecurity topics should be included in the curriculum for students at all levels of education and a focus on providing training and resources to teachers will help increase the cybersecurity knowledge of children and youth.

  4. The National Higher Education and Workforce Initiative: Strategy in Action: Building the Cybersecurity Workforce in Maryland

    ERIC Educational Resources Information Center

    Business-Higher Education Forum, 2014

    2014-01-01

    The Business-Higher Education Forum (BHEF) has achieved particular success in operationalizing the National Higher Education and Workforce Initiative (HEWI) in Maryland around cybersecurity. Leveraging its membership of corporate CEOs, university presidents, and government agency leaders, BHEF partnered with the University System of Maryland to…

  5. States of Cybersecurity: Electricity Distribution System Discussions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pena, Ivonne; Ingram, Michael; Martin, Maurice

    State and local entities that oversee the reliable, affordable provision of electricity are faced with growing and evolving threats from cybersecurity risks to our nation's electricity distribution system. All-hazards system resilience is a shared responsibility among electric utilities and their regulators or policy-setting boards of directors. Cybersecurity presents new challenges and should be a focus for states, local governments, and Native American tribes that are developing energy-assurance plans to protect critical infrastructure. This research sought to investigate the implementation of governance and policy at the distribution utility level that facilitates cybersecurity preparedness to inform the U.S. Department of Energy (DOE),more » Office of Energy Policy and Systems Analysis; states; local governments; and other stakeholders on the challenges, gaps, and opportunities that may exist for future analysis. The need is urgent to identify the challenges and inconsistencies in how cybersecurity practices are being applied across the United States to inform the development of best practices, mitigations, and future research and development investments in securing the electricity infrastructure. By examining the current practices and applications of cybersecurity preparedness, this report seeks to identify the challenges and persistent gaps between policy and execution and reflect the underlying motivations of distinct utility structures as they play out at the local level. This study aims to create an initial baseline of cybersecurity preparedness within the distribution electricity sector. The focus of this study is on distribution utilities not bound by the cybersecurity guidelines of the North American Electric Reliability Corporation (NERC) to examine the range of mechanisms taken by state regulators, city councils that own municipal utilities, and boards of directors of rural cooperatives.« less

  6. 76 FR 7870 - Agency Information Collection Activities: Cybersecurity and Communications Technical Assistance...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0006] Agency Information Collection Activities: Cybersecurity and Communications Technical Assistance Request and Evaluation AGENCY: National... Programs Directorate (NPPD), Office of Cybersecurity and Communications (CS&C), Office of Emergency...

  7. Cybersecurity Implications for Industry, Academia, and Parents: A Qualitative Case Study in NSF STEM Education

    NASA Astrophysics Data System (ADS)

    Stevenson, Gregory V.

    Rationale: Former President Barack Obama's 3.9 trillion for the 2015 fiscal year budget request included a 2.9 billion investment in Science, Technology, Engineering and Math (STEM) education. Research then showed that the national spending for cybersecurity has exceeded $10.7 billion in the 2015 fiscal year. Nonetheless, the number of cyberattacks has risen year after year since 2012, potentially due to the lack of education and training in cybersecurity. Methodology: A qualitative case study research was conducted to explore and investigate the lived professional experiences of experts from San Antonio Texas whose efforts were aligned to increase the number of qualified cybersecurity professionals. To qualify the organizational needs for cybersecurity professionals, the study gathered expert opinions by surveying human resource managers pertaining to the needs of cybersecurity education. To refine and further validate data collection efforts, the study involved researcher observations and a survey of a narrow cohort to perform analytic induction to eliminate bias and exhaust the exploratory research (Maxwell, 2005). Result: The findings of the case study will: 1) help augment the importance of cybersecurity education in pre-kindergarten through 12th grade, 2) be utilized as a single guide for school leaders in the process of developing cybersecurity education strategies, and 3) in the longer term, be used by the National Sciences Foundation (NSF) as an effective model to institute cybersecurity education practices nationwide and thereby reduce the existing trouble of the nation by criminal cyber actors.

  8. Offensive Cybersecurity in the NIST Cybersecurity Framework

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bulyk, Mykhaylo; Evans, Dr. Nathaniel

    Government and corporate computer systems are attacked, networks are penetrated by hackers, and enterprises are protected by demilitarized zones. Language that until recently was used to describe security and warfare in military settings has now become common-place in cybersecurity discussions. The concepts of pre-emptive attack, counterattack and offensive defense fit the linguistic cultural thread of security in cyberspace, at least in part due to the taxonomy adopted by cybersecurity as a discipline.

  9. Defense Cybersecurity: Opportunities Exist for DOD to Share Cybersecurity Resources with Small Businesses

    DTIC Science & Technology

    2015-09-01

    risk self- Communications identified by small businesses . The guidance Commission includes links to addit ional cybersecurity resources...Working Group 4: Final Report. The report’s appendix provides cybersecurity risk management and best practice recommendations for small and medium...including small businesses . Cybersecurity education for risk assessment and planning. These programs provide education and training that small

  10. 77 FR 76537 - Notice of Extension of Public Comment Period: Request for Comments (RFC)-Federal Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-28

    ... Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program,'' a framework for... (RFC)--Federal Cybersecurity Research and Development Strategic Plan AGENCY: The National Coordination... 76538

  11. Wireless Cybersecurity

    DTIC Science & Technology

    2013-04-01

    completely change the entire landscape. For example, under the quantum computing regime, factoring prime numbers requires only polynomial time (i.e., Shor’s...AFRL-OSR-VA-TR-2013-0206 Wireless Cybersecurity Biao Chen Syracuse University April 2013 Final Report DISTRIBUTION A...19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code) 21-02-2013 FINAL REPORT 01-04-2009 TO 30-11-2012 Wireless Cybersecurity

  12. Evaluating the Maturity of Cybersecurity Programs for Building Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Somasundaram, Sriram; Mylrea, Michael E.

    The cyber-physical security threat to buildings is complex, non-linear, and rapidly evolving as operational and information technologies converge and connect buildings to cyberspace. Cyberattacks on buildings can exploit smart building controls and breach corporate networks, causing financial and reputational damage. This may result in the loss of sensitive building information or the disruption of, or damage to, the systems necessary for the safe and efficient operation of buildings. For the buildings and facility infrastructure, there is a need for a robust national cybersecurity strategy for buildings, guidance on the selection and implementation of appropriate cybersecurity controls for buildings, an approachmore » to evaluate the maturity and adequacy of the cybersecurity programs. To provide an approach for evaluating the maturity of the cybersecurity programs for building control systems, the US Department of Energy’s widely used Cybersecurity Capability and Maturity Model (C2M2) has been adapted into a building control systems version. The revised model, the Buildings-C2M2 (B-C2M2) provides maturity level indicators for cybersecurity programmatic domains. A “B-C2M2 Lite” version allows facility managers and building control system engineers, or information technology personnel to perform rapid self-assessments of their cybersecurity program. Both tools have been pilot tested on several facilities. This paper outlines the concept of a maturity model, describes the B-C2M2 tools, presents results and observations from the pilot assessments, and lays out plans for future work.« less

  13. Protecting Information: The Role of Community Colleges in Cybersecurity Education. A Report from a Workshop Sponsored by the National Science Foundation and the American Association of Community Colleges (Washington, DC, June 26-28, 2002).

    ERIC Educational Resources Information Center

    American Association of Community Colleges, Washington, DC.

    The education and training of the cybersecurity workforce is an essential element in protecting the nation's computer and information systems. On June 26-28, 2002, the National Science Foundation supported a cybersecurity education workshop hosted by the American Association of Community Colleges. The goals of the workshop were to map out the role…

  14. Measuring Cybersecurity Competency: An Exploratory Investigation of the Cybersecurity Knowledge, Skills, and Abilities Necessary for Organizational Network Access Privileges

    ERIC Educational Resources Information Center

    Nilsen, Richard K.

    2017-01-01

    Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…

  15. Automated Program Analysis for Cybersecurity (APAC)

    DTIC Science & Technology

    2016-07-14

    AUTOMATED PROGRAM ANALYSIS FOR CYBERSECURITY (APAC) FIVE DIRECTIONS, INC JULY 2016 FINAL TECHNICAL REPORT APPROVED... CYBERSECURITY (APAC) 5a. CONTRACT NUMBER FA8750-14-C-0050 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER 61101E 6. AUTHOR(S) William Arbaugh...AC Team Adversarial Challenge Team, responsible for creating malicious applications APAC Automated Program Analysis for Cybersecurity BAE BAE Systems

  16. Invest to Improve: The Cybersecurity Talent Deficit

    ERIC Educational Resources Information Center

    Business-Higher Education Forum, 2017

    2017-01-01

    "Invest to Improve: The Cybersecurity Talent Deficit" provides recommendations for cybersecurity stakeholders--employers, government agencies, and higher education institutions--to enable regional partnerships to meet today's cybersecurity skills needs. This report combines data from a 2017 Gallup survey of business executives and higher…

  17. Cybersecurity Figure of Merit

    DTIC Science & Technology

    2016-04-30

    qÜáêíÉÉåíÜ=^ååì~ä= ^Åèìáëáíáçå=oÉëÉ~êÅÜ= póãéçëáìã= tÉÇåÉëÇ~ó=pÉëëáçåë= sçäìãÉ=f= = Cybersecurity Figure of Merit CAPT Brian Erickson, USN, SPAWAR...Operational and Developmental Dimensions of Cybersecurity Wednesday, May 4, 2016 3:30 p.m. – 5:00 p.m. Chair: Rear Admiral David H. Lewis, USN, Commander...Space and Naval Warfare Systems Command The Cybersecurity Challenge in Acquisition Sonia Kaestner, Adjunct Professor, McDonough School of Business

  18. Cybersecurity in Artificial Pancreas Experiments.

    PubMed

    O'Keeffe, Derek T; Maraka, Spyridoula; Basu, Ananda; Keith-Hynes, Patrick; Kudva, Yogish C

    2015-09-01

    Medical devices have transformed modern health care, and ongoing experimental medical technology trials (such as the artificial pancreas) have the potential to significantly improve the treatment of several chronic conditions, including diabetes mellitus. However, we suggest that, to date, the essential concept of cybersecurity has not been adequately addressed in this field. This article discusses several key issues of cybersecurity in medical devices and proposes some solutions. In addition, it outlines the current requirements and efforts of regulatory agencies to increase awareness of this topic and to improve cybersecurity.

  19. Cybersecurity in Artificial Pancreas Experiments

    PubMed Central

    O'Keeffe, Derek T.; Maraka, Spyridoula; Basu, Ananda; Keith-Hynes, Patrick

    2015-01-01

    Abstract Medical devices have transformed modern health care, and ongoing experimental medical technology trials (such as the artificial pancreas) have the potential to significantly improve the treatment of several chronic conditions, including diabetes mellitus. However, we suggest that, to date, the essential concept of cybersecurity has not been adequately addressed in this field. This article discusses several key issues of cybersecurity in medical devices and proposes some solutions. In addition, it outlines the current requirements and efforts of regulatory agencies to increase awareness of this topic and to improve cybersecurity. PMID:25923544

  20. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  1. Cybersecurity in Hospitals: A Systematic, Organizational Perspective

    PubMed Central

    Kaiser, Jessica P

    2018-01-01

    Background Cybersecurity incidents are a growing threat to the health care industry in general and hospitals in particular. The health care industry has lagged behind other industries in protecting its main stakeholder (ie, patients), and now hospitals must invest considerable capital and effort in protecting their systems. However, this is easier said than done because hospitals are extraordinarily technology-saturated, complex organizations with high end point complexity, internal politics, and regulatory pressures. Objective The purpose of this study was to develop a systematic and organizational perspective for studying (1) the dynamics of cybersecurity capability development at hospitals and (2) how these internal organizational dynamics interact to form a system of hospital cybersecurity in the United States. Methods We conducted interviews with hospital chief information officers, chief information security officers, and health care cybersecurity experts; analyzed the interview data; and developed a system dynamics model that unravels the mechanisms by which hospitals build cybersecurity capabilities. We then use simulation analysis to examine how changes to variables within the model affect the likelihood of cyberattacks across both individual hospitals and a system of hospitals. Results We discuss several key mechanisms that hospitals use to reduce the likelihood of cybercriminal activity. The variable that most influences the risk of cyberattack in a hospital is end point complexity, followed by internal stakeholder alignment. Although resource availability is important in fueling efforts to close cybersecurity capability gaps, low levels of resources could be compensated for by setting a high target level of cybersecurity. Conclusions To enhance cybersecurity capabilities at hospitals, the main focus of chief information officers and chief information security officers should be on reducing end point complexity and improving internal stakeholder

  2. Evaluation of Roadmap to Achieve Energy Delivery Systems Cybersecurity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.

    The Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) Cybersecurity for Energy Delivery Systems (CEDS) program is currently evaluating the Roadmap to Achieve Energy Delivery Systems Cybersecurity document that sets a vision and outlines a set of milestones. The milestones are divided into five strategic focus areas that include: 1. Build a Culture of Security; 2. Assess and Monitor Risk; 3. Develop and Implement New Protective Measures to Reduce Risk; 4. Manage Incidents; and 5. Sustain Security Improvements. The most current version of the roadmap was last updated in September of 2016. Sandia National Laboratories (SNL) has beenmore » tasked with revisiting the roadmap to update the current state of energy delivery systems cybersecurity protections. SNL is currently working with previous and current partners to provide feedback on which of the roadmap milestones have been met and to identify any preexisting or new gaps that are not addressed by the roadmap. The specific focus areas SNL was asked to evaluate are: 1. Develop and Implement New Protective Measures to Reduce Risk and 2. Sustain Security Improvements. SNL has formed an Industry Advisory Board (IAB) to assist in answering these questions. The IAB consists of previous partners on past CEDS funded efforts as well as new collaborators that have unique insights into the current state of cybersecurity within energy delivery systems. The IAB includes asset owners, utilities and vendors of control systems. SNL will continue to maintain regular communications with the IAB to provide various perspectives on potential future updates to further improve the breadth of cybersecurity coverage of the roadmap.« less

  3. Assessing the Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills toward Computer Misuse Intention at Government Agencies

    ERIC Educational Resources Information Center

    Choi, Min Suk

    2013-01-01

    Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common…

  4. Cybersecurity in Hospitals: A Systematic, Organizational Perspective.

    PubMed

    Jalali, Mohammad S; Kaiser, Jessica P

    2018-05-28

    Cybersecurity incidents are a growing threat to the health care industry in general and hospitals in particular. The health care industry has lagged behind other industries in protecting its main stakeholder (ie, patients), and now hospitals must invest considerable capital and effort in protecting their systems. However, this is easier said than done because hospitals are extraordinarily technology-saturated, complex organizations with high end point complexity, internal politics, and regulatory pressures. The purpose of this study was to develop a systematic and organizational perspective for studying (1) the dynamics of cybersecurity capability development at hospitals and (2) how these internal organizational dynamics interact to form a system of hospital cybersecurity in the United States. We conducted interviews with hospital chief information officers, chief information security officers, and health care cybersecurity experts; analyzed the interview data; and developed a system dynamics model that unravels the mechanisms by which hospitals build cybersecurity capabilities. We then use simulation analysis to examine how changes to variables within the model affect the likelihood of cyberattacks across both individual hospitals and a system of hospitals. We discuss several key mechanisms that hospitals use to reduce the likelihood of cybercriminal activity. The variable that most influences the risk of cyberattack in a hospital is end point complexity, followed by internal stakeholder alignment. Although resource availability is important in fueling efforts to close cybersecurity capability gaps, low levels of resources could be compensated for by setting a high target level of cybersecurity. To enhance cybersecurity capabilities at hospitals, the main focus of chief information officers and chief information security officers should be on reducing end point complexity and improving internal stakeholder alignment. These strategies can solve cybersecurity

  5. Integrating Top-down and Bottom-up Cybersecurity Guidance using XML

    PubMed Central

    Lubell, Joshua

    2016-01-01

    This paper describes a markup-based approach for synthesizing disparate information sources and discusses a software implementation of the approach. The implementation makes it easier for people to use two complementary, but differently structured, guidance specifications together: the (top-down) Cybersecurity Framework and the (bottom-up) National Institute of Standards and Technology Special Publication 800-53 security control catalog. An example scenario demonstrates how the software implementation can help a security professional select the appropriate safeguards for restricting unauthorized access to an Industrial Control System. The implementation and example show the benefits of this approach and suggest its potential application to disciplines other than cybersecurity. PMID:27795810

  6. 75 FR 36633 - Cybersecurity and Innovation in the Information Economy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ...The National Institute of Standards and Technology (NIST), the National Telecommunications and Information Administration (NTIA), and the International Trade Administration (ITA), on behalf of the U.S. Department of Commerce (Department), will hold a public meeting on July 27, 2010, to discuss the relationship between cybersecurity in the commercial space and innovation in the Internet economy.

  7. Integrating Cybersecurity into the Program Management Organization

    DTIC Science & Technology

    2015-05-13

    penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 13 MAY 2015 2...Threat to our National Economy DOD Cybersecurity Gaps Could Be Canary in Federal Acquisition Coal Mine Intangible Assets Create Vulnerabilities...operational approach integrates with current or planned CONOPS, BCP, information architecture, programs or initiatives Development  Approach to

  8. Cybersecurity Curriculum Development: Introducing Specialties in a Graduate Program

    ERIC Educational Resources Information Center

    Bicak, Ali; Liu, Michelle; Murphy, Diane

    2015-01-01

    The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…

  9. Cybersecurity:The Road Ahead for Defense Acquisition

    DTIC Science & Technology

    2016-06-01

    tion programs. A key challenge for DoD acquisition addressing the cyber threat is how do we “ bake in” cybersecurity for our DoD ac- quisition programs...cybersecurity must be “ baked in” the design of our warfighting systems. Supporting policy and best practices for effective cyberse- curity in acquisition...contacted at steve.mills@dau.mil and steve.monks@ dau.mil. A key challenge for DoD acquisition addressing the cyber threat is how do we “ bake in” cybersecurity for our DoD acquisition programs vs. “bolting it on.”

  10. Introduction: Cybersecurity and Software Assurance Minitrack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burns, Luanne; George, Richard; Linger, Richard C

    Modern society is dependent on software systems of remarkable scope and complexity. Yet methods for assuring their security and functionality have not kept pace. The result is persistent compromises and failures despite best efforts. Cybersecurity methods must work together for situational awareness, attack prevention and detection, threat attribution, minimization of consequences, and attack recovery. Because defective software cannot be secure, assurance technologies must play a central role in cybersecurity approaches. There is increasing recognition of the need for rigorous methods for cybersecurity and software assurance. The goal of this minitrack is to develop science foundations, technologies, and practices that canmore » improve the security and dependability of complex systems.« less

  11. ASCR Cybersecurity for Scientific Computing Integrity - Research Pathways and Ideas Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peisert, Sean; Potok, Thomas E.; Jones, Todd

    At the request of the U.S. Department of Energy's (DOE) Office of Science (SC) Advanced Scientific Computing Research (ASCR) program office, a workshop was held June 2-3, 2015, in Gaithersburg, MD, to identify potential long term (10 to +20 year) cybersecurity fundamental basic research and development challenges, strategies and roadmap facing future high performance computing (HPC), networks, data centers, and extreme-scale scientific user facilities. This workshop was a follow-on to the workshop held January 7-9, 2015, in Rockville, MD, that examined higher level ideas about scientific computing integrity specific to the mission of the DOE Office of Science. Issues includedmore » research computation and simulation that takes place on ASCR computing facilities and networks, as well as network-connected scientific instruments, such as those run by various DOE Office of Science programs. Workshop participants included researchers and operational staff from DOE national laboratories, as well as academic researchers and industry experts. Participants were selected based on the submission of abstracts relating to the topics discussed in the previous workshop report [1] and also from other ASCR reports, including "Abstract Machine Models and Proxy Architectures for Exascale Computing" [27], the DOE "Preliminary Conceptual Design for an Exascale Computing Initiative" [28], and the January 2015 machine learning workshop [29]. The workshop was also attended by several observers from DOE and other government agencies. The workshop was divided into three topic areas: (1) Trustworthy Supercomputing, (2) Extreme-Scale Data, Knowledge, and Analytics for Understanding and Improving Cybersecurity, and (3) Trust within High-end Networking and Data Centers. Participants were divided into three corresponding teams based on the category of their abstracts. The workshop began with a series of talks from the program manager and workshop chair, followed by the leaders for each of the

  12. Multi-Scenario Use Case based Demonstration of Buildings Cybersecurity Framework Webtool

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gourisetti, Sri Nikhil G.; Mylrea, Michael E.; Gervais, Easton L.

    The purpose of this paper is to demonstrate the cybersecurity and software capabilities of Buildings Cybersecurity Framework (BCF) webtool. The webtool is designed based on BCF document and existing NIST standards. It’s capabilities and features are depicted through a building usecase with four different investment scenarios geared towards improving the cybersecurity posture of the building. BCF webtool also facilitates implementation of the goals outlined in Presidential Executive Order (EO) on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (May 2017. In realization of the EO goals, BCF includes five core elements: Identify, Protect, Detect, Respond, and Recover, to helpmore » determine various policy and process level vulnerabilities and provide mitigation strategies. With the BCF webtool, an organization can perform a cybersecurity self-assessment; determine the current cybersecurity posture; define investment based goals to achieve a target state; connect the cybersecurity posture with business processes, functions, and continuity; and finally, develop plans to answer critical organizational cybersecurity questions. In this paper, the webtool and its core capabilities are depicted by performing an extensive comparative assessment over four different scenarios.« less

  13. Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students

    ERIC Educational Resources Information Center

    Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E.

    2017-01-01

    The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…

  14. Building a Cybersecurity Workforce with Remote Labs

    ERIC Educational Resources Information Center

    Martin, Nancy; Woodward, Belle

    2013-01-01

    Now more than ever, cybersecurity professionals are in demand and the trend is not expected to change anytime soon. Currently, only a small number of educational programs are funded and equipped to educate cybersecurity professionals and those few programs cannot train a workforce of thousands in a relatively short period of time. Moreover, not…

  15. Creating a National Framework for Cybersecurity: An Analysis of Issues and Options

    DTIC Science & Technology

    2005-02-22

    of those measures; and the associated field of professional endeavor. Virtually any element of cyberspace can be at risk , and the degree of...weaknesses in U.S. cybersecurity is an area of some controversy. However, some components appear to be sources of potentially significant risk because either...security into enterprise architecture, using risk management, and using metrics. These different approaches all have different strengths and weaknesses

  16. Cybersecurity Intrusion Detection and Monitoring for Field Area Network: Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pietrowicz, Stanley

    This report summarizes the key technical accomplishments, industry impact and performance of the I2-CEDS grant entitled “Cybersecurity Intrusion Detection and Monitoring for Field Area Network”. Led by Applied Communication Sciences (ACS/Vencore Labs) in conjunction with its utility partner Sacramento Municipal Utility District (SMUD), the project accelerated research on a first-of-its-kind cybersecurity monitoring solution for Advanced Meter Infrastructure and Distribution Automation field networks. It advanced the technology to a validated, full-scale solution that detects anomalies, intrusion events and improves utility situational awareness and visibility. The solution was successfully transitioned and commercialized for production use as SecureSmart™ Continuous Monitoring. Discoveries made withmore » SecureSmart™ Continuous Monitoring led to tangible and demonstrable improvements in the security posture of the US national electric infrastructure.« less

  17. Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress

    DTIC Science & Technology

    2009-09-30

    responsibilities of cybersecurity stakeholders. Privacy and civil liberties—maintaining privacy and freedom of speech protections on the Internet...securing networks before tackling the attendant issues such as freedom of speech , privacy, and civil liberty protections as they pertain to the Internet...legislation to mandate privacy and freedom of speech protections to be incorporated into a national strategy. • Assessing current congressional

  18. 77 FR 30517 - Electricity Subsector Cybersecurity Risk Management Process

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-23

    ... DEPARTMENT OF ENERGY Electricity Subsector Cybersecurity Risk Management Process AGENCY: Office of Electricity Delivery and Energy Reliability, Department of Energy. ACTION: Notice of publication. SUMMARY... Electricity Subsector Cybersecurity Risk Management Process guideline. The guideline describes a risk...

  19. A combined system for 3D printing cybersecurity

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-06-01

    Previous work has discussed the impact of cybersecurity breaches on 3D printed objects. Multiple attack types that could weaken objects, make them unsuitable for certain applications and even create safety hazards have been presented. This paper considers a visible light sensing-based verification system's efficacy as a means of thwarting cybersecurity threats to 3D printing. This system detects discrepancies between expected and actual printed objects (based on an independent pristine CAD model). Whether reliance on an independent CAD model is appropriate is also considered. The future of 3D printing is projected and the importance of cybersecurity in this future is discussed.

  20. Cybersecurity and the Medical Device Product Development Lifecycle.

    PubMed

    Jones, Richard W; Katzis, Konstantinos

    2017-01-01

    Protecting connected medical devices from evolving cyber related threats, requires a continuous lifecycle approach whereby cybersecurity is integrated within the product development lifecycle and both complements and re-enforces the safety risk management processes therein. This contribution reviews the guidance relating to medical device cybersecurity within the product development lifecycle.

  1. The Role of Healthcare Technology Management in Facilitating Medical Device Cybersecurity.

    PubMed

    Busdicker, Mike; Upendra, Priyanka

    2017-09-02

    This article discusses the role of healthcare technology management (HTM) in medical device cybersecurity and outlines concepts that are applicable to HTM professionals at a healthcare delivery organization or at an integrated delivery network, regardless of size. It provides direction for HTM professionals who are unfamiliar with the security aspects of managing healthcare technologies but are familiar with standards from The Joint Commission (TJC). It provides a useful set of recommendations, including relevant references for incorporating good security practices into HTM practice. Recommendations for policies, procedures, and processes referencing TJC standards are easily applicable to HTM departments with limited resources and to those with no resource concerns. The authors outline processes from their organization as well as best practices learned through information sharing at AAMI, National Health Information Sharing and Analysis Center (NH-ISAC), and Medical Device Innovation, Safety, and Security Consortium (MDISS) conferences and workshops.

  2. 77 FR 58980 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-25

    ... technology security, --Cybersecurity Updates from Director of Cybersecurity, White House, --Presentation on... communications across federal agencies with the National Cybersecurity and Communications Integration Center...

  3. 3 CFR 13636 - Executive Order 13636 of February 12, 2013. Improving Critical Infrastructure Cybersecurity

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow... resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages...

  4. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment

    PubMed Central

    King, Zoe M.; Henshel, Diane S.; Flora, Liberty; Cains, Mariana G.; Hoffman, Blaine; Sample, Char

    2018-01-01

    Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA) has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual’s intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of interviewing

  5. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.

    PubMed

    King, Zoe M; Henshel, Diane S; Flora, Liberty; Cains, Mariana G; Hoffman, Blaine; Sample, Char

    2018-01-01

    Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA) has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual's intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of interviewing malicious

  6. Social Representations of Cybersecurity by University Students and Implications for Instructional Design

    ERIC Educational Resources Information Center

    Pawlowski, Suzanne D.; Jung, Yoonhyuk

    2015-01-01

    Cybersecurity has become an essential topic in introductory information systems (IS) core courses. As an aid to course design, the exploratory research in this paper uses a social representations lens to elucidate the perceptions of cybersecurity and cybersecurity threats held by students. Analysis of qualitative survey data from 152 students at a…

  7. 77 FR 13585 - Electricity Subsector Cybersecurity Risk Management Process Guideline

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-07

    ... DEPARTMENT OF ENERGY Electricity Subsector Cybersecurity Risk Management Process Guideline AGENCY: Office of Electricity Delivery and Energy Reliability, Department of Energy. ACTION: Notice of public... Electricity Subsector Cybersecurity Risk Management Process guideline. The guideline describes a risk...

  8. Cybersecurity: Utilizing Fusion Centers to Protect State, Local, Tribal, and Territorial Entities Against Cyber Threats

    DTIC Science & Technology

    2016-09-01

    PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9...state- and local-level computer networks fertile ground for the cyber adversary. This research focuses on the threat to SLTT computer networks and how...institutions, and banking systems. The array of responsibilities and the cybersecurity threat landscape make state- and local-level computer networks fertile

  9. 76 FR 57723 - Electricity Sector Cybersecurity Risk Management Process Guideline

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-16

    ... DEPARTMENT OF ENERGY Electricity Sector Cybersecurity Risk Management Process Guideline AGENCY... public comment on DOE's intent to publish the Electricity Sector Cybersecurity Risk Management Process... electricity sector organizations and adds to the body of resources that help refine the definition and...

  10. Cybersecurity and Optimization in Smart “Autonomous” Buildings

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup

    Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less

  11. Maintaining a Cybersecurity Curriculum: Professional Certifications as Valuable Guidance

    ERIC Educational Resources Information Center

    Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava

    2017-01-01

    Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…

  12. Cybersecurity for Connected Diabetes Devices

    PubMed Central

    Klonoff, David C.

    2015-01-01

    Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. PMID:25883162

  13. Cybersecurity for Connected Diabetes Devices.

    PubMed

    Klonoff, David C

    2015-04-16

    Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. © 2015 Diabetes Technology Society.

  14. Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes

    ERIC Educational Resources Information Center

    Parekh, Geet; DeLatte, David; Herman, Geoffrey L.; Oliva, Linda; Phatak, Dhananjay; Scheponik, Travis; Sherman, Alan T.

    2018-01-01

    This paper presents and analyzes results of two Delphi processes that polled cybersecurity experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These ratings can be used to identify core concepts--cross-cutting ideas that connect knowledge in the discipline. The first Delphi process identified core concepts that…

  15. A novel approach to quantify cybersecurity for electric power systems

    NASA Astrophysics Data System (ADS)

    Kaster, Paul R., Jr.

    Electric Power grid cybersecurity is a topic gaining increased attention in academia, industry, and government circles, yet a method of quantifying and evaluating a system's security is not yet commonly accepted. In order to be useful, a quantification scheme must be able to accurately reflect the degree to which a system is secure, simply determine the level of security in a system using real-world values, model a wide variety of attacker capabilities, be useful for planning and evaluation, allow a system owner to publish information without compromising the security of the system, and compare relative levels of security between systems. Published attempts at quantifying cybersecurity fail at one or more of these criteria. This document proposes a new method of quantifying cybersecurity that meets those objectives. This dissertation evaluates the current state of cybersecurity research, discusses the criteria mentioned previously, proposes a new quantification scheme, presents an innovative method of modeling cyber attacks, demonstrates that the proposed quantification methodology meets the evaluation criteria, and proposes a line of research for future efforts.

  16. Cybersecurity Activities Support to DoD Information Network Operations

    DTIC Science & Technology

    2016-03-07

    8530.01, March 7, 2016 ENCLOSURE 2 24 c. Provide cybersecurity services to Combatant Commands and other organizations in accordance with support...Department of Defense INSTRUCTION NUMBER 8530.01 March 7, 2016 DoD CIO SUBJECT: Cybersecurity Activities Support to DoD Information...organizational entities within the DoD (referred to collectively in this instruction as the “DoD Components”). DoDI 8530.01, March 7, 2016 2 b

  17. National Health Information Center

    MedlinePlus

    ... About ODPHP National Health Information Center National Health Information Center The National Health Information Center (NHIC) is ... of interest View the NHO calendar . Federal Health Information Centers and Clearinghouses Federal Health Information Centers and ...

  18. Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes thatmore » may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.« less

  19. Cybersecurity Implications for Industry, Academia, and Parents: A Qualitative Case Study in NSF STEM Education

    ERIC Educational Resources Information Center

    Stevenson, Gregory V.

    2017-01-01

    Rationale: Former President Barack Obama's $3.9 trillion for the 2015 fiscal year budget request included a $2.9 billion investment in Science, Technology, Engineering and Math (STEM) education. Research then showed that the national spending for cybersecurity has exceeded $10.7 billion in the 2015 fiscal year. Nonetheless, the number of…

  20. Mitigating Cybersecurity Risks.

    PubMed

    Rose, Rachel V; Kass, Joseph S

    2017-04-01

    Cybersecurity issues and their impact on compliance with the Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health (HITECH) Act are becoming more of an enforcement focus for a variety of government agencies, including the US Department of Health and Human Services, the Federal Trade Commission, and the Department of Justice. In the case presented in this article, a nurse in a neurology practice opted to speak with a patient about human immunodeficiency virus testing procedures in a manner audible to others in the waiting room. Computer screens with patient information were visible to anyone approaching a desk, the staff had not been trained on cybersecurity issues, and malware infected the computers used in the practice. In light of these circumstances and the launch of Phase 2 of the HIPAA Audit Program by the US Department of Health and Human Services Office for Civil Rights, the neurology practice must consider the following questions. First, could the gaps in the technical, administrative, and physical requirements of HIPAA and the HITECH Act result in an adverse audit and penalties? Second, what course of action does the law mandate in response to a ransomware attack?

  1. Strengthening Cybersecurity for Critical Infrastructure Act

    THOMAS, 111th Congress

    Rep. Langevin, James R. [D-RI-2

    2010-09-29

    House - 11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Cybersecurity Roadmap for the United States

    DTIC Science & Technology

    2010-04-01

    economic, political, and military world. This unprecedented capability to connect a globalized world carries significant risk and opportunity for cyber ... criminals , spies, and state or non-state adversaries to exploit cybersecurity weaknesses for their own gain.

  3. 75 FR 21011 - National Protection and Programs Directorate; Statewide Communication Interoperability Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... Directorate/Cybersecurity and Communications/Office of Emergency Communications, has submitted the following... Homeland Security (DHS), National Protection and Programs Directorate/Cybersecurity and Communications...

  4. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.

    PubMed

    Coventry, Lynne; Branley, Dawn

    2018-07-01

    Electronic healthcare technology is prevalent around the world and creates huge potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns relating to the security of healthcare data and devices. Increased connectivity to existing computer networks has exposed medical devices to new cybersecurity vulnerabilities. Healthcare is an attractive target for cybercrime for two fundamental reasons: it is a rich source of valuable data and its defences are weak. Cybersecurity breaches include stealing health information and ransomware attacks on hospitals, and could include attacks on implanted medical devices. Breaches can reduce patient trust, cripple health systems and threaten human life. Ultimately, cybersecurity is critical to patient safety, yet has historically been lax. New legislation and regulations are in place to facilitate change. This requires cybersecurity to become an integral part of patient safety. Changes are required to human behaviour, technology and processes as part of a holistic solution. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Cybersecurity: What you need to know

    ScienceCinema

    Mark Graff

    2017-12-09

    In the first part of a three part video series with Mark Graff, LLNL's Chief Cybersecurity Strategist, he describes how your computer is threatened whenever you receive email, or use your browser to log onto the Internet.

  6. 78 FR 14549 - National Contact Center; Information Collection; National Contact Center Customer Evaluation Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-06

    ...] National Contact Center; Information Collection; National Contact Center Customer Evaluation Survey AGENCY: Contact Center Services, Federal Citizen Information Center, Office of Citizen Services and Innovative... National Contact Center customer evaluation surveys. In this request, the previously approved surveys have...

  7. A summary of cybersecurity best practices

    DOT National Transportation Integrated Search

    2014-10-01

    This report contains the results and analysis of a review of best practices and observations in the field of cybersecurity involving electronic control systems across a variety of industry segments where the safety-of-life is concerned. This research...

  8. Achieving Cyber Resilience, Reducing Cybercrime and Increasing Cyber Defense Capabilities: Where Should the U.S. Department of Defense Concentrate Today to Prevent Cyberattacks of Significant Consequence

    DTIC Science & Technology

    2016-04-24

    the Cybersecurity in the United States – Brief Overview 13 2.1. Data Breaches in the United States 14 2.2. Security and...Capacity to Defend 15 2.2.1. Cybersecurity Capabilities in the United States 18 2.3. Internationalization of Cybersecurity ...The Department of Homeland Security (DHS) Org Chart 43 2.2.1.2 National Cybersecurity and Communications Integration Center (NCCIC) Org

  9. Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know?

    PubMed

    Baranchuk, Adrian; Refaat, Marwan M; Patton, Kristen K; Chung, Mina K; Krishnan, Kousik; Kutyifa, Valentina; Upadhyay, Gaurav; Fisher, John D; Lakkireddy, Dhanunjaya R

    2018-03-20

    Medical devices have been targets of hacking for over a decade, and this cybersecurity issue has affected many types of medical devices. Lately, the potential for hacking of cardiac devices (pacemakers and defibrillators) claimed the attention of the media, patients, and health care providers. This is a burgeoning problem that our newly electronically connected world faces. In this paper from the Electrophysiology Section Council, we briefly discuss various aspects of this relatively new threat in light of recent incidents involving the potential for hacking of cardiac devices. We explore the possible risks for the patients and the effect of device reconfiguration in an attempt to thwart cybersecurity threats. We provide an outline of what can be done to improve cybersecurity from the standpoint of the manufacturer, government, professional societies, physician, and patient. Copyright © 2018 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  10. Understanding System Utilization as a Limitation Associated with Cybersecurity Laboratories--A Literature Analysis

    ERIC Educational Resources Information Center

    Pittman, Jason

    2013-01-01

    The use of laboratories as part of cybersecurity education is well evidenced in the existing literature. We are informed about the benefits, different types of laboratories and, in addition, underlying learning theories therein. Existing research also demonstrates that the success of employing cybersecurity laboratory exercises relies upon…

  11. Cybersecurity: Authoritative Reports and Resources

    DTIC Science & Technology

    2013-07-25

    Breaches: Is Federal Legislation Needed to Protect Consumers ? July 18, 2013 Energy and Commerce Commerce , Manufacturing and Trade Evaluating Privacy...and Commerce Commerce , Manufacturing and Trade Reporting Data Breaches: Is Federal Legislation Needed to Protect Consumers ? July 18, 2013 Energy... Consumer Credit Cybersecurity: An Overview of Risks to Critical Infrastructure July 26, 2011 Energy and Commerce Oversight and Investigations

  12. 78 FR 30303 - National Contact Center; Submission for OMB Review; National Contact Center Customer Evaluation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-22

    ...] National Contact Center; Submission for OMB Review; National Contact Center Customer Evaluation Survey AGENCY: Contact Center Services, Federal Citizen Information Center, Office of Citizen Services and... regarding the National Contact Center customer evaluation surveys. In this request, the previously approved...

  13. Cybersecurity: Authoritative Reports and Resources

    DTIC Science & Technology

    2013-04-17

    Consumer Credit Cybersecurity: An Overview of Risks to Critical Infrastructure July 26, 2011 Energy and Commerce Oversight and Investigations...require greater protection for sensitive consumer data and timely notification in case of breach June 15, 2011 Energy and Commerce Commerce ...Financial Sector June 21, 2011 Commerce , Science and Transportation Privacy and Data Security: Protecting Consumers in the Modern World June 29, 2011

  14. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.

    PubMed

    Wang, Hao; Lau, Nathan; Gerdes, Ryan M

    2018-04-01

    The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.

  15. National Technology Center and photonics

    NASA Astrophysics Data System (ADS)

    Vlannes, Nickolas P.

    1992-05-01

    A National Technology Center is proposed in order to meet the international challenges to the economy and security of the United States. This center would be tasked with the acquisition, analysis, assessment, and dissemination of worldwide scientific and technical information and data; technology transfer to the United States; and research and development in information and library sciences and technology. The National Technology Center would form a national network linking centers of excellence and expertise, and maintain a national technology library. With these functions, the National Technology Center has inherent requirements for technologies based on photonics, and will further motivate developments in this field.

  16. 78 FR 11737 - Improving Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... of America, it is hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical... cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety...

  17. U.S. Cybersecurity Defense Assessment

    DTIC Science & Technology

    2013-03-01

    Government . The U.S. Army War College is accredited by the Commission on Higher Education of the Middle States Association of Colleges and...progression of America’s cybersecurity defense policies and the subsequent Federal agency roles which have developed within the U.S. government ...of the Army, Department of Defense, or the U.S. Government . U.S. Army War College CARLISLE BARRACKS, PENNSYLVANIA 17013 Abstract

  18. Smart Grid Cybersecurity: Job Performance Model Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Neil, Lori Ross; Assante, Michael; Tobey, David

    2012-08-01

    This is the project report to DOE OE-30 for the completion of Phase 1 of a 3 phase report. This report outlines the work done to develop a smart grid cybersecurity certification. This work is being done with the subcontractor NBISE.

  19. Uses and misuses of Bayes' rule and Bayesian classifiers in cybersecurity

    NASA Astrophysics Data System (ADS)

    Bard, Gregory V.

    2017-12-01

    This paper will discuss the applications of Bayes' Rule and Bayesian Classifiers in Cybersecurity. While the most elementary form of Bayes' rule occurs in undergraduate coursework, there are more complicated forms as well. As an extended example, Bayesian spam filtering is explored, and is in many ways the most triumphant accomplishment of Bayesian reasoning in computer science, as nearly everyone with an email address has a spam folder. Bayesian Classifiers have also been responsible significant cybersecurity research results; yet, because they are not part of the standard curriculum, few in the mathematics or information-technology communities have seen the exact definitions, requirements, and proofs that comprise the subject. Moreover, numerous errors have been made by researchers (described in this paper), due to some mathematical misunderstandings dealing with conditional independence, or other badly chosen assumptions. Finally, to provide instructors and researchers with real-world examples, 25 published cybersecurity papers that use Bayesian reasoning are given, with 2-4 sentence summaries of the focus and contributions of each paper.

  20. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem

    PubMed Central

    Williams, Patricia AH; Woodward, Andrew J

    2015-01-01

    The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. PMID:26229513

  1. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.

    PubMed

    Williams, Patricia Ah; Woodward, Andrew J

    2015-01-01

    The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat.

  2. 75 FR 6032 - National Contact Center; Submission for OMB Review; National Contact Center Customer Evaluation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... GENERAL SERVICES ADMINISTRATION [OMB Control No. 3090-0278] National Contact Center; Submission for OMB Review; National Contact Center Customer Evaluation Survey AGENCY: Citizen Services and... collection requirement regarding the National Contact Center customer evaluation survey. A request for public...

  3. An Observational Study of Peer Learning for High School Students at a Cybersecurity Camp

    ERIC Educational Resources Information Center

    Pittman, Jason M.; Pike, Ronald E.

    2016-01-01

    This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…

  4. Identifying Cybersecurity Risks to Critical Infrastructure Act of 2012

    THOMAS, 112th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2012-07-26

    House - 08/15/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management.

    PubMed

    Ganin, Alexander A; Quach, Phuoc; Panwar, Mahesh; Collier, Zachary A; Keisler, Jeffrey M; Marchese, Dayton; Linkov, Igor

    2017-09-05

    Risk assessors and managers face many difficult challenges related to novel cyber systems. Among these challenges are the constantly changing nature of cyber systems caused by technical advances, their distribution across the physical, information, and sociocognitive domains, and the complex network structures often including thousands of nodes. Here, we review probabilistic and risk-based decision-making techniques applied to cyber systems and conclude that existing approaches typically do not address all components of the risk assessment triplet (threat, vulnerability, consequence) and lack the ability to integrate across multiple domains of cyber systems to provide guidance for enhancing cybersecurity. We present a decision-analysis-based approach that quantifies threat, vulnerability, and consequences through a set of criteria designed to assess the overall utility of cybersecurity management alternatives. The proposed framework bridges the gap between risk assessment and risk management, allowing an analyst to ensure a structured and transparent process of selecting risk management alternatives. The use of this technique is illustrated for a hypothetical, but realistic, case study exemplifying the process of evaluating and ranking five cybersecurity enhancement strategies. The approach presented does not necessarily eliminate biases and subjectivity necessary for selecting countermeasures, but provides justifiable methods for selecting risk management actions consistent with stakeholder and decisionmaker values and technical data. Published 2017. This article is a U.S. Government work and is in the public domain in the U.S.A.

  6. 76 FR 2700 - National Protection and Programs Directorate; National Emergency Communications Plan (NECP) Goal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-14

    ... Programs Directorate (NPPD)/Office of Cybersecurity and Communications (CS&C)/Office of Emergency Communications (OEC) will submit the following Information Collection Request to the Office of Management and... Directorate; National Emergency Communications Plan (NECP) Goal 2 Performance Report AGENCY: National...

  7. Cybersecurity through Real-Time Distributed Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kisner, Roger A; Manges, Wayne W; MacIntyre, Lawrence Paul

    2010-04-01

    Critical infrastructure sites and facilities are becoming increasingly dependent on interconnected physical and cyber-based real-time distributed control systems (RTDCSs). A mounting cybersecurity threat results from the nature of these ubiquitous and sometimes unrestrained communications interconnections. Much work is under way in numerous organizations to characterize the cyber threat, determine means to minimize risk, and develop mitigation strategies to address potential consequences. While it seems natural that a simple application of cyber-protection methods derived from corporate business information technology (IT) domain would lead to an acceptable solution, the reality is that the characteristics of RTDCSs make many of those methods inadequatemore » and unsatisfactory or even harmful. A solution lies in developing a defense-in-depth approach that ranges from protection at communications interconnect levels ultimately to the control system s functional characteristics that are designed to maintain control in the face of malicious intrusion. This paper summarizes the nature of RTDCSs from a cybersecurity perspec tive and discusses issues, vulnerabilities, candidate mitigation approaches, and metrics.« less

  8. Metamorphic Testing for Cybersecurity.

    PubMed

    Chen, Tsong Yueh; Kuo, Fei-Ching; Ma, Wenjuan; Susilo, Willy; Towey, Dave; Voas, Jeffrey; Zhou, Zhi Quan

    2016-06-01

    Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct negative testing as well as to alleviate the oracle problem in the testing of security-related functionality and behavior. As demonstrated by the effectiveness of MT in detecting previously unknown bugs in real-world critical applications such as compilers and code obfuscators, we conclude that software testing of security-related features should be conducted from diverse perspectives in order to achieve greater cybersecurity.

  9. "I Can Actually Be a Super Sleuth": Promising Practices for Engaging Adolescent Girls in Cybersecurity Education

    ERIC Educational Resources Information Center

    Jethwani, Monique M.; Memon, Nasir; Seo, Won; Richer, Ariel

    2017-01-01

    Utilizing qualitative data gleaned from focus groups with adolescent girls participating in a cybersecurity summer program (N = 38, mean age = 16.3), this study examines the following research questions: (a) How do adolescent girls perceive the cybersecurity field?; and (b) What are the promising practices that engage girls in cybersecurity…

  10. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    ERIC Educational Resources Information Center

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  11. National Centers for Environmental Prediction

    Science.gov Websites

    Modeling Mesoscale Modeling Marine Modeling and Analysis Teams Climate Data Assimilation Ensembles and Post / National Weather Service National Centers for Environmental Prediction Environmental Modeling Center NOAA

  12. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    PubMed

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  13. National Centers for Environmental Prediction

    Science.gov Websites

    Modeling Mesoscale Modeling Marine Modeling and Analysis Teams Climate Data Assimilation Ensembles and Post / National Weather Service National Centers for Environmental Prediction Environmental Modeling Center NOAA

  14. 78 FR 35940 - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices; Draft...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-14

    ...The Food and Drug Administration (FDA) is announcing the availability of the draft guidance entitled ``Content of Premarket Submissions for Management of Cybersecurity in Medical Devices.'' This guidance identifies cybersecurity issues that manufacturers should consider in preparing premarket submissions for medical devices in order to maintain information confidentiality, integrity, and availability. This draft guidance is not final nor is it in effect at this time.

  15. Community Colleges Mobilize to Train Cybersecurity Workers

    ERIC Educational Resources Information Center

    Parry, Marc

    2009-01-01

    If you work at a community college that teaches cybersecurity, it pays to be located in the backyard of a spy agency. Just don't ask Kelly A. Koermer, administrator of the Anne Arundel Community College, what's inside those dark towers at Fort Meade. She points out other highlights of the restricted region: an employees-only exit off the highway,…

  16. Metamorphic Testing for Cybersecurity

    PubMed Central

    Chen, Tsong Yueh; Kuo, Fei-Ching; Ma, Wenjuan; Susilo, Willy; Towey, Dave; Voas, Jeffrey

    2016-01-01

    Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of MT can help to conduct negative testing as well as to alleviate the oracle problem in the testing of security-related functionality and behavior. As demonstrated by the effectiveness of MT in detecting previously unknown bugs in real-world critical applications such as compilers and code obfuscators, we conclude that software testing of security-related features should be conducted from diverse perspectives in order to achieve greater cybersecurity. PMID:27559196

  17. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    PubMed Central

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  18. Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance.

    PubMed

    Brase, Gary L; Vasserman, Eugene Y; Hsu, William

    2017-01-01

    Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security risk, or criminal behavior risk). However, little research has directly evaluated if this is an accurate or productive framework. To assess this question, two experiments asked participants to respond to a statistical reasoning task framed in one of four different contexts (cybersecurity, plus the above alternative models). Each context was also presented using either percentages or natural frequencies, and these tasks were followed by a behavioral likelihood rating. As in previous research, consistent use of natural frequencies promoted correct Bayesian reasoning. There was little indication, however, that any of the alternative mental models generated consistently better understanding or reasoning over the actual cybersecurity context. There was some evidence that different models had some effects on patterns of responses, including the behavioral likelihood ratings, but these effects were small, as compared to the effect of the numerical format manipulation. This points to a need to improve the content of actual internet security warnings, rather than working to change the models users have of warnings.

  19. Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance

    PubMed Central

    Brase, Gary L.; Vasserman, Eugene Y.; Hsu, William

    2017-01-01

    Cybersecurity research often describes people as understanding internet security in terms of metaphorical mental models (e.g., disease risk, physical security risk, or criminal behavior risk). However, little research has directly evaluated if this is an accurate or productive framework. To assess this question, two experiments asked participants to respond to a statistical reasoning task framed in one of four different contexts (cybersecurity, plus the above alternative models). Each context was also presented using either percentages or natural frequencies, and these tasks were followed by a behavioral likelihood rating. As in previous research, consistent use of natural frequencies promoted correct Bayesian reasoning. There was little indication, however, that any of the alternative mental models generated consistently better understanding or reasoning over the actual cybersecurity context. There was some evidence that different models had some effects on patterns of responses, including the behavioral likelihood ratings, but these effects were small, as compared to the effect of the numerical format manipulation. This points to a need to improve the content of actual internet security warnings, rather than working to change the models users have of warnings. PMID:29163304

  20. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    NASA Astrophysics Data System (ADS)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  1. Standardized and Repeatable Technology Evaluation for Cybersecurity Acquisition

    DTIC Science & Technology

    2017-02-01

    methodology for evaluating cybersecurity technologies. In this report, we introduce the Department of Defense (DoD)-centric and Independent Technology...Evaluation Capability (DITEC), an experimental decision support service within the U.S. DoD which aims to provide a standardized framework for...13 5.3.1 The Technology Matching Tool: A Recommender System for Security Non - Experts

  2. National Centers for Environmental Prediction

    Science.gov Websites

    Modeling Mesoscale Modeling Marine Modeling and Analysis Teams Climate Data Assimilation Ensembles and Post Weather Service National Centers for Environmental Prediction Environmental Modeling Center NOAA Center

  3. Bringing the Cybersecurity Challenge to the Social Studies Classroom

    ERIC Educational Resources Information Center

    Berson, Michael J.; Berson, Ilene R.

    2014-01-01

    Educators have been increasingly sensitized to the role of schools in developing students' cyberethics, cybercitizenship, and cybersafety, which have emerged as one of the most pressing and yet unexplored areas of education. The Department of Defense has identified challenges to cybersecurity infrastructure as a significant risk for the…

  4. National Centers for Environmental Prediction

    Science.gov Websites

    Modeling Mesoscale Modeling Marine Modeling and Analysis Teams Climate Data Assimilation Ensembles and Post Weather Service National Centers for Environmental Prediction Environmental Modeling Center NOAA Center

  5. Toward a Cybersecurity Curriculum Model for Undergraduate Business Schools: A Survey of AACSB-Accredited Institutions in the United States

    ERIC Educational Resources Information Center

    Yang, Samuel C.; Wen, Bo

    2017-01-01

    With the increasing demand for cybersecurity professionals, the authors examined how business schools are meeting that demand, specifically the core requirements of their cybersecurity curricula related to information systems programs. They examined 518 Association to Advance Collegiate Schools of Business-accredited business schools in the United…

  6. National Technology Transfer Center

    NASA Technical Reports Server (NTRS)

    Rivers, Lee W.

    1992-01-01

    Viewgraphs on the National Technology Transfer Center (NTTC) are provided. The NTTC mission is to serve as a hub for the nationwide technology-transfer network to expedite the movement of federally developed technology into the stream of commerce. A description of the Center is provided.

  7. Expressing the sense of the House of Representatives with respect to supporting the goals and ideals of the seventh annual National Cybersecurity Awareness Month and supporting the efforts of the Department of Homeland Security to raise awareness of cyber threats and enhance cybersecurity in the United States.

    THOMAS, 111th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2010-09-29

    House - 11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Cybersecurity Technology R&D | Energy Systems Integration Facility | NREL

    Science.gov Websites

    and development (R&D) in cybersecurity is focused on distributed energy resources and the control equipment. The team is focusing on integrity for command and control messages in transit to and from systems and control architectures. Moving Target Defense In collaboration with Kansas State University

  9. Is Media Multitasking Good for Cybersecurity? Exploring the Relationship Between Media Multitasking and Everyday Cognitive Failures on Self-Reported Risky Cybersecurity Behaviors.

    PubMed

    Hadlington, Lee; Murphy, Karen

    2018-03-01

    The current study focused on how engaging in media multitasking (MMT) and the experience of everyday cognitive failures impact on the individual's engagement in risky cybersecurity behaviors (RCsB). In total, 144 participants (32 males, 112 females) completed an online survey. The age range for participants was 18 to 43 years (M = 20.63, SD = 4.04). Participants completed three scales which included an inventory of weekly MMT, a measure of everyday cognitive failures, and RCsB. There was a significant difference between heavy media multitaskers (HMM), average media multitaskers (AMM), and light media multitaskers (LMM) in terms of RCsB, with HMM demonstrating more frequent risky behaviors than LMM or AMM. The HMM group also reported more cognitive failures in everyday life than the LMM group. A regression analysis showed that everyday cognitive failures and MMT acted as significant predictors for RCsB. These results expand our current understanding of the relationship between human factors and cybersecurity behaviors, which are useful to inform the design of training and intervention packages to mitigate RCsB.

  10. Is Media Multitasking Good for Cybersecurity? Exploring the Relationship Between Media Multitasking and Everyday Cognitive Failures on Self-Reported Risky Cybersecurity Behaviors

    PubMed Central

    Murphy, Karen

    2018-01-01

    Abstract The current study focused on how engaging in media multitasking (MMT) and the experience of everyday cognitive failures impact on the individual's engagement in risky cybersecurity behaviors (RCsB). In total, 144 participants (32 males, 112 females) completed an online survey. The age range for participants was 18 to 43 years (M = 20.63, SD = 4.04). Participants completed three scales which included an inventory of weekly MMT, a measure of everyday cognitive failures, and RCsB. There was a significant difference between heavy media multitaskers (HMM), average media multitaskers (AMM), and light media multitaskers (LMM) in terms of RCsB, with HMM demonstrating more frequent risky behaviors than LMM or AMM. The HMM group also reported more cognitive failures in everyday life than the LMM group. A regression analysis showed that everyday cognitive failures and MMT acted as significant predictors for RCsB. These results expand our current understanding of the relationship between human factors and cybersecurity behaviors, which are useful to inform the design of training and intervention packages to mitigate RCsB. PMID:29638157

  11. Energy Department Announces National Bioenergy Center

    Science.gov Websites

    Department of Energy's National Renewable Energy Laboratory (NREL) in Golden, Colo., and Oak Ridge National Laboratories (ORNL) in Oak Ridge, Tenn. will lead the Bioenergy Center. The center will link DOE-funded biomass

  12. The National Institutes of Health Clinical Center

    MedlinePlus

    ... Issue Past Issues The National Institutes of Health Clinical Center Past Issues / Spring 2007 Table of Contents ... Communications, NIH Clinical Center Welcome to the nation's clinical research hospital. The NIH Clinical Center: For more ...

  13. 36 CFR 1253.4 - Washington National Records Center.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Washington National Records Center. 1253.4 Section 1253.4 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS... National Records Center. Washington National Records Center is located at 4205 Suitland Road, Suitland, MD...

  14. 36 CFR 1253.4 - Washington National Records Center.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Washington National Records Center. 1253.4 Section 1253.4 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS... National Records Center. Washington National Records Center is located at 4205 Suitland Road, Suitland, MD...

  15. 36 CFR 1253.4 - Washington National Records Center.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Washington National Records Center. 1253.4 Section 1253.4 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS... National Records Center. Washington National Records Center is located at 4205 Suitland Road, Suitland, MD...

  16. Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments

    ERIC Educational Resources Information Center

    Inan, Fethi A.; Namin, Akbar S.; Pogrund, Rona L.; Jones, Keith S.

    2016-01-01

    Twenty individuals with visual impairments were surveyed in order to (a) understand their Internet use and (b) examine relations between metrics related to Internet use and cybersecurity-related knowledge, skills, confidence, and attitudes. Participants used the Internet for various purposes, including information search, communication, chatting,…

  17. National Centers for Environmental Prediction

    Science.gov Websites

    Statistics Observational Data Processing Data Assimilation Monsoon Desk Model Transition Seminars Seminar conducts a program of research and development in support of the National Centers for Environmental Center NOAA Center for Weather and Climate Prediction (NCWCP) 5830 University Research Court College Park

  18. 75 FR 55739 - Cybersecurity, Innovation and the Internet Economy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-14

    ...The Department of Commerce's Internet Policy Task Force announces that the closing deadline for submission of comments responsive to the July 28, 2010 notice of inquiry on the nexus between cybersecurity challenges in the commercial sector and innovation in the Internet economy has been extended until 5 p.m. Eastern Daylight Time (EDT) on September 20, 2010.

  19. 2017 Cybersecurity Workshop: Readouts from Working Groups - Video Text

    Science.gov Websites

    applicability of artificial intelligence to search for cybersecurity gaps in our existing SKATA networks. Second primarily renewable that all back each other up; that are all highly intelligent, artificial intelligence we have in cyber security, digital technologies, artificial intelligence. We think that that would

  20. National Response Center

    EPA Pesticide Factsheets

    The NRC is the federal government's national communications center, which is staffed 24 hours a day by U.S. Coast Guard officers and marine science technicians. Sole federal point of contact for reporting all hazardous substance releases and oil spills

  1. Notification: Audit of CSB's Compliance with the Cybersecurity Act of 2015

    EPA Pesticide Factsheets

    Project #OA-FY16-0127, March 14, 2016. The EPA OIG plans to begin fieldwork for an audit of the U.S. CSB's compliance with the mandated “Inspector General Report on Covered Systems,” as outlined in the Cybersecurity Act of 2015.

  2. 78 FR 13024 - Developing a Framework To Improve Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... review to develop a framework to reduce cyber risks to critical infrastructure \\1\\ (the ``Cybersecurity... processes that align policy, business, and technological approaches to address cyber risks. \\1\\ For the... cyber activity. Such activity is increasing and its consequences can range from theft through disruption...

  3. 77 FR 51817 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-27

    ... the information sharing efforts of the Coast Guard and DHS. (2) Cyber-Security. The Committee will... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2012-0797] National Maritime Security Advisory...: The National Maritime Security Advisory Committee (NMSAC) will meet on September 11-12, 2012 in the...

  4. National Biocontainment Training Center

    DTIC Science & Technology

    2014-08-01

    and Dr. Christopher Kasanga, Virologist, SACIDS, SUA. Pictured bottom right: Martha Betson, an instructor at Sokoine from the Royal Veterinary ...laboratories in the Pendik Veterinary Control Institute, which is a national research laboratory under the Turkish Ministry of Food, Agriculture and Livestock...Gargili (first row, center) for laboratory staff of the Pendik Veterinary Control Institute, a national research laboratory under the Turkish

  5. The National Geospatial Technical Operations Center

    USGS Publications Warehouse

    Craun, Kari J.; Constance, Eric W.; Donnelly, Jay; Newell, Mark R.

    2009-01-01

    The United States Geological Survey (USGS) National Geospatial Technical Operations Center (NGTOC) provides geospatial technical expertise in support of the National Geospatial Program in its development of The National Map, National Atlas of the United States, and implementation of key components of the National Spatial Data Infrastructure (NSDI).

  6. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... Schaffer, Assistant Secretary for Cybersecurity and Communications, an update on the Cloud Computing Subcommittee from Mr. Mark McLaughlin, Chair of the Cloud Computing Subcommittee, and an update on the National...

  7. 32 CFR 240.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... designated by the Department of Homeland Security and the NSA as a national center of excellence. IA. For the purpose of this part, the term “IA” includes computer security, network security, cybersecurity, cyber... the Department of Homeland Security and the NSA as a national center of excellence. CAE-R. An...

  8. 32 CFR 240.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... designated by the Department of Homeland Security and the NSA as a national center of excellence. IA. For the purpose of this part, the term “IA” includes computer security, network security, cybersecurity, cyber... the Department of Homeland Security and the NSA as a national center of excellence. CAE-R. An...

  9. 32 CFR 240.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... designated by the Department of Homeland Security and the NSA as a national center of excellence. IA. For the purpose of this part, the term “IA” includes computer security, network security, cybersecurity, cyber... the Department of Homeland Security and the NSA as a national center of excellence. CAE-R. An...

  10. 36 CFR § 1253.4 - Washington National Records Center.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Washington National Records Center. § 1253.4 Section § 1253.4 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS... National Records Center. Washington National Records Center is located at 4205 Suitland Road, Suitland, MD...

  11. Agriculture: About EPA's National Agriculture Center

    EPA Pesticide Factsheets

    EPA's National Agriculture Center (Ag Center), with the support of the United States Department of Agriculture, serves growers, livestock producers, other agribusinesses, and agricultural information/education providers.

  12. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

    PubMed

    Allodi, Luca; Massacci, Fabio

    2017-08-01

    Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.

  13. NREL National Bioenergy Center Overview

    ScienceCinema

    Foust, Thomas; Pienkos, Phil; Sluiter, Justin; Magrini, Kim; McMillan, Jim

    2018-01-16

    The demand for clean, sustainable, secure energy is growing... and the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) is answering the call. NREL's National Bioenergy Center is pioneering biofuels research and development and accelerating the pace these technologies move into the marketplace.

  14. 34 CFR 413.1 - What is the National Center or Centers for Research in Vocational Education?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Vocational Education (National Center) in the areas of— (a) Applied research and development; and (b... 34 Education 3 2010-07-01 2010-07-01 false What is the National Center or Centers for Research in... RESEARCH IN VOCATIONAL EDUCATION General § 413.1 What is the National Center or Centers for Research in...

  15. Demythifying Cybersecurity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Talbot, Ed; Frincke, Deborah A.; Bishop, Matt

    2010-06-01

    Consider a face-to-face meeting of exactly five people in a closed and shielded room, hidden from view, with no other communications equipment present. With proper screening, participants can be reasonably sure that the conversation will only be available in real time to those in the room, that the words they hear are the ones spoken by their companions, and that everyone receives them at the same time. Now suppose this same meeting were held as an Internet video conference with the participants scattered over the globe. The attendees may have similar expectations, but meeting those expectations is considerably more difficult.more » For instance, the administrators of the systems that the participants are using could manipulate the flow of data to rebroadcast, or even change, what individual participants see and hear. In many cases, ISPs and other intermediate providers can do the same; at the least, they can interfere with the transmission. An external attacker who can break into the participants’ systems can do the same. And there may be no proof, or even indications, that the meeting was compromised. As cybersecurity professionals, we understand this - but does the population at large know what happens to their tweets once they leave their smart phones?« less

  16. Thad Cochran National Warmwater Aquaculture Center

    Science.gov Websites

    bytes) 2012 U.S. CATFISH DATABASE grnbar.jpg (3114 bytes) Delta Research & Extension Center to access these files. THAD COCHRAN NATIONAL WARMWATER AQUACULTURE CENTER Delta Research and

  17. 75 FR 48853 - National Health Center Week, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-11

    ... Part IV The President Proclamation 8545--National Health Center Week, 2010 #0; #0; #0..., 2010 National Health Center Week, 2010 By the President of the United States of America A Proclamation America's community health centers are a vital component of our health care system, providing underserved...

  18. 77 FR 47765 - National Health Center Week, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-09

    ... Health Center Week, 2012 By the President of the United States of America A Proclamation For nearly half a century, health centers have helped make primary care services available and affordable for... lives. During National Health Center Week, we recognize the professionals who power our Nation's health...

  19. Commitment to Cybersecurity and Information Technology Governance: A Case Study and Leadership Model

    ERIC Educational Resources Information Center

    Curtis, Scipiaruth Kendall

    2012-01-01

    The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…

  20. About the Centers - National Site for the Regional IPM Centers

    Science.gov Websites

    Stories Contact Us United States Department of Agriculture - National Institute of Food and Agriculture . Regional IPM Centers are sponsored by the USDA National Institute of Food and Agriculture. Last update

  1. NSF Establishes First Four National Supercomputer Centers.

    ERIC Educational Resources Information Center

    Lepkowski, Wil

    1985-01-01

    The National Science Foundation (NSF) has awarded support for supercomputer centers at Cornell University, Princeton University, University of California (San Diego), and University of Illinois. These centers are to be the nucleus of a national academic network for use by scientists and engineers throughout the United States. (DH)

  2. National Center for Photovoltaics at NREL

    ScienceCinema

    VanSant, Kaitlyn; Wilson, Greg; Berry, Joseph; Al-Jassim, Mowafak; Kurtz, Sarah

    2018-06-08

    The National Center for Photovoltaics at the National Renewable Energy Laboratory (NREL) focuses on technology innovations that drive industry growth in U.S. photovoltaic (PV) manufacturing. The NCPV is a central resource for our nation's capabilities in PV research, development, deployment, and outreach.

  3. National Centers for Environmental Prediction

    Science.gov Websites

    / VISION | About EMC EMC > GEFS > COLLABORATORS Home Operational Products Experimental Data ENSEMBLE FORECAST SYSTEM MSC NAEFS Products CPC NAEFS Experimental 8 to 14 Day Temperature Guidance CPC NAEFS Experimental 8 to 14 Day Precip Guidance NOAA / National Weather Service National Centers for

  4. Improving Cybersecurity Incident Response Team (CSIRT) Skills, Dynamics and Effectiveness

    DTIC Science & Technology

    2017-03-01

    recommendations for optimal CSIRT performance. 15. SUBJECT TERMS Cyber Incident Response, Response Teams, Cognitive Task Analysis 16. SECURITY...conducted a study of the cognitive , social, personality, and motivational requirements involved in cybersecurity incident response and then validated...corporate CSIRTs, and academic institution CSIRTs. • Survey of Non-Technical KSAOs. Previous known studies of CSIRTs did not examine cognitive , social, and

  5. National Coalition of Advanced Technology Centers Proposal to the Nation.

    ERIC Educational Resources Information Center

    National Coalition of Advanced Technology Centers, Waco, TX.

    In 1988, nine institutions operating advanced technology centers (ATC's) to provide workers with up-to-date technical skills formed the National Coalition of Advanced Technology Centers (NCATC). The center was established to increase awareness of ATC's, serve as a forum for the discussion and demonstration of new and underused technologies,…

  6. Integrating Cybersecurity Education in K-6 Curriculum: Schoolteachers, IT Experts, and Parents' Perceptions

    NASA Astrophysics Data System (ADS)

    Sadaghiani-Tabrizi, Avideh

    The educational system has been challenging children through competitive societal information-age education by promoting achievement among students, in preparing children for global excellence. This qualitative research case study of elementary school children's lack in cybersecurity knowledge and awareness served helpful with exploration into cybersecurity awareness phenomena in kindergarten-through-6th grade (K-6) education through gaining an understanding about children's need for awareness of cybersecurity from viewpoints of six elementary schoolteachers, six information technology (IT) experts, and four parents. The intent of this research was to explore perceptions of 15 elementary schoolteachers, five IT experts, and five parents of elementary school children about children's Internet safety measures and needs, in digital-age. This study's participants agreed with the necessity of monitoring children's internetworking, to direct attention on children's ever-increasing need to exercise awareness when playing and learning, depending on the age of children. Interviews of a stratified sample of subpopulations within an upstate New York school district helped to uncover common themes about children's vulnerability characteristics, in which triangulation of study participants' perspectives about children's present character, personal safety, research, and various educational opportunities in elementary schools helped this study's data saturation. The common themes of this study developed through interviews, directed attention to teaching children information safety practices and monitoring children's Internet activities, relative to the age and social development of children through continuing existing programs, which the school districts work with local communities to help to increase children's personal safety.

  7. National Centers for Environmental Prediction

    Science.gov Websites

    . Government's official Web portal to all Federal, state and local government Web resources and services. MISSION Web Page [scroll down to "Verification" Section] HRRR Verification at NOAA ESRL HRRR Web Verification Web Page NOAA / National Weather Service National Centers for Environmental Prediction

  8. The National Center Test for University Admissions

    ERIC Educational Resources Information Center

    Watanabe, Yoshinori

    2013-01-01

    This article describes the National Center Test for University Admissions, a unified national test in Japan, which is taken by 500,000 students every year. It states that implementation of the Center Test began in 1990, with the English component consisting only of the written section until 2005, when the listening section was first implemented…

  9. National Center on Sleep Disorders Research

    MedlinePlus

    ... for Updates The National Center on Sleep Disorders Research (NCSDR) Located within the National Heart, Lung, and ... key functions: research, training, technology transfer, and coordination. Research Sleep disorders span many medical fields, requiring multidisciplinary ...

  10. 78 FR 27966 - Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-13

    ... Working Group on Improving Cybersecurity and Resilience Through Acquisition AGENCY: Office of Emergency... the Department of Homeland Security and the Federal Acquisition Regulation Council, are required to... security standards into acquisition planning and contract administration and address what steps [[Page...

  11. The National Center for Biomedical Ontology

    PubMed Central

    Noy, Natalya F; Shah, Nigam H; Whetzel, Patricia L; Chute, Christopher G; Story, Margaret-Anne; Smith, Barry

    2011-01-01

    The National Center for Biomedical Ontology is now in its seventh year. The goals of this National Center for Biomedical Computing are to: create and maintain a repository of biomedical ontologies and terminologies; build tools and web services to enable the use of ontologies and terminologies in clinical and translational research; educate their trainees and the scientific community broadly about biomedical ontology and ontology-based technology and best practices; and collaborate with a variety of groups who develop and use ontologies and terminologies in biomedicine. The centerpiece of the National Center for Biomedical Ontology is a web-based resource known as BioPortal. BioPortal makes available for research in computationally useful forms more than 270 of the world's biomedical ontologies and terminologies, and supports a wide range of web services that enable investigators to use the ontologies to annotate and retrieve data, to generate value sets and special-purpose lexicons, and to perform advanced analytics on a wide range of biomedical data. PMID:22081220

  12. Cybersecurity Protection: Design Science Research toward an Intercloud Transparent Bridge Architecture (ITCOBRA)

    ERIC Educational Resources Information Center

    Wilson, Joe M.

    2013-01-01

    This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…

  13. National Fuel Cell Technology Evaluation Center | Hydrogen and Fuel Cells |

    Science.gov Websites

    NREL National Fuel Cell Technology Evaluation Center National Fuel Cell Technology Evaluation Center The National Fuel Cell Technology Evaluation Center (NFCTEC) at NREL's Energy Systems Integration Cell Technology Evaluation Center to process and analyze data for a variety of hydrogen and fuel cell

  14. Critical Infrastructure Protection- Los Alamos National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bofman, Ryan K.

    Los Alamos National Laboratory (LANL) has been a key facet of Critical National Infrastructure since the nuclear bombing of Hiroshima exposed the nature of the Laboratory’s work in 1945. Common knowledge of the nature of sensitive information contained here presents a necessity to protect this critical infrastructure as a matter of national security. This protection occurs in multiple forms beginning with physical security, followed by cybersecurity, safeguarding of classified information, and concluded by the missions of the National Nuclear Security Administration.

  15. Incorporating Blended Format Cybersecurity Education into a Community College Information Technology Program

    ERIC Educational Resources Information Center

    Calhoun, Cheryl D.

    2017-01-01

    The main goal of this project is to expand cybersecurity curriculum. This was accomplished by developing six new courses. The curriculum for each course utilized a common online course for all class formats including web-enhanced, hybrid, or online. In this article, we will discuss the online components used, faculty professional development, and…

  16. NISAC | National Infrastructure Simulation and Analysis Center | NISAC

    Science.gov Websites

    Logo National Infrastructure Simulation and Analysis Center Search Btn search this site... Overview Capabilities Fact Sheets Publications Contacts NISAC content top NISAC The National Infrastructure Simulation and Analysis Center (NISAC) is a modeling, simulation, and analysis program within the Department of

  17. Cybersecurity in healthcare: A systematic review of modern threats and trends.

    PubMed

    Kruse, Clemens Scott; Frederick, Benjamin; Jacobson, Taylor; Monticone, D Kyle

    2017-01-01

    The adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats. The objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature. The reviewers conducted three separate searches through the CINAHL and PubMed (MEDLINE) and the Nursing and Allied Health Source via ProQuest databases. Using key words with Boolean operators, database filters, and hand screening, we identified 31 articles that met the objective of the review. The analysis of 31 articles showed the healthcare industry lags behind in security. Like other industries, healthcare should clearly define cybersecurity duties, establish clear procedures for upgrading software and handling a data breach, use VLANs and deauthentication and cloud-based computing, and to train their users not to open suspicious code. The healthcare industry is a prime target for medical information theft as it lags behind other leading industries in securing vital data. It is imperative that time and funding is invested in maintaining and ensuring the protection of healthcare technology and the confidentially of patient information from unauthorized access.

  18. 75 FR 32229 - National Declassification Center (NDC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-07

    ...) of Executive Order 13526, Classified National Security Information, announcement is made for the... attend must be submitted to the National Declassification Center. Information may be submitted via e-mail..., Washington, DC 20408. FOR FURTHER INFORMATION CONTACT: Don McIlwain, Supervisory Archivist, National...

  19. A national neurological excellence centers network.

    PubMed

    Pazzi, S; Cristiani, P; Cavallini, A

    1998-02-01

    The most relevant problems related to the management of neurological disorders are (i) the frequent hospitalization in nonspecialist departments, with the need for neurological consultation, and (ii) the frequent requests of GPs for highly specialized investigations that are very expensive and of little value in arriving at a correct diagnosis. In 1996, the Consorzio di Bioingegneria e Informatica Medica in Italy realized the CISNet project (in collaboration with the Consorzio Istituti Scientifici Neuroscienze e Tecnologie Biomediche and funded by the Centro Studi of the National Public Health Council) for the implementation of a national neurological excellence centers network (CISNet). In the CISNet project, neurologists will be able to give on-line interactive consultation and off-line consulting services identifying correct diagnostic/therapeutic procedures, evaluating the need for both examination in specialist centers and admission to specialized centers, and identifying the most appropriate ones.

  20. 34 CFR 656.1 - What is the National Resource Centers Program?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 3 2011-07-01 2011-07-01 false What is the National Resource Centers Program? 656.1... POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION NATIONAL RESOURCE CENTERS PROGRAM FOR FOREIGN LANGUAGE AND AREA... Centers Program? Under the National Resource Centers Program for Foreign Language and Areas Studies or...

  1. 34 CFR 656.1 - What is the National Resource Centers Program?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 34 Education 3 2012-07-01 2012-07-01 false What is the National Resource Centers Program? 656.1... POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION NATIONAL RESOURCE CENTERS PROGRAM FOR FOREIGN LANGUAGE AND AREA... Centers Program? Under the National Resource Centers Program for Foreign Language and Areas Studies or...

  2. 34 CFR 656.1 - What is the National Resource Centers Program?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false What is the National Resource Centers Program? 656.1... POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION NATIONAL RESOURCE CENTERS PROGRAM FOR FOREIGN LANGUAGE AND AREA... Centers Program? Under the National Resource Centers Program for Foreign Language and Areas Studies or...

  3. 34 CFR 656.1 - What is the National Resource Centers Program?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 34 Education 3 2014-07-01 2014-07-01 false What is the National Resource Centers Program? 656.1... POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION NATIONAL RESOURCE CENTERS PROGRAM FOR FOREIGN LANGUAGE AND AREA... Centers Program? Under the National Resource Centers Program for Foreign Language and Areas Studies or...

  4. 34 CFR 656.1 - What is the National Resource Centers Program?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 34 Education 3 2013-07-01 2013-07-01 false What is the National Resource Centers Program? 656.1... POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION NATIONAL RESOURCE CENTERS PROGRAM FOR FOREIGN LANGUAGE AND AREA... Centers Program? Under the National Resource Centers Program for Foreign Language and Areas Studies or...

  5. 76 FR 49645 - National Health Center Week, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-10

    ... system. Every day, men, women, and children find help at community health centers. These centers lead the... stronger, healthier Nation that drives the work of community health centers and fuels our efforts to...

  6. National Center on Elder Abuse

    MedlinePlus

    ... Research Synthesize and disseminate high quality research on elder abuse to encourage the translation of research into practice. ... to further the field for those interested in elder abuse identification and prevention. What’s Happening National Center on ...

  7. National Centers for Career and Technical Education Annual Report, 2000.

    ERIC Educational Resources Information Center

    National Dissemination Center for Career and Technical Education, Columbus, OH.

    The National Research Center for Career and Technical Education and the National Dissemination Center for Career and Technical Education were established at the University of Minnesota and The Ohio State University, respectively, in 1999. The centers operate as a consortium with primary and associate partners. Through the centers, the partners…

  8. Using Bloom's and Webb's Taxonomies to Integrate Emerging Cybersecurity Topics into a Computing Curriculum

    ERIC Educational Resources Information Center

    Harris, Mark A.; Patten, Karen P.

    2015-01-01

    Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…

  9. National Site for the Regional IPM Centers

    Science.gov Websites

    see above Submit United States Department of Agriculture - National Institute of Food and Agriculture . Regional IPM Centers are sponsored by the USDA National Institute of Food and Agriculture.

  10. The Volpe National Transportation Systems Center : an introduction

    DOT National Transportation Integrated Search

    1997-01-01

    The Volpe National Transportation Systems Center (Volpe Center) has a long and proud history of defining problems and developing solutions. For more than 25 years, the Center has been applying its unique technical knowledge in planning, research, dev...

  11. Center Products - National Site for the Regional IPM Centers

    Science.gov Websites

    IPM eAcademy Impact Assessment Toolkit United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from work by the Agriculture. Last update: March 12, 2014.

  12. 75 FR 32187 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-07

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special..., National Center for Research Resources, or National Institutes of Health, 6701 Democracy Boulevard, 1...

  13. Insights from nature for cybersecurity.

    PubMed

    Rzeszutko, Elżbieta; Mazurczyk, Wojciech

    2015-01-01

    The alarming rise in the quantity of malware in the past few years poses a serious challenge to the security community and requires urgent response. However, current countermeasures seem no longer to be effective. Thus, it is our belief that it is now time for researchers and security experts to turn to nature in the search for novel inspiration for defense systems. Nature has provided species with a whole range of offensive and defensive techniques, which have been developing and improving over the course of billions of years of evolution. Extremely diverse living conditions have promoted a large variation in the devised biosecurity solutions. In this article we introduce a novel Protection framework in which common denominators of the encountered offensive and defensive means are proposed and presented. The bio-inspired solutions are discussed in the context of cybersecurity, where some principles have already been adopted. The deployment of the whole nature-based framework should aid in the design and improvement of modern cyberdefense systems.

  14. NASA's National Center for Advanced Manufacturing

    NASA Technical Reports Server (NTRS)

    Vickers, John

    2003-01-01

    NASA has designated the Principal Center Assignment to the Marshall Space Flight Center (MSFC) for implementation of the National Center for Advanced Manufacturing (NCAM). NCAM is NASA s leading resource for the aerospace manufacturing research, development, and innovation needs that are critical to the goals of the Agency. Through this initiative NCAM s people work together with government, industry, and academia to ensure the technology base and national infrastructure are available to develop innovative manufacturing technologies with broad application to NASA Enterprise programs, and U.S. industry. Educational enhancements are ever-present within the NCAM focus to promote research, to inspire participation and to support education and training in manufacturing. Many important accomplishments took place during 2002. Through NCAM, NASA was among five federal agencies involved in manufacturing research and development (R&D) to launch a major effort to exchange information and cooperate directly to enhance the payoffs from federal investments. The Government Agencies Technology Exchange in Manufacturing (GATE-M) is the only active effort to specifically and comprehensively address manufacturing R&D across the federal government. Participating agencies include the departments of Commerce (represented by the National Institute of Standards and Technology), Defense, and Energy, as well as the National Science Foundation and NASA. MSFC s ongoing partnership with the State of Louisiana, the University of New Orleans, and Lockheed Martin Corporation at the Michoud Assembly Facility (MAF) progressed significantly. Major capital investments were initiated for world-class equipment additions including a universal friction stir welding system, composite fiber placement machine, five-axis machining center, and ten-axis laser ultrasonic nondestructive test system. The NCAM consortium of five universities led by University of New Orleans with Mississippi State University

  15. National Center tour guide

    USGS Publications Warehouse

    ,

    1979-01-01

    On behalf of each employee at the Geological Survey's National Center, I [H. William Menard, Director] extend a warm welcome to you during our Centennial Year. We hope that your visit to our headquarters will be a pleasant and rewarding experience. Our scientific research is directed towards helping to solve some of the critical environmental and natural resource problems that face our Nation today. We want you to see some aspects of this work, and we hope you will visit us again. As part of the Federal Government, we are deeply committed to the concept of public service. We are proud to serve you.

  16. Agent-Centric Approach for Cybersecurity Decision-Support with Partial Observability

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tipireddy, Ramakrishna; Chatterjee, Samrat; Paulson, Patrick R.

    Generating automated cyber resilience policies for real-world settings is a challenging research problem that must account for uncertainties in system state over time and dynamics between attackers and defenders. In addition to understanding attacker and defender motives and tools, and identifying “relevant” system and attack data, it is also critical to develop rigorous mathematical formulations representing the defender’s decision-support problem under uncertainty. Game-theoretic approaches involving cyber resource allocation optimization with Markov decision processes (MDP) have been previously proposed in the literature. Moreover, advancements in reinforcement learning approaches have motivated the development of partially observable stochastic games (POSGs) in various multi-agentmore » problem domains with partial information. Recent advances in cyber-system state space modeling have also generated interest in potential applicability of POSGs for cybersecurity. However, as is the case in strategic card games such as poker, research challenges using game-theoretic approaches for practical cyber defense applications include: 1) solving for equilibrium and designing efficient algorithms for large-scale, general problems; 2) establishing mathematical guarantees that equilibrium exists; 3) handling possible existence of multiple equilibria; and 4) exploitation of opponent weaknesses. Inspired by advances in solving strategic card games while acknowledging practical challenges associated with the use of game-theoretic approaches in cyber settings, this paper proposes an agent-centric approach for cybersecurity decision-support with partial system state observability.« less

  17. 75 FR 417 - National Protection and Programs Directorate; Statewide Communication Interoperability Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... Communication Interoperability Plan Implementation Report AGENCY: National Protection and Programs Directorate... Directorate/Cybersecurity and Communications/Office of Emergency Communications, has submitted the following... INFORMATION: The Office of Emergency Communications (OEC), formed under Title XVIII of the Homeland Security...

  18. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Executive Order \\1\\ to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2...

  19. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ... Obama signed an Executive Order to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2...

  20. 75 FR 57972 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special..., Scientific Review Officer, Office of Review, National Center for Research Resources, Bethesda, MD 20892, 301...

  1. Alternative Fuels Data Center: Clean Cities Helps National Parks Model

    Science.gov Websites

    Sustainable Transportation Clean Cities Helps National Parks Model Sustainable Transportation to someone by E-mail Share Alternative Fuels Data Center: Clean Cities Helps National Parks Model Sustainable Transportation on Facebook Tweet about Alternative Fuels Data Center: Clean Cities Helps National

  2. Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions

    DTIC Science & Technology

    2013-06-20

    originally introduced in March.19 Several other Senate bills would have addressed specific aspects of cybersecurity, such as data breaches of personal...H.R. 3674)c X X X Public awareness H.R. 756 X X X X Cybercrime law X X X Data breach notification X X Internet security...Revisions Congressional Research Service 20 Data Breach Notification. The White House Proposal and the Task Force Report would also both have set

  3. The National Space Science and Technology Center (NSSTC)

    NASA Technical Reports Server (NTRS)

    2003-01-01

    The National Space Science and Technology Center (NSSTC), located in Huntsville, Alabama, is a laboratory for cutting-edge research in selected scientific and engineering disciplines. The major objectives of the NSSTC are to provide multiple fields of expertise coming together to solve solutions to science and technology problems, and gaining recognition as a world-class science research organization. The center, opened in August 2000, focuses on space science, Earth sciences, information technology, optics and energy technology, biotechnology and materials science, and supports NASA's mission of advancing and communicating scientific knowledge using the environment of space for research. In addition to providing basic and applied research, NSSTC, with its student participation, also fosters the next generation of scientists and engineers. NSSTC is a collaborated effort between NASA and the state of Alabama through the Space Science and Technology alliance, a group of six universities including the Universities of Alabama in Huntsville (UAH),Tuscaloosa (UA), and Birmingham (UAB); the University of South Alabama in Mobile (USA);Alabama Agricultural and Mechanical University (AM) in Huntsville; and Auburn University (AU) in Auburn. Participating federal agencies include NASA, Marshall Space Flight Center, the National Oceanic and Atmospheric Administration, the Department of Defense, the National Science Foundation, and the Department of Energy. Industries involved include the Space Science Research Center, the Global Hydrology and Climate Center, the Information Technology Research Center, the Optics and Energy Technology Center, the Propulsion Research Center, the Biotechnology Research Center, and the Materials Science Research Center. This photo shows the completed center with the additional arnex (right of building) that added an additional 80,000 square feet (7,432 square meters) to the already existent NSSTC, nearly doubling the size of the core facility. At

  4. The National Conservation Training Center.

    ERIC Educational Resources Information Center

    Cohn, Jeffrey P.

    2000-01-01

    Describes the National Conservation Training Center (NCTC) which provides a host of benefits for fish and wildlife pros and includes classrooms, laboratories, and residential lodges. Provides information about some of the courses offered such as how to use global positioning systems and water quality testing. (ASK)

  5. National Centers for Environmental Prediction

    Science.gov Websites

    Statistics Observational Data Processing Data Assimilation Monsoon Desk Model Transition Seminars Seminar conducts a program of research and development in support of the National Centers for Environmental Prediction (NCEP) operational forecasting mission for global prediction. This research and development in

  6. 78 FR 55089 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-09

    ... February 12, 2013, President Barack Obama signed an Executive Order \\1\\ to strengthen the cybersecurity of... framework of cybersecurity practices with our industry partners. This is a continuation of a discussion held.../02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2) Presidential Policy...

  7. National Center for Mathematics and Science - links to related sites

    Science.gov Websites

    Mathematics and Science (NCISLA) HOME | WHAT WE DO | K-12 EDUCATION RESEARCH | PUBLICATIONS | TEACHER -Madison UW-Madison School of Education Wisconsin Center for Education Research The Why Files Other National Research Centers Publications from all OERI-supported national research centers can be viewed by

  8. 46 CFR 1.01-15 - Organization; Districts; National Maritime Center.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Organization; Districts; National Maritime Center. 1.01... General Flow of Functions § 1.01-15 Organization; Districts; National Maritime Center. (a) To assist the... navigation, vessel inspection and seaman laws in general. (c) The Commanding Officer of the National Maritime...

  9. Alternative Fuels Data Center: Mammoth Cave National Park Uses Only

    Science.gov Websites

    Alternative Fuel Vehicles Mammoth Cave National Park Uses Only Alternative Fuel Vehicles to someone by E-mail Share Alternative Fuels Data Center: Mammoth Cave National Park Uses Only Alternative Fuel Vehicles on Facebook Tweet about Alternative Fuels Data Center: Mammoth Cave National Park Uses

  10. 75 FR 62299 - National Cybersecurity Awareness Month, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-08

    ..., government efficiency, and national security. We stand at a transformational moment in history, when our technologically interconnected world presents both immense promise and potential risks. The same technology that... efforts to defend our Nation's information technology and communications infrastructure. We must continue...

  11. National Center for Advanced Manufacturing Overview

    NASA Technical Reports Server (NTRS)

    Vickers, J.

    2001-01-01

    The National Center for Advanced Manufacturing (NCAM) is a strategy, organization, and partnership focused on long-term technology development. The NCAM initially will be a regional partnership, however the intent is national in scope. Benchmarking is needed to follow the concept to the finished project, not using trial and error. Significant progress has been made to date, and NCAM is setting the vision for the future.

  12. The National Space Science and Technology Center (NSSTC)

    NASA Technical Reports Server (NTRS)

    2002-01-01

    The National Space Science and Technology Center (NSSTC), located in Huntsville, Alabama, is a laboratory for cutting-edge research in selected scientific and engineering disciplines. The major objectives of the NSSTC are to provide multiple fields of expertise coming together to solve solutions to science and technology problems, and gaining recognition as a world-class science research organization. The center, opened in August 2000, focuses on space science, Earth sciences, information technology, optics and energy technology, biotechnology and materials science, and supports NASA's mission of advancing and communicating scientific knowledge using the environment of space for research. In addition to providing basic and applied research, NSSTC, with its student participation, also fosters the next generation of scientists and engineers. NSSTC is a collaborated effort between NASA and the state of Alabama through the Space Science and Technology alliance, a group of six universities including the Universities of Alabama in Huntsville (UAH),Tuscaloosa (UA), and Birmingham (UAB); the University of South Alabama in Mobile (USA); Alabama Agricultural and Mechanical University (AM) in Huntsville; and Auburn University (AU) in Auburn. Participating federal agencies include NASA, Marshall Space Flight Center, the National Oceanic and Atmospheric Administration, the Department of Defense, the National Science Foundation, and the Department of Energy. Industries involved include the Space Science Research Center, the Global Hydrology and Climate Center, the Information Technology Research Center, the Optics and Energy Technology Center, the Propulsion Research Center, the Biotechnology Research Center, and the Materials Science Research Center. An arnex, scheduled for completion by summer 2002, will add an additional 80,000 square feet (7,432 square meters) to NSSTC nearly doubling the size of the core facility. At full capacity, the completed NSSTC will top 200

  13. 32 CFR 637.14 - Use of National Crime Information Center (NCIC).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Use of National Crime Information Center (NCIC). 637.14 Section 637.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY... Use of National Crime Information Center (NCIC). Provost marshals will make maximum use of NCIC...

  14. National Crime Information Center (NCIC) Training Videos.

    ERIC Educational Resources Information Center

    Federal Bureau of Investigation, Washington, DC. National Crime Information Center.

    The Federal Bureau of Investigation's National Crime Information Center (NCIC) maintains a set of computerized files of documented criminal justice information reported by a network of over 60,000 participating national, regional, state, and local agencies. The files, dealing with wanted persons, missing persons, unidentified persons, and stolen…

  15. 77 FR 1547 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-10

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  16. 76 FR 1657 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  17. 77 FR 22057 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  18. 75 FR 4122 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  19. 78 FR 23622 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-19

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  20. 78 FR 39823 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  1. 78 FR 76886 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-19

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  2. 77 FR 64836 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  3. 76 FR 41320 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-13

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  4. 75 FR 17793 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-07

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... quarter meetings of the National Small Business Development Center (SBDC) Advisory Board. DATES: The...

  5. The National Center of the U.S. Geological Survey

    USGS Publications Warehouse

    ,

    1974-01-01

    In August of 1973, the U. S. Geological Survey moved its first group of employees into the John Wesley Powell Federal Building of its newly constructed National Center at Reston, Virginia. The move signaled the fruition of more than a decade of planning and work to consolidate the agency's widespread activities into one location which could truly serve as a National Center. The Survey's leadership in the natural resources field has been materially strengthened through the availability of the Center's outstanding research and engineering facilities. Also the Center affords important professional and administrative advantages by bringing together the 2,200 Survey employees in the Washington, D.C, metropolitan area.

  6. 36 CFR 1253.4 - Washington National Records Center.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Washington National Records Center. 1253.4 Section 1253.4 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE LOCATION OF RECORDS AND HOURS OF USE § 1253.4 Washington National...

  7. 76 FR 52377 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-22

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings... Meeting of the National Small Business Development Center (SBDC) Advisory Board at the ASBDC Conference...

  8. Cybersecurity Education in Community Colleges across America: A Survey of Four Approaches by Five Institutions.

    ERIC Educational Resources Information Center

    Campbell, Robert D.; Hawthorne, Elizabeth K.

    This document describes four distinct approaches to education in the area of cybersecurity currently taught at community colleges across America. The four broad categories of instruction are: (1) degree program--four semesters of study leading to an associate's degree; (2) certificate program--two semesters leading to an institution-conferred…

  9. 77 FR 64314 - National Cybersecurity Center of Excellence (NCCoE)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-19

    ... Technology (NIST) Information Technology Laboratory (ITL) invites interested U.S. companies to submit letters... http://csrc.nist.gov/nccoe . SUPPLEMENTARY INFORMATION: The NCCoE, hosted by NIST, is a public- private... Information Technology (IT) systems. By accelerating dissemination and use of these integrated tools and...

  10. National Cartographic Information Center

    USGS Publications Warehouse

    ,

    1984-01-01

    The National Cartographic Information Center (NCIC) exists to help you find maps of all kinds and much of the data and materials used to compile and to print them. NCIC collects, sorts and describes all types of cartographic information from Federal, State and local government agencies and, where possible, from private companies in the mapping business. It is the public's primary source for cartographic information. (See partial list of Federal agencies and their map and other cartographic products.)

  11. National Severe Storms Forecast Center

    NASA Technical Reports Server (NTRS)

    1977-01-01

    The principal mission of the National Severe Storms Forecast Center (NSSFC) is to maintain a continuous watch of weather developments that are capable of producing severe local storms, including tornadoes, and to prepare and issue messages designated as either Weather Outlooks or Tornado or Severe Thunderstorm Watches for dissemination to the public and aviation services. In addition to its assigned responsibility at the national level, the NSSFC is involved in a number of programs at the regional and local levels. Subsequent subsections and paragraphs describe the NSSFC, its users, inputs, outputs, interfaces, capabilities, workload, problem areas, and future plans in more detail.

  12. Home - National Site for the Regional IPM Centers

    Science.gov Websites

    Western Region United States Department of Agriculture - National Institute of Food and Agriculture . Regional IPM Centers are sponsored by the USDA National Institute of Food and Agriculture. Last update: May

  13. Cybersecurity in the Clinical Setting: Nurses' Role in the Expanding "Internet of Things".

    PubMed

    Billingsley, Luanne; McKee, Shawn A

    2016-08-01

    Nurses face growing complexity in their work. The expanding "Internet of Things" with "smart" technologies can reduce the burden. However, equipment and devices that connect to patients, the network, or to the Internet can be exploited by hackers. Nurses should be able to identify, understand, and protect against cybersecurity risks to safeguard patients. J Contin Educ Nurs. 2016;47(8):347-349. Copyright 2016, SLACK Incorporated.

  14. A genetic epidemiology approach to cyber-security.

    PubMed

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-16

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  15. A genetic epidemiology approach to cyber-security

    PubMed Central

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-01-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security. PMID:25028059

  16. National Center for Nuclear Security - NCNS

    ScienceCinema

    None

    2018-01-16

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  17. 75 FR 49946 - National Drug Intelligence Center: Agency Information Collection Activities: Proposed Extension...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... DEPARTMENT OF JUSTICE [OMB Number 1105-0087] National Drug Intelligence Center: Agency Information...), National Drug Intelligence Center (NDIC), will be submitting the following information collection request... Kevin M. Walker, General Counsel, National Drug Intelligence Center, Fifth Floor, 319 Washington Street...

  18. A Trusted National Fusion Center Network: Are Baseline Capabilities and Accreditation Needed?

    DTIC Science & Technology

    2010-09-01

    Criminal Intelligence Sharing Plan NCTC National Counterterrorism Center NEMA National Emergency Management Agency NFCA National Fusion Center...1997, during its mid-year conference, the National Emergency Management Association ( NEMA ) met to discuss the need for the development of nationally...and accreditation. EMAP is governed by a commission comprised of ten members, consisting of five representatives from NEMA and five

  19. 78 FR 17411 - Board of Scientific Counselors, National Center for Health Statistics

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Board of Scientific Counselors, National Center for Health Statistics In accordance with section 10(a)(2) of the...), National Center for Health Statistics (NCHS) announces the following meeting of the aforementioned...

  20. 78 FR 48438 - Board of Scientific Counselors, National Center for Health Statistics

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-08

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Board of Scientific Counselors, National Center for Health Statistics In accordance with section 10(a)(2) of the...), National Center for Health Statistics (NCHS) announces the following meeting of the aforementioned...

  1. 76 FR 62814 - National Center For Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-11

    ..., Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389, Research... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center For Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  2. 76 FR 35223 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... clearly unwarranted invasion of personal privacy. Name of Committee: National Center for Research... cycle. (Catalogue of Federal Domestic Assistance Program Nos. 93.306, Comparative Medicine; 93.333...

  3. 75 FR 32187 - National Center for Research Resources: Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-07

    ..., Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389, Research... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  4. 76 FR 29254 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-20

    ... Federal Domestic Assistance Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  5. 75 FR 32187 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-07

    ... Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  6. 75 FR 52538 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-26

    .... 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  7. 76 FR 28055 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... clearly unwarranted invasion of personal privacy. Name of Committee: National Center for Research...

  8. 75 FR 3741 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-22

    ... Federal Domestic Assistance Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... clearly unwarranted invasion of personal privacy. Name of Committee: National Center for Research...

  9. 76 FR 369 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-04

    .... 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  10. 76 FR 6627 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    .... 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  11. 76 FR 12123 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ... Domestic Assistance Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  12. 75 FR 54895 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-09

    ... Assistance Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  13. 76 FR 4121 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-24

    ... Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  14. 76 FR 59709 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-27

    ... Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  15. 76 FR 16797 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special... funding cycle. (Catalogue of Federal Domestic Assistance Program Nos. 93.306, Comparative Medicine; 93.333...

  16. 75 FR 28262 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ....306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389, Research... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  17. 76 FR 57748 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-16

    ... Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  18. 76 FR 40384 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    .... 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  19. 75 FR 61768 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ....306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389, Research... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... unwarranted invasion of personal privacy. Name of Committee: National Center for Research Resources Special...

  20. Kazmerski Leads National Center for Solar Research

    Science.gov Websites

    center is a collaborative co-equal effort involving Sandia National Laboratories and NREL and helps the technologies and continue its leadership in the global marketplace." Kazmerski was NREL's first employee

  1. IPM Projects - National Site for the Regional IPM Centers

    Science.gov Websites

    IPM Roadmap Center Products IPM Databases Home » IPM in the US » IPM Projects IPM Projects USDA Regional IPM Centers (and others) USDA Current Research Information System (CRIS) IR-4 Minor Crops Program Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design

  2. IPM Databases - National Site for the Regional IPM Centers

    Science.gov Websites

    Pesticide Information United States Department of Agriculture - National Institute of Food and Agriculture . Regional IPM Centers are sponsored by the USDA National Institute of Food and Agriculture. Last update

  3. DITEC: Technology Matching Tool (TMT)

    DTIC Science & Technology

    2016-08-01

    of cyberattacks, cybersecurity has become one of the Department of Defense’s (DoD) top priorities. The marketplace of cybersecurity technologies is... cybersecurity products and services. The Space and Naval Warfare Systems Center Pacific’s (SSC Pacific) IA Division has developed the DoD-Centric and...Independent Technology Evaluation Capability (DITEC) to streamline cybersecurity technology evaluation. Specifically, DITEC defines a process for

  4. National Ice Center Visiting Scientist Program

    NASA Technical Reports Server (NTRS)

    Austin, Meg

    2001-01-01

    The objectives of the work done by Dr. Kim Partington were to manage NASA's polar research program, including its strategic direction, research funding and interagency and international collaborations. The objectives of the UCAR Visiting Scientist Program at the National Ice Center (NIC) are to: (1) Manage a visiting scientist program for the NIC Science Center in support of the mission of the NIC; (2) Provide a pool of researchers who will share expertise with the NIC and the science community; (3) Facilitate communications between the research and operational communities for the purpose of identifying work ready for validation and transition to an operational environment; and (4) Act as a focus for interagency cooperation. The NIC mission is to provide worldwide operational sea ice analyses and forecasts for the armed forces of the US and allied nations, the Departments of Commerce and Transportation, and other US Government and international agencies, and the civil sector. The NIC produces these analyses and forecasts of Arctic, Antarctic, Great Lakes, and Chesapeake Bay ice conditions to support customers with global, regional, and tactical scale interests. The NIC regularly deploys Naval Ice Center NAVICECEN Ice Reconnaissance personnel to the Arctic and Antarctica in order to perform aerial ice observation and analysis in support of NIC customers. NIC ice data are a key part of the US contribution to international global climate and ocean observing systems.

  5. Food Sustainability - National Site for the Regional IPM Centers

    Science.gov Websites

    brochure; 280 KB pdf). United States Department of Agriculture - National Institute of Food and Agriculture . Regional IPM Centers are sponsored by the USDA National Institute of Food and Agriculture. Last update

  6. 76 FR 32980 - Telecommunications Service Priority (TSP) System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-07

    ... of Cybersecurity and Communications (CS&C), National Communications System (NCS), will submit the... Protection and Programs Directorate, Office of Cybersecurity and Communications, National Communications...

  7. 76 FR 54244 - Telecommunications Service Priority System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-31

    ... Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of Cybersecurity and... Programs Directorate, Office of Cybersecurity and Communications, National Communications System. Title...

  8. Framework for Identifying Cybersecurity Risks in Manufacturing

    DOE PAGES

    Hutchins, Margot J.; Bhinge, Raunak; Micali, Maxwell K.; ...

    2015-10-21

    Increasing connectivity, use of digital computation, and off-site data storage provide potential for dramatic improvements in manufacturing productivity, quality, and cost. However, there are also risks associated with the increased volume and pervasiveness of data that are generated and potentially accessible to competitors or adversaries. Enterprises have experienced cyber attacks that exfiltrate confidential and/or proprietary data, alter information to cause an unexpected or unwanted effect, and destroy capital assets. Manufacturers need tools to incorporate these risks into their existing risk management processes. This article establishes a framework that considers the data flows within a manufacturing enterprise and throughout its supplymore » chain. The framework provides several mechanisms for identifying generic and manufacturing-specific vulnerabilities and is illustrated with details pertinent to an automotive manufacturer. Finally, in addition to providing manufacturers with insights into their potential data risks, this framework addresses an outcome identified by the NIST Cybersecurity Framework.« less

  9. Framework for Identifying Cybersecurity Risks in Manufacturing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutchins, Margot J.; Bhinge, Raunak; Micali, Maxwell K.

    Increasing connectivity, use of digital computation, and off-site data storage provide potential for dramatic improvements in manufacturing productivity, quality, and cost. However, there are also risks associated with the increased volume and pervasiveness of data that are generated and potentially accessible to competitors or adversaries. Enterprises have experienced cyber attacks that exfiltrate confidential and/or proprietary data, alter information to cause an unexpected or unwanted effect, and destroy capital assets. Manufacturers need tools to incorporate these risks into their existing risk management processes. This article establishes a framework that considers the data flows within a manufacturing enterprise and throughout its supplymore » chain. The framework provides several mechanisms for identifying generic and manufacturing-specific vulnerabilities and is illustrated with details pertinent to an automotive manufacturer. Finally, in addition to providing manufacturers with insights into their potential data risks, this framework addresses an outcome identified by the NIST Cybersecurity Framework.« less

  10. Vice President Mike Pence Visits Kennedy Space Center - National

    NASA Image and Video Library

    2018-02-21

    Members of the National Space Council meet in the high bay of the Space Station Processing Facility at NASA's Kennedy Space Center in Florida, on Feb. 21, 2018. Chaired by Vice President Mike Pence, the council's role is to advise the president regarding national space policy and strategy, and review the nation's long-range goals for space activities.

  11. Vice President Mike Pence Visits Kennedy Space Center - National

    NASA Image and Video Library

    2018-02-21

    Vice President Mike Pence chairs a meeting of the National Space Council in the high bay of the Space Station Processing Facility at NASA's Kennedy Space Center in Florida, on Feb. 21, 2018. The council's role is to advise the president regarding national space policy and strategy, and review the nation's long-range goals for space activities.

  12. Northwest National Marine Renewable Energy Center

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Batten, Belinda; Polagye, Brian

    In 2008, the US Department of Energy’s (DOE) Wind and Water Power Program issued a funding opportunity announcement to establish university-led National Marine Renewable Energy Centers. Oregon State University and the University of Washington combined their capabilities in wave and tidal energy to establish the Northwest National Marine Renewable Energy Center, or NNMREC. NNMREC’s scope included research and testing in the following topic areas: • Advanced Wave Forecasting Technologies; • Device and Array Optimization; • Integrated and Standardized Test Facility Development; • Investigate the Compatibility of Marine Energy Technologies with Environment, Fisheries and other Marine Resources; • Increased Reliability andmore » Survivability of Marine Energy Systems; • Collaboration/Optimization with Marine Renewable and Other Renewable Energy Resources. To support the last topic, the National Renewable Energy Laboratory (NREL) was brought onto the team, particularly to assist with testing protocols, grid integration, and testing instrumentation. NNMREC’s mission is to facilitate the development of marine energy technology, to inform regulatory and policy decisions, and to close key gaps in scientific understanding with a focus on workforce development. In this, NNMREC achieves DOE’s goals and objectives and remains aligned with the research and educational mission of universities. In 2012, DOE provided NNMREC an opportunity to propose an additional effort to begin work on a utility scale, grid connected wave energy test facility. That project, initially referred to as the Pacific Marine Energy Center, is now referred to as the Pacific Marine Energy Center South Energy Test Site (PMEC-SETS) and involves work directly toward establishing the facility, which will be in Newport Oregon, as well as supporting instrumentation for wave energy converter testing. This report contains a breakdown per subtask of the funded project. Under each subtask, the

  13. Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure

    DTIC Science & Technology

    2013-03-01

    protection has become a matter of national security, public safety, and economic stability . It is imperative the U.S. Government (USG) examine current...recommendations for federal responsibilities and legislation to direct nation critical infrastructure efforts to ensure national security, public safety and economic stability .

  14. 34 CFR 403.207 - What are the State's responsibilities to the National Center or Centers for Research in...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... for each new research, curriculum development, or personnel development project it supports, and the... Center or Centers for Research in Vocational Education? 403.207 Section 403.207 Education Regulations of... the State's responsibilities to the National Center or Centers for Research in Vocational Education? A...

  15. National Site for the Regional IPM Centers

    Science.gov Websites

    Agriculture Fungicide Efficacy and Approved Labels Comparative ARS trials Paraguay 2004 Zimbabwe 2004 Paraguay Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design Institute of Food and Agriculture.

  16. National Site for the Regional IPM Centers

    Science.gov Websites

    Click on a state to see IPM site(s) available US Map United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from work by and Agriculture.

  17. The USGS National Wildlife Health Center: Advancing wildlife and ecosystem health

    USGS Publications Warehouse

    Moede Rogall, Gail; Sleeman, Jonathan M.

    2017-01-11

    In 1975, the Federal government responded to the need for establishing national expertise in wildlife health by creating the National Wildlife Health Center (NWHC), a facility within the Department of the Interior; the NWHC is the only national center dedicated to wildlife disease detection, control, and prevention. Its mission is to provide national leadership to safeguard wildlife and ecosystem health through active partnerships and exceptional science. Comparisons are often made between the NWHC, which strives to protect the health of our Nation’s wildlife, and the Centers for Disease Control and Prevention (CDC), which strive to protect public health. The NWHC, a science center of the U.S. Geological Survey (USGS) with specialized laboratories, works to safeguard the Nation’s wildlife from diseases by studying the causes and drivers of these threats, and by developing strategies to prevent and manage them. In addition to the main campus, located in Madison, Wisconsin, the NWHC also operates the Honolulu Field Station that addresses wildlife health issues in Hawaii and the Pacific Region.

  18. 78 FR 64963 - National Center for Complementary & Alternative Medicine; Amended Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-30

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Amended Notice of Meeting Notice is hereby given of a change in the meeting of the National Center for Complementary and Alternative Medicine Special Emphasis Panel, October...

  19. Providing security assurance in line with national DBT assumptions

    NASA Astrophysics Data System (ADS)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  20. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    NASA Astrophysics Data System (ADS)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  1. 15 CFR 950.4 - National Oceanographic Data Center (NODC).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... established and houses the world's largest usuable collection of marine data. (a) Oceanographic data available... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false National Oceanographic Data Center... REGULATIONS OF THE ENVIRONMENTAL DATA SERVICE ENVIRONMENTAL DATA AND INFORMATION § 950.4 National...

  2. National Quality Improvement Center on Early Childhood

    ERIC Educational Resources Information Center

    Browne, Charlyn Harper

    2014-01-01

    The national Quality Improvement Center on early Childhood (QIC-eC) funded four research and demonstration projects that tested child maltreatment prevention approaches. The projects were guided by several key perspectives: the importance of increasing protective factors in addition to decreasing risk factors in child maltreatment prevention…

  3. National Training Center Research Issues

    DTIC Science & Technology

    1987-01-01

    ART Research Note 87-06 aNATIONAL TRAINING CENTER RESEARCH ISSUES UThomas J. Rijenour The BDM Corporation I for AR! Field Unit at Presidio of...Monterey, California James H. Banks, Chief DTIC TRAINING RESEARCH LABORATORY-- ELECTE Jack H. Hiller, Director S APR 06 WD D U. S. Army Research Institute...for the Behavioral and Social Sciences January 1987 Anoo ,d 𔃺, a b1c ’ete s@ cGst’butc n jlh, T@d 87 % P= U. S. ARMY RESEARCH INSTITUTE Im FOR THE

  4. National space test centers - Lewis Research Center Facilities

    NASA Technical Reports Server (NTRS)

    Roskilly, Ronald R.

    1990-01-01

    The Lewis Research Center, NASA, presently has a number of test facilities that constitute a significant national space test resource. It is expected this capability will continue to find wide application in work involving this country's future in space. Testing from basic research to applied technology, to systems development, to ground support will be performed, supporting such activities as Space Station Freedom, the Space Exploration Initiative, Mission to Planet Earth, and many others. The major space test facilities at both Cleveland and Lewis' Plum Brook Station are described. Primary emphasis is on space propulsion facilities; other facilities of importance in space power and microgravity are also included.

  5. 77 FR 2548 - Board of Scientific Counselors, National Center for Health Statistics

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-18

    ... Scientific Counselors, National Center for Health Statistics In accordance with section 10(a)(2) of the...), National Center for Health Statistics (NCHS) announces the following meeting of the aforementioned...; review of the ambulatory and hospital care statistics program; a discussion of the NHANES genetics...

  6. 76 FR 62287 - National Cybersecurity Awareness Month, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ... ensures a coordinated national response to major disruptive cyber events. This May, we also proposed to... infrastructure. And because we have seen the benefits and risks of cyber- and information-related technologies... public and private sectors to ensure coordinated and planned responses to cyber incidents, as we do with...

  7. National Center for Advanced Manufacturing Overview

    NASA Technical Reports Server (NTRS)

    Vickers, John H.

    2000-01-01

    This paper presents a general overview of the National Center for Advanced Manufacturing, with an emphasis on Aerospace Materials, Processes and Environmental Technology. The topics include: 1) Background; 2) Mission; 3) Technology Development Approach; 4) Space Transportation Significance; 5) Partnering; 6) NCAM MAF Project; 7) NASA & Calhoun Community College; 8) Educational Development; and 9) Intelligent Synthesis Environment. This paper is presented in viewgraph form.

  8. Holism at the National Intrepid Center of Excellence (NICoE).

    PubMed

    Foote, Frederick O; Schwartz, Lora

    2012-01-01

    Traumatic brain injury and posttraumatic stress disorder are the signature injuries of the Iraq and Afghanistan wars. Holistic medicine (comprising multispecialty care integration, patient/family-centered care, wellness interventions, and the construction of architectural "healing environments") has much to offer these patients. In this work we describe the architecture and holistic medicine programming of the National Intrepid Center of Excellence (NICoE), a new clinical research center for traumatic brain injury and posttraumatic stress disorder in the Military Health System. Architecture and clinical process are united in a "design/care continuum" for optimal healing. A groundbreaking institution, the NICoE foreshadows many trends in national healthcare for the 21st century. Copyright © 2012 Elsevier Inc. All rights reserved.

  9. Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vishik, Claire; Sheldon, Frederick T; Ott, David

    Cybersecurity practice lags behind cyber technology achievements. Solutions designed to address many problems may and do exist but frequently cannot be broadly deployed due to economic constraints. Whereas security economics focuses on the cost/benefit analysis and supply/demand, we believe that more sophisticated theoretical approaches, such as economic modeling, rarely utilized, would derive greater societal benefits. Unfortunately, today technologists pursuing interesting and elegant solutions have little knowledge of the feasibility for broad deployment of their results and cannot anticipate the influences of other technologies, existing infrastructure, and technology evolution, nor bring the solutions lifecycle into the equation. Additionally, potentially viable solutionsmore » are not adopted because the risk perceptions by potential providers and users far outweighs the economic incentives to support introduction/adoption of new best practices and technologies that are not well enough defined. In some cases, there is no alignment with redominant and future business models as well as regulatory and policy requirements. This paper provides an overview of the economics of security, reviewing work that helped to define economic models for the Internet economy from the 1990s. We bring forward examples of potential use of theoretical economics in defining metrics for emerging technology areas, positioning infrastructure investment, and building real-time response capability as part of software development. These diverse examples help us understand the gaps in current research. Filling these gaps will be instrumental for defining viable economic incentives, economic policies, regulations as well as early-stage technology development approaches, that can speed up commercialization and deployment of new technologies in cybersecurity.« less

  10. The National Space Science Data Center

    NASA Technical Reports Server (NTRS)

    1989-01-01

    An overview is presented of the services offered by the National Space Science Data Center (NSSDC). The NSSDC was established by the National Aeronautics and Space Administration (NASA) over 20 years ago to be the long-term archive for data from its space missions. NSSDC's goal is to provide the research community with data and attendant services in the most efficient, economical, and useful manner possible now and in the future. The organization is dedicated to getting the most scientific value out of NASA's initial investment in its missions. Each service available to scientists through the world is discussed. Also a contact person is identified for each service in case more information in needed.

  11. 42 CFR 124.515 - Compliance alternative for community health centers, migrant health centers and certain National...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Compliance alternative for community health centers, migrant health centers and certain National Health Service Corps sites. 124.515 Section 124.515 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH RESOURCES DEVELOPMENT...

  12. 76 FR 50199 - National Center To Enhance the Professional Development of School Personnel Who Share...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... DEPARTMENT OF EDUCATION [CFDA No. 84.325F] National Center To Enhance the Professional Development... of project period and waiver for the National Center to Enhance the Professional Development of... waiver enables the currently funded National Center to Enhance the Professional Development of School...

  13. The Miami-Dade Juvenile Assessment Center National Demonstration Project

    ERIC Educational Resources Information Center

    Walters, Wansley; Dembo, Richard; Beaulaurier, Richard; Cocozza, Joseph; De La Rosa, Mario; Poythress, Norman; Skowyra, Kathy; Veysey, Bonita M.

    2005-01-01

    The Miami-Dade Juvenile Assessment Center National Demonstration Project (NDP) is serving as a national model for the transformation of front end services in the juvenile justice system in a unique sociocultural setting.We discuss the background and vision of the NDP, its implementation and accomplishments in six major program areas: (1)…

  14. Supportive care services in hemato-oncology centers: a national survey.

    PubMed

    Mercadante, Sebastiano; Costanzi, Andrea; David, Fabrizio; Villari, Patrizia; Musso, Maurizio; Marchetti, Paolo; Casuccio, Alessandra

    2016-10-01

    In the field of hemato-oncology, there is paucity of data assessing models of integration between hemato-oncology and other partner specialties. The aim of this national survey was to gather information about the status of the integration of this kind of activity in hemato-oncologic units existing in Italy. A national telephone survey was conducted to gather information about the status of the integration of hemato-oncologic and supportive care/anesthesiological services. From the national registry of hemato-oncology units, 149 centers were contacted by phone and a dedicated doctor was identified to gather information about the center through a telephone interview. Eighty-one centers (54.3 %) agreed to participate. A mean of 206 (SD 132) painful procedures/year/center were performed. No significant differences among regions and centers were found (P = 0.680). Of the centers, 41.9 % usually asked for anesthesiological consultation to perform painful procedures. No differences were found between the regions (P = 0.137). A mean of 1.8 (SD 1.2) days elapsed from the request to the procedure performance (P = 0.271). No differences among the regions were found (P = 0.350). A mean of 220 (SD 89) central venous vascular accesses/year/center were performed. No differences among regions were found (P = 0.170). No differences among the centers were found (P = 0.691). A mean of 1.8 (SD 1.2) days elapsed from the request to the performance of procedure. Of the centers, 64.2 % had a palliative care team. No differences among regions were found (P = 0.331). A mean of 31.5 (SD 12.2) consultations/year/center for pain control were required. No differences among the regions were found (P = 0.556). Of the centers, 30.8 % had some beds for palliative care. No differences among the regions were found (P = 0.641). Of the centers, 32 % had a hospice was available. No differences among regions were found (P = 0.298). Integration between hemato

  15. National Site for the Regional IPM Centers

    Science.gov Websites

    Service, U.S. Department of Agriculture Soybean Rust from Invasivespecies.gov Soybean Rust Reference Guide SBR facts Iowa State Crop Advisor Institute Module on SBR United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from

  16. National Site for the Regional IPM Centers

    Science.gov Websites

    Agriculture USDA Soybean Rust Web Site Latest News - Southern Plant Diagnostic Network Soybean Rust Pest Alert , contact: Kent Smith, (202) 720-3186, ksmith@ars.usda.gov United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from

  17. National Site for the Regional IPM Centers

    Science.gov Websites

    Agriculture Working Group of State and Federal Scientists Summaries of past meetings November 13, 2002 January , 2004 Active membership Action plans of stakeholders United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from work by

  18. Building a Cloud Computing and Big Data Infrastructure for Cybersecurity Research and Education

    DTIC Science & Technology

    2015-04-17

    408 1,408 312,912 17 Hadoop- Integration M/D Node R720xd 2 24 128 3,600 5 Subtotal: 120 640 18,000 5 Cloud - Production VRTX M620 2 16 256 30,720...4 Subtotal: 8 64 1,024 30,720 4 Cloud - Integration IBM HS22 7870H5U 2 12 84 4,800 5 Subtotal: 10 60 420 4,800 5 TOTAL: 62 652 3,492 366,432...3,492 366,432 Cloud - Integration Hadoop- Production Hadoop- Integration Cloud - Production September 2014 8 Exploring New Opportunities (Cybersecurity

  19. Better Broader Impacts through National Science Foundation Centers

    NASA Astrophysics Data System (ADS)

    Campbell, K. M.

    2010-12-01

    National Science Foundation Science and Technology Centers (STCs) play a leading role in developing and evaluating “Better Broader Impacts”; best practices for recruiting a broad spectrum of American students into STEM fields and for educating these future professionals, as well as their families, teachers and the general public. With staff devoted full time to Broader Impacts activities, over the ten year life of a Center, STCs are able to address both a broad range of audiences and a broad range of topics. Along with other NSF funded centers, such as Centers for Ocean Sciences Education Excellence, Engineering Research Centers and Materials Research Science and Engineering Centers, STCs develop both models and materials that individual researchers can adopt, as well as, in some cases, direct opportunities for individual researchers to offer their disciplinary research expertise to existing center Broader Impacts Programs. The National Center for Earth-surface Dynamics is an STC headquartered at the University of Minnesota. NCED’s disciplinary research spans the physical, biological and engineering issues associated with developing an integrative, quantitative and predictive understanding of rivers and river basins. Funded in 2002, we have had the opportunity to partner with individuals and institutions ranging from formal to informal education and from science museums to Tribal and women’s colleges. We have developed simple table top physical models, complete museum exhibitions, 3D paper maps and interactive computer based visualizations, all of which have helped us communicate with this wide variety of learners. Many of these materials themselves or plans to construct them are available online; in many cases they have also been formally evaluated. We have also listened to the formal and informal educators with whom we partner, from whom we have learned a great deal about how to design Broader Impacts activities and programs. Using NCED as a case study

  20. 78 FR 66983 - National Small Business Development Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... SMALL BUSINESS ADMINISTRATION National Small Business Development Center Advisory Board AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open Federal Advisory Committee meetings..., 2013 and the cancellation for the December 17, 2013 meeting of the National Small Business Development...

  1. 42 CFR 124.515 - Compliance alternative for community health centers, migrant health centers and certain National...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., migrant health centers and certain National Health Service Corps sites. 124.515 Section 124.515 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH RESOURCES DEVELOPMENT... certain National Health Service Corps sites. (a) Period of effectiveness. For each fiscal year for which a...

  2. 42 CFR 124.515 - Compliance alternative for community health centers, migrant health centers and certain National...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., migrant health centers and certain National Health Service Corps sites. 124.515 Section 124.515 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH RESOURCES DEVELOPMENT... certain National Health Service Corps sites. (a) Period of effectiveness. For each fiscal year for which a...

  3. 42 CFR 124.515 - Compliance alternative for community health centers, migrant health centers and certain National...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., migrant health centers and certain National Health Service Corps sites. 124.515 Section 124.515 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH RESOURCES DEVELOPMENT... certain National Health Service Corps sites. (a) Period of effectiveness. For each fiscal year for which a...

  4. 42 CFR 124.515 - Compliance alternative for community health centers, migrant health centers and certain National...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., migrant health centers and certain National Health Service Corps sites. 124.515 Section 124.515 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES HEALTH RESOURCES DEVELOPMENT... certain National Health Service Corps sites. (a) Period of effectiveness. For each fiscal year for which a...

  5. Cybersecurity for distributed energy resources and smart inverters

    DOE PAGES

    Qi, Junjian; Hahn, Adam; Lu, Xiaonan; ...

    2016-12-01

    The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less

  6. Cybersecurity for distributed energy resources and smart inverters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qi, Junjian; Hahn, Adam; Lu, Xiaonan

    The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less

  7. National Ice Center Visiting Scientist Program

    NASA Technical Reports Server (NTRS)

    Austin, Meg

    2002-01-01

    The long-term goal of the University Corporation for Atmospheric Research (UCAR) Visiting Scientist Program at the National Ice Center (NIC) is to recruit the highest quality visiting scientists in the ice research community for the broad purpose of strengthening the relationship between the operational and research communities in the atmospheric and oceanic sciences. The University Corporation for Atmospheric Research supports the scientific community by creating, conducting, and coordinating projects that strengthen education and research in the atmospheric, oceanic and earth sciences. UCAR accomplishes this mission by building partnerships that are national or global in scope. The goal of UCAR is to enable researchers and educators to take on issues and activities that require the combined and collaborative capabilities of a broadly engaged scientific community.

  8. 77 FR 20887 - Proposed Information Collection (National Acquisition Center Customer Response Survey) Activity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-06

    ... information needed to measure customer satisfaction with delivered products and services. DATES: Written... (National Acquisition Center Customer Response Survey) Activity; Comment Request AGENCY: Office of...: Department of Veterans Affairs (VA) National Acquisition Center Customer Response Survey, VA Form 0863. OMB...

  9. National center for airborne laser mapping proposed

    NASA Astrophysics Data System (ADS)

    Carter, Bill; Shrestha, Ramesh L.; Dietrich, Bill

    Researchers from universities, U.S. government agencies, U.S. national laboratories, and private industry met in the spring to learn about the current capabilities of Airborne Laser Swath Mapping (ALSM), share their experiences in using the technology for a wide variety of research applications, outline research that would be made possible by research-grade ALSM data, and discuss the proposed operation and management of the brand new National Center for Airborne Laser Mapping (NCALM).The workshop successfully identified a community of researchers with common interests in the advancement and use of ALSM—a community which strongly supports the immediate establishment of the NCALM.

  10. Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations

    DTIC Science & Technology

    2009-03-10

    Separation of Powers in National Security Matters....................................................................... 10 Congressional Constraints on Executive Action ........................................................................... 15 Policy Considerations and Congressional Options........................................................................ 17 Conclusion..................................................................................................................................... 18 Author Contact

  11. A National Periodicals Center Technical Development Plan.

    ERIC Educational Resources Information Center

    Council on Library Resources, Inc., Washington, DC.

    This technical plan for developing, managing, and operating a national periodicals center (NPC), which was prepared at the request of the Library of Congress, is designed so that it could be used by the Library or any other agency prepared to assume responsibility for the creation of a major periodicals facility. The overall goal of the NPC is to…

  12. 75 FR 80063 - National Center for Research Resources; Notice of Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ... of Federal Domestic Assistance Program Nos. 93.306, Comparative Medicine; 93.333, Clinical Research... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... U.S.C. App.), notice is hereby given of meetings of the National Advisory Research Resources Council...

  13. Disruptive Ideas for Power Grid Security and Resilience With DER

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ibrahim, Erfan

    This presentation by Erfan Ibrahim was prepared for NREL's 2017 Cybersecurity and Reslience Workshop on distributed energy resource (DER) best practices. The presentation provides an overview of NREL's Cyber-Physical Systems Security and Resilience R&D Center, the Center's approach to cybersecurity, and disruptive ideas for power grid security and resilience with DER.

  14. Home - National Site for the Regional IPM Centers

    Science.gov Websites

    Region Northeastern Region Southern Region Western Region United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from of Food and Agriculture. Last update: May 19, 2016.

  15. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance

    PubMed Central

    Dawson, Jessica; Thomson, Robert

    2018-01-01

    One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars. PMID:29946276

  16. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.

    PubMed

    Dawson, Jessica; Thomson, Robert

    2018-01-01

    One of the challenges in writing an article reviewing the current state of cyber education and workforce development is that there is a paucity of quantitative assessment regarding the cognitive aptitudes, work roles, or team organization required by cybersecurity professionals to be successful. In this review, we argue that the people who operate within the cyber domain need a combination of technical skills, domain specific knowledge, and social intelligence to be successful. They, like the networks they operate, must also be reliable, trustworthy, and resilient. Defining the knowledge, skills, attributes, and other characteristics is not as simple as defining a group of technical skills that people can be trained on; the complexity of the cyber domain makes this a unique challenge. There has been little research devoted to exactly what attributes individuals in the cyber domain need. What research does exist places an emphasis on technical and engineering skills while discounting the important social and organizational influences that dictate success or failure in everyday settings. This paper reviews the literature on cyber expertise and cyber workforce development to identify gaps and then argues for the important contribution of social fit in the highly complex and heterogenous cyber workforce. We then identify six assumptions for the future of cybersecurity workforce development, including the requirement for systemic thinkers, team players, a love for continued learning, strong communication ability, a sense of civic duty, and a blend of technical and social skill. Finally, we make recommendations for social and cognitive metrics which may be indicative of future performance in cyber work roles to provide a roadmap for future scholars.

  17. 76 FR 79217 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-National Center...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--National Center for Manufacturing Sciences, Inc. Notice is hereby given that, on November 22, 2011, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993...

  18. 75 FR 26272 - Final Environmental Impact Statement; Environmental Education Center, Yosemite National Park...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-11

    ...; Environmental Education Center, Yosemite National Park, Mariposa County, CA; Notice of Approval of Record of...-190, as amended) and the regulations promulgated by the Council on Environmental Quality (40 CFR 1505... education center in Yosemite National Park. The requisite no-action ``wait period'' was initiated February...

  19. National Center for Combating Terrorism Strategic Plan, September 2003

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bechtel Nevada

    2003-09-01

    National Center for Combating Terrorism Strategic Plan is to document the mission, vision, and goals for success; define the build plan; and describe initiatives that support the U.S. Department of Homeland Security, U.S. Department of Defense, U.S. Department of Energy, U.S. Department of Justice, intelligence community, National Governors Association, and other organizations or departments with combating terrorism training, testing, and technology responsibilities.

  20. About the National Center for Radiation Field Operations (NCRFO)

    EPA Pesticide Factsheets

    The National Center for Radiation Field Operations (NCRFO) is an essential component of EPA’s Radiological Emergency Response Team (RERT) and is key to EPA's response to radiological emergencies and accidents nationwide.

  1. Personnel - National Site for the Regional IPM Centers

    Science.gov Websites

    , California 95618 Phone: 530-750-1269 Email: sfelliott@ucdavis.edu United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from of Food and Agriculture. Last update: June 26, 2015.

  2. 75 FR 75867 - National Sheep Industry Improvement Center

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-07

    ..., Reporting and recordkeeping requirements. PART 63--NATIONAL SHEEP INDUSTRY IMPROVEMENT CENTER 0 Accordingly... #0; #0;Rules and Regulations #0; Federal Register #0; #0; #0;This section of the FEDERAL REGISTER contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0...

  3. IPM eAcademy - National Site for the Regional IPM Centers

    Science.gov Websites

    Events Sonny Ramaswamy's State of NIFA Address USDA National Institute of Food and Agriculture Director species issues affecting the United States United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from work by the

  4. 75 FR 66124 - Notice of Public Meeting, National Historic Oregon Trail Interpretive Center Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-27

    ...] Notice of Public Meeting, National Historic Oregon Trail Interpretive Center Advisory Board AGENCY: Bureau of Land Management, Interior. ACTION: Meeting Notice for the National Historic Oregon Trail...) National Historic Oregon Trail Interpretive Center (NHOTIC) Advisory Board will meet as indicated below...

  5. 75 FR 22160 - National Conservation Training Center Logo

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    ... DEPARTMENT OF THE INTERIOR Fish and Wildlife Service [FWS-R9-NCTC-2009-N285; ABC-92/97300-1661-0029] National Conservation Training Center Logo AGENCY: Fish and Wildlife Service, Interior. ACTION... official Department of the Interior seal, the Fish and Wildlife Service seal, or any other Federal...

  6. 78 FR 23744 - Proposed Establishment of a Federally Funded Research and Development Center-First Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-22

    ... technologies in the government and private sectors. The activity includes staff support for information... cybersecurity technologies in the government and private sectors. [cir] Generate technical expertise to create a... cybersecurity approaches that address the real world needs of complex Information Technology (IT) systems. By...

  7. A framework for linking cybersecurity metrics to the modeling of macroeconomic interdependencies.

    PubMed

    Santos, Joost R; Haimes, Yacov Y; Lian, Chenyang

    2007-10-01

    Hierarchical decision making is a multidimensional process involving management of multiple objectives (with associated metrics and tradeoffs in terms of costs, benefits, and risks), which span various levels of a large-scale system. The nation is a hierarchical system as it consists multiple classes of decisionmakers and stakeholders ranging from national policymakers to operators of specific critical infrastructure subsystems. Critical infrastructures (e.g., transportation, telecommunications, power, banking, etc.) are highly complex and interconnected. These interconnections take the form of flows of information, shared security, and physical flows of commodities, among others. In recent years, economic and infrastructure sectors have become increasingly dependent on networked information systems for efficient operations and timely delivery of products and services. In order to ensure the stability, sustainability, and operability of our critical economic and infrastructure sectors, it is imperative to understand their inherent physical and economic linkages, in addition to their cyber interdependencies. An interdependency model based on a transformation of the Leontief input-output (I-O) model can be used for modeling: (1) the steady-state economic effects triggered by a consumption shift in a given sector (or set of sectors); and (2) the resulting ripple effects to other sectors. The inoperability metric is calculated for each sector; this is achieved by converting the economic impact (typically in monetary units) into a percentage value relative to the size of the sector. Disruptive events such as terrorist attacks, natural disasters, and large-scale accidents have historically shown cascading effects on both consumption and production. Hence, a dynamic model extension is necessary to demonstrate the interplay between combined demand and supply effects. The result is a foundational framework for modeling cybersecurity scenarios for the oil and gas sector. A

  8. 75 FR 49498 - National Center for Research Resources; Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-13

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... U.S.C. App.), notice is hereby given of a meeting of the National Advisory Research Resources... 552b(c)(4) and 552b(c)(6), Title 5 U.S.C., as amended. The grant applications and the discussions could...

  9. 75 FR 18216 - National Center for Research Resources; Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-09

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... U.S.C. App.), notice is hereby given of a meeting of the National Advisory Research Resources... 552b(c)(4) and 552b(c)(6), Title 5 U.S.C., as amended. The grant applications and/or contract proposals...

  10. National University Rail Transportation Center : Tier 1 : final report.

    DOT National Transportation Integrated Search

    2016-10-17

    This project was a collaborative effort between Michigan Techs Rail Transportation Program (RTP), a member of the National University Rail Center (NURail) and the Michigan Dept of Transportation (MDOT), Office of Rail to advance rail transportatio...

  11. The National Climate Change and Wildlife Science Center annual report for 2012

    USGS Publications Warehouse

    Varela-Acevedo, Elda; O'Malley, Robin

    2013-01-01

    Welcome to the inaugural edition of the U.S. Geological Survey (USGS) National Climate Change and Wildlife Science Center (NCCWSC) and the Department of the Interior (DOI) Climate Science Centers (CSCs) annual report. In 2008, Congress created the National Climate Change and Wildlife Science Center (NCCWSC) within the U.S. Geological Survey (USGS). The center was formed to respond to the demands of natural resource managers for rigorous scientific information and effective tools for assessing and responding to climate change. Located at the USGS National Headquarters in Reston, Va., the NCCWSC has invested more than $70 million in cutting-edge climate change research and, in response to Secretarial Order No. 3289,established and is managing eight regional Department of Interior (DOI) Climate Science Centers (CSCs). The mission of the NCCWSC is to provide natural resource managers with the tools and information they need to develop and execute management strategies that address the impacts of climate and other ongoing global changes on fish and wildlife and their habitats. The DOI CSCs are joint Federal-university partnerships that focus their scientific work on regional priorities identified by DOI Landscape Conservation Cooperatives (LCCs) as well as Federal, State, Tribal, and other resource managers. The CSCs provide access to a wide range of scientific capabilities through their network of university partners along with the USGS and other Federal agency scientists. The focus of the NCCWSC on multiregion and national priorities complements the regionally focused agendas of the CSCs.

  12. National Center for Transit Research annual report : July 2001

    DOT National Transportation Integrated Search

    2001-07-01

    The National Center for Transit Research is fully engaged in its mission of enhancing the performance and relevance of public transportation and alternative forms of transportation in urban areas. Research faculty at NCTR already have completed eight...

  13. A National Network of Neurotechnology Centers for the BRAIN Initiative

    PubMed Central

    Alivisatos, A. Paul; Chun, Miyoung; Church, George M.; Greenspan, Ralph J.; Roukes, Michael L.; Yuste, Rafael

    2017-01-01

    We propose the creation of a national network of neurotechnology centers to enhance and accelerate the BRAIN Initiative and optimally leverage the effort and creativity of individual laboratories involved in it. As “brain observatories,” these centers could provide the critical interdisciplinary environment both for realizing ambitious and complex technologies and for providing individual investigators with access to them. PMID:26481036

  14. National Wind Tecnology Center Provides Dual Axis Resonant Blade Testing

    ScienceCinema

    Felker, Fort

    2018-01-16

    NREL's Structural Testing Laboratory at the National Wind Technology Center (NWTC) provides experimental laboratories, computer facilities for analytical work, space for assembling components and turbines for atmospheric testing as well as office space for industry researchers. Fort Felker, center director at the NWTC, discusses NREL's state-of-the-art structural testing capabilities and shows a flapwise and edgewise blade test in progress.

  15. National Wind Tecnology Center Provides Dual Axis Resonant Blade Testing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Felker, Fort

    2013-11-13

    NREL's Structural Testing Laboratory at the National Wind Technology Center (NWTC) provides experimental laboratories, computer facilities for analytical work, space for assembling components and turbines for atmospheric testing as well as office space for industry researchers. Fort Felker, center director at the NWTC, discusses NREL's state-of-the-art structural testing capabilities and shows a flapwise and edgewise blade test in progress.

  16. 76 FR 37822 - General Meeting Registration and Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-28

    ...), National Protection and Programs Directorate (NPPD, Office of Cybersecurity and Communications (CS&C... Cybersecurity and Communications, Office of Emergency Communications. Title: General Meeting Registration and...

  17. Disruptive Ideas for IT/OT Security in Energy Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martin, Maurice

    Presentation on disruptive ideas for IT and OT cybersecurity in energy systems, presented by Power Systems Engineering Center Researcher Maurice Martin. This presentation was prepared for the Florida Institute for Cybersecurity Research Conference on March 1, 2018.

  18. 46 CFR 1.03-40 - Appeals from decisions or actions of the National Maritime Center.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Maritime Center. 1.03-40 Section 1.03-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES... Appeal § 1.03-40 Appeals from decisions or actions of the National Maritime Center. Any person directly affected by a decision or action of an officer or employee of the National Maritime Center (NMC) involving...

  19. IPM in the US - National Site for the Regional IPM Centers

    Science.gov Websites

    Committee Federal IPM Coordinating Committee National IPM Roadmap United States Department of Agriculture - National Institute of Food and Agriculture Website managed by the Southern IPM Center. Design adapted from of Food and Agriculture. Last update: January 20, 2014.

  20. Alternative Fuels Data Center: Michigan's National Lakeshore Reduces

    Science.gov Websites

    alternative fuel vehicles to the park's fleet, while educating staff and visitors about the impact of vehicle Vehicle Impact on the Environment Michigan's National Lakeshore Reduces Vehicle Impact on the Vehicle Impact on the Environment on Facebook Tweet about Alternative Fuels Data Center: Michigan's

  1. Examination into Grants to National Reading Center Foundation.

    ERIC Educational Resources Information Center

    Comptroller General of the U.S., Washington, DC.

    Reported is a review by the U. S. General Accounting Office of procedures and requirements related to grants totaling $2.9 million to the National Reading Center Foundation by the Office of Education (OE), Department of Health, Education, and Welfare. Costs totaling $305,300 incurred during the initial grant period were deemed unallowable.…

  2. DoD Cybersecurity Weaknesses as Reported in Audit Reports Issued From August 1, 2015 Through July 31, 2016 (REDACTED)

    DTIC Science & Technology

    2016-12-13

    INFORMATION TECHNOLOGY , GOVERNMENT ACCOUNTABILITY OFFICE SUBJECT: DoD Cybersecurity Weaknesses as Reported in Audit Reports Issued From August...The Air Force Audit Agency recommended that the Air Force Reserve officials direct AFRC personnel to implement a standard process to ensure continued...those products and systems throughout the system development life cycle. The DoD audit community and the GAO reported configuration management

  3. A National Network of Neurotechnology Centers for the BRAIN Initiative.

    PubMed

    Alivisatos, A Paul; Chun, Miyoung; Church, George M; Greenspan, Ralph J; Roukes, Michael L; Yuste, Rafael

    2015-11-04

    We propose the creation of a national network of neurotechnology centers to enhance and accelerate the BRAIN Initiative and optimally leverage the effort and creativity of individual laboratories involved in it. As "brain observatories," these centers could provide the critical interdisciplinary environment both for realizing ambitious and complex technologies and for providing individual investigators with access to them. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Identifying the Local Impacts of National ATE Centers on Their Host Institutions: An Exploratory Study

    ERIC Educational Resources Information Center

    Henderson, Charles; Fynewever, Herb; Petcovic, Heather; Bierema, Andrea

    2012-01-01

    The purpose of this study is to identify the local impacts of national advanced technological education (ATE) centers on their host institutions. A sample of three mature, national ATE centers are chosen, with each center serving as a case for a mixed-methods, collective case study research design. Results, drawn from interviews and surveys,…

  5. 75 FR 55333 - Board of Scientific Counselors, National Center for Health Statistics, (BSC, NCHS)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... Scientific Counselors, National Center for Health Statistics, (BSC, NCHS) In accordance with section 10(a)(2... Prevention (CDC), National Center for Health Statistics (NCHS) announces the following meeting of [email protected] or Virginia Cain, [email protected] at least 10 days in advance for requirements). All visitors...

  6. National College Learning Center Association 2014 Survey Report

    ERIC Educational Resources Information Center

    Toms, Marcia

    2016-01-01

    The material in this article is a compilation of the results of an National College Learning Center Association (NCLCA) study conducted by Dr. Marcia Toms under the auspices of NC State University which came from 211 unique institutions during the Spring of 2014. Invitations to complete the survey were sent to all past and present NCLCA members as…

  7. Wind Energy at NREL's National Wind Technology Center

    ScienceCinema

    None

    2017-12-09

    It is a pure, plentiful natural resource. Right now wind is in high demand and it holds the potential to transform the way we power our homes and businesses. NREL is at the forefront of wind energy research and development. NREL's National Wind Technology Center (NWTC) is a world-class facility dedicated to accelerating and deploying wind technology.

  8. Panel Discussion: New Directions in Human Reliability Analysis for Oil & Gas, Cybersecurity, Nuclear, and Aviation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harold S. Blackman; Ronald Boring; Julie L. Marble

    This panel will discuss what new directions are necessary to maximize the usefulness of HRA techniques across different areas of application. HRA has long been a part of Probabilistic Risk Assessment in the nuclear industry as it offers a superior standard for risk-based decision-making. These techniques are continuing to be adopted by other industries including oil & gas, cybersecurity, nuclear, and aviation. Each participant will present his or her ideas concerning industry needs followed by a discussion about what research is needed and the necessity to achieve cross industry collaboration.

  9. Mapping Applications Center, National Mapping Division, U.S. Geological Survey

    USGS Publications Warehouse

    ,

    1996-01-01

    The Mapping Applications Center (MAC), National Mapping Division (NMD), is the eastern regional center for coordinating the production, distribution, and sale of maps and digital products of the U.S. Geological Survey (USGS). It is located in the John Wesley Powell Federal Building in Reston, Va. The MAC's major functions are to (1) establish and manage cooperative mapping programs with State and Federal agencies; (2) perform new research in preparing and applying geospatial information; (3) prepare digital cartographic data, special purpose maps, and standard maps from traditional and classified source materials; (4) maintain the domestic names program of the United States; (5) manage the National Aerial Photography Program (NAPP); (6) coordinate the NMD's publications and outreach programs; and (7) direct the USGS mapprinting operations.

  10. LULAC National Educational Service Centers Inc. (LNESC) Progress Report, 1977: Building Leadership Through Education.

    ERIC Educational Resources Information Center

    Lorber, Erin, Ed.; And Others

    Since 1973, the LULAC National Education Service Centers, Inc. (LNESC) has been functioning to increase Hispanic access to and participation in post-secondary education. A national educational outreach network consisting of 12 field center offices and a headquarters in Washington, D.C. LNESC is dedicated to the principle that the essential…

  11. Preparedness and Emergency Response Learning Centers: supporting the workforce for national health security.

    PubMed

    Richmond, Alyson L; Sobelson, Robyn K; Cioffi, Joan P

    2014-01-01

    The importance of a competent and prepared national public health workforce, ready to respond to threats to the public's health, has been acknowledged in numerous publications since the 1980s. The Preparedness and Emergency Response Learning Centers (PERLCs) were funded by the Centers for Disease Control and Prevention in 2010 to continue to build upon a decade of focused activities in public health workforce preparedness development initiated under the Centers for Public Health Preparedness program (http://www.cdc.gov/phpr/cphp/). All 14 PERLCs were located within Council on Education for Public Health (CEPH) accredited schools of public health. These centers aimed to improve workforce readiness and competence through the development, delivery, and evaluation of targeted learning programs designed to meet specific requirements of state, local, and tribal partners. The PERLCs supported organizational and community readiness locally, regionally, or nationally through the provision of technical consultation and dissemination of specific, practical tools aligned with national preparedness competency frameworks and public health preparedness capabilities. Public health agencies strive to address growing public needs and a continuous stream of current and emerging public health threats. The PERLC network represented a flexible, scalable, and experienced national learning system linking academia with practice. This system improved national health security by enhancing individual, organizational, and community performance through the application of public health science and learning technologies to frontline practice.

  12. 75 FR 29366 - ``Homeless Veterans' Reintegration Program (HVRP) National Technical Assistance Center...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-25

    ... ``Homeless Veterans' Reintegration Program (HVRP) National Technical Assistance Center Cooperative Agreement...). Section 2021 authorizes programs to expedite the reintegration of homeless Veterans into the labor force... Technical Assistance Center (NTAC) for the Homeless Veterans' Reintegration Program (HVRP) to include the...

  13. 76 FR 79202 - National Center for Complementary & Alternative Medicine; Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of a meeting of the National Advisory Council for Complementary and Alternative...

  14. 75 FR 19983 - National Center for Injury Prevention and Control Initial Review Group

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-16

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control Initial Review Group In accordance with section 10(a)(2) of the Federal Advisory Committee Act (Pub. L. 92-463), the Centers for Disease Control and Prevention (CDC...

  15. 75 FR 11186 - National Center for Complementary and Alternative Medicine Announcement of Workshop on Natural...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-10

    ... Complementary and Alternative Medicine Announcement of Workshop on Natural Products ACTION: Notice. SUMMARY: As part of its strategic planning process, the National Center for Complementary and Alternative Medicine... attend. Seating is limited. Background: The National Center for Complementary and Alternative Medicine...

  16. Local Integration of the National Atmospheric Release Advisory Center with Cities (LINC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ermak, D L; Tull, J E; Mosley-Rovi, R

    The objective of the ''Local Integration of the National Atmospheric Release Advisory Center with Cities'' (LINC) program is to demonstrate the capability for providing local government agencies with an advanced operational atmospheric plume prediction capability, which can be seamlessly integrated with appropriate federal agency support for homeland security applications. LINC is a Domestic Demonstration and Application Program (DDAP) funded by the Chemical and Biological National Security Program (CBNP), which is part of the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). LINC will make use of capabilities that have been developed the CBNP, and integrated into the National Atmosphericmore » Release Advisory Center (NARAC) at Lawrence Livermore National Laboratory (LLNL). NARAC tools services will be provided to pilot study cities and counties to map plumes from terrorism threats. Support to these local agencies will include training and customized support for exercises, special events, and general emergencies. NARAC provides tools and services that map the probable spread of hazardous material which have been accidentally or intentionally released into the atmosphere. Primarily supported by the DOE, NARAC is a national support and resource center for planning, real-time assessment and detailed studies of incidents involving a wide variety of hazards, including radiological, chemical, or biological releases. NARAC is a distributed system, providing modeling and geographical information tools for use on an end user's computer system, as well as real-time access to global meteorological and geographical databases and advanced three-dimensional model predictions.« less

  17. Vegetation studies, National Training Center, Fort Irwin, California

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brandt, C.A.; Rickard, W.H.; Cadoret, N.A.

    1997-09-01

    During the spring of 1992, the Pacific Northwest National Laboratory (PNNL) conducted surveys of the Avawatz and Granite mountains springs for the National Training Center (NTC) to evaluate the occurrence of sensitive plant species in these areas. PNNL also conducted a survey of the eastern outwash of the Paradise Range for the occurrence of Lane Mountain milk vetch (Astragalus jaegerianus). In spring of 1993, PNNL conducted an additional study of Lane Mountain milk vetch on the NTC to determine habitat characteristics for this plant and to develop a method for predicting its potential occurrence, based on simple habitat attributes. Themore » results of these studies are itemized.« less

  18. 75 FR 38126 - UAW-Chrysler National Training Center, Detroit, MI; Notice of Affirmative Determination Regarding...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-01

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-71,047] UAW-Chrysler National Training Center, Detroit, MI; Notice of Affirmative Determination Regarding Application for Reconsideration... that a significant number or proportion of the workers in the UAW-Chrysler National Training Center...

  19. 78 FR 33228 - Final Waiver and Extension of the Project Period for the National Dropout Prevention Center for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-04

    ... the National Dropout Prevention Center for Students With Disabilities [Catalog of Federal Domestic... period enables the currently funded National Dropout Prevention Center for Students with Disabilities... Dropout Prevention Center for Students with Disabilities. The Center was funded under the Technical...

  20. 77 FR 4052 - National Center for Complementary & Alternative Medicine; Amended Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-26

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Amended Notice of Meeting Notice is hereby given of a change in the meeting of the National Advisory Council for Complementary and Alternative Medicine, February 3, 2012, 8...

  1. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.

    PubMed

    He, Meilin; Devine, Laura; Zhuang, Jun

    2018-02-01

    The government, private sectors, and others users of the Internet are increasingly faced with the risk of cyber incidents. Damage to computer systems and theft of sensitive data caused by cyber attacks have the potential to result in lasting harm to entities under attack, or to society as a whole. The effects of cyber attacks are not always obvious, and detecting them is not a simple proposition. As the U.S. federal government believes that information sharing on cybersecurity issues among organizations is essential to safety, security, and resilience, the importance of trusted information exchange has been emphasized to support public and private decision making by encouraging the creation of the Information Sharing and Analysis Center (ISAC). Through a decision-theoretic approach, this article provides new perspectives on ISAC, and the advent of the new Information Sharing and Analysis Organizations (ISAOs), which are intended to provide similar benefits to organizations that cannot fit easily into the ISAC structure. To help understand the processes of information sharing against cyber threats, this article illustrates 15 representative information sharing structures between ISAC, government, and other participating entities, and provide discussions on the strategic interactions between different stakeholders. This article also identifies the costs of information sharing and information security borne by different parties in this public-private partnership both before and after cyber attacks, as well as the two main benefits. This article provides perspectives on the mechanism of information sharing and some detailed cost-benefit analysis. © 2017 Society for Risk Analysis.

  2. NATIONAL CARTOGRAPHIC INFORMATION CENTER: AN INFORMATION RESOURCE ON MAPPING PRODUCTS FOR THE NATION.

    USGS Publications Warehouse

    Stevens, Alan R.

    1985-01-01

    Since its inception in 1974 the National Cartographic Information Center (NCIC), US Geological Survey, has rapidly developed to become a focal point for providing information on the availability of cartographic data, including maps/charts, aerial photographs, satellite imagery, geodetic control, digital mapping data, map materials and related cartographic products. In early years NCIC concentrated its efforts on encoding and entering several major National Mapping Division record collections into its systems. NCIC is now stressing the acquisition of data from sources outside the National Mapping Division, including 37 Federal agencies and more than a thousand State and private institutions. A critical review has recently been conducted by NCIC of its systems with the aim of improving its efficiency and levels of operation. Several activities which resulted include improving its existing networks, refinement of digital data distribution, study of new storage media and related projects.

  3. Cybersecurity Regulation of Wireless Devices for Performance and Assurance in the Age of "Medjacking".

    PubMed

    Armstrong, David G; Kleidermacher, David N; Klonoff, David C; Slepian, Marvin J

    2015-08-27

    We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as "medjacking") is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. © 2015 Diabetes Technology Society.

  4. Products Available from the National Center for Education Statistics.

    ERIC Educational Resources Information Center

    Fromboluti, Carol Sue

    This booklet lists some of the products available from the National Center for Education Statistics. Each product is described briefly, with some notes about its development and use, and ordering information, including cost and stock number. The following products are described: (1) "Student Data Handbook for Elementary, Secondary, and Early…

  5. National Climate Change and Wildlife Science Center, Version 2.0

    USGS Publications Warehouse

    O'Malley, R.; Fort, E.; Hartke-O'Berg, N.; Varela-Acevedo, E.; Padgett, Holly A.

    2013-01-01

    The mission of the USGS's National Climate Change and Wildlife Science Center (NCCWSC) is to serve the scientific needs of managers of fish, wildlife, habitats, and ecosystems as they plan for a changing climate. DOI Climate Science Centers (CSCs) are management by NCCWSC and include this mission as a core responsibility, in line with the CSC mission to provide scientific support for climate-adaptation across a full range of natural and cultural resources. NCCWSC is a Science Center application designed in Drupal with the OMEGA theme. As a content management system, Drupal allows the science center to keep their website up-to-date with current publications, news, meetings and projects. OMEGA allows the site to be adaptive at different screen sizes and is developed on the 960 grid.

  6. 76 FR 30735 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-26

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory... Alternative Medicine [[Page 30736

  7. National Center for Standards and Certification Information: Service and programs

    NASA Technical Reports Server (NTRS)

    Overman, Joanne

    1994-01-01

    The National Center for Standards and Certification Information (NCSCI) provides information on U.S., foreign and international voluntary standards, government regulations, and conformity assessment procedures for non-agricultural products. The Center serves as a referral service and focal point in the United States for information on standards and standards-related information. NCSCI staff respond to inquiries, maintain a reference collection of standards and standards-related documents, and serve as the U.S. inquiry point for information to and from foreign countries.

  8. 34 CFR 413.33 - What substantive studies must the National Center or Centers conduct and submit?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Secretary of Labor, the Secretary of Health and Human Services, the Committee on Labor and Human Resources... apprenticeship or mentoring approaches. (b) The National Center conducting dissemination and training activities shall annually prepare a study of its dissemination and training activities. (c) Annual studies...

  9. The National Reading Research Center: Agenda Related to Issues of Diverse Learners.

    ERIC Educational Resources Information Center

    Tomlinson, Louise M.

    The National Reading Research Center (NRRC) advocates education through research that addresses the unacceptably low reading achievement of American students and the lack of equity in the achievement of mainstream and minority populations. The NRRC acknowledges four pervasive problems that will sharpen the focus of the center's work: too many…

  10. The Lister Hill National Center for Biomedical Communications.

    PubMed

    Smith, K A

    1994-09-01

    On August 3, 1968, the Joint Resolution of the Congress established the program and construction of the Lister Hill National Center for Biomedical Communications. The facility dedicated in 1980 contains the latest in computer and communications technologies. The history, program requirements, construction management, and general planning are discussed including technical issues regarding cabling, systems functions, heating, ventilation, and air conditioning system (HVAC), fire suppression, research and development laboratories, among others.

  11. Effective Instruction. National Dropout Prevention Center/Network Newsletter. Volume 21, Number 2

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2009-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Strategies for Success (Charles W. Hatch); (2) 2009 NDPN Crystal Star Winners; (3) Strategies for More Effective Instruction (Micki Gibson); (4) Some Thoughts on Teaching…

  12. Service-Learning. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 4

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Dropouts and Democracy (Robert Shumer); (2) 2011 NDPN Crystal Star Winners; (3) Service-Learning as Dropout Intervention and More (Michael VanKeulen); and (4) Teacher…

  13. Planning and acquiring a national center for the United States Geological Survey

    USGS Publications Warehouse

    Schmidt, William A.

    1993-01-01

    This history of building a National Center for the U.S. Geological Survey is a "nuts and bolts" account of the planning, design and construction, forgotten happenings, and frustrations in the planning and authorization process, and the political and other considerations which played a significant role in the culmination of a dream about a National Center for the Geological Survey. This documented data of unique procedures in the acquisition and financing of Federal buildings, the choice and development of the building site, and its location as a contribution to the enhancement of the "new town" concept of the 1960's in the planning and development of the National Capital Area, may well provide guidance in the future to those who have to decide whether a building of true worth should be preserved.

  14. 76 FR 370 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-04

    .... 93.306, Comparative Medicine; 93.333, Clinical Research; 93.371, Biomedical Technology; 93.389... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research... Biomedical and Behavioral Research Facilities. Date: March 1-3, 2011. Time: 8 a.m. to 5 p.m. Agenda: To...

  15. Project UNIFY. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 1

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Special Olympics Project UNIFY (Andrea Cahn); (2) The Impact of Project UNIFY; (3) Project UNIFY Brings Youth Together to Learn and Graduate (William H. Hughes); (4)…

  16. The BHEF National Higher Education and Workforce Initiative: A Model for Pathways to Baccalaureate Attainment and High-Skill Careers in Emerging Fields, Part 2. BHEF Case Study Series

    ERIC Educational Resources Information Center

    Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Troyan, Danielle

    2015-01-01

    BHEF has achieved particular success in operationalizing its National Higher Education and Workforce Initiative (HEWI) in Maryland focusing on cybersecurity. Leveraging its membership of corporate CEOs, university presidents and government agency leaders, BHEF partnered with the University System of Maryland to build a system-wide response to the…

  17. 76 FR 55073 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-06

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the National Advisory Council for Complementary and Alternative Medicine ...

  18. New York can be our nation's center for Alzheimer's research.

    PubMed

    Vann, Allan S

    2014-09-01

    More than 5 million people in this country have Alzheimer's disease, and more than 300,000 of those with Alzheimer's live in New York. By 2025, it is estimated that there will be 350,000 residents living with Alzheimer's in New York. Congressman Steve Israel and New York Assemblyman Charles Lavine issued a joint proposal in June, 2013 suggesting that New York become this country's center for Alzheimer's research. Obviously, they would both like to see increased federal funding, but they also know that we cannot count on that happening. So Israel and Lavine have proposed a $3 billion state bonding initiative to secure sufficient funding to tackle this disease. It would be similar to the bonding initiatives that have made California and Texas this nation's centers for stem cell and cancer research. The bond would provide a dedicated funding stream to support research to find effective means to treat, cure, and eventually prevent Alzheimer's, and fund programs to help people currently dealing with Alzheimer's and their caregivers. New York already has some of the major "ingredients" to make an Alzheimer's bond initiative a success, including 3 of our nation's 29 Alzheimer's Disease Research Centers and some of the finest research facilities in the nation for genetic and neuroscience research. One can only imagine the synergy of having these world class institutions working on cooperative grants and projects with sufficient funding to attract even more world class researchers and scientists to New York to find ways to prevent, treat, and cure Alzheimer's. © The Author(s) 2014.

  19. 77 FR 38398 - Agency Information Collection (National Acquisition Center Customer Response Survey) Activities...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ... Acquisition Center Customer Response Survey) Activities Under OMB Review AGENCY: Office of Acquisition and... INFORMATION: Title: Department of Veterans Affairs (VA) National Acquisition Center Customer Response Survey... collection. Abstract: VA Form 0863 will be used to collect customer's feedback and suggestions on delivered...

  20. 77 FR 31862 - National Center for Complementary & Alternative Medicine; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-30

    ... Complementary & Alternative Medicine; Notice of Closed Meetings Pursuant to section 10(d) of the Federal... Alternative Medicine Special Emphasis Panel; HCS Collaboratory Coordinating Center (U54). Date: July 9, 2012... Scientific Review, National Center for Complementary and Alternative Medicine, NIH, 6707 Democracy Blvd...

  1. Family Engagement. National Dropout Prevention Center/Network Newsletter. Volume 20, Number 2

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2008-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Family/School Relationships: Relationships That Matter; (2) Program Profile; (3) Engaging Families in the Pathway to College: Lessons From Schools That Are Beating the Odds (Anne T.…

  2. What Currently Defines a Breast Center? Initial Data From the National Accreditation Program for Breast Centers

    PubMed Central

    Moran, Meena S.; Kaufman, Cary; Burgin, Cindy; Swain, Sandra; Granville, Tenisha; Winchester, David P.

    2013-01-01

    Purpose: The definition of a “breast center” varies significantly, ranging from hospital-based or free-standing comprehensive programs to private subspecialty practices with patient resources in close proximity. This study analyzes the 2-year data of the National Accreditation Program for Breast Centers (NAPBC) to assess the demographics of the types of programs seeking breast center (BC) accreditation. The results of a postaccreditation survey are also analyzed. Materials and Methods: All data (ie, Survey Application Record, on-site surveyors' reports, postaccreditation survey) for programs applying for accreditation between October 31, 2008, and October 31, 2010, were entered into a database at the American College of Surgeons headquarters. Analysis was conducted with SPSS v.19 and Microsoft Excel 2007. Results: During the initial 2-year period, 238 centers were surveyed across 41 states. With regard to the 27 standards and 17 BC components, 68% of centers had no deficiencies, 28% had ≤ 10% deficiencies, 3% had deficiencies in 11% to 29% of standards, and 2% had ≥ 30% deficiencies. The most common standards with noncompliance were accreditation for ultrasound-guided biopsy (standard 11), stereotactic biopsy (standard 10), and accrual onto clinical trials (standard 3.2). The only BC component found to be absent was survivorship program (1%). Desciptive categories were as follows: 81.5% were hospital-based centers, 13.5% were free-standing facilities, 2.5% were group practices, and 3% were “other.” There were no significant associations between descriptive category and full accreditation versus contingency or failure, or deficiencies in any one standard (all Ps > .05). On the basis of responses to the postaccreditation survey, 76% admitted making significant changes before the survey process. Conclusion: This initial analysis of the NAPBC 2-year data suggests that a wide variety of BC models adequately provide a high level of care and services for

  3. Information resources at the National Center for Biotechnology Information.

    PubMed Central

    Woodsmall, R M; Benson, D A

    1993-01-01

    The National Center for Biotechnology Information (NCBI), part of the National Library of Medicine, was established in 1988 to perform basic research in the field of computational molecular biology as well as build and distribute molecular biology databases. The basic research has led to new algorithms and analysis tools for interpreting genomic data and has been instrumental in the discovery of human disease genes for neurofibromatosis and Kallmann syndrome. The principal database responsibility is the National Institutes of Health (NIH) genetic sequence database, GenBank. NCBI, in collaboration with international partners, builds, distributes, and provides online and CD-ROM access to over 112,000 DNA sequences. Another major program is the integration of multiple sequences databases and related bibliographic information and the development of network-based retrieval systems for Internet access. PMID:8374583

  4. The National Space Science Data Center guide to international rocket data

    NASA Technical Reports Server (NTRS)

    Dubach, L. L.

    1972-01-01

    Background information is given which briefly describes the mission of the National Space Science Data Center (NSSDC), including its functions and systems, along with its policies and purposes for collecting rocket data. The operation of a machine-sensible rocket information system, which allows the Data Center to have convenient access to information and data concerning all rocket flights carrying scientific experiments, is also described. The central feature of this system, an index of rocket flights maintained on magnetic tape, is described. Standard outputs for NSSDC and for the World Data Center A (WDC-A) for Rockets and Satellites are described.

  5. 78 FR 51734 - National Center for Complementary and Alternative Medicine Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary and Alternative Medicine Notice of Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of a meeting of the National Advisory Council for Complementary and Alternative...

  6. 77 FR 43099 - National Center For Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-23

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center For Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of a meeting of the National Advisory Council for Complementary and Alternativ...

  7. 78 FR 19498 - National Center for Complementary and Alternative Medicine; Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-01

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary and Alternative Medicine; Notice of Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of a meeting of the National Advisory Council for Complementary and Alternative...

  8. Formation of National Partnerships by Centers to Increase Diversity

    NASA Astrophysics Data System (ADS)

    Tolbert, M. E.

    2008-05-01

    As scientists seek innovative ways for their research results to have greater impact, they are using many strategies to implement their ideas to add value to the process. Some have decided to remain individual researchers while others have identified partners with whom to work. The idea behind forming partnerships is that a synergistic effect would result and there would be value added with a research center approach. Eight research center programs are sponsored by the National Science Foundation (NSF) to take advantage of this type of synergy. These centers form strong partnerships with multiple institutions thereby enabling the conduct of research, education, and knowledge transfer. The added value of the centers is critical as these interdisciplinary entities exploit opportunities in science, technology, engineering, and mathematics. Additionally, they address racial and ethnic diversity while conducting innovative research. Important for the survival of these centers is the formation of strong, long-term partnerships. In this presentation, Science and Technology Centers that focus on earth, atmospheric, and ocean sciences - fields in which racial and ethnic diversity is lacking - will be highlighted. These centers have developed recruitment and retention strategies to increase the number of under- represented minorities in these fields. The discussion will include a description of these strategies, degrees earned, and employment data on persons in the target fields. Special attention will be paid to partnerships and other characteristics that put these centers on the road to success, especially in the integration of research and education and the fostering of ethnic and racial diversity.

  9. Visual Display Study: National 4-H Center. A 4-H Intern Report.

    ERIC Educational Resources Information Center

    Farwell, Sanford W.

    An internship report cites ways in which the National 4-H Center could be more effective in a visual sense. The author suggests collecting the memorabilia already at the Center to form an historical museum and coordinating the historical items with present items. Impact areas, those with a lot of traffic, are discussed individually in terms of…

  10. Verified Centers, Nonverified Centers or Other Facilities: A National Analysis of Burn Patient Treatment Location

    PubMed Central

    Zonies, David; Mack, Christopher; Kramer, Bradley; Rivara, Frederick; Klein, Matthew

    2009-01-01

    Background Although comprehensive burn care requires significant resources, patients may be treated at verified burn centers, non-verified burn centers, or other facilities due to a variety of factors. The purpose of this study was to evaluate the association between patient and injury characteristics and treatment location using a national database. Study Design We performed an analysis of all burn patients admitted to United States hospitals participating in the Healthcare Cost and Utilization Project over 2 years. Univariate and multivariate analyses were performed to identify patient and injury factors associated with the likelihood of treatment at designated burn care facilities. Definitve care facilities were categorized as American Burn Association verified centers, non-verified burn centers, or other facilities. Results Over the two years, 29,971 burn patients were treated in 1,376 hospitals located in 19 participating states. A total of 6,712 (22%) patients were treated at verified centers, with 26% and 52% treated at non-verified or other facilities, respectively. Patients treated at verified centers were younger than those at non-verified or other facilities (33.1 years vs. 33.7 years vs. 41.9 years, p<0.001) and had a higher rate of inhalation injury (3.4% vs. 3.2% vs. 2.2%, p<0.001). Independent factors associated with treatment at verified centers include burns to the head/neck (RR 2.4, CI 2.1-2.7), hand (RR 1.8, CI 1.6-1.9), electrical injury (RR 1.4, CI 1.4, CI 1.2-1.7), and fewer co-morbidities (RR 0.55, CI 0.5-0.6). Conclusions More than two-thirds of significantly burned patients are treated at non-verified burn centers in the U.S. Many patients meeting ABA criteria for transfer to a burn center are being treated at non-burn center facilities. PMID:20193892

  11. Factors Influencing the Decision to Proceed to Firmware Upgrades to Implanted Pacemakers for Cybersecurity Risk Mitigation.

    PubMed

    Saxon, Leslie A; Varma, Niraj; Epstein, Laurence M; Ganz, Leonard I; Epstein, Andrew E

    2018-05-10

    In August 2017, the first major recall for cybersecurity vulnerabilities in pacemakers capable of remote connectivity was released that impacted 465,000 United States patients. 1,2 The FDA approved a firmware update designed by the manufacturer of the devices as a remediation (Abbott , formally St. Jude Medical). The recall was in response to the public disclosure of vulnerability by an investment firm and produced in a lab environment that could allow an unauthorized party in close proximity to a patient to impact the performance of the device or modify device settings via radio frequency communication. 3 While an exploit has not occurred in a patient and requires a high degree of resources and skill to execute, if accomplished, it could pose a significant risk to device safety and essential performance and cause patient harm. The FDA defines this as an uncontrolled vulnerability. 2 The recall recommendations were coordinated between the FDA, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), a division of Homeland Security that responds to and coordinates disclosure of critical infrastructure cybersecurity vulnerabilities and Abbott. 1 All parties urged caution and shared decision making between patient and clinician as to whether to have the device firmware update, a process that requires a clinic visit to implement with a device programmer. The manufacturer bench tested the firmware update but the only prior experience with an implanted device firmware updates was a 2012 ICD firmware update that demonstrated a 0.197% risk of device back-up mode pacing after the upgrade was performed.

  12. 76 FR 35227 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    ... Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory... Alternative Medicine Special Emphasis Panel, NIH-HMO Collaboratory Coordinating Center (U54). Date: July 14... Scientific Review, National Center for Complementary, and Alternative Medicine, NIH, 6707 Democracy Blvd...

  13. Summer Learning. National Dropout Prevention Center/Network Newsletter. Volume 21, Number 3

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2010-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) A New Vision of Summer Learning (Brenda McLaughlin); (2) Using Summers More Strategically to Bridge the 8th-9th Grade Transition (Brenda McLaughlin and Hillary Hardt); (3)…

  14. Climate Science Centers: Growing Federal and Academic Expertise in the Nation's Interests

    NASA Astrophysics Data System (ADS)

    Ryker, S. J.

    2014-12-01

    The U.S. Department of the Interior's (Interior) natural and cultural resource managers face increasingly complex challenges exacerbated by climate change. In 2009, under Secretarial Order 3289, Interior created eight regional Climate Science Centers managed by the U.S. Geological Survey's (USGS) National Climate Change and Wildlife Science Center and in partnership with universities. Secretarial Order 3289 provides a framework to coordinate climate change science and adaptation efforts across Interior and to integrate science and resource management expertise from Federal, State, Tribal, private, non-profit, and academic partners. In addition to broad research expertise, these Federal/university partnerships provide opportunities to develop a next generation of climate science professionals. These include opportunities to increase the climate science knowledge base of students and practicing professionals; build students' skills in working across the boundary between research and implementation; facilitate networking among researchers, students, and professionals for the application of research to on-the-ground issues; and support the science pipeline in climate-related fields through structured, intensive professional development. In 2013, Climate Science Centers supported approximately 10 undergraduates, 60 graduate students, and 26 postdoctoral researchers. Additional students trained by Climate Science Center-affiliated faculty also contribute valuable time and expertise, and are effectively part of the Climate Science Center network. The Climate Science Centers' education and training efforts have also reached a number of high school students interested in STEM careers, and professionals in natural and cultural resource management. The Climate Science Centers are coordinating to build on each other's successful education and training efforts. Early successes include several intensive education experiences, such as the Alaska Climate Science Center's Girls on

  15. 77 FR 26511 - Announcing a National Cybersecurity Center of Excellence (NCCoE) Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-04

    ... possible case studies that are expected to form a central focus of collaborative efforts. The workshop will... possible case studies that are expected to form a central focus of collaborative efforts. The workshop will... together experts from industry, government and academia under one roof to develop practical, interoperable...

  16. 75 FR 57967 - Science Advisory Board to the National Center for Toxicological Research Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ...] Science Advisory Board to the National Center for Toxicological Research Notice of Meeting AGENCY: Food... closed to the public. Name of Committee: Science Advisory Board (SAB) to the National Center for Toxicological Research (NCTR). General Function of the Committee: To provide advice and recommendations to the...

  17. Alternan Research at the National Center for Agricultural Utilization Research

    USDA-ARS?s Scientific Manuscript database

    The Northern Regional Research Laboratory (later the National Center for Agricultural Utilization Research, or NCAUR) began operations on December 16, 1940. By the late 1940’s, Dr. Allene Jeanes was leading a team in an extensive research program on dextrans. Dextrans are glucan polysaccharides th...

  18. Alternan research at the National Center for Agricultural Utilization Research

    USDA-ARS?s Scientific Manuscript database

    The Northern Regional Research Laboratory (later the National Center for Agricultural Utilization Research, or NCAUR) began operations on December 16, 1940. By the late 1940’s, Dr. Allene Jeanes was leading a team in an extensive research program on dextrans. Dextrans are glucan polysaccharides th...

  19. Cybersecurity Regulation of Wireless Devices for Performance and Assurance in the Age of “Medjacking”

    PubMed Central

    Armstrong, David G.; Kleidermacher, David N.; Klonoff, David C.; Slepian, Marvin J.

    2015-01-01

    We are rapidly reaching a point where, as connected devices for monitoring and treating diabetes and other diseases become more pervasive and powerful, the likelihood of malicious medical device hacking (known as “medjacking”) is growing. While government could increase regulation, we have all been witness in recent times to the limitations and issues surrounding exclusive reliance on government. Herein we outline a preliminary framework for establishing security for wireless health devices based on international common criteria. Creation of an independent medical device cybersecurity body is suggested. The goal is to allow for continued growth and innovation while simultaneously fostering security, public trust, and confidence. PMID:26319227

  20. National Space Science Data Center (NSSDC) Data Listing

    NASA Technical Reports Server (NTRS)

    1980-01-01

    Satellite and nonsatellite data available from the National Space Science Data Center are listed. The Satellite Data listing includes the spacecraft name, launch date, and an alphabetical list of experiments. The Non-Satellite Data listing contains ground based data, models, computer routines, and composite spacecraft data. The data set name, data form code, quantity of data, and the time space covered are included in the data sets of both listings where appropriate. Geodetic tracking data sets are also included.

  1. Fox Chase Cancer Center's Genitourinary Division: a national resource for research, innovation and patient care.

    PubMed

    Uzzo, Robert G; Horwitz, Eric M; Plimack, Elizabeth R

    2016-04-01

    Founded in 1904, Fox Chase Cancer Center remains committed to its mission. It is one of 41 centers in the country designated as a Comprehensive Cancer Center by the National Cancer Institute, is a founding member of the National Comprehensive Cancer Network, holds the magnet designation for nursing excellence, is one of the first to establish a family cancer risk assessment program, and has achieved national distinction because of the scientific discoveries made there that have advanced clinical care. Two of its researchers have won Nobel prizes. The Genitourinary Division is nationally recognized and viewed as one of the top driving forces behind the growth of Fox Chase due to its commitment to initiating and participating in clinical trials, its prolific contributions to peer-reviewed publications and presentations at scientific meetings, its innovations in therapies and treatment strategies, and its commitment to bringing cutting-edge therapies to patients.

  2. Vice President Pence Arrives at Kennedy Space Center for National Space Council Meeting

    NASA Image and Video Library

    2018-02-20

    Vice President Mike Pence arrived at the Shuttle Landing Facility at NASA’s Kennedy Space Center, Florida on Feb. 20 ahead of the second meeting of the National Space Council. Vice President Pence, and his wife Karen, were greeted by Robert Lightfoot, acting NASA Administrator and Brig. Gen. Wayne Monteith, commander, 45th Space Wing. On Feb. 21, Vice President Pence will lead the National Space Council meeting inside Kennedy’s Space Station Processing Facility. “Moon, Mars, and Worlds Beyond: Winning the Next Frontier” will include testimonials from leaders in the civil, commercial, and national security sectors about the importance of the United States’ space enterprise. The Vice President will conclude his visit with a tour of Kennedy Space Center.

  3. 76 FR 50811 - Seventeenth Meeting: EUROCAE WG-72: RTCA Special Committee 216: Aeronautical Systems Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    .... Agenda Tuesday, September 6th (Pre-Meeting Events) 9 a.m. to 12 p.m. Optional--DHS National Cybersecurity... cooperation. 11:15 a.m.-12 p.m., DHS Briefing on the Cybersecurity Control System Security (CSSP) Program. 1 p...

  4. Library Educators' Awareness and Evaluation of National Audiovisual Center Materials.

    ERIC Educational Resources Information Center

    Palmer, Joseph W.

    1980-01-01

    Describes a survey of 18 library schools conducted to determine if faculty are familiar with audiovisual materials available from the National Audiovisual Center, and how these materials are rated in quality. Results indicate that there is a need for more descriptive and evaluative information to reach library educators. (BK)

  5. Research Plan for the National Center for Medical Rehabilitation Research.

    ERIC Educational Resources Information Center

    National Inst. of Child Health and Human Development (NIH), Bethesda, MD.

    This research plan describes a framework for defining and developing the field of rehabilitation sciences and research opportunities for the National Center for Medical Rehabilitation Research (NCMRR) and other agencies funding medical rehabilitation research. The plan addresses the needs of both persons who are involved in habilitation and in…

  6. Unplugged Cybersecurity: An Approach for Bringing Computer Science into the Classroom

    ERIC Educational Resources Information Center

    Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L.

    2018-01-01

    The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…

  7. 75 FR 7487 - National Center for Research Resources; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-19

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research Resources; Notice of Closed Meetings Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meetings. The meetings will be closed to the public in accordance with the...

  8. 76 FR 6627 - National Center for Research Resources; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Research Resources; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in accordance with the...

  9. 78 FR 24380 - National Sheep Industry Improvement Center: Notice of Request for Extension and Revision of a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-25

    ... Service [Doc. No. AMS-LPS-13-0020] National Sheep Industry Improvement Center: Notice of Request for... the currently approved information collection 0581-0263: National Sheep Industry Improvement Center... Division; Livestock, Poultry, and Seed Program; Agricultural Marketing Service; U.S. Department of...

  10. 75 FR 34458 - National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG) Correction: This notice was... (Pub. L. 92-463), the Centers for Disease Control and Prevention (CDC), announces the following meeting...

  11. 75 FR 34459 - National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG) Correction: This notice was... (Pub. L. 92-463), the Centers for Disease Control and Prevention (CDC), announces the following meeting...

  12. 75 FR 34458 - National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG) Correction: This notice was... Federal Advisory Committee Act (Pub. L. 92-463), the Centers for Disease Control and Prevention (CDC...

  13. 75 FR 34459 - National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG) Correction: This notice was... Advisory Committee Act (Pub. L. 92-463), the Centers for Disease Control and Prevention (CDC), announces...

  14. 77 FR 47440 - Office of the Assistant Secretary for Office of Disability Employment Program National Center on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-08

    ... DEPARTMENT OF LABOR Office of Disability Employment Policy Office of the Assistant Secretary for Office of Disability Employment Program National Center on Leadership for Employment and Advancement of... establish the National Center on Leadership for the Employment and Advancement of People with Disabilities...

  15. Final priority; National Institute on Disability and Rehabilitation Research--Disability and Rehabilitation Projects and Centers Program--Rehabilitation Engineering Research Centers. Final priority.

    PubMed

    2013-06-19

    The Assistant Secretary for Special Education and Rehabilitative Services announces a priority for a Rehabilitation Engineering Research Center (RERC) on Technologies to Support Successful Aging with Disability under the Disability and Rehabilitation Research Projects and Centers Program administered by the National Institute on Disability and Rehabilitation Research (NIDRR). The Assistant Secretary may use this priority for a competition in fiscal year (FY) 2013 and later years. We take this action to focus research attention on areas of national need. We intend to use this priority to improve outcomes for individuals with disabilities.

  16. 75 FR 7281 - National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-18

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG) In accordance with section 10(a)(2) of the Federal Advisory Committee Act (Pub. L. 92-463), the Centers for Disease Control and...

  17. 75 FR 7150 - National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-17

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG) In accordance with section 10(a)(2) of the Federal Advisory Committee Act (Pub. L. 92-463), the Centers for Disease Control and...

  18. 75 FR 5089 - National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG) In accordance with section 10(a)(2) of the Federal Advisory Committee Act (Pub. L. 92-463), the Centers for Disease Control and...

  19. 75 FR 7284 - National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-18

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Injury Prevention and Control/Initial Review Group, (NCIPC/IRG) In accordance with section 10(a)(2) of the Federal Advisory Committee Act (Pub. L. 92-463), the Centers for Disease Control and...

  20. Celebrating 25 Years. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 3

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Leading the Way in Dropout Prevention; (2) The 15 Effective Strategies in Action; (3) Technology Changes 1986-2011 (Marty Duckenfield); (4) 25 Years of Research and Support…

  1. Delivering Climate Science for the Nation's Fish, Wildlife, and Ecosystems: The U.S. Geological Survey National Climate Change and Wildlife Science Center

    USGS Publications Warehouse

    Beard, T. Douglas

    2011-01-01

    Changes to the Earth's climate-temperature, precipitation, and other important aspects of climate-pose significant challenges to our Nation's natural resources now and will continue to do so. Managers of land, water, and living resources need to understand the impacts of climate change-which will exacerbate ongoing stresses such as habitat fragmentation and invasive species-so they can design effective response strategies. In 2008 Congress created the National Climate Change and Wildlife Science Center (NCCWSC) within the U.S. Geological Survey (USGS); this center was formed to address challenges resulting from climate change and to empower natural resource managers with rigorous scientific information and effective tools for decision-making. Located at the USGS National Headquarters in Reston, Virginia, the NCCWSC has invested over $20M in cutting-edge climate change research and is now leading the effort to establish eight regional Department of the Interior (DOI) Climate Science Centers (CSCs).

  2. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  3. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  4. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  5. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  6. 28 CFR 16.82 - Exemption of the National Drug Intelligence Center Data Base-limited access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Intelligence Center Data Base-limited access. 16.82 Section 16.82 Judicial Administration DEPARTMENT OF JUSTICE....82 Exemption of the National Drug Intelligence Center Data Base—limited access. (a) The following... Intelligence Center Data Base (JUSTICE/NDIC-001). (2) [Reserved] (b) These exemptions apply only to the extent...

  7. Overview of the National Inventory and Monitoring Applications Center (NIMAC)

    Treesearch

    Charles T. Scott

    2009-01-01

    The National Inventory and Monitoring Applications Center (NIMAC) was created by the Forest Inventory and Analysis (FIA) program in 2006. NIMAC addresses a growing need, expressed by FIA partners, for technical assistance in designing and implementing monitoring plans for forests at scales finer than that provided by the FIA standard inventory. NIMAC's goal is to...

  8. The National Climate Change and Wildlife Science Center and Department of the Interior Climate Science Centers annual report for 2014

    USGS Publications Warehouse

    Varela Minder, Elda; Padgett, Holly A.

    2015-10-27

    The National Climate Change and Wildlife Science Center (NCCWSC) and the Department of the Interior (DOI) Climate Science Centers (CSCs) had another exciting year in 2014. The NCCWSC moved toward focusing their science funding on several high priority areas and, along with the CSCs, gained new agency partners; contributed to various workshops, meetings, publications, student activities, and Tribal/indigenous activities; increased outreach; and more. 

  9. The Lighter Side of Things: The Inevitable Convergence of the Internet of Things and Cybersecurity

    NASA Technical Reports Server (NTRS)

    Davis, Jerry

    2017-01-01

    By the year 2020 it is estimated that there will be more than 50 billion devices connected to the Internet. These devices not only include traditional electronics such as smartphones and other mobile compute devices, but also eEnabled technologies such as cars, airplanes and smartgrids. The IoT brings with it the promise of efficiency, greater remote management of industrial processes and further opens the doors to world of vehicle autonomy. However, IoT enabled technology will have to operate and contend in the contested domain of cyberspace. This discussion will touch on the impact that cybersecurity has on IoT and the people, processes and technology required to mitigate cyber risks.

  10. Mass storage system experiences and future needs at the National Center for Atmospheric Research

    NASA Technical Reports Server (NTRS)

    Olear, Bernard T.

    1991-01-01

    A summary and viewgraphs of a discussion presented at the National Space Science Data Center (NSSDC) Mass Storage Workshop is included. Some of the experiences of the Scientific Computing Division at the National Center for Atmospheric Research (NCAR) dealing the the 'data problem' are discussed. A brief history and a development of some basic mass storage system (MSS) principles are given. An attempt is made to show how these principles apply to the integration of various components into NCAR's MSS. Future MSS needs for future computing environments is discussed.

  11. School-Based Health Centers: National Census School Year 2004-05

    ERIC Educational Resources Information Center

    Juszczak, Linda; Schlitt, John; Moore, Aisha

    2007-01-01

    The National Assembly on School-Based Health Care conducted the 2004-05 Census, the tenth count of school-based health centers (SBHCs) since 1986, to: (1) provide a better understanding of the role of SBHCs in meeting the needs of underserved children and adolescents; (2) collect up-to-date data on demographics, staffing services, operations,…

  12. School-Based Health Centers: National Census School Year 2007-08

    ERIC Educational Resources Information Center

    Strozer, Jan; Juszczak, Linda; Ammerman, Adrienne

    2010-01-01

    The National Assembly on School-Based Health Care's (NASBHC) 2007-2008 Census is the 11th request for data from school-based health centers (SBHCs) since 1986. The Census: (1) provides a better understanding of the role of SBHCs in meeting the needs of underserved children and adolescents; (2) collects relevant trend data on demographics,…

  13. 36 CFR 1233.16 - How does an agency transfer records to the National Personnel Records Center (NPRC)?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... records to the National Personnel Records Center (NPRC)? 1233.16 Section 1233.16 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION RECORDS MANAGEMENT TRANSFER, USE, AND DISPOSITION OF RECORDS IN A NARA FEDERAL RECORDS CENTER § 1233.16 How does an agency transfer records to the...

  14. 15 CFR 291.4 - National industry-specific pollution prevention and environmental compliance resource centers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false National industry-specific pollution... § 291.4 National industry-specific pollution prevention and environmental compliance resource centers... information on pollution prevention opportunities, regulatory compliance and technologies and techniques for...

  15. 78 FR 37836 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-24

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  16. 76 FR 17140 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-28

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  17. 77 FR 52751 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-30

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  18. 76 FR 79201 - National Center for Complementary & Alternative Medicine; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meetings Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meetings. The meetings will be closed to the public in...

  19. 76 FR 12744 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-08

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  20. 76 FR 6806 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  1. 76 FR 27651 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  2. 78 FR 10184 - National Center For Complementary & Alternative Medicine; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-13

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center For Complementary & Alternative Medicine; Notice of Closed Meetings Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meetings. The meetings will be closed to the public in...

  3. 77 FR 58402 - National Center for Complementary & Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-20

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary & Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  4. 76 FR 12122 - Advisory Committee to the Director (ACD), Centers for Disease Control and Prevention-National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Advisory Committee to the Director (ACD), Centers for Disease Control and Prevention--National Biosurveillance.... L. 92-463), the Centers for Disease Control and Prevention (CDC) announces the following meeting of...

  5. Final priority; National Institute on Disability and Rehabilitation Research--Disability and Rehabilitation Research Projects and Centers Program--Rehabilitation Engineering Research Centers. Final priority.

    PubMed

    2013-06-14

    The Assistant Secretary for Special Education and Rehabilitative Services announces a priority for a Rehabilitation Engineering Research Center (RERC) on Universal Interfaces and Information Technology Access under the Disability and Rehabilitation Research Projects and Centers Program administered by the National Institute on Disability and Rehabilitation Research (NIDRR). The Assistant Secretary may use this priority for a competition in fiscal year (FY) 2013 and later years. We take this action to focus research attention on areas of national need. We intend to use this priority to improve outcomes for individuals with disabilities.

  6. Poor procedures and quality control among non-affiliated blood centers in Burkina Faso: an argument for expanding the reach of the national blood transfusion center

    PubMed Central

    Nébié, Koumpingnin; Ouattara, Siaka; Sanou, Mahamoudou; Kientega, Youssouphe; Dahourou, Honorine; Ky, Lassina; Kienou, Kisito; Diallo, Samba; Bigirimana, Françoise; Fretz, Catherine; Murphy, Edward L.; Lefrère, Jean-Jacques

    2011-01-01

    Introduction The World Health Organization (WHO) recommends the creation of national blood transfusion services. Burkina Faso has a CNTS (Centre national de transfusion sanguine - National Blood Transfusion Center) but it currently covers only 53% of the national blood supply versus 47% produced by independent hospital blood banks. Study design To evaluate blood collection, testing, preparation and prescription practices in the regions of Burkina Faso that are not covered by the CNTS, we conducted a cross-sectional survey. Methodology Data were collected by trained professionals from May to June 2009, at 42 autonomous blood centers not covered by the CNTS. Results Blood collection was supervised in all sites by laboratory technicians without specific training. There was no marketing of community blood donation nor mobile collection. Donation was restricted to replacement (family) donors in 21.4% of sites. Pre-donation screening of donors was performed in 63.4% of sites, but some did not use written questionnaires. Testing for HIV, hepatitis B virus and syphilis was universal, although some sites did not screen for hepatitis C virus. In 83.3% of the sites blood typing was performed without reverse ABO typing. In 97.6% of the sites, nurses acted alone or in conjunction with a physician to order blood transfusions. Conclusion Shortcomings in non-CNTS blood centers argue for the development of a truly national CNTS. Such a national center should coordinate and supervise all blood transfusion activities, and is the essential first step for improving and institutionalizing blood transfusion safety and efficacy in a developing country. PMID:21736582

  7. 3 CFR - Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered in Colombia Presidential Documents Other Presidential Documents Notice of October 16, 2013 Continuation of the National Emergency With Respect to Significant...

  8. 3 CFR - Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 3 The President 1 2013-01-01 2013-01-01 false Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered in Colombia Presidential Documents Other Presidential Documents Notice of October 17, 2012 Continuation of the National Emergency With Respect to Significant...

  9. 3 CFR - Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 3 The President 1 2012-01-01 2012-01-01 false Continuation of the National Emergency With Respect to Significant Narcotics Traffickers Centered in Colombia Presidential Documents Other Presidential Documents Notice of October 19, 2011 Continuation of the National Emergency With Respect to Significant...

  10. 76 FR 17659 - National Center for Complementary and Alternative Medicine Announcement of Stakeholder Roundtable

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-30

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for... meaningful interaction, space is limited. To attend, please RSVP by Friday, April 1, 2011, by contacting.... To allow for meaningful interaction, space is limited. To attend, please RSVP by Friday, April 1...

  11. 77 FR 29673 - National Center for Advancing Translational Sciences; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Advancing Translational Sciences; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in accordance...

  12. 78 FR 4421 - National Center for Advancing Translational Sciences; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-22

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Advancing Translational Sciences; Notice of Closed Meetings Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meetings. The meetings will be closed to the public in accordanc...

  13. 170. Photocopy of measured drawing (from National Record Center, Suitland, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    170. Photocopy of measured drawing (from National Record Center, Suitland, Maryland, R.G. 121-76-301, Box 83, No. DC 0020 ZZ 29) 'F. N.,' delineator 28 September 1938 INTERIOR, FIRST FLOOR, MAIN CORRIDOR, INDIAN ARTS AND CRAFTS SHOP, ROOM 1023, DETAIL OF TIN LIGHT SCONCE - U.S. Department of the Interior, Eighteenth & C Streets Northwest, Washington, District of Columbia, DC

  14. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  15. Health center financial performance: national trends and state variation, 1998-2004.

    PubMed

    Shi, Leiyu; Collins, Patricia B; Aaron, Kaytura Felix; Watters, Vanessa; Shah, Leslie Greenblat

    2007-01-01

    For four decades, health centers have provided quality, cost-effective primary healthcare to underserved populations. Using the Uniform Data System, this study analyzes national trends in health center patients, providers, and financial performance for 1998-2004, and state-specific data for 2004. Between 1998 and 2004, health centers served increasing numbers of underserved patients, which included patients who were uninsured or on Medicaid, minorities, and patients at or below poverty level. Even though the number of health center providers and patients increased, patient-to-provider ratios did not change significantly. Medicaid remained the single largest source of health center revenue, accounting for 36.4 percent of total revenue in 2004. Compared with Medicare, private insurance, and self-pay, Medicaid consistently reimbursed health centers at the highest rate per patient. Federal and nonfederal grants to support care for the uninsured as well as enabling services such as transportation, translation, and other support systems is one of many important sources of revenue. Financial challenges for health centers included increasing costs and varied or declining rates of reimbursement for services rendered. However, health centers became more self-sufficient over time, average net revenues increased, and operating margins were predominantly positive. Data on individual states, with different numbers and types of health centers, varied widely in all of these categories. In conclusion, health centers rely on federal and nonfederal grant support in concert with the Medicaid program as major funding sources and continued financial stability will be contingent upon health centers' ability to balance revenues with the cost of managing the vulnerable populations that they serve.

  16. Guide to Cybersecurity, Resilience, and Reliability for Small and Under-Resourced Utilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ingram, Michael; Martin, Maurice

    Small electricity utilities -- those with less than 100 employees or 50,000 meters -- provide essential services to large parts of the United States while facing a number of challenges unique to their mission. For instance, they often serve areas that are sparsely populated, meaning that their per-customer cost to provide service is higher. At the same time, they often serve customers that have moderate or fixed incomes, meaning that they are under strong pressure to keep costs down. This pressure puts them on a strict budget and creates a need for innovative solutions to common problems. Further, their servicemore » areas may include extreme climates, making severe weather events more frequent and their aftermaths more expensive to address. This guide considers challenges that small utilities face while ensuring the reliability, resilience, and cybersecurity of their electric service; approaches to address those challenges using existing guidance documents; ways that the federal government could provide support in these areas.« less

  17. Ecological genetics at the USGS National Wetlands Research Center

    USGS Publications Warehouse

    Travis, Steven

    2006-01-01

    The Ecological Genetics Program at the USGS National Wetlands Research Center (NWRC) employs state-of-the-art DNA fingerprinting technologies in characterizing critical management aspects of the population biology of species of concern (fig. 1). The overarching themes of this program have been (1) the critical role that genetic diversity plays in maintaining population viability and (2) how management strategies might incorporate genetic information in preventing the decline of desirable species or in controlling the spread of invasive species.

  18. The National Research Center on the Gifted and Talented Newsletter, 2000.

    ERIC Educational Resources Information Center

    Gubbins, E. Jean; Siegle, Del, Ed.

    2000-01-01

    These two newsletters from the National Research Center on the Gifted and Talented (NRC/GT) contain the following articles: (1) "NRC/GT: Professional Development--Not an Event" (E. Jean Gubbins), discusses NRC/GT research-based principles related to professional development and the importance of ongoing professional development; (2)…

  19. Meteorology program of the National Center for Air Pollution Control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ludwig, J.H.; McCormick, R.A.

    1968-08-01

    An attempt is made to discuss the role of the meteorologist in the Federal air pollution programs. There are two types of meteorological activities that have evolved as a result of the Federal air pollution program to aid the states and local agencies in their efforts to control air pollution. They are: research, which has focused on defining and describing meteorological factors of prime importance to air pollution control activities; and application of meteorological principles to the conduct of air pollution control programs. A detailed discussion is presented of the meteorological activities of the National Center for Air Pollution Controlmore » and their close relationships to other phases of the Center's research and operational programs.« less

  20. National Centers for Environmental Prediction

    Science.gov Websites

    Modeling Mesoscale Modeling Marine Modeling and Analysis Teams Climate Data Assimilation Ensembles and Post Centers for Environmental Prediction Environmental Modeling Center NOAA Center for Weather and Climate

  1. 75 FR 39265 - National Center for Health Statistics (NCHS), Classifications and Public Health Data Standards...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-08

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Health Statistics (NCHS), Classifications and Public Health Data Standards Staff, Announces the... Prevention, Classifications and Public Health Data Standards, 3311 Toledo Road, Room 2337, Hyattsville, MD...

  2. 78 FR 53148 - National Center for Health Statistics (NCHS), Classifications and Public Health Data Standards...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-28

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Health Statistics (NCHS), Classifications and Public Health Data Standards Staff, Announces the... Administrator, Classifications and Public Health Data Standards Staff, NCHS, 3311 Toledo Road, Room 2337...

  3. 78 FR 9055 - National Center for Health Statistics (NCHS), Classifications and Public Health Data Standards...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-07

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Health Statistics (NCHS), Classifications and Public Health Data Standards Staff, Announces the..., Medical Systems Administrator, Classifications and Public Health Data Standards Staff, NCHS, 3311 Toledo...

  4. Frederick National Lab Collaborates with Moffitt Cancer Center on HPV and Oral Cancer | Frederick National Laboratory for Cancer Research

    Cancer.gov

    The Frederick National Lab and Moffitt Cancer Center have established a collaboration to research antibody responses against the human papillomavirus (HPV) in males following administration of the Gardasil vaccine. The vaccine prevents HPV infections

  5. Financial performance among adult day centers: results of a national demonstration program.

    PubMed

    Reifler, B V; Henry, R S; Rushing, J; Yates, M K; Cox, N J; Bradham, D D; McFarlane, M

    1997-02-01

    This paper describes the financial performance (defined as percent of total expenses covered by net operating revenue) of 16 adult day centers participating in a national demonstration program on day services for people with dementia, including examination of possible predictors of financial performance. Participating sites submitted quarterly financial and utilization reports to the National Program Office. Descriptive statistics summarize the factors believed to influence financial performance. Sites averaged meeting 35% of expenses from self-pay and 29% from government (mainly Medicaid) revenue, totaling 64% of all (cash plus in-kind) expenses met by operating revenue. Examination of center characteristics suggests that factors related to meeting consumer needs, such as being open a full day (i.e., 7:30 am to 6:00 pm) rather than shorter hours, and providing transportation, may be related to improved utilization and, thus, improved financial performance. Higher fees were not related to lower enrollment, census, or revenue. Adult day centers are able to achieve financial viability through a combination of operating (i.e., fee-for-service) and non-operating revenue. Operating revenue is enhanced by placing emphasis on consumer responsiveness, such as being open a full day. Because higher fees were not related to lower utilization, centers should set fees to reflect actual costs. The figure of 64% of expenses met by operating revenue is conservative inasmuch as sites included in-kind revenue as expenses in their budgeting calculations, and percent of cash expenses met by operating revenue would be higher (approximately 75% for this group of centers).

  6. Amarillo National Resource Center for Plutonium. Quarterly technical progress report, May 1, 1997--July 31, 1997

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    Progress summaries are provided from the Amarillo National Center for Plutonium. Programs include the plutonium information resource center, environment, public health, and safety, education and training, nuclear and other material studies.

  7. Educational Policies. National Dropout Prevention Center/Network Newsletter. Volume 19, Number 2, Spring 2007

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2007-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Policy Matters; (2) A Conversation With A State Policymaker (Stephen Canessa); (3) Policy Matters at the School Level (Steven W. Edwards); (4) EEDA: Promise or Peril? (Sam…

  8. 75 FR 56549 - National Center for Health Statistics (NCHS), Classifications and Public Health Data Standards...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention National Center for Health Statistics (NCHS), Classifications and Public Health Data Standards Staff, Announces the... Public Health Data Standards Staff, NCHS, 3311 Toledo Road, Room 2337, Hyattsville, Maryland 20782, e...

  9. Sankofan socio-ethical reflections: the Tuskegee University National Bioethics Center's decade of operation, 1999-2009.

    PubMed

    Earl, Riggins R

    2010-08-01

    Primarily, this is a Sankofan socio-ethical analysis of the moral foundation of the Tuskegee University National Bioethics Center's decade of operation. The first section of the study will do the following: a) a Sankofan socio-ethical analysis of the Center's raison d'être; and b) definitions of ethical terms and the social world of the infamous syphilis study. The second section, as a result of the analysis, will address the Center's following challenges: c) the Center's challenge of theory and practice; d) the Center's challenge of moral heritage; and e) the Center's challenge of the future.

  10. Incidence of Minimally Invasive Colorectal Cancer Surgery at National Comprehensive Cancer Network Centers

    PubMed Central

    Yeo, Heather; Niland, Joyce; Milne, Dana; ter Veer, Anna; Bekaii-Saab, Tanios; Farma, Jeffrey M.; Lai, Lily; Skibber, John M.; Small, William; Wilkinson, Neal; Schrag, Deborah

    2015-01-01

    Background: Laparoscopic colectomy has been shown to have equivalent oncologic outcomes to open colectomy for the management of colon cancer, but its adoption nationally has been slow. This study investigates the prevalence and factors associated with laparoscopic colorectal resection at National Comprehensive Cancer Network (NCCN) centers. Methods: Data on patients undergoing surgery for colon and rectal cancer at NCCN centers from 2005 to 2010 were obtained from chart review of medical records for the NCCN Outcomes Project and included information on socioeconomic status, insurance coverage, comorbidity, and physician-reported Eastern Cooperative Oncology Group (ECOG) performance status. Associations between receipt of minimally invasive surgery and patient and clinical variables were analyzed with univariate and multivariable logistic regression. All statistical tests were two-sided. Results: A total of 4032 patients, diagnosed between September 2005 and December 2010, underwent elective colon or rectal resection for cancer at NCCN centers. Median age of colon cancer patients was 62.6 years, and 49% were men. The percent of colon cancer patients treated with minimally invasive surgery (MIS) increased from 35% in 2006 to 51% in 2010 across all centers but varied statistically significantly between centers. On multivariable analysis, factors associated with minimally invasive surgery for colon cancer patients who had surgery at an NCCN institution were older age (P = .02), male sex (P = .006), fewer comorbidities (P ≤ .001), lower final T-stage (P < .001), median household income greater than or equal to $80000 (P < .001), ECOG performance status = 0 (P = .02), and NCCN institution (P ≤ .001). Conclusions: The use of MIS increased at NCCN centers. However, there was statistically significant variation in adoption of MIS technique among centers. PMID:25527640

  11. National Center for Education Statistics "Product Planning and Development." Final Report.

    ERIC Educational Resources Information Center

    User Technology Associates, Inc.

    To assist in its mission of providing information in the most timely manner, the National Center for Education Statistics (NCES) contracted for a study of current modes of information dissemination to its user population that would also identify new and emerging technologies for information dissemination. The project is divided into three phases…

  12. Career and Technical Education. National Dropout Prevention Center/Network Newsletter. Volume 20, Number 3

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2008-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Why Do I Have to Learn This?; (2) 2008 NDPN Crystal Star Winners; (3) Effective Freshman Transition for School Improvement (David Livingston, John Greene, and Lindy Stahlman); (4)…

  13. Middle College. National Dropout Prevention Center/Network Newsletter. Volume 17, Number 4, Fall 2005

    ERIC Educational Resources Information Center

    Duckenfield, Marty, Ed.

    2005-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) College As A Bridge to High School Graduation (Terry Cash); (2) 2005 NDPN Crystal Star Awards of Excellence; (3) Mott Middle College (Chery S. Wagonlander); (4) Gateway to…

  14. Public health training online: the National Center for Suicide Prevention Training.

    PubMed

    Stone, Deborah M; Barber, Catherine W; Potter, Lloyd

    2005-12-01

    Suicide is a serious public health problem, and training in suicide prevention has not kept pace with recent rapid growth of the field. To address this concern, the Harvard Injury Control Research Center and Education Development Center, Inc., launched the National Center for Suicide Prevention Training (NCSPT) with funding by the Maternal and Child Health Bureau of the Health Resources Services Administration. NCSPT offers an online professional development workshop series for public officials, service providers, and community-based coalitions involved in suicide prevention. Using a public health framework of prevention, the three workshops implemented to date have drawn over 1200 participants nationally and internationally over the past 3 years. Workshop participants completing the post-test and evaluation show consistent improvement in their knowledge of suicide, rate their online training experience positively, and report that they would take additional online courses if offered. A barrier to objective evaluation of the courses, however, is the high attrition rates of the courses, an expected feature of free online courses. Online training is a valuable option to help meet suicide prevention training needs employing flexible, easy-to-use, and inexpensive Internet technology. With its growing presence in the field, NCSPT will continue to develop new courses to improve the ability of professionals and community-based coalitions to reduce suicide and its devastating impact on public health.

  15. 75 FR 1062 - Board of Scientific Counselors, National Center for Injury Prevention and Control, (BSC, NCIPC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-08

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention Board of Scientific Counselors, National Center for Injury Prevention and Control, (BSC, NCIPC) In accordance with Section 10(a)(2) of the Federal Advisory Committee Act (Pub. L. 92-463), the Centers for Disease Control and Prevention (CDC) announces, the followin...

  16. Hydrologic Modeling at the National Water Center: Operational Implementation of the WRF-Hydro Model to support National Weather Service Hydrology

    NASA Astrophysics Data System (ADS)

    Cosgrove, B.; Gochis, D.; Clark, E. P.; Cui, Z.; Dugger, A. L.; Fall, G. M.; Feng, X.; Fresch, M. A.; Gourley, J. J.; Khan, S.; Kitzmiller, D.; Lee, H. S.; Liu, Y.; McCreight, J. L.; Newman, A. J.; Oubeidillah, A.; Pan, L.; Pham, C.; Salas, F.; Sampson, K. M.; Smith, M.; Sood, G.; Wood, A.; Yates, D. N.; Yu, W.; Zhang, Y.

    2015-12-01

    The National Weather Service (NWS) National Water Center(NWC) is collaborating with the NWS National Centers for Environmental Prediction (NCEP) and the National Center for Atmospheric Research (NCAR) to implement a first-of-its-kind operational instance of the Weather Research and Forecasting (WRF)-Hydro model over the Continental United States (CONUS) and contributing drainage areas on the NWS Weather and Climate Operational Supercomputing System (WCOSS) supercomputer. The system will provide seamless, high-resolution, continuously cycling forecasts of streamflow and other hydrologic outputs of value from both deterministic- and ensemble-type runs. WRF-Hydro will form the core of the NWC national water modeling strategy, supporting NWS hydrologic forecast operations along with emergency response and water management efforts of partner agencies. Input and output from the system will be comprehensively verified via the NWC Water Resource Evaluation Service. Hydrologic events occur on a wide range of temporal scales, from fast acting flash floods, to long-term flow events impacting water supply. In order to capture this range of events, the initial operational WRF-Hydro configuration will feature 1) hourly analysis runs, 2) short-and medium-range deterministic forecasts out to two day and ten day horizons and 3) long-range ensemble forecasts out to 30 days. All three of these configurations are underpinned by a 1km execution of the NoahMP land surface model, with channel routing taking place on 2.67 million NHDPlusV2 catchments covering the CONUS and contributing areas. Additionally, the short- and medium-range forecasts runs will feature surface and sub-surface routing on a 250m grid, while the hourly analyses will feature this same 250m routing in addition to nudging-based assimilation of US Geological Survey (USGS) streamflow observations. A limited number of major reservoirs will be configured within the model to begin to represent the first-order impacts of

  17. Notification: National Pesticide Information Center Federal Insecticide, Fungicide, and Rodenticide Act Enforcement Referrals

    EPA Pesticide Factsheets

    Project #OPE-FY14-0035, March 21, 2014. The Office of Inspector General is starting preliminary research on the U.S. Environmental Protection Agency's oversight of the National Pesticide Information Center program.

  18. Measuring Up on College-Level Learning. National Center Report #05-8

    ERIC Educational Resources Information Center

    Miller, Margaret A.; Ewell, Peter T.

    2005-01-01

    To address the issue of student learning at the state level, an invitational forum of public policy, business, and education leaders was convened by James B. Hunt Jr., governor of North Carolina. The forum recommended that the National Center for Public Policy and Higher Education initiate a "demonstration project" to determine whether or not it…

  19. 22 CFR 40.5 - Limitations on the use of National Crime Information Center (NCIC) criminal history information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Information Center (NCIC) criminal history information. 40.5 Section 40.5 Foreign Relations DEPARTMENT OF... Center (NCIC) criminal history information. (a) Authorized access. The FBI's National Crime Information Center (NCIC) criminal history records are law enforcement sensitive and can only be accessed by...

  20. 22 CFR 40.5 - Limitations on the use of National Crime Information Center (NCIC) criminal history information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Information Center (NCIC) criminal history information. 40.5 Section 40.5 Foreign Relations DEPARTMENT OF... Center (NCIC) criminal history information. (a) Authorized access. The FBI's National Crime Information Center (NCIC) criminal history records are law enforcement sensitive and can only be accessed by...

  1. 22 CFR 40.5 - Limitations on the use of National Crime Information Center (NCIC) criminal history information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Information Center (NCIC) criminal history information. 40.5 Section 40.5 Foreign Relations DEPARTMENT OF... Center (NCIC) criminal history information. (a) Authorized access. The FBI's National Crime Information Center (NCIC) criminal history records are law enforcement sensitive and can only be accessed by...

  2. 22 CFR 40.5 - Limitations on the use of National Crime Information Center (NCIC) criminal history information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Information Center (NCIC) criminal history information. 40.5 Section 40.5 Foreign Relations DEPARTMENT OF... Center (NCIC) criminal history information. (a) Authorized access. The FBI's National Crime Information Center (NCIC) criminal history records are law enforcement sensitive and can only be accessed by...

  3. 22 CFR 40.5 - Limitations on the use of National Crime Information Center (NCIC) criminal history information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Information Center (NCIC) criminal history information. 40.5 Section 40.5 Foreign Relations DEPARTMENT OF... Center (NCIC) criminal history information. (a) Authorized access. The FBI's National Crime Information Center (NCIC) criminal history records are law enforcement sensitive and can only be accessed by...

  4. The Role of the National Training Center during Full Mobilization

    DTIC Science & Technology

    1991-06-07

    resources are proposed by this study. 14. SUBJECT TERMS 15. NUMBER OF PAGES 217 National Training Center (NTC); Training; Mobilization; Combat 16. PRICE ... Price Code, Enter appropriate price Block 8. Performina Oraanization Report code (NTIS only). Number, Enter the unique alphanumeric report number(s...Regular Army and a transfer of their roles to the Reserve Component. The end of the Cold War makes future mobilization needs less likely and argues for

  5. National Center for Manufacturing Sciences: Environmentally conscious manufacturing

    NASA Technical Reports Server (NTRS)

    Vinton, Clare

    1995-01-01

    The purpose of this presentation is to share the results and some of the thinking of the Environmentally Conscious Manufacturing - Strategic Initiative Group (ECM-SIG) at the National Center for Manufacturing Sciences (NCMS). NCMS is a consortium of more than 185 North American Manufacturing organizations comprised of about 75 percent for profit manufacturing companies and about 25 percent nonprofit organizations that support manufacturing activities. NCMS conducts collaborative R&D programs designed to improve global competitiveness of its members and other North American manufacturers to address common issues that are important to manufacturing industries. NCMS is an industry driven organization whose agenda is established by industry with input from appropriate government agencies.

  6. Students at the Center: A National Teleconference on School Reform. Selected Readings.

    ERIC Educational Resources Information Center

    Shaughnessy, Joan M., Ed.

    This book contains readings supplement information provided by a group of principals, teachers, and researchers participating in the U.S. Department of Education's National Satellite Teleconference, "Students at the Center." The March 1998 broadcast shared key findings on planning, implementing, and sustaining comprehensive school…

  7. 78 FR 15961 - Center for Substance Abuse Treatment National Advisory Council; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-13

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Substance Abuse and Mental Health Services Administration Center for Substance Abuse Treatment National Advisory Council; Meeting Pursuant to Public Law 92-463, notice is hereby given of the meeting of the Substance Abuse and Mental Health Services Administration's...

  8. Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies

    ERIC Educational Resources Information Center

    Reddy, Dinesh Sampangirama

    2017-01-01

    Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…

  9. Integration of Cloud Technologies for Data Stewardship at the NOAA National Centers for Environmental Information (NCEI)

    NASA Astrophysics Data System (ADS)

    Casey, K. S.; Hausman, S. A.

    2016-02-01

    In the last year, the NOAA National Oceanographic Data Center (NODC) and its siblings, the National Climatic Data Center and National Geophysical Data Center, were merged into one organization, the NOAA National Centers for Environmental Information (NCEI). Combining its expertise under one management has helped NCEI accelerate its efforts to embrace and integrate private, public, and hybrid cloud environments into its range of data stewardship services. These services span a range of tiers, from basic, long-term preservation and access, through enhanced access and scientific quality control, to authoritative product development and international-level services. Throughout these tiers of stewardship, partnerships and pilot projects have been launched to identify technological and policy-oriented challenges, to establish solutions to these problems, and to highlight success stories for emulation during operational integration of the cloud into NCEI's data stewardship activities. Some of these pilot activities including data storage, access, and reprocessing in Amazon Web Services, the OneStop data discovery and access framework project, and a set of Cooperative Research and Development Agreements under the Big Data Project with Amazon, Google, IBM, Microsoft, and the Open Cloud Consortium. Progress in these efforts will be highlighted along with a future vision of how NCEI could leverage hybrid cloud deployments and federated systems across NOAA to enable effective data stewardship for its oceanographic, atmospheric, climatic, and geophysical Big Data.

  10. Hybrid methods for cybersecurity analysis :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, Warren Leon,; Dunlavy, Daniel M.

    2014-01-01

    Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months

  11. 78 FR 56238 - National Center for Complementary and Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary and Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  12. 77 FR 1940 - National Center for Complementary and Alternative Medicine; Notice of Closed Meetings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-12

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary and Alternative Medicine; Notice of Closed Meetings Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meetings. The meetings will be closed to the public in...

  13. 78 FR 34664 - National Center for Complementary and Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-10

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary and Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  14. 77 FR 69869 - National Center for Complementary and Alternative Medicine; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-21

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Center for Complementary and Alternative Medicine; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in...

  15. National Space Science Data Center and World Data Center A for Rockets and Satellites - Ionospheric data holdings and services

    NASA Technical Reports Server (NTRS)

    Bilitza, D.; King, J. H.

    1988-01-01

    The activities and services of the National Space Science data Center (NSSDC) and the World Data Center A for Rockets and Satellites (WDC-A-R and S) are described with special emphasis on ionospheric physics. The present catalog/archive system is explained and future developments are indicated. In addition to the basic data acquisition, archiving, and dissemination functions, ongoing activities include the Central Online Data Directory (CODD), the Coordinated Data Analysis Workshopps (CDAW), the Space Physics Analysis Network (SPAN), advanced data management systems (CD/DIS, NCDS, PLDS), and publication of the NSSDC News, the SPACEWARN Bulletin, and several NSSD reports.

  16. Atlantic salmon breeding program at the National Cold Water Marine Aquaculture Center

    USDA-ARS?s Scientific Manuscript database

    The USDA-ARS National Cold Water Marine Aquaculture Center (NCWMAC) in Franklin, ME has been supporting the U.S. coldwater marine aquaculture industry for the past thirteen years by developing a genetically improved North American Atlantic salmon. The St. John's River stock was chosen as the focal ...

  17. Cast Study: National Naval Medical Center, A Graduate Management Project

    DTIC Science & Technology

    2002-06-10

    USNR 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. pPDV^-- -’" !nDf-AxTT7ATION NATIONAL NAVAL MEDICAL CENTER BETHESDA 8901 WISCONSIN AVE...reinvented itself on July 3, 2000 when it transformed from a traditional stovepipe organization into a service line health care delivery system. In less...many diverse projects throughout the organization . Commander Steve Griffitts, USN... for your continual cooperation and flexibility as I pursued my

  18. Pursuing the Clearinghouse Goal: Report of the National Indian Policy Center for Program Year 1995.

    ERIC Educational Resources Information Center

    National Indian Policy Center, Washington, DC.

    The National Indian Policy Center was established by Congress in 1990 to determine whether an Indian policy research institution could provide Indian tribes, Congress, and federal agencies with information that would contribute to the development of sound Indian policies. The Center is governed by a planning committee of tribal leaders,…

  19. The National Quality Improvement Center on the Privatization of Child Welfare Services: A Program Description

    ERIC Educational Resources Information Center

    Collins-Camargo, Crystal; Ensign, Karl; Flaherty, Chris

    2008-01-01

    Quality improvement centers were created by the U.S. Department of Health and Human Services' Children's Bureau beginning in 2001 to promote knowledge development through an innovative approach to applied collaborative research in child welfare. The National Quality Improvement Center on the Privatization of Child Welfare Services was funded to…

  20. Simbios: an NIH national center for physics-based simulation of biological structures.

    PubMed

    Delp, Scott L; Ku, Joy P; Pande, Vijay S; Sherman, Michael A; Altman, Russ B

    2012-01-01

    Physics-based simulation provides a powerful framework for understanding biological form and function. Simulations can be used by biologists to study macromolecular assemblies and by clinicians to design treatments for diseases. Simulations help biomedical researchers understand the physical constraints on biological systems as they engineer novel drugs, synthetic tissues, medical devices, and surgical interventions. Although individual biomedical investigators make outstanding contributions to physics-based simulation, the field has been fragmented. Applications are typically limited to a single physical scale, and individual investigators usually must create their own software. These conditions created a major barrier to advancing simulation capabilities. In 2004, we established a National Center for Physics-Based Simulation of Biological Structures (Simbios) to help integrate the field and accelerate biomedical research. In 6 years, Simbios has become a vibrant national center, with collaborators in 16 states and eight countries. Simbios focuses on problems at both the molecular scale and the organismal level, with a long-term goal of uniting these in accurate multiscale simulations.