Science.gov

Sample records for achieve economic security

  1. Achieving the Security, Environmental, and Economic Potential of Bioenergy. Final Technical Report

    SciTech Connect

    Riggs, John A

    2006-06-07

    A group of business, government, environmental and academic leaders convened in a dialogue by the Aspen Institute proposed a series of actions to promote the widespread commercialization of both corn and cellulosic ethanol to improve energy security, the environment, and the economy. Co-chaired by Booz Allen Hamilton Vice President and former CIA Director R. James Woolsey and former Congressman Tom Ewing (R. IL), they developed a series of recommendations involving improved crop yields, processing of biomass into ethanol, manufacture of more cars that can burn either ethanol or gasoline, and the provision of ethanol pumps at more filling stations. Their report, "A High Growth Strategy for Ethanol, includes a discussion of the potential of ethanol, the group's recommendations, and a series of discussion papers commissioned for the dialogue.

  2. The United States and Japan: A Broad View to Achieving Economic and Security Interests in the Asia-Pacific Region

    DTIC Science & Technology

    1993-04-14

    7, Army War College, 1992. PRIMACY OF ECONOMICS 24. World Almanac `1993, p. 718. 25. Solomon, p. 54. 26. Baker, J., p. 16. RELIGIOUS ISSUES 27. World ...9 June 1992, p.11,1 2. 53. Holbrooke, p. 9. 54. The World Almanac 1993, p.128. 55.Wood, p. 142. 56. I p.142. 57. Ibid. p. 144. 58. David C...p. 107. 90. World Almanac 1993, p.718. 91. Brandon, p.228. 92. Hollerman, p. 50,51. 93. Makin, p. 55. 44 94. Ibid. 95. Ibid., p. 57. 96. Gary D

  3. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  4. Economic security in an aging Canadian population.

    PubMed

    Brown, Robert L

    2011-09-01

    Recent research indicates that today's retirees are doing very well in terms of their replacement ratios and that Canadian poverty rates among the elderly are low relative to other Organization for Economic Co-operation and Development (OECD) countries. Government-sponsored plans have been strengthened either through explicit expansion - for example, the Guaranteed Income Supplement (GIS) - or through the reform of the Canada/Quebec Pension Plans (C/QPP). Also important is the maturation of employer-sponsored pension plans, although coverage rates are down. Future generations of retirees may not achieve the standard of living that exists today, however, which is a concern. The author argues that today's economic security programs are affordable and that their costs could be stabilized if the retirement age were raised.

  5. Student Achievement and National Economic Growth

    ERIC Educational Resources Information Center

    Ramirez, Francisco O.; Luo, Xiaowei; Schofer, Evan; Meyer, John W.

    2006-01-01

    Educational policy around the world has increasingly focused on improving aggregate student achievement as a means to increase economic growth. In the last two decades, attention has focused especially on the importance of achievement in science and mathematics. Yet, the policy commitments involved have not been based on research evidence. The…

  6. Achieving food security in times of crisis.

    PubMed

    Swaminathan, M S

    2010-11-30

    In spite of several World Food Summits during the past decade, the number of people going to bed hungry is increasing and now exceeds one billion. Food security strategies should therefore be revisited. Food security systems should begin with local communities who can develop and manage community gene, seed, grain and water banks. At the national level, access to balanced diet and clean drinking water should become a basic human right. Implementation of the right to food will involve concurrent attention to production, procurement, preservation and public distribution. Higher production in perpetuity should be achieved through an ever-green revolution based on the principles of conservation and climate-resilient farming. This will call for a blend of traditional ecological prudence with frontier technologies, particularly biotechnology and information communication technologies.

  7. Personal Stability and Economic Security

    ERIC Educational Resources Information Center

    Brenner, M. Harvey

    1977-01-01

    This article reports on seven indicators of social stress, e.g., total mortality, homicide, and suicide, and their relationship with three national economic variables (changes in real income, changes in rate of inflation, and changes in rate of unemployment). Results indicate that changes in the unemployment rate have the most profound impact of…

  8. Economic Analysis of Cyber Security

    DTIC Science & Technology

    2006-07-01

    calculated and require a good deal of guesswork ( Lemos , 2002). 2.2.3 Mi2g The British firm Mi2g has published numerous economic impact estimates...policy, has fallen out of favor. Users who are forced to periodically change their password are more likely to write it down or reuse a password used...Post. Lemos , Robert. January 21, 2002. “Data on Internet Threats Still Out Cold.” Available at <http://news.com.com/Data+on+Internet+threats+still

  9. Challenges in Achieving Food Security in India

    PubMed Central

    Upadhyay, R Prakash; Palanivel, C

    2011-01-01

    First Millennium Development Goal states the target of “Halving hunger by 2015”. Sadly, the recent statistics for India present a very gloomy picture. India currently has the largest number of undernourished people in the world and this is in spite of the fact that it has made substantial progress in health determinants over the past decades and ranks second worldwide in farm output. The causes of existing food insecurity can be better viewed under three concepts namely the: ‘traditional concept’ which includes factors such as unavailability of food and poor purchasing capacity; ‘socio-demographic concept’ which includes illiteracy, unemployment, overcrowding, poor environmental conditions and gender bias; ‘politico-developmental concept’ comprising of factors such as lack of intersectoral coordination and political will, poorly monitored nutritional programmes and inadequate public food distribution system. If the Millennium Development Goal is to be achieved by 2015, efforts to improve food and nutrition security have to increase considerably. Priority has to be assigned to agriculture and rural development along with promoting women empowerment, ensuring sustainable employment and improving environmental conditions (water, sanitation and hygiene). As the problem is multi-factorial, so the solution needs to be multi-sectoral. PMID:23113100

  10. Economic performance of water storage capacity expansion for food security

    NASA Astrophysics Data System (ADS)

    Gohar, Abdelaziz A.; Ward, Frank A.; Amer, Saud A.

    2013-03-01

    SummaryContinued climate variability, population growth, and rising food prices present ongoing challenges for achieving food and water security in poor countries that lack adequate water infrastructure. Undeveloped storage infrastructure presents a special challenge in northern Afghanistan, where food security is undermined by highly variable water supplies, inefficient water allocation rules, and a damaged irrigation system due three decades of war and conflict. Little peer-reviewed research to date has analyzed the economic benefits of water storage capacity expansions as a mechanism to sustain food security over long periods of variable climate and growing food demands needed to feed growing populations. This paper develops and applies an integrated water resources management framework that analyzes impacts of storage capacity expansions for sustaining farm income and food security in the face of highly fluctuating water supplies. Findings illustrate that in Afghanistan's Balkh Basin, total farm income and food security from crop irrigation increase, but at a declining rate as water storage capacity increases from zero to an amount equal to six times the basin's long term water supply. Total farm income increases by 21%, 41%, and 42% for small, medium, and large reservoir capacity, respectively, compared to the existing irrigation system unassisted by reservoir storage capacity. Results provide a framework to target water infrastructure investments that improve food security for river basins in the world's dry regions with low existing storage capacity that face ongoing climate variability and increased demands for food security for growing populations.

  11. Issues of Falsifying Financial Statements in Terms of Economic Security

    ERIC Educational Resources Information Center

    Zhitlukhina, Olga G.; Rakutko, Svetlana Y.; Berezhnova, Elena I.; Selezneva, Elena Y.; Belik, Elena V.; Shalaeva, Nina I.; Denisevich, Elena I.; Belik, Natalia V.; Saenko, Zhanna E.; Sultanova, Alina A.

    2016-01-01

    The paper deals with problems of the country's economic security and entities, timely resolution of which influences directly the country's national security. The cornerstone of successful existence of any country, especially the Russian Federation, during such complicated period is the presence of effective national economic security system.…

  12. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  13. Achieving National Security Strategy: An Effective Process?

    DTIC Science & Technology

    2008-01-01

    Smith , a career foreign service officer and former Deputy Chief ofMission, the strength ofDOS is its ability to operate with minimal guidance.28 The...DOS’s five-year strategic plan may offer the minimal guidance Mr. Smith suggests. This five- year plan, which is provided by the Secretary of State...outlines the departments overall strategy, which ~ves the latitude required to achieve its mission goals. Mr. Smith also recognizes that, "Most State

  14. Realities and Choices: Helping States Enhance Family Economic Security.

    ERIC Educational Resources Information Center

    Venner, Sandra

    This document, which is designed to help state administrators and legislators formulate policies enhancing family economic security, summarizes research findings regarding barriers to economic self-sufficiency and policies used by various states to improve poor family's available work opportunities and economic security. Discussed in the…

  15. Economic security: an essential component of recovery.

    PubMed

    Cook, Judith A; Mueser, Kim T

    2013-03-01

    People with psychiatric disabilities often face complex financial situations that make them unable to exercise choice in how their financial resources are allocated to needs including health care, housing, education, leisure pursuits, and other important life activities. One avenue to address these barriers is by helping people increase their financial literacy or knowledge of how to manage and budget their money effectively, accumulate assets, and reduce or deal with debt. However, our field has not focused sufficient attention on improving the financial literacy of the people we serve. Unfortunately, people with mental illness are significantly less likely to have any savings than those without mental illness. This makes them excellent candidates for state and federal programs that help low-income individuals accumulate savings that are exempt from asset limits for all federal means-tested programs. Growing out of these efforts, a field known as "asset-based welfare" has evolved to understand the role of assets in the promotion of individual and collective welfare. In an uncertain economy, the time is right for the field of psychiatric rehabilitation to expand its focus to include community and economic development activities that promote financial security.

  16. The National Economic Strategy: Security and Prosperity Today and Tomorrow

    DTIC Science & Technology

    2007-11-02

    Reagan and Beyond. New York: Simon and Schuster, 1984. Sunstein , Cass R. “Economic Security: A Human Right,” The American Prospect, October 2004, A24...president’s NSS provides the vision to spread economic prosperity through democracy , globalization, and free trade while improving the lives of all...but will create conditions that allow democracy , freedom, security, and prosperity to spread around the globe. 2. The National Economic Strategy in

  17. Economic security for the elderly in India: an overview.

    PubMed

    Kumar, S Vijaya

    2003-01-01

    The basic concept of social security is not new in India. Traditionally, a sort of moral economy existed to provide security to older destitute and other vulnerable groups in society. However, gradually, traditional support systems are disappearing, and state-based social security systems have come into existence. Under standardized economic security policies, government is covering retirement benefits for those in the organized sector; economic security benefits for those in the unorganized sector; and old-age pension for rural elderly. These are contributory as well as non-contributory programs. Besides life insurance approaches, savings-linked insurance and Annapurna (food security) are other important programs. However, in terms of coverage, program quality and effectiveness have been largely criticized by social security experts, suggesting immediate reforms to old-age programs.

  18. Economic Aspects of Airport Security Measures

    DTIC Science & Technology

    1999-06-01

    Airport security measures use very expensive equipment, and may keep passengers in line for several minutes. The time passengers spend in those lines...can add up, and must be understood as time opportunity cost. In the 1970s, several airport security measures were adopted to help stop aircraft...associated with airport security measures. He concluded that the costs of the adopted measures were very high. While Landes concentrated on the

  19. Economic abuse and intra-household inequities in food security.

    PubMed

    Power, Elaine M

    2006-01-01

    Food insecurity affected over 2.3 million Canadians in 2004. To date, the food security literature has not considered the potential impact of economic abuse on food security, but there are three ways in which these two important public health issues may be related: 1) victims of economic abuse are at risk of food insecurity when they are denied access to adequate financial resources; 2) the conditions that give rise to food insecurity may also precipitate intimate partner violence in all its forms; 3) women who leave economically abusive intimate heterosexual relationships are more likely to live in poverty and thus are at risk of food insecurity. This paper presents a case of one woman who, during a qualitative research interview, spontaneously reported economic abuse and heterosexual interpersonal violence. The economic abuse suffered by this participant appears to have affected her food security and that of her children, while her husband's was apparently unaffected. There is an urgent need to better understand the nature of intra-household food distribution in food-insecure households and the impact of economic abuse on its victims' food security. Such an understanding may lead to improved food security measurement tools and social policies to reduce food insecurity.

  20. Economic Conflict and National Security Research

    DTIC Science & Technology

    1977-02-22

    infectious diseases or cancer can have epidemological consequences that go beyond national boundaries. The recent attention to DNA research in America...claims "it doesn’t have the time" is merely asserting, with a kind of childish petulance, that it Im- atiently wants the fruits of economic growth n

  1. Is yield increase sufficient to achieve food security in China?

    PubMed

    Wei, Xing; Zhang, Zhao; Shi, Peijun; Wang, Pin; Chen, Yi; Song, Xiao; Tao, Fulu

    2015-01-01

    Increasing demand for food, driven by unprecedented population growth and increasing consumption, will keep challenging food security in China. Although cereal yields have substantially improved during the last three decades, whether it will keep thriving to meet the increasing demand is not known yet. Thus, an integrated analysis on the trends of crop yield and cultivated area is essential to better understand current state of food security in China, especially on county scale. So far, yield stagnation has extensively dominated the main cereal-growing areas across China. Rice yield is facing the most severe stagnation that 53.9% counties tracked in the study have stagnated significantly, followed by maize (42.4%) and wheat (41.9%). As another important element for production sustainability, but often neglected is the planted area patterns. It has been further demonstrated that the loss in productive arable land for rice and wheat have dramatically increased the pressure on achieving food security. Not only a great deal of the planted areas have stagnated since 1980, but also collapsed. 48.4% and 54.4% of rice- and wheat-growing counties have lost their cropland areas to varying degrees. Besides, 27.6% and 35.8% of them have retrograded below the level of the 1980s. The combined influence (both loss in yield and area) has determined the crop sustainable production in China to be pessimistic for rice and wheat, and consequently no surprise to find that more than half of counties rank a lower level of production sustainability. Therefore, given the potential yield increase in wheat and maize, as well as substantial area loss of rice and wheat, the possible targeted adaptation measures for both yield and cropping area is required at county scale. Moreover, policies on food trade, alongside advocation of low calorie diets, reducing food loss and waste can help to enhance food security.

  2. Is Yield Increase Sufficient to Achieve Food Security in China?

    PubMed Central

    Wei, Xing; Zhang, Zhao; Shi, Peijun; Wang, Pin; Chen, Yi; Song, Xiao; Tao, Fulu

    2015-01-01

    Increasing demand for food, driven by unprecedented population growth and increasing consumption, will keep challenging food security in China. Although cereal yields have substantially improved during the last three decades, whether it will keep thriving to meet the increasing demand is not known yet. Thus, an integrated analysis on the trends of crop yield and cultivated area is essential to better understand current state of food security in China, especially on county scale. So far, yield stagnation has extensively dominated the main cereal-growing areas across China. Rice yield is facing the most severe stagnation that 53.9% counties tracked in the study have stagnated significantly, followed by maize (42.4%) and wheat (41.9%). As another important element for production sustainability, but often neglected is the planted area patterns. It has been further demonstrated that the loss in productive arable land for rice and wheat have dramatically increased the pressure on achieving food security. Not only a great deal of the planted areas have stagnated since 1980, but also collapsed. 48.4% and 54.4% of rice- and wheat-growing counties have lost their cropland areas to varying degrees. Besides, 27.6% and 35.8% of them have retrograded below the level of the 1980s. The combined influence (both loss in yield and area) has determined the crop sustainable production in China to be pessimistic for rice and wheat, and consequently no surprise to find that more than half of counties rank a lower level of production sustainability. Therefore, given the potential yield increase in wheat and maize, as well as substantial area loss of rice and wheat, the possible targeted adaptation measures for both yield and cropping area is required at county scale. Moreover, policies on food trade, alongside advocation of low calorie diets, reducing food loss and waste can help to enhance food security. PMID:25680193

  3. Economic Sanctions Targeting Yugoslavia - An Effective National Security Strategy Component

    DTIC Science & Technology

    2006-05-31

    USAWC STRATEGY RESEARCH PROJECT Economic Sanctions Targeting Yugoslavia – An Effective National Security Strategy Component by COL Charles J. Kacsur...Jr. U.S. Army Dr. Clayton K. S. Chun Project Advisor The views expressed in this academic research paper are those of the author and do not...National Security Strategy Component 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Charles Kacsur; 5d. PROJECT

  4. Information security: where computer science, economics and psychology meet.

    PubMed

    Anderson, Ross; Moore, Tyler

    2009-07-13

    Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.

  5. Social Security Disability: Demographic and Economic Characteristics of New Beneficiaries.

    DTIC Science & Technology

    1988-01-01

    your offices, we are providing information on the demographic , health, and economic conditions of social security disability insurance program...new survey in a subsequent report. SSA conducted its New Beneficiary Survey between October and December 1982, collecting a wide range of demographic ...retired beneficiaries and the general population. DEMOGRAPHIC AND EMPLOYMENT CHARACTERISTICS The disabled beneficiaries surveyed consisted of

  6. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    DTIC Science & Technology

    2015-09-01

    seem too complex to understand so policy makers do not make any decisions to change for fear of adverse impacts. Current policies often lean towards ...ES, HS, and NS because I want to understand how they affect one another in order to improve homeland security policy development and decision making ...happens when countries are not able to make political decisions because of economic encumbrances? In “Genuine National Security: A People’s

  7. The Asia-Pacific Maritime Security Strategy: Achieving U.S. National Security Objectives in a Changing Environment

    DTIC Science & Technology

    2015-07-27

    ACHIEVING U.S. NATIONAL SECURITY OBJECTIVES IN A CHANGING ENVIRONMENT Indian Ocean In sharp contrast to the South and East China Seas, the Indian ... ENVIRONMENT Second, we are working together with our allies and partners from Northeast Asia to the Indian Ocean to build their maritime capacity. We...Pacific Maritime Security Strategy: Achieving U.S. National Security Objectives in a Changing Environment 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  8. Family Economic Security Policies and Child and Family Health.

    PubMed

    Spencer, Rachael A; Komro, Kelli A

    2017-03-01

    In this review, we examine the effects of family economic security policies (i.e., minimum wage, earned income tax credit, unemployment insurance, Temporary Assistance to Needy Families) on child and family health outcomes, summarize policy generosity across states in the USA, and discuss directions and possibilities for future research. This manuscript is an update to a review article that was published in 2014. Millions of Americans are affected by family economic security policies each year, many of whom are the most vulnerable in society. There is increasing evidence that these policies impact health outcomes and behaviors of adults and children. Further, research indicates that, overall, policies which are more restrictive are associated with poorer health behaviors and outcomes; however, the strength of the evidence differs across each of the four policies. There is significant diversity in state-level policies, and it is plausible that these policy variations are contributing to health disparities across and within states. Despite increasing evidence of the relationship between economic policies and health, there continues to be limited attention to this issue. State policy variations offer a valuable opportunity for scientists to conduct natural experiments and contribute to evidence linking social policy effects to family and child well-being. The mounting evidence will help to guide future research and policy making for evolving toward a more nurturing society for family and child health and well-being.

  9. 40 CFR 450.22 - Effluent limitations reflecting the best available technology economically achievable (BAT).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... best available technology economically achievable (BAT). 450.22 Section 450.22 Protection of... Effluent limitations reflecting the best available technology economically achievable (BAT). Except as... application of the best available technology economically achievable (BAT). (a) Beginning no later than...

  10. 40 CFR 450.22 - Effluent limitations reflecting the best available technology economically achievable (BAT).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... best available technology economically achievable (BAT). 450.22 Section 450.22 Protection of... Effluent limitations reflecting the best available technology economically achievable (BAT). Except as... application of the best available technology economically achievable (BAT). (a) Beginning no later than...

  11. 40 CFR 450.22 - Effluent limitations reflecting the best available technology economically achievable (BAT).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... best available technology economically achievable (BAT). 450.22 Section 450.22 Protection of... Effluent limitations reflecting the best available technology economically achievable (BAT). Except as... application of the best available technology economically achievable (BAT). (a) Beginning no later than...

  12. 40 CFR 450.22 - Effluent limitations reflecting the best available technology economically achievable (BAT).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... best available technology economically achievable (BAT). 450.22 Section 450.22 Protection of... limitations reflecting the best available technology economically achievable (BAT). Except as provided in 40... the best available technology economically achievable (BAT). (a) Beginning no later than August...

  13. "Give and Take," Economics Achievement, and Basic Skills Development.

    ERIC Educational Resources Information Center

    Chizmar, John F.; And Others

    1985-01-01

    An economics program designed for junior high and senior high school students indicates that learning economic content tends to improve a student's ability in social studies skills and, indirectly, also improves language arts and quantitative skills. (Author/RM)

  14. Are safety, security, and dependability achievable in software?

    SciTech Connect

    Fletcher, S.K.

    1996-07-01

    Critical software must be safe, secure, and dependable. Traditionally, these have been pursued as separate disciplines. This presentation looks at the traditional approaches and highlights commonalities and differences among them. Each can learn from the history of the others. More importantly, it is imperative to seek a systems approach which blends all three.

  15. Achieving Youth Employment and National Security in Nigeria: TVET Imperatives

    ERIC Educational Resources Information Center

    Ogbuanya, T. C.; Ofonmbuk, Michael

    2015-01-01

    The rate of unemployment in Nigeria is alarming and could promote social vices some of which are kidnapping, armed robbery, child trafficking, Cultism, Drug peddling and ritual killing. These social vices could in no small measure constitute a threat to national security as a matter of fact. Therefore, the development of a workable Technical and…

  16. Thailand's energy security: Strategic Petroleum Reserve and its economic impacts

    NASA Astrophysics Data System (ADS)

    Leesombatpiboon, Poonpat

    This dissertation studies Thailand's energy security from three related perspectives, the role of oil on the Thai macroeconomy, the sectoral demand for oil in Thailand, and the Strategic Petroleum Reserve (SPR) policy for the Thai economy. The first part of my dissertation estimates an error correction model of aggregate production function for Thailand. Thai economic growth is modeled as a function of labor, capital, and oil consumption. Unlike previous studies that focus on testing the causal relationship between energy consumption and economic growth, I focus on measuring the elasticity of economic growth with respect to oil consumption and oil prices. I find a cointegration relationship between GDP, capital, labor, and oil consumption. The results suggest that there exists a constant-return-to-scale characteristic in Thailand's aggregate production function with the contribution of labor, oil, and capital to output around 68, 19, and 13 percent respectively. The long-run and short-run contribution of oil consumption to the economy appears to be fairly close, suggesting that oil has a critical role in the Thai economy. In the short run, oil shortages have a much more severe impact on Thai economy than the effects of an oil price shock. For example, a 10 percent shortfall in oil consumption might cause economic growth to shrink by 2 percent within the same year while a sharp10 percent rise in oil prices canlead output growth to a fall by about 0.5 percent. The response of output to increases and decreases in oil prices is found to be asymmetric in the short run. The second part of my dissertation examines the short-run and long-run determinants of final oil consumption in seven major economic sectors in Thailand. Two different approaches are compared. The first approach uses dynamic panel data estimation techniques taking into account oil consumption of the whole economy in an aggregate manner. The second approach employs the Autoregressive Distributed Lag (ADL

  17. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    DTIC Science & Technology

    2001-06-01

    Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system. Ideally, the principles presented here would he used from the onset of a program-at the beginning of, or during the design phase- and then employed throughout the system’s life-cycle. However, these principles are also helpful in affirming and confirming the security posture of already deployed information systems. The principles are short and concise and can he used by organizations

  18. Economic Need among Older Latinos: Applying The Elder Economic Security Standard™ Index

    PubMed Central

    Wallace, Steven P.; Padilla-Frausto, D. Imelda; Smith, Susan

    2013-01-01

    The first official U.S. federal poverty line was developed in the 1960s; since the mid-1990s the scientific consensus has been that it has become outdated and inaccurate. This article explains the key elements of the current federal measure that are inaccurate for older adults in general and older Latinos specifically. An alternative is described that addresses the key failings of the current measure. The alternative, the Elder Economic Security Standard™ Index (Elder Index), adapts a national methodology to the basic costs of living in California for 2007 using data from the American Community Survey, and other public data sources. The results show that the amount needed for basic economic security in California is higher than the federal poverty level in all counties, and averages about twice the federal level. Housing costs are the largest component of costs in most counties, although health care is the largest component for couples in lower housing cost counties. Among singles and couples age 65 and over in California, almost 60% of Latinos have incomes below the Elder Index compared to one-quarter of non-Latino whites. The rates are higher among renters, and older Latinos are more likely than non-Latino whites to rent. Applying the Elder Index in California documents the disproportionate rates of economic insecurity among older Latinos. The findings indicate that changes to public programs such as Social Security and Medicare that decrease benefits or increase costs will have disproportionately negative impact on the ability of most older Latinos to pay for basic needs. PMID:23857068

  19. Economic need among older Latinos: applying the Elder Economic Security Standard™ Index.

    PubMed

    Wallace, Steven P; Padilla-Frausto, D Imelda; Smith, Susan E

    2013-09-01

    The first official U.S. federal poverty line was developed in the 1960s; since the mid-1990s the scientific consensus has been that it has become outdated and inaccurate. This article explains the key elements of the current federal measure that are inaccurate for older adults in general and older Latinos specifically. An alternative is described that addresses the key failings of the current measure. The alternative, the Elder Economic Security Standard™ Index (Elder Index), adapts a national methodology to the basic costs of living in California for 2007 using data from the American Community Survey, and other public data sources. The results show that the amount needed for basic economic security in California is higher than the federal poverty level in all counties, and averages about twice the federal level. Housing costs are the largest component of costs in most counties, although health care is the largest component for couples in lower housing cost counties. Among singles and couples age 65 and over in California, almost 60% of Latinos have incomes below the Elder Index compared to one-quarter of non-Latino whites. The rates are higher among renters, and older Latinos are more likely than non-Latino whites to rent. Applying the Elder Index in California documents the disproportionate rates of economic insecurity among older Latinos. The findings indicate that changes to public programs such as Social Security and Medicare that decrease benefits or increase costs will have disproportionately negative impact on the ability of most older Latinos to pay for basic needs.

  20. Future Achievement Orientations: Job Training and Economic Success.

    ERIC Educational Resources Information Center

    Hubbard, Robert L.

    The research had four purposes: describe the concept of future orientation; develop measures of future constructs; determine the impact of background, labor markets, and job training on future orientations; and evaluate the validity of the measures as predictors of training outcomes and economic success. Data were collected from a sample of men in…

  1. Personal Economic and Financial Security. Unit 7: A Core Curriculum of Related Instruction for Apprentices.

    ERIC Educational Resources Information Center

    New York State Education Dept., Albany. Bureau of Occupational and Career Curriculum Development.

    The personal economic and financial security unit is presented to assist apprentices to acquire a general knowledge of how to maintain economic security and stability. The unit consists of six modules: (1) Fair Labor Standards Act: minimum wages and maximum hours, (2) unemployment insurance: payments for the unemployed worker, (3) workmen's…

  2. Seinfeld and Economics: How to Achieve the Revised Bloom's Taxonomy in an Introductory Economics Class

    ERIC Educational Resources Information Center

    Deal, John; Hegde, S. Aaron

    2013-01-01

    This paper presents an innovative teaching technique, the utilization of a popular sitcom to teach an introductory economics course. Using clips from the television show "Seinfeld," instructors can present the oft-perceived difficult, yet basic, economic concepts in an amenable manner, which also enables the achieving of higher levels of…

  3. Pre-marital pregnancy, childspacing, and later economic achievement.

    PubMed

    Coombs, L C; Freedman, R

    1970-11-01

    Abstract The nature of the first-birth interval has a persistent, if diminishing relation to the family's economic position at successive observations in a longitudinal study of Detroit. The pre-maritally pregnant (PMP) were at a disadvantage at either the first (1961) observation or the fourth (1966) as compared with other married couples with either a short or long first birth interval (short-spacers and long-spacers). The PMP disadvantage was much greater for assets than for income, but disadvantage in each area persisted and was not a result of age, duration of marriage, or other factors likely to disappear in time. Poor education combined with early age at marriage was probably responsible. On the other hand, the economic disadvantages of the short-spacers (not PMP) as compared with the long-spacers, diminished consistently between 1961 and 1965. The initial disadvantage results from shorter marriage and career duration for husbands at each parity. At comparable marriage durations the difference disappears. Nevertheless, this means substantially smaller resources per head at the actual time of birth of successive children.

  4. 40 CFR 449.10 - Effluent limitations representing the best available technology economically achievable (BAT).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... best available technology economically achievable (BAT). 449.10 Section 449.10 Protection of... available technology economically achievable (BAT). Except as provided in 40 CFR 125.30 through 125.32, any... following requirements representing the degree of effluent reduction attainable by the application of...

  5. 40 CFR 449.10 - Effluent limitations representing the best available technology economically achievable (BAT).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... best available technology economically achievable (BAT). 449.10 Section 449.10 Protection of... available technology economically achievable (BAT). Except as provided in 40 CFR 125.30 through 125.32, any... following requirements representing the degree of effluent reduction attainable by the application of...

  6. 40 CFR 449.10 - Effluent limitations representing the best available technology economically achievable (BAT).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... best available technology economically achievable (BAT). 449.10 Section 449.10 Protection of... available technology economically achievable (BAT). Except as provided in 40 CFR 125.30 through 125.32, any... following requirements representing the degree of effluent reduction attainable by the application of...

  7. The Bangladesh paradox: exceptional health achievement despite economic poverty.

    PubMed

    Chowdhury, A Mushtaque R; Bhuiya, Abbas; Chowdhury, Mahbub Elahi; Rasheed, Sabrina; Hussain, Zakir; Chen, Lincoln C

    2013-11-23

    Bangladesh, the eighth most populous country in the world with about 153 million people, has recently been applauded as an exceptional health performer. In the first paper in this Series, we present evidence to show that Bangladesh has achieved substantial health advances, but the country's success cannot be captured simplistically because health in Bangladesh has the paradox of steep and sustained reductions in birth rate and mortality alongside continued burdens of morbidity. Exceptional performance might be attributed to a pluralistic health system that has many stakeholders pursuing women-centred, gender-equity-oriented, highly focused health programmes in family planning, immunisation, oral rehydration therapy, maternal and child health, tuberculosis, vitamin A supplementation, and other activities, through the work of widely deployed community health workers reaching all households. Government and non-governmental organisations have pioneered many innovations that have been scaled up nationally. However, these remarkable achievements in equity and coverage are counterbalanced by the persistence of child and maternal malnutrition and the low use of maternity-related services. The Bangladesh paradox shows the net outcome of successful direct health action in both positive and negative social determinants of health--ie, positives such as women's empowerment, widespread education, and mitigation of the effect of natural disasters; and negatives such as low gross domestic product, pervasive poverty, and the persistence of income inequality. Bangladesh offers lessons such as how gender equity can improve health outcomes, how health innovations can be scaled up, and how direct health interventions can partly overcome socioeconomic constraints.

  8. Integrating epidemiology, psychology, and economics to achieve HPV vaccination targets.

    PubMed

    Basu, Sanjay; Chapman, Gretchen B; Galvani, Alison P

    2008-12-02

    Human papillomavirus (HPV) vaccines provide an opportunity to reduce the incidence of cervical cancer. Optimization of cervical cancer prevention programs requires anticipation of the degree to which the public will adhere to vaccination recommendations. To compare vaccination levels driven by public perceptions with levels that are optimal for maximizing the community's overall utility, we develop an epidemiological game-theoretic model of HPV vaccination. The model is parameterized with survey data on actual perceptions regarding cervical cancer, genital warts, and HPV vaccination collected from parents of vaccine-eligible children in the United States. The results suggest that perceptions of survey respondents generate vaccination levels far lower than those that maximize overall health-related utility for the population. Vaccination goals may be achieved by addressing concerns about vaccine risk, particularly those related to sexual activity among adolescent vaccine recipients. In addition, cost subsidizations and shifts in federal coverage plans may compensate for perceived and real costs of HPV vaccination to achieve public health vaccination targets.

  9. AY 2007-2008 Achieving U.S. Energy Security: Energy Industry Sector Report Seminar 8

    DTIC Science & Technology

    2008-01-01

    2008 ABSTRACT: The source of U.S. national security strength stems in large part from the nation’s economic foundation; the ability to generate and...exploit inexpensive energy underpins that strength. Therefore, the United States has a vital interest in ensuring the viability and stability of...relationships with nations that broaden our energy portfolio to maintain diversity of source; 3.) Increase the U.S.’ global leadership role in

  10. The Relationship between Teachers' Collective Efficacy and Student Achievement at Economically Disadvantaged Middle School Campuses

    ERIC Educational Resources Information Center

    Sandoval, Juan Manuel; Challoo, Linda B.; Kupczynski, Lori

    2011-01-01

    The purpose of this study was to examine the relationship between the collective efficacy of teachers and student achievement at economically disadvantaged middle school campuses. The population of the study consisted of Texas campuses that served economically disadvantaged students and received a campus rating of Exemplary or Academically…

  11. Commission on Measures of Household Economic Security Act of 2010

    THOMAS, 111th Congress

    Sen. Feingold, Russell D. [D-WI

    2009-12-11

    12/11/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Post-processing of economic dispatch solutions for security enhancement based on approximate reasoning

    SciTech Connect

    Niimura, Takahide; Yokoyama, Ryuichi

    1996-05-01

    In this paper the authors present an approach to enhance the security of power systems by supplementing conventional economic dispatch solutions for less branch overload in case of contingencies. The supplementary control adjustment is determined by approximate reasoning based on qualitative rules and linguistic fuzzy sets. Fuzzy sets and reasoning procedure are defined for effective security enhancement of real power generation. Numerical examples prove that this approach efficiently produces more secure conditions against branch overload.

  13. Pathways to Economic Security: Gender and Nonstandard Employment in Contemporary Japan

    ERIC Educational Resources Information Center

    Gottfried, Heidi

    2008-01-01

    Compiling data from several government surveys, this article identifies key social indicators of economic security associated with nonstandard employment in Japan. Empirical trends of nonstandard employment are contextualized in the development of Japanese coordinated capitalism from the economic boom during the 1960s through the recession of the…

  14. Economic Factors of Japan’s National Security Policy

    DTIC Science & Technology

    1988-06-01

    security, the rates of domestic consumption, trade balances , overseas investment, and technology development have become tests of bilateral cooperation... balances , overseas investment, and technology development have become tests of bilateral cooperation. Domestic demand, capital formation, trade and...the policy were: * Balance the nation’s budget * Strengthen the tax collection process * Limit Reconstruction Finance Bank (RFB) loans * Improve

  15. Economic Assistance and Security. Rethinking U. S. Policy,

    DTIC Science & Technology

    1982-01-01

    international economic system is only peripherally discussed. The critical question of insuring that our assistance reaches the poor beneficiary groups it is...rates: e.g., educational levels and literacy rates, natural resource availabilities, differentials in health services, and earnings in international...North-South dialogue on changes in the international economic system . In- deed, it was the long-range design of a group of Third World nations of

  16. Secure or Insure: An Economic Analysis of Security Interdependencies and Investment Types

    ERIC Educational Resources Information Center

    Grossklags, Jens

    2009-01-01

    Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…

  17. Achieving an Effective National Security Posture in an Age of Austerity

    DTIC Science & Technology

    2014-05-14

    Achieving an Effective National Security Posture in an Age of Austerity * Dr. Gansler served as Under Secretary of Defense (Acquisition, Technology ...Maintain Technological Leadership - - in all areas e.g. in cybersecurity, in intelligence, and in logistics (e.g. from “Big Data Analytics”); while...recognizing that technology , industry, and labor today are globalized (and, in many areas, the technological leadership exists in commercial or

  18. Food and nutrition security and the economic crisis in Indonesia.

    PubMed

    Soekirman

    2001-01-01

    Indonesia has been afflicted by an economic crisis since July 1997. The economic crisis was preceded by a long drought associated with El Nino. The result has been a decline in food production, especially rice. In the eastern part of the country, especially in Irian Jaya, there was food insecurity during the early stages of the economic crisis. When the crisis escalated to become an economic, social and political crisis in 1998, food insecurity spread to other provinces, especially to urban areas in Java. The crisis led to increasingly high inflation. unemployment, poverty, food insecurity and malnutrition. The official figures indicate that poverty in Indonesia increased from 22.5 million (11.3%) in 1996 to 36.5 million (17.9%) in 1998. Food production decreased by 20-30% in some parts of the country. Compared with prices in January 1998, food prices had escalated 1.5- to threefold by August/November 1998 when acute food shortages occurred, especially in urban Java. Coupled with a drop in purchasing power, the higher food prices worsened health, nutritional status and education of children of urban poor and unemployed families. Despite social and political uncertainties, the Indonesian Government has taken prompt action to prevent a worsening of the situation by massive imports of rice, instituting food price subsidies for the poor and launching social safety net programmes to cope with food shortages and malnutrition. The present paper attempts to highlight the impact of the economic crisis on food insecurity and malnutrition in Indonesia.

  19. Border Security, Economic Opportunity, and Immigration Modernization Act

    THOMAS, 113th Congress

    Rep. Garcia, Joe [D-FL-26

    2013-10-02

    03/26/2014 Motion to Discharge Committee filed by Mr. Garcia. Petition No: 113-9. (Discharge petition text with signatures.) (All Actions) Notes: On 3/26/2014, a motion was filed to discharge the Committees on the Judiciary, Foreign Affairs, Homeland Security, Ways and Means, Armed Services, Natural Resources, Agriculture, Education and the Workforce, Energy and Commerce, Oversight and Government Reform, the Budget, Science... Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Economic Analysis of National Nuclear Security Administration (NNSA) Modernization Alternatives

    DTIC Science & Technology

    2007-11-01

    ecological systems, political systems, and economic systems. The model is implemented using a software package called STELLA, distributed by isee systems. 3 ...detailed and probably better at their specific tasks than the corresponding module of the Enterprise Model. 3 Go to the isee systems Web site...30 3 . Assembly/Disassembly Facilities ................................................................... 33 vi 4

  1. Polygamy, economic security and well-being of retired Zulu migrant workers.

    PubMed

    Møller, V; Welch, G J

    1990-07-01

    Why does polygamy still persist when changing circumstances challenge the conventional wisdom that polygamy and numerous progeny provide social security in old age? To answer this question an in-depth questionnaire survey of 253 retired Zulu male migrants resident in rural areas examined the relationship between polygamy, economic security, and quality of life after return migration. Results indicate that polygamous marital status contributes only indirectly to feelings of enhanced well-being relative to economic advantage and good health. It is concluded that despite changing economic circumstances a traditionally-oriented polygamous head of a Zulu household may still expect to feel optimistic about his social and spiritual security in old age. Further research is required to explore Zulu women's views regarding the longer-term advantages of polygamy throughout the life course.

  2. Malaysia: Political, Security, Economic, and Trade Issues Considered

    DTIC Science & Technology

    2007-02-13

    3.7 % (2006) Natural Resources: Petroleum, natural gas, tin, minerals, palm oil , rubber U.S. Trade: Malaysia is the United States’ 10th largest trade...eight workers in Malaysia are employed in agriculture, animal husbandry, fishing, or forestry. Rice and palm oil are two crops of particular importance...of rice. The latter is important for economic reasons, as palm oil is a traditional major export crop for Malaysia . Malaysia’s manufacturing sector

  3. Demographic and employment shifts: implications for benefits and economic security.

    PubMed

    Anzick, M

    1993-08-01

    This Issue Brief examines factors affecting the population's age distribution and composition, such as mortality rates, fertility rates, and immigration. In addition, it examines factors affecting labor force composition, such as immigration, increased labor force participation of women, and retirement trends, and discusses the potential impact of these changes on publicly financed programs: Medicare, Medicaid, Social Security, and federal employee retirement systems. The discussion also highlights the implications of these population and labor force changes on employers, employees, and retirees. The elderly population--now 31.8 million, representing 12.6 percent of the population--is projected to experience tremendous growth between 2010 and 2030, when the baby boom generation reaches age 65, rising from 39.7 million, or 13.3 percent of the population, to 69.8 million, or 20.2 percent of the population. Growth in the elderly population has implications for retirement and health care systems. Population projections suggest that the traditionally pyramid-shaped work force, with a proportionately greater number of younger workers than older workers, will be replaced with a more even age distribution. Consequently, significant and continued modifications to benefit packages, such as changes in compensation structures in which earnings automatically rise with age, are likely to occur. Women's labor force participation began to accelerate in the mid-1950s, rising 75 percent among women aged 25-44 in 1991, although there is some indication that this growth may be flattening. With women comprising a greater part of the labor force, employers will be encouraged to develop and implement programs to better accommodate their needs. Increased life expectancy, a decreased percentage of entry level workers, changes in Social Security's normal retirement age from 65 to 67, and employer plans to raise the normal age of retirement or provide incentives to delay retirement, could

  4. Food security in an era of economic volatility.

    PubMed

    Naylor, Rosamond L; Falcon, Walter P

    2010-01-01

    This article analyzes international commodity price movements, assesses food policies in response to price fluctuations, and explores the food security implications of price volatility on low-income groups. It focuses specifically on measurements, causes, and consequences of recent food price trends, variability around those trends, and price spikes. Combining these three components of price dynamics shows that the variation in real prices post-2000 was substantially greater than that in the 1980s and 1990s, and was approximately equal to the extreme volatility in commodity prices that was experienced in the 1970s. Macro policy, exchange rates, and petroleum prices were important determinants of price variability over 2005–2010, highlighting the new linkages between the agriculture-energy and agriculture-finance markets that affect the world food economy today. These linkages contributed in large part to misguided expectations and uncertainty that drove prices to their peak in 2008. The article also argues that there is a long-lasting effect of price spikes on food policy around the world, often resulting in self-sufficiency policies that create even more volatility in international markets. The efforts by governments to stabilize prices frequently contribute to even greater food insecurity among poor households, most of which are in rural areas and survive on the margin of net consumption and net production. Events of 2008—and more recently in 2010—underscore the impact of price variability for food security and the need for refocused policy approaches to prevent and mitigate price spikes.

  5. Socio-Economic Background and Access to Internet as Correlates of Students' Achievement in Agricultural Science

    ERIC Educational Resources Information Center

    Adegoke, Sunday Paul; Osokoya, Modupe M.

    2015-01-01

    This study investigated access to internet and socio-economic background as correlates of students' achievement in Agricultural Science among selected Senior Secondary Schools Two Students in Ogbomoso South and North Local Government Areas. The study adopted multi-stage sampling technique. Simple random sampling was used to select 30 students from…

  6. School Effects and Ethnic, Gender and Socio-Economic Gaps in Educational Achievement at Age 11

    ERIC Educational Resources Information Center

    Strand, Steve

    2014-01-01

    There are long-standing achievement gaps in England associated with socio-economic status (SES), ethnicity and gender, but relatively little research has evaluated interactions between these variables or explored school effects on such gaps. This paper analyses the national test results at age 7 and age 11 of 2,836 pupils attending 68 mainstream…

  7. The Economic Impact of Achievement Gaps in Pennsylvania's Public Schools. Research Report

    ERIC Educational Resources Information Center

    Karoly, Lynn A.

    2015-01-01

    This study documents the magnitude of the gaps in student performance for public school students in Pennsylvania and estimates the economic consequences of those education performance gaps. Although Pennsylvania is one of the top-scoring states on the 2013 National Assessment of Educational Progress (NAEP) on average, the achievement gaps between…

  8. Gender Achievement and Social, Political and Economic Equality: A European Perspective

    ERIC Educational Resources Information Center

    Ireson, Gren

    2017-01-01

    Differences in gender equality based on social, political and economic factors is cited, by some writers, as a contributory factor in the differentially greater achievement of boys in STEM subjects through the concept of gender stratification. Gender differences, especially in mathematics, have been linked directly to gender parity in wider…

  9. Altruistic punishment as an explanation of hunter-gatherer cooperation: how much has experimental economics achieved?

    PubMed

    Sugden, Robert

    2012-02-01

    The discovery of the altruistic punishment mechanism as a replicable experimental result is a genuine achievement of behavioural economics. The hypothesis that cooperation in hunter-gatherer societies is sustained by altruistic punishment is a scientifically legitimate conjecture, but it must be tested against real-world observations. Guala's doubts about the evidential support for this hypothesis are well founded.

  10. Better options for work and retirement: some suggestions for improving economic security mechanisms for old age.

    PubMed

    Chen, Y P

    1988-01-01

    After identifying the income security system as a tripod structure symbolizing the efforts of the individual, the employer, and the government, the first section of this chapter suggested that economic security is a broader concept than income security, since a person is concerned not only with the acquisition of income and assets but also with the retention and disposal of them. Factors such as health care expenditures, housing and living arrangements, service delivery, and support networks affect income and asset retention. Both acquisition and retention of income and assets, furthermore, are influenced by macroeconomic policies. This section also discussed the possibility that the role of the individual in providing economic security may be underestimated. In the second section, the heterogeneity of older persons was demonstrated in terms of both income sources and the relative importance of these sources to persons in different income classes. Social Security declines in importance as income level rises, whereas assets and employment as sources of income increase with income levels. Occupational pensions are of minimal importance to persons in the lowest-income class. Though more important to persons in the higher-income classes, occupational pensions as a proportion to their total income lie between 10% and 20% for these groups. By definition, public assistance is important only to the lowest-income class. During the last two decades, the relative importance of these income sources has changed, as pointed out in the third section, which also speculated on their future roles. The fourth section proposed possible ways of improving the five income security mechanisms: to provide more child-care credit for women under Social Security, to strengthen portability under private pension plans, to make IRAs more accessible and more meaningful for retirement purposes, to enhance the role of employment for adults, and to raise SSI so as to eliminate poverty. The chapter

  11. West European economic security and international natural gas trade: optimal portfolios of gas imports

    SciTech Connect

    Greer, B.I.

    1985-01-01

    In 1981 the dependence of Western Europe on the Soviet Union for natural gas imports became a major issue in the debate over the European involvement in the Urengoi natural gas project. This analysis addresses the question spawned by this debate: how should West Europe diversify its natural gas imports to achieve the greatest security for its economy. The analysis presents a summary of the policy and institutional background of this Western European gas market, explains the nature of European gas markets, and establishes the relationship, between contract structure and economic vulnerability. By characterizing Western Europe's gas import problem as a portfolio decision, the analysis develops a simple static model that articulates the relationship between the cost of gas imports and commensurate risk. Using the portfolio framework, the analysis develops a dynamic model to characterize the intertemporal tradeoffs that are characteristic of a depletable resource in the optimal portfolio selection. An optimal control formulation provides insights that generalize the static portfolio model. Both the static and dynamic formulations provide the basis of computational models that produce empirical estimates of optimal natural gas import portfolios for Western Europe.

  12. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    ERIC Educational Resources Information Center

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  13. From Casual Work to Economic Security; the Paradoxical Case of Self-Employment

    ERIC Educational Resources Information Center

    Tremblay, Diane-Gabrielle

    2008-01-01

    The term "casual work" is not well defined in the literature and can include a diversity of types of employment. In this paper, we first present an introduction and definition of concepts related to job security and economic insecurity. Second, a view on the main labour market transformations, their causes and impacts, with more accent on…

  14. A profile of social security child beneficiaries and their families: sociodemographic and economic characteristics.

    PubMed

    Tamborini, Christopher R; Cupito, Emily; Shoffner, Dave

    2011-01-01

    Using a rich dataset that links the Census Bureau's Survey of Income and Program Participation calendar-year 2004 file with Social Security benefit records, this article provides a portrait of the sociodemographic and economic characteristics of Social Security child beneficiaries. We find that the incidence ofbenefit receipt in the child population differs substantially across individual and family-level characteristics. Average benefit amounts also vary across subgroups and benefit types. The findings provide a better understanding of the importance of Social Security to families with beneficiary children. Social Security is a major source of family income for many child beneficiaries, particularly among those with low income or family heads with lower education and labor earnings.

  15. Petro-Patrons: Economic Security and the U.S. in the Gulf

    NASA Astrophysics Data System (ADS)

    Badie, Dina

    This project investigates the effect of resource dependence on alliance formation and endurance. It argues that the rentier system compels states to rely on great powers to help secure economic imperatives to ensure regime stability regardless of the status of regional aggressors. Three case studies explore the oft-overlooked link between oil dependence and security relationships from the perspective of the host nations to demonstrate that US security arrangements, while contributing to domestic opposition, protect the rentier dynamic that is critical to the survival of the Gulf monarchies. Upon establishing the presence of this dynamic, the dissertation examines prospects of shifting partnerships in light of China's growing influence and energy needs and suggests that the shifting balance of power between the US and China may better determine Gulf regional security than the status of regional aggressors.

  16. The Economic Impact of the Homeland Security Advisory System: The Cost of Heightened Border Security

    DTIC Science & Technology

    2008-12-01

    the United States. Secondary economic impacts of the HSAS such as the airline industry, lost tourism , and retail business from cross-border...Ontario and its businesses. The study is aimed at the trucking, automotive, and tourism industries; and how they are impacted by border delays. The...anniversary of 9/11 2) Feb 7, 2003 - Intel suggesting al Qaeda attacks on apt Feb 27, 2003 buildings, hotels , other soft skin targets after Bali and Mombasa

  17. Do needs for security and certainty predict cultural and economic conservatism? A cross-national analysis.

    PubMed

    Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach

    2014-06-01

    We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.

  18. Impact of climate change on crop yield and role of model for achieving food security.

    PubMed

    Kumar, Manoj

    2016-08-01

    In recent times, several studies around the globe indicate that climatic changes are likely to impact the food production and poses serious challenge to food security. In the face of climate change, agricultural systems need to adapt measures for not only increasing food supply catering to the growing population worldwide with changing dietary patterns but also to negate the negative environmental impacts on the earth. Crop simulation models are the primary tools available to assess the potential consequences of climate change on crop production and informative adaptive strategies in agriculture risk management. In consideration with the important issue, this is an attempt to provide a review on the relationship between climate change impacts and crop production. It also emphasizes the role of crop simulation models in achieving food security. Significant progress has been made in understanding the potential consequences of environment-related temperature and precipitation effect on agricultural production during the last half century. Increased CO2 fertilization has enhanced the potential impacts of climate change, but its feasibility is still in doubt and debates among researchers. To assess the potential consequences of climate change on agriculture, different crop simulation models have been developed, to provide informative strategies to avoid risks and understand the physical and biological processes. Furthermore, they can help in crop improvement programmes by identifying appropriate future crop management practises and recognizing the traits having the greatest impact on yield. Nonetheless, climate change assessment through model is subjected to a range of uncertainties. The prediction uncertainty can be reduced by using multimodel, incorporating crop modelling with plant physiology, biochemistry and gene-based modelling. For devloping new model, there is a need to generate and compile high-quality field data for model testing. Therefore, assessment of

  19. Addressing China's grand challenge of achieving food security while ensuring environmental sustainability.

    PubMed

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-02-01

    China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies.

  20. A Novel Approach to Achieve the Perfect Security through AVK over Insecure Communication Channel

    NASA Astrophysics Data System (ADS)

    Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak

    2016-08-01

    To enhance the security level of the cryptosystem in shared encrypted data over the insecure channel; Automatic variable key (AVK) is a perfect mechanism as being experimented by many researchers. In AVK, after establishment of the secret key (through some IKE protocols, like IKEv2 or 2 PAKA or 3 PAKA, etc), the successive keys are generated that are variable in nature from session to session by using time variant key technique. In this work, it is shown that how AVK can provide higher security than fixed key from well-known plaintext attack (for example, brute force attack) and ciphertext only attack (for example, frequency attack etc) due to randomness of keys. In order to improve the level of randomness among the key set, a new method is proposed to generate keys where the randomness are achieved not only in terms of change in bits sequence but also flexible in size as well. Randomness of the key set is also compared with other related time variant key mechanisms to prove superiority.

  1. Addressing China’s grand challenge of achieving food security while ensuring environmental sustainability

    PubMed Central

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C.; Bailey, Mark; Gordon, Iain J.; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-01-01

    China’s increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies. PMID:26601127

  2. A framework for analyzing the economic tradeoffs between urban commerce and security against terrorism.

    PubMed

    Rose, Adam; Avetisyan, Misak; Chatterjee, Samrat

    2014-08-01

    This article presents a framework for economic consequence analysis of terrorism countermeasures. It specifies major categories of direct and indirect costs, benefits, spillover effects, and transfer payments that must be estimated in a comprehensive assessment. It develops a spreadsheet tool for data collection, storage, and refinement, as well as estimation of the various components of the necessary economic accounts. It also illustrates the usefulness of the framework in the first assessment of the tradeoffs between enhanced security and changes in commercial activity in an urban area, with explicit attention to the role of spillover effects. The article also contributes a practical user interface to the model for emergency managers.

  3. Effects of the 2008 flood on economic performance and food security in Yemen: a simulation analysis.

    PubMed

    Breisinger, Clemens; Ecker, Olivier; Thiele, Rainer; Wiebelt, Manfred

    2016-04-01

    Extreme weather events such as floods and droughts can have devastating consequences for individual well being and economic development, in particular in poor societies with limited availability of coping mechanisms. Combining a dynamic computable general equilibrium model of the Yemeni economy with a household-level calorie consumption simulation model, this paper assesses the economy-wide, agricultural and food security effects of the 2008 tropical storm and flash flood that hit the Hadramout and Al-Mahrah governorates. The estimation results suggest that agricultural value added, farm household incomes and rural food security deteriorated long term in the flood-affected areas. Due to economic spillover effects, significant income losses and increases in food insecurity also occurred in areas that were unaffected by flooding. This finding suggests that while most relief efforts are typically concentrated in directly affected areas, future efforts should also consider surrounding areas and indirectly affected people.

  4. 2007 Report to Congress of the U.S.- China Economic and Security Review Commission

    DTIC Science & Technology

    2007-11-01

    high energy weapons, high energy weather monitor- ing rockets, and ground attacks on earth -based stations 98 An Assessment of China’s Anti-Satellite...128 S &T Areas and Programs for Development Identified in China’s Fifteen-Year Science Plan 255 Key Areas Agriculture National defense Energy ...of Mun S . Ho, June 14, 2007. 113. U.S.-China Economic and Security Review Commission, Hearing on China’s Energy Consumption and Opportunities for U.S

  5. Russian Political, Economic, and Security Issues and U.S. Interests

    DTIC Science & Technology

    2014-03-05

    9 U.S. Department of State, Remarks: John Kerry, Secretary of State, U.S. Embassy Kyiv, March 4, 2014; Background Briefing: Senior Administration...and Secretary of State John Kerry and Russian Foreign Minister Sergey Lavrov met on the sidelines of the NATO-Russia Council meeting in Brussels on... Stuart D. Goldman. Russian Political, Economic, and Security Issues and U.S. Interests Congressional Research Service 54 he did not anticipate a

  6. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  7. Reducing the socio-economic status achievement gap at University by promoting mastery-oriented assessment.

    PubMed

    Smeding, Annique; Darnon, Céline; Souchal, Carine; Toczek-Capelle, Marie-Christine; Butera, Fabrizio

    2013-01-01

    In spite of official intentions to reduce inequalities at University, students' socio-economic status (SES) is still a major determinant of academic success. The literature on the dual function of University suggests that University serves not only an educational function (i.e., to improve students' learning), but also a selection function (i.e., to compare people, and orient them towards different positions in society). Because current assessment practices focus on the selection more than on the educational function, their characteristics fit better with norms and values shared by dominant high-status groups and may favour high-SES students over low-SES students in terms of performances. A focus on the educational function (i.e., mastery goals), instead, may support low-SES students' achievement, but empirical evidence is currently lacking. The present research set out to provide such evidence and tested, in two field studies and a randomised field experiment, the hypothesis that focusing on University's educational function rather than on its selection function may reduce the SES achievement gap. Results showed that a focus on learning, mastery-oriented goals in the assessment process reduced the SES achievement gap at University. For the first time, empirical data support the idea that low-SES students can perform as well as high-SES students if they are led to understand assessment as part of the learning process, a way to reach mastery goals, rather than as a way to compare students to each other and select the best of them, resulting in performance goals. This research thus provides a theoretical framework to understand the differential effects of assessment on the achievement of high and low-SES students, and paves the way toward the implementation of novel, theory-driven interventions to reduce the SES-based achievement gap at University.

  8. Teaching about National Security: Instructional Strategies and Lessons for High School Courses in History, Government, Geography, Economics.

    ERIC Educational Resources Information Center

    Remy, Richard C.; And Others

    The instructional techniques illustrated in this book present a method of infusing national security issues into the five principal social studies courses of U.S. history, world history, U.S. government, economics, and geography. Chapter 1 discusses the meaning and evolution of the term national security in its general and educational contexts.…

  9. Class and Schools: Using Social, Economic, and Educational Reform to Close The Black?White Achievement Gap

    ERIC Educational Resources Information Center

    Taylor, Dianne L.

    2005-01-01

    This paper presents a comprehensive review of Richard Rothstein's book "Class and Schools: Using Social, Economic, and Educational Reform to Close the Black-White Achievement Gap" (Washington, DC: Economic Policy Institute, 2004). The insights offered in this book are timely in light of the No Child Left Behind legislation that puts the…

  10. Growth in Literacy and Numeracy Achievement: Evidence and Explanations of a Summer Slowdown in Low Socio-Economic Schools

    ERIC Educational Resources Information Center

    Vale, Colleen; Weaven, Mary; Davies, Anne; Hooley, Neil; Davidson, Kristy; Loton, Daniel

    2013-01-01

    The phenomenon of summer slide or setback has gained a great deal of attention in the USA. It is understood to account for as much as 80% of the difference in achievement for students between low and high socio-economic families over their elementary schooling. In a mixed method longitudinal study of reforms in low socio-economic school…

  11. Review: Balancing Limiting Factors and Economic Drivers to Achieve Sustainable Midwestern US Agricultural Residue Feedstock Supplies

    SciTech Connect

    Wally W. Wilhelm; J. Richard Hess; Douglas L. Karlen; David J. Muth; Jane M. F. Johnson; John M. Baker; Hero T. Gollany; Jeff M. Novak; Diane E. Stott; Gary E. Varvel

    2010-10-01

    Advanced biofuels will be developed using cellulosic feedstock rather than grain or oilseed crops that can also be used for food and feed. To be sustainable, these new agronomic production systems must be economically viable without degrading soil resources. This review examines six agronomic factors that collectively define many of the limits and opportunities for harvesting crop residue for biofuel feedstock. These six “limiting factors” are discussed in relationship to economic drivers associated with harvesting corn (Zea mays L.) stover as a potential cellulosic feedstock. The limiting factors include soil organic carbon, wind and water erosion, plant nutrient balance, soil water and temperature dynamics, soil compaction, and off-site environmental impacts. Initial evaluations using the Revised Universal Soil Loss Equation 2.0 (RUSLE2) show that a single factor analysis based on simply meeting tolerable soil loss might indicate stover could be harvested sustainably, but the same analysis based on maintaining soil organic carbon shows the practice to be non-sustainable. Modifying agricultural management to include either annual or perennial cover crops is shown to meet both soil erosion and soil carbon requirements. The importance of achieving high yields and planning in a holistic manner at the landscape scale are also shown to be crucial for balancing limitations and drivers associated with renewable bioenergy production.

  12. Projections of economic well-being for Social Security beneficiaries in 2022 and 2062.

    PubMed

    Butrica, Barbara A; Cashin, David B; Uccello, Cori E

    Policymakers considering potential changes to the Social Security program need to be able to assess how such changes would affect the economic well-being of future retirees. The first step to understanding these effects is to determine the well-being of future retirees under the current Social Security system. To this end, this article projects the retiree populations aged 62 or older in 2022 and 2062 using the Social Security Administration's MINT (Modeling Income in the Near Term) model and assesses their well-being. Because no one measure can fully capture whether future retirees will have adequate resources to meet their needs, we employ several indicators to assess retirement prospects. In addition, because current-law Social Security promises cannot be financed from current-law taxes, we project an alternative 2062 baseline that adjusts Social Security benefits downward to reflect the amounts that current-law taxes can support. Our results illustrate the importance of using several measures when assessing the well-being of future Social Security beneficiaries. When using absolute measures, retirement well-being will improve for Social Security beneficiaries in 2062 compared with those in 2022. Median per capita income of Social Security beneficiaries is projected to increase by a third (in real terms) between 2022 and 2062, with a corresponding decline in projected poverty rates. In addition, median financial wealth will increase between 2022 and 2062. Relative measures of well-being, however, suggest a decline in well-being between Social Security beneficiaries in 2022 and those in 2062. The share of beneficiaries who have low income relative to their peers, measured as the share whose income-to-needs ratio is less than half of the median ratio, will increase over time. In addition, income replacement rates are projected to fall between 2022 and 2062, indicating a decline in how well-being during retirement compares with that during the working years. And

  13. The contemporary dynamics of Sino-Indian relations: Examining maritime security, economics, energy and elite dialogue

    NASA Astrophysics Data System (ADS)

    Athwal, Amardeep

    This dissertation examines the modern-day dynamics of the Sino-Indian relationship---with a particular focus on issues relating to maritime security, economics, energy and elite bilateral dialogue. In exploring the contemporary nature of the Sino-Indian relationship, the dissertation also seeks to assess the accuracy of predominant neorealist accounts of the Sino-Indian relationship. Since the 1962 Sino-Indian War, most analysts have continued to emphasize the conflictual and competitive elements within the Sino-Indian relationship. The dissertation first explores the crucial post-independence history of Sino-Indian relations to provide the appropriate contextual background (chapter one). Thereafter, the dissertation explores the geopolitical significance of the Indian Ocean in light of soaring (global) energy demands. This then leads into an analysis of China and India's naval modernization and China's strategic partnership with Pakistan and Myanmar (chapter two). While acknowledging the credibility of neorealist insights in the realm of maritime security by detailing China and India's naval buildup and naval strategy, overall, it is found that the security dilemma argument is overstated. There is both a lack of threat perception and the existence of alternate explanations for both Chinese and Indian activities in Southern Asia. The dissertation then moves on to explore the positive elements within the Sino-Indian relationship---growing economic interdependence, energy convergence and elite consensus. In the economic realm (chapter three) it is found that Sino-Indian bilateral trade is increasingly being framed institutionally and rapidly expanding every year. The areas where the Sino-Indian economic relationship could be fruitfully expanded are traced and the great potential of bilateral trade is discussed. Thereafter, the dissertation highlights how China and India are beginning to coordinate energy policy (chapter four) as well as the growing political will

  14. Family Influences on the Achievement of Economically Disadvantaged Students: Implications for Gifted Identification and Programming. Research Monograph 95206.

    ERIC Educational Resources Information Center

    Hunsaker, Scott L.; And Others

    This review of the literature looks at family influences on the achievement of economically disadvantaged youth, with an emphasis on relationships among families, academic achievement, and gifted education. Theoretical perspectives on the study of families have focused primarily on families as static systems and families as dynamic systems and,…

  15. Who Are the Most Disadvantaged? Factors Associated with the Achievement of Students with Low Socio-Economic Backgrounds

    ERIC Educational Resources Information Center

    Bellibas, Mehmet Sükrü

    2016-01-01

    Analysis of the relationship between socio-economic status (SES) and student achievement has been prevalent in the literature, yet research focusing on the association between factors and the achievement of school populations with distinct categories of SES is limited. The purpose of the present study was to investigate various relevant student,…

  16. The policy of import substitution as the basis for economic security and well-being of society

    NASA Astrophysics Data System (ADS)

    Makasheva, Yu S.; Makasheva, N. P.; Gromova, A. S.; Andreeva, N. V.; Ishtunov, S. A.

    2016-09-01

    The study presents the analysis of import substitution opportunities on separate branches of economic activity, preceding the realization of import substitution policy with the aim to support national economic security, which is essential for the contemporary society welfare insurance. Currently, social well-being is considered to be the reflection of economic activity, the instrument of state influence on the society, as well as an indicator of the social security system. Due to the fact that Russia is integrated into the world economy, the foreign-economic policy currently is playing an important role in the development of national security and the state's interest to the spheres of economy considering external and internal threats. Decline in external economic conditions may result in serious consequences for the functioning and development of the country as well as for the trade and investment activities, which will further lead to the decline in export, withdrawal of capital, recession of industrial production, trade and investment sphere, fall of GDP and living standards. Thus, considering the current state of instability in the world economy and the growing political tension in relation to Russian Federation, the measures to increase economic security in the country should be taken. The policy of import substitution is considered to be one of the major solutions nowadays.

  17. Child Self-Regulation, Parental Secure Base Scripts, and At-Risk Kindergartners' Academic Achievement

    ERIC Educational Resources Information Center

    McLear, Caitlin; Trentacosta, Christopher J.; Smith-Darden, Joanne

    2016-01-01

    Research Findings: Early reading and mathematics skills predict later academic success, and child self-regulation and secure parent-child relationships are both predictors of early academic skills. Self-regulatory and family relationship factors have rarely been studied together as predictors of early academic success in populations of young…

  18. Achieving Reasonable Campus Security. Self-Regulation Initiatives: Resource Documents for Colleges and Universities, No. 2.

    ERIC Educational Resources Information Center

    American Council on Education, Washington, DC.

    Steps colleges can take to minimize the likelihood of violent crime on campuses are recommended, and administrative responsibilities are identified. Important basics are to inform campus members about security risks and about procedures for summoning aid during an emergency. While attending to educational values, colleges should consider whether…

  19. Creating conditions for greater private sector participation in achieving contraceptive security.

    PubMed

    Sharma, Suneeta; Dayaratna, Varuni

    2005-03-01

    The growing gap between donor/government funding and the expected need for contraceptives is an issue of great concern for most developing countries. Addressing this resource shortfall, and meeting the goals of contraceptive security requires that countries mobilize the full and active participation of the private sector in the contraceptive market. Private sector involvement will not only increase the resource base available for contraceptives, it can also free up scarce donor and government resources to serve those who have the greatest need for public subsidies. This paper provides an overview of policy processes, strategies, and tools that can be used in developing countries to create an enabling environment for greater private sector participation, foster complementary public-private sector roles, and enhance the contribution of the private sector to contraceptive security.

  20. Minimalist Medical Diplomacy - Do Engagements Achieve US National Strategy Global Health Security Objectives?

    DTIC Science & Technology

    2015-04-01

    Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 i    Disclaimer The views...Health Initiatives GHS Global Health Security HA Humanitarian Assistance HE Health Engagement HN Host Nation HSS Health Services Support

  1. The Cooperative Monitoring Center: Achieving cooperative security objectives through technical collaborations

    SciTech Connect

    Pregenzer, A.

    1996-08-01

    The post cold war security environment poses both difficult challenges and encouraging opportunities. Some of the most difficult challenges are related to regional conflict and the proliferation of weapons of mass destruction. New and innovative approaches to prevent the proliferation of weapons of mass destruction are essential. More effort must be focused on underlying factors that motivate countries to seek weapons of mass destruction. Historically the emphasis has been on denial: denying information, denying technology, and denying materials necessary to build such weapons. Though still important, those efforts are increasingly perceived to be insufficient, and initiatives that address underlying motivational factors are needed. On the opportunity side, efforts to establish regional dialogue and confidence-building measures are increasing in many areas. Such efforts can result in cooperative agreements on security issues such as border control, demilitarized zones, weapons delivery systems, weapons of mass destruction free zones, environmental agreements, and resource sharing. In some cases, implementing such cooperative agreements will mean acquiring, analyzing, and sharing large quantities of data and sensitive information. These arrangements for ``cooperative monitoring`` are becoming increasingly important to the security of individual countries, regions, and international institutions. However, many countries lack sufficient technical and institutional infrastructure to take full advantage of these opportunities. Constructing a peaceful twenty-first century will require that technology is brought to bear in the most productive and innovative ways to meet the challenges of proliferation and to maximize the opportunities for cooperation.

  2. Comparative Strategies of the Black and "Chicano" Movements in Achieving Economic and Social Justice.

    ERIC Educational Resources Information Center

    1976

    Frequently references to spokesmen and issues of the Chicano movement for social and economic equality refer to prior experiences of the black American mass social movement. Through examining both mass social movements, it becomes obvious that exact comparisons are misleading. Numerous similarities in economic, social, and political suppression…

  3. Pod Learning: Student Groups Create Podcasts to Achieve Economics Learning Goals

    ERIC Educational Resources Information Center

    Moryl, Rebecca L.

    2016-01-01

    In this article, the author describes a group project to create student-generated podcasts on economics topics. This project provides an innovative opportunity for students to demonstrate proficiency in skills required for the undergraduate economics major and valued in the professional marketplace. Results of a student self-assessment survey on…

  4. Teachers' Teaching Practice and Student Achievement in Basic Economics--A Comparison in Two Types of Schools in Malaysia

    ERIC Educational Resources Information Center

    Singh, Termit Kaur Ranjit; Krishnan, Sashi Kala

    2014-01-01

    The purpose of this study is to compare teachers' teaching practice based on students' perception towards achievement in the subject of Basic Economics between two different types of secondary schools in Malaysia, the National Secondary Schools (SMK) and Chinese National Type Secondary Schools (SMJK) in the state of Penang, Malaysia. The…

  5. Closing the Achievement Gap: A Summer School Program to Accelerate the Academic Performance of Economically Disadvantaged Students

    ERIC Educational Resources Information Center

    Gonzalez, Ramon Michael

    2013-01-01

    With the increasing disparity in educational outcomes among economically and racially different groups of students, summer school has received attention from school reformers as a means to close the achievement gap. Given the interest in this topic by educators, researchers, and policymakers, there is little research on the impact of summer school…

  6. The Influence of Gender, School Location and Socio-Economic Status on Students' Academic Achievement in Mathematics

    ERIC Educational Resources Information Center

    Alordiah, Caroline Ochuko; Akpadaka, Grace; Oviogbodu, Christy Oritseweyimi

    2015-01-01

    The study investigated the influence of gender, school location, and socio-economic status (SES) on students' academic achievement in mathematics. The study was an ex-post factor design in which the variables were not manipulated nor controlled. Four research questions and three hypotheses were formulated to guide the study. The stratified random…

  7. The Impact of School Climate on the Achievement of Elementary School Students Who Are Economically Disadvantaged a Quantitative Study

    ERIC Educational Resources Information Center

    Smallwood, Gina W.

    2014-01-01

    The purpose of this research was to explore the impact of school climate on the achievement of third and fourth grade students who are economically disadvantaged in Mathematics and Reading/Language Arts. Students' perception of school climate was studied using the "Tripod Survey" variables of a caring, captivating, and academically…

  8. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  9. Achieving thermography with a thermal security camera using uncooled amorphous silicon microbolometer image sensors

    NASA Astrophysics Data System (ADS)

    Wang, Yu-Wei; Tesdahl, Curtis; Owens, Jim; Dorn, David

    2012-06-01

    Advancements in uncooled microbolometer technology over the last several years have opened up many commercial applications which had been previously cost prohibitive. Thermal technology is no longer limited to the military and government market segments. One type of thermal sensor with low NETD which is available in the commercial market segment is the uncooled amorphous silicon (α-Si) microbolometer image sensor. Typical thermal security cameras focus on providing the best image quality by auto tonemaping (contrast enhancing) the image, which provides the best contrast depending on the temperature range of the scene. While this may provide enough information to detect objects and activities, there are further benefits of being able to estimate the actual object temperatures in a scene. This thermographic ability can provide functionality beyond typical security cameras by being able to monitor processes. Example applications of thermography[2] with thermal camera include: monitoring electrical circuits, industrial machinery, building thermal leaks, oil/gas pipelines, power substations, etc...[3][5] This paper discusses the methodology of estimating object temperatures by characterizing/calibrating different components inside a thermal camera utilizing an uncooled amorphous silicon microbolometer image sensor. Plots of system performance across camera operating temperatures will be shown.

  10. Energy Market and Economic Impacts of H.R. 2454, the American Clean Energy and Security Act of 2009

    EIA Publications

    2009-01-01

    This report responds to a request from Chairman Henry Waxman and Chairman Edward Markey for an analysis of H.R. 2454, the American Clean Energy and Security Act of 2009 (ACESA). ACESA, as passed by the House of Representatives on June 26, 2009, is a complex bill that regulates emissions of greenhouse gases through market-based mechanisms, efficiency programs, and economic incentives.

  11. Energy Market and Economic Impacts of S.2191, the Lieberman-Warner Climate Security Act of 2007

    EIA Publications

    2008-01-01

    This report responds to a request from Senators Lieberman and Warner for an analysis of S.2191, the Lieberman-Warner Climate Security Act of 2007. S.2191 is a complex bill regulating emissions of greenhouse gases through market- based mechanisms, energy efficiency programs, and economic incentives.

  12. National Defense Education and Innovation Initiative: Meeting America's Economic and Security Challenges in the 21st Century

    ERIC Educational Resources Information Center

    Association of American Universities, 2006

    2006-01-01

    The Association of American Universities (AAU) calls on the Administration, Congress, and academia, with the help of the business sector, to implement a 21st Century National Defense Education and Innovation Initiative aimed at meeting the economic and security challenges we will face over the next half-century. Government and America's…

  13. Men in Limbo: Former Students with Special Educational Needs Caught between Economic Independence and Social Security Dependence

    ERIC Educational Resources Information Center

    Skjong, Gerd; Myklebust, Jon Olav

    2016-01-01

    Individuals in their mid-thirties are expected to be employed and economically independent. However, people with disabilities and health problems--for example, former students with special educational needs (SEN)--may have problems in this domain of adult life. In Norway, individuals with SEN frequently rely on social security and support measures…

  14. Bringing home the right to food in Canada: challenges and possibilities for achieving food security.

    PubMed

    Rideout, Karen; Riches, Graham; Ostry, Aleck; Buckingham, Don; MacRae, Rod

    2007-06-01

    We offer a critique of Canada's approach to domestic food security with respect to international agreements, justiciability and case law, the breakdown of the public safety net, the institutionalisation of charitable approaches to food insecurity, and the need for 'joined-up' food and nutrition policies. We examined Canada's commitments to the right to food, as well as Canadian policies, case law and social trends, in order to assess Canada's performance with respect to the human right to food. We found that while Canada has been a leader in signing international human rights agreements, including those relating to the right to food, domestic action has lagged and food insecurity increased. We provide recommendations for policy changes that could deal with complex issues of state accountability, social safety nets and vulnerable populations, and joined-up policy frameworks that could help realise the right to adequate food in Canada and other developed nations.

  15. The role of underutilized fruits in nutritional and economic security of tribals: a review.

    PubMed

    Nandal, Urvashi; Bhardwaj, Raju Lal

    2014-01-01

    The tribal people of Rajasthan are severely malnourished along with multiple nutrient-deficiency disorders due to ignorance about importance of fruits and vegetables in their diets. The tribal areas are full of biodiversity having natural vegetation which is not harnessed fully. Due to which a wide gap is formed between health and optimal use of natural sources of nutrients, i.e., underutilized crops. The crops, which are neither grown commercially on large scale nor traded widely, may be termed as underutilized horticultural crops. These crops are cultivated, traded, and consumed locally. These crops have many advantages like easier to grow and hardy in nature, producing a crop even under adverse soil and climatic conditions. So, exploitation of underutilized horticultural crops can become a solution to the social problem of health and nutrition insecurity, poverty, and unemployment. The consumption of underutilized fruit crops can provide nutrition to the poor and needy tribals by meeting the nutrient requirements of vulnerable groups. As underutilized fruits, nuts, and vegetables are a rich of source of carbohydrates, fats, proteins, energy, vitamins-A, B1, B2, B3, B6, B9, B12, C, folic acid, and minerals-Ca, P, Fe, and dietary fiber. Thus, they have the nutritional capacity to prevent and cure various diseases like kwashiorkor, marasmus, night blindness, anemia, diabetes, cancer, hypertension, and hidden hunger. It is also established fact that seasonal, locally available, and cheap fruits and vegetables can also keep the population healthy and nutritionally secure rather than costly off-season ones. Also, the underutilized crops have the potential to give economic security to tribals by giving employment and by fetching good returns from their sale in raw form as well as value-added products.

  16. Components of Achievement Motivation as Predictors of Potential for Economic Change, Volume I.

    ERIC Educational Resources Information Center

    Veroff, Joseph; And Others

    The major goal of this research study was the identification and validation of measures of components of personal achievement orientations that can be used in the job training program context. The guiding conceptions for the research were based on Atkinson's theory of achievement motivation, Gurin's investigations of expectancies, and measurement…

  17. Literacy Achievement and Economic Health: A Correlative Review of National and International Data

    ERIC Educational Resources Information Center

    Stephens, Monica Fadel

    2012-01-01

    In the face of global economic recession, the competition and collaboration for innovation and future growth among nations has led to discussions of how young people are being prepared to become the next generation of workers and leaders. Although the U.S. has enjoyed a strong presence among the international community since the turn of the…

  18. Schooling Achievement among Rural Zimbabwean Children during a Period of Economic Turmoil

    ERIC Educational Resources Information Center

    Larochelle, Catherine; Alwang, Jeffrey; Taruvinga, Nelson

    2016-01-01

    Zimbabwe suffered severe economic crisis in the decade before 2009, and anecdotal evidence indicates that public education suffered due to uncertainty about salary payments and inflation. As the country recovers, it is important to understand how this crisis affected schooling participation before and during the crisis. This study focuses on the…

  19. Disaggregation of Student Achievement in the Principles of Economics Course: Revised.

    ERIC Educational Resources Information Center

    Manahan, Jerry

    The purpose of this research was to estimate the educational production functions for students belonging to different subgroups in a principles of economics course. Three samples were used: (1) a large lecture class at a large state university (185 students), (2) several small sections taught by different instructors at a small private university…

  20. Apprenticeships and Regeneration: The Civic Struggle to Achieve Social and Economic Goals

    ERIC Educational Resources Information Center

    Fuller, Alison; Rizvi, Sadaf; Unwin, Lorna

    2013-01-01

    Apprenticeship has always played both a social and economic role. Today, it forms part of the regeneration strategies of cities in the United Kingdom. This involves the creation and management of complex institutional relationships across the public and private domains of the civic landscape. This paper argues that it is through closely observed…

  1. Solving the Principal - Agent Problem in Iraq: Economic Incentives Create a New Model for Security

    DTIC Science & Technology

    2007-12-01

    3 A. IRAQ’S ECONOMY AND INFRASTRUCTURE .......................................3 B . PRIVATIZATION...17 B . A DETERIORATING SECURITY SITUATION ......................................18 1. Inadequate Iraqi Security Forces...41 B . CZECH REPUBLIC......................................................................................42 C. POLAND

  2. How America can look within to achieve energy security and reduce global warming

    NASA Astrophysics Data System (ADS)

    Richter, Burton; Goldston, David; Crabtree, George; Glicksman, Leon; Goldstein, David; Greene, David; Kammen, Dan; Levine, Mark; Lubell, Michael; Savitz, Maxine; Sperling, Daniel; Schlachter, Fred; Scofield, John; Dawson, James

    2008-10-01

    The American Physical Society regularly produces reports on issues of public import that require technical understanding and for which an objective and authoritative analysis would be of particular use to the public and policy makers. This report, entitled Energy Future: Think Efficiency, is the latest in the series and appears here as a special supplement issue of Reviews of Modern Physics, as have other such reports. It is hard to imagine a more timely study topic, given the urgent environmental, geopolitical, and economic incentives for improving energy efficiency at this juncture. Energy Future: Think Efficiency provides a valuable and broadly applicable guide to effective approaches, many of which employ existing technologies and, surprisingly, need not be difficult or expensive. In order to have the most immediate impact, an earlier version of Energy Future: Think Efficiency was issued at a press release in Washington, D.C. in September of 2008 in hard copy and online. Prior to its release a distinguished review panel examined the report and its conclusions. Thus the study has been rigorously refereed although this was outside of the usual review process employed by RMP. Except for adjustments in pagination, this version is unchanged from the earlier version. The report introduction contains full information on the study personnel, review panel members, and other acknowledgments, so these are not repeated here. What is repeated is an expression of deep appreciation to all those involved in the preparation of a revelatory report on a topic of critical importance.

  3. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    PubMed

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.

  4. Integrating Economic and Social Policy: Good Practices from High-Achieving Countries. Innocenti Working Papers.

    ERIC Educational Resources Information Center

    Mehrotra, Santosh

    This paper examines the successes of 10 "high achievers," countries with social indicators far higher than might be expected, given their national wealth, pulling together the lessons learned for social policy in the developing world. The 10 countries identified are Costa Rica, Cuba, Barbados, Botswana, Zimbabwe, Mauritius, Kerala, Sri…

  5. School Socio-Economic Status and Student Socio-Academic Achievement Goals in Upper Secondary Contexts

    ERIC Educational Resources Information Center

    Berger, Nathan; Archer, Jennifer

    2016-01-01

    In recent years motivational researchers have spent considerable time examining race/ethnicity and gender differences in academic and social achievement goals, but little time examining the influence of socioeconomic status (SES). This lack of attention is surprising given that both student motivation and SES have been shown to predict academic…

  6. The Validity of Seven Easily Obtainable Economic and Demographic Predictors of Achievement Test Performance.

    ERIC Educational Resources Information Center

    May, Robert J., Jr.; And Others

    1978-01-01

    Seven easily obtainable background variables, such as number of persons, rooms, or cars per family dwelling; kindergarten attendance; and sex were found to have a multiple correlation of .52 with a standard achievement test for a large sample of fourth grade pupils in a metropolitan school district. (JKS)

  7. Racial identity, academic achievement, and the psychological well-being of economically disadvantaged adolescents.

    PubMed

    Arroyo, C G; Zigler, E

    1995-11-01

    The relation between racial identity and personal psychological functioning was examined within the framework of the "racelessness" construct proposed by Fordham and Ogbu (S. Fordham, 1988; S. Fordham & J. U. Ogbu, 1986). These researchers have proposed that academically successful African American students achieve their success by adopting behaviors and attitudes that distance them from their culture of origin, resulting in increased feelings of depression, anxiety, and identity confusion. Studies 1 and 2 describe the development of the Racelessness Scale (RS) designed to test these assumptions. Study 2 also investigated Race X Achievement level differences in students' responses to the RS. In Study 3, correlations between the RS and measures of depression, self-efficacy, anxiety, alienation, and collective self-esteem were assessed. The pattern of results in Study 2 suggest that the behaviors and attitudes described by Fordham and Ogbu are common to high-achieving adolescents and not specific to African Americans. However, racial differences in the pattern of associations between the RS and measures of depression suggest that racelessness may have important psychological consequences for African American adolescents.

  8. Nutritional and socio-economic determinants of cognitive function and educational achievement of Aboriginal schoolchildren in rural Malaysia.

    PubMed

    Al-Mekhlafi, Hesham M; Mahdy, Mohammed A; Sallam, Atiya A; Ariffin, W A; Al-Mekhlafi, Abdulsalam M; Amran, Adel A; Surin, Johari

    2011-10-01

    A community-based cross-sectional study was carried out among Aboriginal schoolchildren aged 7-12 years living in remote areas in Pos Betau, Pahang, Malaysia to investigate the potential determinants influencing the cognitive function and educational achievement of these children. Cognitive function was measured by intelligence quotient (IQ), while examination scores of selected school subjects were used in assessing educational achievement. Blood samples were collected to assess serum Fe status. All children were screened for soil-transmitted helminthes. Demographic and socio-economic data were collected using pre-tested questionnaires. Almost two-thirds (67·6 %) of the subjects had poor IQ and most of them (72·6 %) had insufficient educational achievement. Output of the stepwise multiple regression model showed that poor IQ was significantly associated with low household income which contributed the most to the regression variance (r2 0·059; P = 0·020). Low maternal education was also identified as a significant predictor of low IQ scores (r2 0·042; P = 0·043). With educational achievement, Fe-deficiency anaemia (IDA) was the only variable to show significant association (r2 0·025; P = 0·015). In conclusion, the cognitive function and educational achievement of Aboriginal schoolchildren are poor and influenced by household income, maternal education and IDA. Thus, effective and integrated measures to improve the nutritional and socio-economic status of rural children would have a pronounced positive effect on their education.

  9. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  10. Is water security necessary? An empirical analysis of the effects of climate hazards on national-level economic growth.

    PubMed

    Brown, Casey; Meeks, Robyn; Ghile, Yonas; Hunu, Kenneth

    2013-11-13

    The influence of climate and the role of water security on economic growth are topics of growing interest. Few studies have investigated the potential role that climate hazards, which water security addresses, and their cumulative effects have on the growth prospects for a country. Owing to the relatively stationary spatial patterns of global climate, certain regions and countries are more prone to climate hazards and climate variability than others. For example, El Nino/Southern Oscillation patterns result in greater hydroclimatic variability in much of the tropics than that experienced at higher latitudes. In this study, we use a precipitation index that preserves the spatial and temporal variability of precipitation and differentiates between precipitation maxima (e.g. floods) and minima (e.g. droughts). The index is a more precise instrument for hydroclimate hazards than that used in any previous studies. A fixed effects, for year and country, regression model was developed to test the influence of climate variables on measures of economic growth and activity. The results indicate that precipitation extremes (i.e. floods and droughts) are the dominant climate influences on economic growth and that the effects are significant and negative. The drought index was found to be associated with a highly significant negative influence on gross domestic product (GDP) growth, while the flood index was associated with a negative influence on GDP growth and lagged effects on growth. The flood index was also found to have a negative effect on industrial value added in contemporary and lagged regressions. Temperature was found to have little significant effect. These results have important implications for economic projections of climate change impacts. Perhaps more important, the results make clear that hydroclimatic hazards have measurable negative impacts, and thus lack of water security is an impediment to growth. In addition, adaptation strategies should recognize the

  11. The existential cost of economic insecurity: Threatened financial security undercuts meaning.

    PubMed

    Abeyta, Andrew A; Routledge, Clay; Kersten, Michael; Cox, Cathy R

    2016-12-14

    Financial security (i.e., a person's sense that they can afford the things they need now and in the foreseeable future) contributes to psychological health and well-being. In the present research, we explored the implications of financial security for perceptions of meaning in life. In Study 1, we found that perceptions of financial insecurity predicted perceptions of meaning in life above and beyond income. Further, income only predicted perceptions of meaning to the extent that it was associated with reduced financial insecurity. In Studies 2 and 3, we found that financial security threats undermined perceptions of meaning in life. Taken together, these studies suggest that maintaining financial security is important for a sense of meaning in life.

  12. Widows Waiting to Wed?: (Re)Marriage and Economic Incentives in Social Security Widow Benefits

    ERIC Educational Resources Information Center

    Brien Michael J.; Dickert-Conlin, Stacy; Weaver, David A.

    2004-01-01

    A widow(er) is only entitled to get the economic incentives benefits only after she/he attains the age of 60. The rate of remarriages before 60 for widow(er) is gradually going down resulting in marriages after the age of 60 to gain the economic benefits.

  13. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    DTIC Science & Technology

    2004-06-01

    International Aid …external resources reduce the costs both of reform and of doing nothing – that is avoiding reform. Rodrik , Dani [Ref. 8] Based on...8. Rodrik , Dani . Understanding Economic Policy Reform. Journal of Economic Literature, Vol. XXXIV (March 1996), pp. 9-41. 9. Economist, 4 January

  14. The Social and Economic Security of International Students: A New Zealand Study

    ERIC Educational Resources Information Center

    Sawir, Erlenawati; Marginson, Simon; Nyland, Chris; Ramia, Gaby; Rawlings-Sanaei, Felicity

    2009-01-01

    International education has generated complex problems of governance. As well as being beneficiaries of educational services and consumers of a product, international students are also migrants, workers and beings with civil rights. Arguably, the regulation of international student security as consumer protection fails to recognize this full range…

  15. Global Climate Change - U.S. Economic and National Security Opportunity

    DTIC Science & Technology

    2009-03-20

    and politicians have become increasingly convinced that global warming is occurring and that the effects of it may increase social-economic tensions...conclusions on man-made global warming . As a scientist, she remains skeptical and is concerned that the argument for anthropogenic increase of greenhouse... globalization and technology advancements have also proven that resource management can be a great source for increasing economic interests. A 2006 report

  16. The Economic Health of the Airline Industry and Its Impact on National Security

    DTIC Science & Technology

    1993-04-01

    aerospace industry to create a more favorable economic environment for them. Second, the Government must sponsor development of an aircraft that will make...cost of any product. 24 Nawal K. Taneja (author of The U.S. Airfreight Industry ) has developed the Total Distribution Cost concept, which considers all...aerospace industry to create a more favorable economic environment for them. Second, the Government must sponsor development of an aircraft that will make

  17. The Impact of Teacher-Student Relationships and Achievement Motivation on Students' Intentions to Dropout According to Socio-Economic Status

    ERIC Educational Resources Information Center

    Bergeron, Julie; Chouinard, Roch; Janosz, Michel

    2011-01-01

    The main goal was to test if teacher-student relationships and achievement motivation are predicting dropout intention equally for low and high socio-economic status students. A questionnaire measuring teacher-student relationships and achievement motivation was administered to 2,360 French Canadian secondary students between 12 and 15 years old…

  18. The economic burden of musculoskeletal disorders on the Italian social security pension system estimated by a Monte Carlo simulation.

    PubMed

    Russo, S; Mariani, T T; Migliorini, R; Marcellusi, A; Mennini, F S

    2015-09-16

    The aim of the study is to estimate the pension costs incurred for patients with musculoskeletal disorders (MDs) and specifically with rheumatoid arthritis (RA) and ankylosing spondylitis (AS) in Italy between 2009 and 2012. We analyzed the database of the Italian National Social Security Institute (Istituto Nazionale Previdenza Sociale i.e. INPS) to estimate the total costs of three types of social security benefits granted to patients with MDs, RA and AS: disability benefits (for people with reduced working ability), disability pensions (for people who cannot qualify as workers) and incapacity pensions (for people without working ability). We developed a probabilistic model with a Monte Carlo simulation to estimate the total costs for each type of benefit associated with MDs, RA and AS. We also estimated the productivity loss resulting from RA in 2013. From 2009 to 2012 about 393 thousand treatments were paid for a total of approximately €2.7 billion. The annual number of treatments was on average 98 thousand and cost in total €674 million per year. In particular, the total pension burden was about €99 million for RA and €26 million for AS. The productivity loss for AR in 2013 was equal to €707,425,191 due to 9,174,221 working days lost. Our study is the fi rst to estimate the burden of social security pensions for MDs based on data of both approved claims and benefits paid by the national security system. From 2009 to 2012, in Italy, the highest indirect costs were associated with disability pensions (54% of the total indirect cost), followed by disability benefits (44.1% of cost) and incapacity pensions (1.8% of cost). In conclusion, MDs are chronic and highly debilitating diseases with a strong female predominance and very significant economic and social costs that are set to increase due to the aging of the population.

  19. Social Security. Little Success Achieved in Rehabilitating Disabled Beneficiaries. Report to the Chairman, Subcommittee on Social Security, Committee on Ways and Means, House of Representatives.

    ERIC Educational Resources Information Center

    General Accounting Office, Washington, DC. Div. of Human Resources.

    The relationship between the Social Security Disability Insurance (SSDI) Program and vocational rehabilitation (VR) programs was reviewed. Focus was on the extent to which VR services are successful in returning SSDI beneficiaries to productive employment. The review was carried out in 10 states with widely varying practices in referring SSDI…

  20. Working Hard, Falling Short: America's Working Families and the Pursuit of Economic Security

    ERIC Educational Resources Information Center

    Waldron, Tom; Roberts, Brandon; Reamer, Andrew

    2004-01-01

    The United States of America is often called the "land of opportunity," a place where hard work and sacrifice lead to economic success. Across generations, countless families have been able to live out that promise. However, more than one out of four American working families now earn wages so low that they have difficulty surviving…

  1. Transformative World Language Learning: An Approach for Environmental and Cultural Sustainability and Economic and Political Security

    ERIC Educational Resources Information Center

    Goulah, Jason

    2008-01-01

    In this article, the author responds to the Modern Language Association's report, "Foreign Languages and Higher Education: New Structures for a Changed World" (2007) by arguing for an explicit and interdisciplinary transformative world language learning approach toward environmental and cultural sustainability and economic and political…

  2. The North Carolina Department of Commerce: a healthy workforce promotes economic security.

    PubMed

    Smith, Libby; Morck, John

    2012-01-01

    To thrive economically, North Carolina needs a healthy, productive workforce. The public and private sectors should collaborate on the prevention and management of chronic diseases, which significantly impact the state's economy. Evidence-based prevention strategies should be prioritized, and communities should be designed with public health considerations in mind.

  3. Economics.

    PubMed

    Palley, Paul D; Parcero, Miriam E

    2016-10-01

    A review of literature in the calendar year 2015 dedicated to environmental policies and sustainable development, and economic policies. This review is divided into these sections: sustainable development, irrigation, ecosystems and water management, climate change and disaster risk management, economic growth, water supply policies, water consumption, water price regulation, and water price valuation.

  4. Regional Security in Latin America: U.S. Economic and Military Options

    DTIC Science & Technology

    1993-03-10

    the danger of regression increases. President Salinas de Gortari of Mexico said "We know that any economic reform takes time and demands sacrifices...attempt, a poll indicated that 81 percent had little or no confidence in President Carlos Andr~s Perez. They were reacting to rising prices, falling...single party system. Without effective political opposition, President Salinas has been able to continue the policies initiated by his predecessor

  5. Economics definitions, methods, models, and analysis procedures for Homeland Security applications.

    SciTech Connect

    Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

    2010-01-01

    This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation & Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

  6. Pakistan’s Economic and Security Dilemma: Expanded Defence Expenditures and the Relative Governance Syndrome

    DTIC Science & Technology

    2008-03-01

    higher governance countries, defence expenditures can have a positive impact on economic growth (Table 7). Table 6. Anticipated defence spending in high...predicted expenditures , conditional on governance structures. Low defence spending countries can obtain positive benefits from defence by cutting back...that obtains no positive benefit from their low level of defence. On the other hand, if low defence spending countries can cut back their expenditures

  7. Latin American Special Economic Zones and Their Impacts on Regional Security

    DTIC Science & Technology

    2011-06-01

    26 David E . Apter, The Politics of Modernization (Chicago: University of Chicago Press, 1965), 481. 16 At no period was neo-liberal economics and...Illegality in South America.” New Voices Series, no. 6, October 6, 2010. Apter, David E . The Politics of Modernization. Chicago: University of Chicago...purpose of enhancing trade. Indeed, arguments for trade and its benefits in creating economies of scale go back as far as David Ricardo’s, “Principles

  8. Economics.

    ERIC Educational Resources Information Center

    James, L. D.

    1978-01-01

    Presents a literature review of the economic aspects of water pollution control covering publications of 1976-77. This review also includes the policy issues of water management. A list of 77 references is presented. (HM)

  9. Factors associated with condom use: economic security and positive prevention among people living with HIV/AIDS in the Caribbean.

    PubMed

    Allen, C F; Simon, Y; Edwards, J; Simeon, D T

    2010-11-01

    In the Caribbean region, an estimated 1.1% of the population aged 15-49 is living with HIV. We aimed to measure factors associated with condom use, the primary form of positive prevention in the Caribbean, among people living with HIV (PLHIV) in its major agency advocating on behalf of PLHIV (the Caribbean Regional Network of People Living with HIV/AIDS, or CRN +). Condom use at last sex was selected for analysis from a broad-ranging cross-sectional survey (n=394) among PLHIV who were members of or received services from CRN+ in Antigua and Barbuda, Grenada, Trinidad and Tobago. PLHIV from CRN+ traced potential participants, administered informed consent procedures and carried out structured interviews. Fifty-four percent of respondents reported using a condom the last time they had sex. Condom use was positively associated with partner being HIV negative, disclosure of HIV status, alcohol use, economic security, education level and being employed. Multivariate logistic regression found independent associations between condom use and economic security (p=0.031; odds ratio (OR) for "enough" income 5.06; 95% CI 1.47-17.39), partner being HIV negative (p=0.036; OR 2.85; 95% CI 1.28-6.33) and being married (p=0.043; OR 2.86; 95% CI 1.03-7.91). Seventy-three percent of respondents reported inadequate family income, 26% reported an HIV-negative partner and 9% were married. Condom use appears to be motivated by protection of HIV-negative partners and spouses. Low socioeconomic status is associated with the overall percentage using condoms. Restriction to members of CRN+ limits generalisability of the findings. Nevertheless, the findings support the view that programmes for the socioeconomic empowerment of PLHIV are needed to slow the Caribbean HIV epidemic. Expectations for protection of different types of partners should be further explored in order to develop culturally appropriate interventions with couples.

  10. Economic security, informational resources, and women's reproductive choices in urban Mozambique.

    PubMed

    Agadjanian, V

    1998-01-01

    Reproductive changes in sub-Saharan Africa are contingent upon women's socioeconomic conditions and informational and cultural resources. This study focuses on socioeconomic and cultural determinants and correlates of the intention to stop childbearing and of contraceptive use among urban women in Mozambique. It uses data from a survey of 1,585 married women conducted in Greater Maputo in 1993, and it employs logistic regression for multivariate analysis. The results of the analysis indicate that although the stopping intention and contraceptive use are interrelated and similarly affected by such factors as education or the area of residence, the intention to stop childbearing is mainly driven by women's perception of their material conditions and socioeconomic security, while contraceptive use is largely a product of social diffusion and the legitimization of innovative, Western-origin information and technologies. The study proposes that these findings may help explain the unique features of the fertility transition in sub-Saharan Africa.

  11. Water security, risk and economic growth: lessons from a dynamical systems model

    NASA Astrophysics Data System (ADS)

    Dadson, Simon; Hall, Jim; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2016-04-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been a noteworthy feature in the development of most civilisations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple sectors of the economy, especially those that are water intensive such as agriculture and energy; and (ii) by reducing the acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate these risks in order to promote economic growth is widely acknowledged, but prior work to conceptualise the relationship between water-related risks and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical model of water-related investment, risk, and growth at the national level. The model suggests the existence of a context-specific threshold above which growth proceeds along an 'S'-curve. In many cases there is a requirement for initial investment in water-related assets to enable growth. Below the threshold it is possible for a poverty trap to arise. The presence and location of the poverty trap is context-specific and depends on the relative exposure of productive water-related assets to risk, compared with risks faced by assets in the wider economy. Exogenous changes in the level of water-related risk (through, for example, climate and land cover change) can potentially push an economy away from a growth path towards a poverty trap. These results illustrate the value of accounting for environmental risk in models of economic growth and may offer guidance in the design of robust policies for investment in water-related productive assets to manage risk, particularly in the face of global and regional environmental change.

  12. Five States' Innovative Approaches to Welfare: Promoting Economic Security among America's Poor.

    ERIC Educational Resources Information Center

    Tufts Univ., Medford, MA. Center on Hunger, Poverty and Nutrition Policy.

    The Family Support Act of 1988 and the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 provided the basis for a comprehensive reform of welfare programs. This document provides examples of how five states have chosen to implement new provisions in their welfare programs to aid families in achieving greater economic…

  13. Economic and Security Reasons Why the U.S. Should Normalize Relations with Cuba

    DTIC Science & Technology

    2008-06-01

    chapter], a refusal to allow Castro to blackmail the United States with the threat of unleashing a wave of Cuban refugees to the U.S., the wrongful...9 Joaquín Roy, “ Cuba , the United States , and the Helms-Burton Doctrine,” Gainesville: The University...the U.S. current foreign policy toward Cuba will not achieve its stated objective of the end of the Castro regime and a democratic Cuba . Additionally

  14. Economics.

    ERIC Educational Resources Information Center

    Kemp, Rodger

    This course presents basic economic concepts and explores issues such as how goods and services are produced and distributed, what affects costs and profits, and how wealth is spread around or concentrated. The course is designed to be used with students enrolled in an adult high school diploma program; course content is appropriate to meet social…

  15. Fifty Years of Social Security: Past Achievements and Future Challenges. An Information Paper Prepared for Use by the Special Committee on Aging. United States Senate, Ninety-Ninth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Special Committee on Aging.

    This document contains six essays examining the history and impact of the social security program on America's economic and social development. "Social Security: The Cornerstone of American Social Welfare Policy," by Malcolm H. Morrison, presents brief background information on the system and discusses the basic principles of social…

  16. Collaborating To Serve Arizona Students & Families More Effectively: Phase 1 Report. Evaluation of Murphy School District-Department of Economic Security Collaborative Project.

    ERIC Educational Resources Information Center

    Izu, Jo Ann; Carreon, Tori

    This report presents the results of Phase I of an evaluation of the Murphy School District (MSD)-Department of Economic Security (DES) collaborative effort, one of the first interagency partnerships in the state of Arizona that attempts to address the needs of students and their families more effectively. The primary purposes of the evaluation are…

  17. Indicators of Children's Well-Being: Conference Papers. Child Health, Education, and Economic Security. Volume II. Special Report Series. Special Report Number 60b.

    ERIC Educational Resources Information Center

    Wisconsin Univ., Madison. Inst. for Research on Poverty.

    This volume groups papers discussing indicators of children's well-being into three areas: child health, education, and economic security. Papers concerning child health include: (1) "Prenatal and Infant Health Indicators" (Paula Lantz and Melissa Partin); (2) "Health Indicators for Preschool Children (Ages 1-4)" (Barbara L.…

  18. The Relations of a School's Capacity for Institutional Diversity to Student Achievement in Socio-Economically, Ethnically, and Linguistically Diverse Schools

    ERIC Educational Resources Information Center

    Min, Sookweon; Goff, Peter T.

    2016-01-01

    This study examines how a school's capacity for institutional diversity relates to student achievement in socio-economically, ethnically, and linguistically diverse schools. It also investigates whether various student groups benefit differently from a school's level of student diversity and its institutional capacity for diversity. Using data…

  19. The Economic Benefits of Closing Educational Achievement Gaps: Promoting Growth and Strengthening the Nation by Improving the Educational Outcomes of Children of Color

    ERIC Educational Resources Information Center

    Lynch, Robert G.; Oakford, Patrick

    2014-01-01

    Our nation is currently experiencing growing levels of income and wealth inequality, which are contributing to longstanding racial and ethnic gaps in education outcomes and other areas. This report quantifies the economic benefits of closing one of the most harmful racial and ethnic gaps: the educational achievement gap that exists between black…

  20. Relationship Between Locus of Control Scores and Reading Achievement of Black and White Second Grade Children from Two Socio-Economic Levels.

    ERIC Educational Resources Information Center

    Shaw, Ralph L.; Uhl, Norman P.

    This study investigates the effect of socio-economic level (lower and upper-middle), race (black and white), and sex on locus of control of reinforcement scores, and the relationship between the latter scores and reading achievement in a sample of 211 second grade children. A stratified random sampling technique insured adequate levels of each…

  1. The Interaction of Logical Reasoning Ability and Socio-Economic Status on Achievement in Genetics among Secondary School Students in Nigeria

    ERIC Educational Resources Information Center

    Okoye, Nnamdi S.; Okecha, Rita Ebele

    2008-01-01

    The study examined the interaction of logical reasoning ability (cognitive development) and socio-economic status on achievement in genetics amongst secondary school students in Nigeria. Factorial Analysis of variance design with one dependent variable and two independent variables at two levels together with the t-test was used in the analysis of…

  2. Teacher Self-Efficacy Enhancement and School Location: Implication for Students' Achievement in Economics in Senior Secondary School in Ibadan, Oyo State, Nigeria

    ERIC Educational Resources Information Center

    Durowoju, Esther O.; Onuka, Adams O. U.

    2015-01-01

    The paper investigated the effect of teacher self-efficacy enhancement and school location on students' achievement in Economics in Senior Secondary School in Ibadan Metropolis of Oyo State, Nigeria. Three hypotheses were tested at 0.05 level of significance. Multi-stage sampling technique was adopted in the study. Four Local Government Areas (two…

  3. Associations between Students' Perceptions of Teacher-Student Relationship Quality, Academic Achievement, and Classroom Behavior: Are They Moderated by Ethnicity, Gender, or Socio Economic Status?

    ERIC Educational Resources Information Center

    Gill, Khushwinder Kaur

    2012-01-01

    The primary purpose of this study was to explore the correlations between students' perceptions of their relationships with teachers, students' academic achievement and students' classroom behavior. A secondary purpose of the study was to investigate if students' ethnicity, gender and socio-economic status moderate the…

  4. Medico-economic evaluation of health products in the context of the Social Security Financing Act for 2012.

    PubMed

    Dervaux, Benoît; Baseilhac, Eric; Fagon, Jean-Yves; Ameye, Véronique; Angot, Pierre; Audry, Antoine; Becquemont, Laurent; Borel, Thomas; Cazeneuve, Béatrice; Courtois, Jocelyn; Detournay, Bruno; Favre, Pascal; Granger, Muriel; Josseran, Anne; Lassale, Catherine; Louvet, Olivier; Pinson, Jean; de Pouvourville, Gérard; Rochaix, Lise; Rumeau-Pichon, Catherine; de Saab, Rima; Schwarzinger, Mickaël; Sun, Aristide

    2013-01-01

    The participants in round table 6 of the Giens Workshops 2012 drafted recommendations based on the collective interpretation of important elements of the decree concerning the medico-economic evaluation of health products published a few days earlier (02 October 2012). The medico-economic evaluation (MEE), becomes an additional determinant for fixing the prices of health products by the Health products economic committee (Comité économique des produits de santé, CEPS) via the hierarchisation of treatment strategies, and thus modifies the market access conditions. Limiting the analysis to medicinal products and medical devices for which a major, important or moderate improvement in the medical service rendered (ASMR) or of the expected service (ASA) has been requested and presenting a significant budget impact on the Social Security expenses, excludes health products with ASMR or ASA with a lower level requested which often create complex price fixing problems and often have a major budget impact. This latter concept remains to be defined in detail. The MEE envisaged for the first registration must include the need to confirm or refute the initial hypotheses especially concerning the actual position in the therapeutic strategy at the time of renewal of the registration. For the first registration, the conventional reference to European prices guaranteeing a minimum price to innovative medicinal products, the medico-economic models submitted by the industry to the French Drug Authority (Haute autorité de santé, HAS) must be used to guide the compilation of new data to be requested at the time of the registration renewal and to negotiate the level of the discounts in the framework of a price-volume agreement, if applicable. The MEE will allow comparing the result of the analysis to the model hypothesis at the time of the renewal of the registration, which may contribute to the renegotiation (either up or down) of the price of health goods. The costs related to

  5. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    PubMed

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  6. Allocation of resources in the Soviet Union and China - 1985. Hearing before the Subcommittee on Economic Resources, Competitiveness, and Security Economics of the Joint Economic Committee, Congress of the United States, Ninety-Ninth Congress, Second Session, March 19, 1986

    SciTech Connect

    Not Available

    1986-01-01

    Part II of the hearing record covers a March 19 Executive session, with statements by Douglas MacEachin of the Central Intelligence Agency (CIA), submissions for the record by MacEachin and Admiral Robert Schmitt, and supporting documentation. The purpose of the hearings was to examine economic indicators of the Soviet Union and China in the context of military and national security interests. The study and report represent a cooperative effort on the part of the CIA and the Defense Intelligence Agency. The report focuses on Gorbachev's modernization program, its potential for success, and the military implications if it should fail. The witnesses felt that unlike the Soviets, the Chinese probably understate military expenditures; and the military triangle involving the US, Soviet Union, and China has benefited both the US and China. Submissions for the record make up most of the document.

  7. How much land-based greenhouse gas mitigation can be achieved without compromising food security and environmental goals?

    PubMed

    Smith, Pete; Haberl, Helmut; Popp, Alexander; Erb, Karl-Heinz; Lauk, Christian; Harper, Richard; Tubiello, Francesco N; de Siqueira Pinto, Alexandre; Jafari, Mostafa; Sohi, Saran; Masera, Omar; Böttcher, Hannes; Berndes, Göran; Bustamante, Mercedes; Ahammad, Helal; Clark, Harry; Dong, Hongmin; Elsiddig, Elnour A; Mbow, Cheikh; Ravindranath, Nijavalli H; Rice, Charles W; Robledo Abad, Carmenza; Romanovskaya, Anna; Sperling, Frank; Herrero, Mario; House, Joanna I; Rose, Steven

    2013-08-01

    Feeding 9-10 billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6 Gt CO2 -eq. yr(-1) ) in meeting both challenges than do supply-side measures (1.5-4.3 Gt CO2 -eq. yr(-1) at carbon prices between 20 and 100 US$ tCO2 -eq. yr(-1) ), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that

  8. Classroom Conditions to Secure Enjoyment and Achievement: The Pupils' Voice. Listening to the Voice of "Every Child Matters"

    ERIC Educational Resources Information Center

    Hopkins, Elizabeth A.

    2008-01-01

    This paper argues that pupil voice and the active engagement of pupils in shaping their own educational experience are integral to the success of the "Enjoy and Achieve" strand of the "Every child matters: Change for children" programme. Through accessing the voice of Key Stage 2 pupils, insight was gained into what pupils…

  9. Cognitive capitalism: the effect of cognitive ability on wealth, as mediated through scientific achievement and economic freedom.

    PubMed

    Rindermann, Heiner; Thompson, James

    2011-06-01

    Traditional economic theories stress the relevance of political, institutional, geographic, and historical factors for economic growth. In contrast, human-capital theories suggest that peoples' competences, mediated by technological progress, are the deciding factor in a nation's wealth. Using three large-scale assessments, we calculated cognitive-competence sums for the mean and for upper- and lower-level groups for 90 countries and compared the influence of each group's intellectual ability on gross domestic product. In our cross-national analyses, we applied different statistical methods (path analyses, bootstrapping) and measures developed by different research groups to various country samples and historical periods. Our results underscore the decisive relevance of cognitive ability--particularly of an intellectual class with high cognitive ability and accomplishments in science, technology, engineering, and math--for national wealth. Furthermore, this group's cognitive ability predicts the quality of economic and political institutions, which further determines the economic affluence of the nation. Cognitive resources enable the evolution of capitalism and the rise of wealth.

  10. Mixed-Method Quasi-Experimental Study of Outcomes of a Large-Scale Multilevel Economic and Food Security Intervention on HIV Vulnerability in Rural Malawi.

    PubMed

    Weinhardt, Lance S; Galvao, Loren W; Yan, Alice F; Stevens, Patricia; Mwenyekonde, Thokozani Ng'ombe; Ngui, Emmanuel; Emer, Lindsay; Grande, Katarina M; Mkandawire-Valhmu, Lucy; Watkins, Susan C

    2017-03-01

    The objective of the Savings, Agriculture, Governance, and Empowerment for Health (SAGE4Health) study was to evaluate the impact of a large-scale multi-level economic and food security intervention on health outcomes and HIV vulnerability in rural Malawi. The study employed a quasi-experimental non-equivalent control group design to compare intervention participants (n = 598) with people participating in unrelated programs in distinct but similar geographical areas (control, n = 301). We conducted participant interviews at baseline, 18-, and 36-months on HIV vulnerability and related health outcomes, food security, and economic vulnerability. Randomly selected households (n = 1002) were interviewed in the intervention and control areas at baseline and 36 months. Compared to the control group, the intervention led to increased HIV testing (OR 1.90; 95 % CI 1.29-2.78) and HIV case finding (OR = 2.13; 95 % CI 1.07-4.22); decreased food insecurity (OR = 0.74; 95 % CI 0.63-0.87), increased nutritional diversity, and improved economic resilience to shocks. Most effects were sustained over a 3-year period. Further, no significant differences in change were found over the 3-year study period on surveys of randomly selected households in the intervention and control areas. Although there were general trends toward improvement in the study area, only intervention participants' outcomes were significantly better. Results indicate the intervention can improve economic and food security and HIV vulnerability through increased testing and case finding. Leveraging the resources of economic development NGOs to deliver locally-developed programs with scientific funding to conduct controlled evaluations has the potential to accelerate the scientific evidence base for the effects of economic development programs on health.

  11. U.S. National Security Strategy: Is There an Empirical Relationship Between Economic Freedom and Political Freedom

    DTIC Science & Technology

    2009-12-01

    1998) suggests that increases in prosperity create conditions for freer markets. Other literature (Barro, 1996) determines that the opposite causal ...relationship between economic and political freedom as well as identify other, outside, causal factors for the two phenomena. Having surveyed the...Specifically, past economic growth appears to Granger -cause an increase in economic freedom. Additional tests determine that economic growth has a strong

  12. The role of genomics and biotechnology in achieving global food security for high-oleic vegetable oil.

    PubMed

    Wilson, Richard F

    2012-01-01

    ensuring global food security for high-oleic vegetable oils.

  13. Update of Project to Introduce Technology in Urban Schools Which Have Low Achievement and Economically Poor Student Populations

    ERIC Educational Resources Information Center

    Smith, Gary R.

    2009-01-01

    This document provides new insights into events which occurred in a project funded by a Technology Literacy Challenge Fund grant awarded by Michigan Department of Education(MDE) in 2000. One purpose of this document is to update the formal report of the project which introduced new technology for use by low achieving students who are studying in…

  14. An Assessment of Science Achievement of Five- and Six-Year Old Students of Contrasting Socio-Economic Backgrounds.

    ERIC Educational Resources Information Center

    McGlathery, Glenn Edward

    Assessed was the science achievement of five-and six-year-olds from different socioeconomic backgrounds. Classes included both a middle-class and lower-class pre-school class and a middle-class and a lower-class first grade class. Four additional classes, which were studying a local science curriculum, were chosen to match these same grade-level…

  15. Achieving hemostasis with topical hemostats: making clinically and economically appropriate decisions in the surgical and trauma settings.

    PubMed

    Schreiber, Martin A; Neveleff, Deborah J

    2011-11-01

    Achieving hemostasis is a crucial focus of clinicians working in surgical and trauma settings. Topical hemostatic agents-including mechanical hemostats, active hemostats, flowable hemostats, and fibrin sealants-are frequently used in efforts to control bleeding, and new options such as hemostatic dressings, initially used in combat situations, are increasingly being used in civilian settings. To achieve successful hemostasis, a number of vital factors must be considered by surgeons and perioperative nurses, such as the size of the wound; bleeding severity; and the efficacy, possible adverse effects, and method of application of potential hemostatic agents. Understanding how and when to use each of the available hemostatic agents can greatly affect clinical outcomes and help to limit the overall cost of treatment.

  16. Achieving the triple bottom line in the face of inherent trade-offs among social equity, economic return, and conservation.

    PubMed

    Halpern, Benjamin S; Klein, Carissa J; Brown, Christopher J; Beger, Maria; Grantham, Hedley S; Mangubhai, Sangeeta; Ruckelshaus, Mary; Tulloch, Vivitskaia J; Watts, Matt; White, Crow; Possingham, Hugh P

    2013-04-09

    Triple-bottom-line outcomes from resource management and conservation, where conservation goals and equity in social outcomes are maximized while overall costs are minimized, remain a highly sought-after ideal. However, despite widespread recognition of the importance that equitable distribution of benefits or costs across society can play in conservation success, little formal theory exists for how to explicitly incorporate equity into conservation planning and prioritization. Here, we develop that theory and implement it for three very different case studies in California (United States), Raja Ampat (Indonesia), and the wider Coral Triangle region (Southeast Asia). We show that equity tends to trade off nonlinearly with the potential to achieve conservation objectives, such that similar conservation outcomes can be possible with greater equity, to a point. However, these case studies also produce a range of trade-off typologies between equity and conservation, depending on how one defines and measures social equity, including direct (linear) and no trade-off. Important gaps remain in our understanding, most notably how equity influences probability of conservation success, in turn affecting the actual ability to achieve conservation objectives. Results here provide an important foundation for moving the science and practice of conservation planning-and broader spatial planning in general-toward more consistently achieving efficient, equitable, and effective outcomes.

  17. Economic Security, Social Cohesion, and Depression Disparities in Post-Transition Societies: A Comparison of Older Adults in China and Russia

    PubMed Central

    Hsieh, Ning

    2016-01-01

    Although both China and Russia have experienced several decades of market reform, initial evidence suggests that this structural change has compromised mental and physical health among the Russian population but not the Chinese population. Using data from the World Health Organization (WHO) Study on Global AGEing and Adult Health (2007–2010), this study examines the factors associated with the disparity in depression between older adults in China and their Russian counterparts, all of whom experienced market transition in the prime of their lives (N=10,896). Results show that the lower level of depression among Chinese respondents is attributable to higher levels of economic security and social cohesion, as well as stronger effects of economic and social resources on depression, while health-rating style is likely a minor factor. The study advances the sociological understanding of global/comparative mental health by considering the effects of macro-level political, economic, social, and cultural conditions. PMID:26578542

  18. Economic Security, Social Cohesion, and Depression Disparities in Post-transition Societies: A Comparison of Older Adults in China and Russia.

    PubMed

    Hsieh, Ning

    2015-12-01

    Although both China and Russia have experienced several decades of market reform, initial evidence suggests that this structural change has compromised mental and physical health among the Russian population but not the Chinese population. Using data from the World Health Organization Study on Global AGEing and Adult Health (2007-2010), this study examines the factors associated with the disparity in depression between older adults in China and their Russian counterparts, all of whom experienced market transition in the prime of their lives (N = 10,896). Results show that the lower level of depression among Chinese respondents is attributable to higher levels of economic security and social cohesion as well as stronger effects of economic and social resources on depression, while health-rating style is likely a minor factor. The study advances the sociological understanding of global/comparative mental health by considering the effects of macrolevel political, economic, social, and cultural conditions.

  19. The Effective Integration of the ICGLR Towards Sustainable Security and Economic Development in the GLR of Africa

    DTIC Science & Technology

    2012-06-08

    Morgenthau , a renowned writer in security studies, holds that writers about interests in international politics have always found it hard to make...itself, interests of the parties to the conflict, and interests in the management of conflict ( Morgenthau 1983). A further categorization of conflicting...ensuring peace and security in Africa. Working Paper, Danish Institute for International Studies. Morgenthau , Hans J. 1983. In defense of the national

  20. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  1. The Free Trade Area of the Americas: Can Regional Economic Integration Lead to Greater Cooperation on Security?

    DTIC Science & Technology

    2002-12-01

    Varas and Cruz Johnson, eds., Percepciones de Amenza y Politica de Defensa en America Latina (Santiago: FLASCO, 1993). Sidney...hemisferica y la defensa nacional,” in Agusto Varas and Cruz Johnson, eds., Percepciones de Amenza y Politica de Defensa en America ... Latina (Santiago: FLASCO, 1993), 1-69. 2 security. Specifically, can the Free Trade Area of the Americas (FTAA) lead to enhanced

  2. Iraq and Afghanistan: Security, Economic, and Governance Challenges to Rebuilding Efforts Should Be Addressed in U.S. Strategies

    DTIC Science & Technology

    2009-03-25

    from Iraq and the Organization of Their Activities during Their Temporary Presence in Iraq, Nov. 17, 2008. The agreement took effect Jan . 1, 2009...Stability in Afghanistan (Washington, D.C.: Jan . 2009). Figure 1: Enemy-Initiated Attacks in Iraq and Afghanistan Per Month, May 2003...Forward ( Jan . 2007 – July 2008) • President Obama outlined a new U.S. strategy in Feb. 2009 • Security forces development plan • Integrated energy plan

  3. Education in the World System: The Demand for Language and International Proficiencies in Economic Development and National Security.

    ERIC Educational Resources Information Center

    Hoegl, Juergen K.

    1986-01-01

    Discusses the role of second-language proficiency from international, national, and state perspectives, including consideration of the need for such proficiency in science, technology, and research for economic development. Trends indicate that a more internationalized curricula in higher education and a greater demand for second-language…

  4. [Universalization of health or of social security?].

    PubMed

    Levy-Algazi, Santiago

    2011-01-01

    This article presents an analysis of the architecture of Mexico's health system based on the main economic problem, failing to achieve a GDP growth rate to increase real wages and give workers in formal employment coverage social security. This analysis describes the relationship between social security of the population and employment status of it (either formal or informal employment) and the impact that this situation poses to our health system. Also, it ends with a reform proposal that will give all workers the same social rights, ie to grant universal social security.

  5. Global Cropland Area Database (GCAD) derived from Remote Sensing in Support of Food Security in the Twenty-first Century: Current Achievements and Future Possibilities

    USGS Publications Warehouse

    Teluguntla, Pardhasaradhi G.; Thenkabail, Prasad S.; Xiong, Jun N.; Gumma, Murali Krishna; Giri, Chandra; Milesi, Cristina; Ozdogan, Mutlu; Congalton, Russ; Tilton, James; Sankey, Temuulen Tsagaan; Massey, Richard; Phalke, Aparna; Yadav, Kamini

    2015-01-01

    from 280 kg/person to 380 kg/person and meat from 22 kg/person to 34 kg/person (McIntyre, 2008); (c) new cultivar types (e.g., hybrid varieties of wheat and rice, biotechnology); and (d) modern agronomic and crop management practices (e.g., fertilizers, herbicide, pesticide applications). However, some of the factors that lead to the green revolution have stressed the environment to limits leading to salinization and decreasing water quality. For example, from 1960 to 2000, the phosphorous use doubled from 10 million tons to 20 MT, pesticide use tripled from near zero to 3 MT, and nitrogen use as fertilizer increased to a staggering 80 MT from just 10 MT (Foley et al., 2007; Khan and Hanjra, 2008). Further, diversion of croplands to bio-fuels is already taking water away from food production; the economics, carbon sequestration, environmental, and food security impacts of biofuel production are net negative (Lal and Pimentel, 2009), leaving us with a carbon debt (Gibbs et al., 2008; Searchinger et al., 2008). Climate models predict that in most regions of the world the hottest seasons on record will become the norm by the end of the century-an outcome that bodes ill for feeding the world (Kumar and Singh, 2005). Also, crop yield increases of the green revolution era have now stagnated (Hossain et al., 2005). Thereby, further increase in food production through increase in cropland areas and\\or increased allocations of water for croplands are widely considered unsustainable and\\or infeasible. Indeed, cropland areas have even begun to decrease in many 3 parts of the World due to factors such as urbanization, industrialization, and salinization. Furthermore, ecological and environmental imperatives such as biodiversity conservation and atmospheric carbon sequestration have put a cap on the possible expansion of cropland areas to other lands such as forests and rangelands. Other important factors limit food security. These include factors such as diversion of croplands

  6. The US and India Security-Economic Dilemma: A Study on the Effects of Relative Gain Sensitivities and Regime Formation

    DTIC Science & Technology

    2014-05-01

    efforts in the Western Indian Ocean Region (WIOR). The WIOR presents a focus area of lower barriers and higher agreement possibilities for the states to...the states to combine their efforts in the Western Indian Ocean Region (WIOR). The WIOR presents a focus area of lower barriers and higher...economics as a means of influence occurs early in recorded history. A prime example occurred in ancient Greece. In 432 B.C.E., rising tensions between

  7. An input-output procedure for calculating economy-wide economic impacts in supply chains using homeland security consequence analysis tools.

    SciTech Connect

    Smith, Braeton J.; Vugrin, Eric D.; Loose, Verne W.; Warren, Drake E.; Vargas, Vanessa N.

    2010-10-01

    Sandia National Laboratories has developed several models to analyze potential consequences of homeland security incidents. Two of these models (the National Infrastructure Simulation and Analysis Center Agent-Based Laboratory for Economics, N-ABLE{trademark}, and Loki) simulate detailed facility- and product-level consequences of simulated disruptions to supply chains. Disruptions in supply chains are likely to reduce production of some commodities, which may reduce economic activity across many other types of supply chains throughout the national economy. The detailed nature of Sandia's models means that simulations are limited to specific supply chains in which detailed facility-level data has been collected, but policymakers are often concerned with the national-level economic impacts of supply-chain disruptions. A preliminary input-output methodology has been developed to estimate national-level economic impacts based upon the results of supply-chain-level simulations. This methodology overcomes two primary challenges. First, the methodology must be relatively simple to integrate successfully with existing models; it must be easily understood, easily applied to the supply-chain models without user intervention, and run quickly. The second challenge is more fundamental: the methodology must account for both upstream and downstream impacts that result from supply-chain disruptions. Input-output modeling typically estimates only upstream impacts, but shortages resulting from disruptions in many supply chains (for example, energy, communications, and chemicals) are likely to have large downstream impacts. In overcoming these challenges, the input-output methodology makes strong assumptions about technology and substitution. This paper concludes by applying the methodology to chemical supply chains.

  8. DC-9/JT8D refan, Phase 1. [technical and economic feasibility of retrofitting DC-9 aircraft with refan engine to achieve desired acoustic levels

    NASA Technical Reports Server (NTRS)

    1973-01-01

    Analyses and design studies were conducted on the technical and economic feasibility of installing the JT8D-109 refan engine on the DC-9 aircraft. Design criteria included minimum change to the airframe to achieve desired acoustic levels. Several acoustic configurations were studied with two selected for detailed investigations. The minimum selected acoustic treatment configuration results in an estimated aircraft weight increase of 608 kg (1,342 lb) and the maximum selected acoustic treatment configuration results in an estimated aircraft weight increase of 809 kg (1,784 lb). The range loss for the minimum and maximum selected acoustic treatment configurations based on long range cruise at 10 668 m (35,000 ft) altitude with a typical payload of 6 804 kg (15,000 lb) amounts to 54 km (86 n. mi.) respectively. Estimated reduction in EPNL's for minimum selected treatment show 8 EPNdB at approach, 12 EPNdB for takeoff with power cutback, 15 EPNdB for takeoff without power cutback and 12 EPNdB for sideline using FAR Part 36. Little difference was estimated in EPNL between minimum and maximum treatments due to reduced performance of maximum treatment. No major technical problems were encountered in the study. The refan concept for the DC-9 appears technically feasible and economically viable at approximately $1,000,000 per airplane. An additional study of the installation of JT3D-9 refan engine on the DC-8-50/61 and DC-8-62/63 aircraft is included. Three levels of acoustic treatment were suggested for DC-8-50/61 and two levels for DC-8-62/63. Results indicate the DC-8 technically can be retrofitted with refan engines for approximately $2,500,000 per airplane.

  9. A Sustainable WMD Nonproliferation Strategy for East Africa: Connecting the WMD Nonproliferation Agenda with Local Border Security Needs to Achieve Mutually Beneficial Outcomes

    DTIC Science & Technology

    2014-01-01

    East African Case Study in Dual-Benefit Assistance Solving the problem of bridging the security/development divide, which prevents sustainable...nuclear and other radioactive materials. Last year alone, the IAEA’s Nuclear Incident and Trafficking Database (ITDB) confirmed 146 such cases . That...expansion • Reform public finance • Encourage entrepreneurship through loan reform • Secure cross-border trade flows; encourage investment Tangible

  10. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  11. Passenger Rail Security, Planning, and Resilience: Application of Network, Plume, and Economic Simulation Models as Decision Support Tools

    PubMed Central

    Greenberg, Michael; Lioy, Paul; Ozbas, Birnur; Mantell, Nancy; Isukapalli, Sastry; Lahr, Michael; Altiok, Tayfur; Bober, Joseph; Lacy, Clifton; Lowrie, Karen; Mayer, Henry; Rovito, Jennifer

    2014-01-01

    We built three simulation models that can assist rail transit planners and operators to evaluate high and low probability rail-centered hazard events that could lead to serious consequences for rail-centered networks and their surrounding regions. Our key objective is to provide these models to users who, through planning with these models, can prevent events or more effectively react to them. The first of the three models is an industrial systems simulation tool that closely replicates rail passenger traffic flows between New York Penn Station and Trenton, New Jersey. Second, we built and used a line source plume model to trace chemical plumes released by a slow-moving freight train that could impact rail passengers, as well as people in surrounding areas. Third, we crafted an economic simulation model that estimates the regional economic consequences of a variety of rail-related hazard events through the year 2020. Each model can work independently of the others. However, used together they help provide a coherent story about what could happen and set the stage for planning that should make rail-centered transport systems more resistant and resilient to hazard events. We highlight the limitations and opportunities presented by using these models individually or in sequence. PMID:23718133

  12. Passenger rail security, planning, and resilience: application of network, plume, and economic simulation models as decision support tools.

    PubMed

    Greenberg, Michael; Lioy, Paul; Ozbas, Birnur; Mantell, Nancy; Isukapalli, Sastry; Lahr, Michael; Altiok, Tayfur; Bober, Joseph; Lacy, Clifton; Lowrie, Karen; Mayer, Henry; Rovito, Jennifer

    2013-11-01

    We built three simulation models that can assist rail transit planners and operators to evaluate high and low probability rail-centered hazard events that could lead to serious consequences for rail-centered networks and their surrounding regions. Our key objective is to provide these models to users who, through planning with these models, can prevent events or more effectively react to them. The first of the three models is an industrial systems simulation tool that closely replicates rail passenger traffic flows between New York Penn Station and Trenton, New Jersey. Second, we built and used a line source plume model to trace chemical plumes released by a slow-moving freight train that could impact rail passengers, as well as people in surrounding areas. Third, we crafted an economic simulation model that estimates the regional economic consequences of a variety of rail-related hazard events through the year 2020. Each model can work independently of the others. However, used together they help provide a coherent story about what could happen and set the stage for planning that should make rail-centered transport systems more resistant and resilient to hazard events. We highlight the limitations and opportunities presented by using these models individually or in sequence.

  13. Economic Security: Neglected Dimension of National Security?

    DTIC Science & Technology

    2011-01-01

    war-winning logistical support capability. After the war, the Bethlehem Iron Company introduced the Bessemer process for converting iron to steel...want and we do not need. And so we have to have some special processes to be able to re-baseline government to make it more future focused and more...Northern financial-industrial interests thus benefitted and deepened the linkage with Midwestern agricultural processing and extractive industries, which

  14. Understanding China in the 21st Century: Political, Economic, and Security Issues in the Asia/Pacific Region. Part I, U.S. and Japanese Relations with China: Case Studies of Cooperation and Competition.

    ERIC Educational Resources Information Center

    Mukai, Gary; Moore, Carey; Young, Jocelyn; Cheng, Amy; Fairbrother, Greg

    This curriculum unit is part one of a three-part series. The unit introduces students to policy options for U.S. and Japanese relations with China at the beginning of the 21st century. By identifying and examining these options, students gain an awareness of U.S., Japanese, and Chinese perspectives on political, economic, and security issues.…

  15. An Examination of an Information Security Framework Implementation Based on Agile Values to Achieve Health Insurance Portability and Accountability Act Security Rule Compliance in an Academic Medical Center: The Thomas Jefferson University Case Study

    ERIC Educational Resources Information Center

    Reis, David W.

    2012-01-01

    Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information…

  16. Scaling cost-sharing to wages: how employers can reduce health spending and provide greater economic security.

    PubMed

    Robertson, Christopher T

    2014-01-01

    In the employer-sponsored insurance market that covers most Americans; many workers are "underinsured." The evidence shows onerous out-of-pocket payments causing them to forgo needed care, miss work, and fall into bankruptcies and foreclosures. Nonetheless, many higher-paid workers are "overinsured": the evidence shows that in this domain, surplus insurance stimulates spending and price inflation without improving health. Employers can solve these problems together by scaling cost-sharing to wages. This reform would make insurance better protect against risk and guarantee access to care, while maintaining or even reducing insurance premiums. Yet, there are legal obstacles to scaled cost-sharing. The group-based nature of employer health insurance, reinforced by federal law, makes it difficult for scaling to be achieved through individual choices. The Affordable Care Act's (ACA) "essential coverage" mandate also caps cost-sharing even for wealthy workers that need no such cap. Additionally, there is a tax distortion in favor of highly paid workers purchasing healthcare through insurance rather than out-of-pocket. These problems are all surmountable. In particular, the ACA has expanded the applicability of an unenforced employee-benefits rule that prohibits "discrimination" in favor of highly compensated workers. A novel analysis shows that this statute gives the Internal Revenue Service the authority to require scaling and to thereby eliminate the current inequities and inefficiencies caused by the tax distortion. The promise is smarter insurance for over 150 million Americans.

  17. Recalled Test Anxiety in Relation to Achievement, in the Context of General Academic Self-Concept, Study Habits, Parental Involvement and Socio-Economic Status among Grade 6 Ethiopian Students

    ERIC Educational Resources Information Center

    Raju, P. Mohan; Asfaw, Abebech

    2009-01-01

    The study investigated the predictive nature of test anxiety on achievement in the presence of perceived general academic self-concept, study habits, parental involvement in children's learning and socio-economic status. From a population of 2482 Grade 6 students from seven government primary schools of a sub-city in Addis Ababa, 497 participants…

  18. The Relationship between Out-of-School-Suspension and English Language Arts Achievement of Students from Low Socio-Economic Settings

    ERIC Educational Resources Information Center

    Lobban, Carol Janet

    2012-01-01

    Out-of-school suspension (OSS) links low academic achievement to at risk students. Middle school students in one low socioeconomic urban setting experience lower academic achievement and higher rates of OSS. The purpose of this study was to determine the relationship between students' English Language Arts (ELA) achievement and OSS. Glasser's…

  19. Closing the Achievement Gap for Economically Disadvantaged Students? Analyzing Change since No Child Left Behind Using State Assessments and the National Assessment of Educational Progress

    ERIC Educational Resources Information Center

    Blank, Rolf K.

    2011-01-01

    A critical state-level indicator of progress in public education is student achievement annual performance and change over time. The Council of Chief State School Officers (CCSSO) has been very active in tracking and reporting on student achievement results and using state assessment scores and other data to analyze achievement trends. A central…

  20. The Effects of On-Time, Delayed and Early Kindergarten Enrollment on Children's Mathematics Achievement: Differences by Gender, Race, and Family Socio-Economic Status

    ERIC Educational Resources Information Center

    Yesil Dagli, Ummuhan; Jones, Ithel

    2012-01-01

    This study was an examination of the effect of delayed, early, and on-time kindergarten enrollment on children's kindergarten mathematics achievement. Central for this study was to explore if the relationship between the kindergarten enrollment status and mathematics achievement varies by children's gender, race, and family SES status. It used a…

  1. Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification rules under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; other modifications to the HIPAA rules.

    PubMed

    2013-01-25

    The Department of Health and Human Services (HHS or ``the Department'') is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (``the HITECH Act'' or ``the Act'') to strengthen the privacy and security protection for individuals' health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities.

  2. Effects of Learning Approaches, Locus of Control, Socio-Economic Status and Self-Efficacy on Academic Achievement: A Turkish Perspective

    ERIC Educational Resources Information Center

    Suphi, Nilgun; Yaratan, Huseyin

    2012-01-01

    In this study the effects of learning approaches, locus of control (LOC), socio-economic status and self-efficacy on undergraduate students in North Cyprus was investigated. Four questionnaires were administered on 99 students in order to collect data regarding the learning approaches, LOC, self-efficacy and demographic factors. High cumulative…

  3. Identifying Research-Based Teaching Strategies in Reading to Close the Achievement Gap for Low Socio-Economic Children in Texas

    ERIC Educational Resources Information Center

    Brownlee, Steven Albert

    2013-01-01

    This study examined the effects of scientifically research based (SRB) teaching strategies on the learning of students living in poverty in a Educational Service Center (ESC) Region VI of East Texas. By interviewing teachers within academically successful campuses with high economically disadvantaged student populations, an accurate assessment was…

  4. Predicting Student Achievement in University-Level Business and Economics Classes: Peer Observation of Classroom Instruction and Student Ratings of Teaching Effectiveness

    ERIC Educational Resources Information Center

    Galbraith, Craig S.; Merrill, Gregory B.

    2012-01-01

    We examine the validity of peer observation of classroom instruction for purposes of faculty evaluation. Using both a multi-section course sample and a sample of different courses across a university's School of Business and Economics we find that the results of annual classroom observations of faculty teaching are significantly and positively…

  5. Paradigms and poverty in global energy policy: research needs for achieving universal energy access

    NASA Astrophysics Data System (ADS)

    Sovacool, Benjamin K.; Bazilian, Morgan; Toman, Michael

    2016-06-01

    This research letter discusses elements of a long-term interdisciplinary research effort needed to help ensure the maximum social, economic, and environmental benefits of achieving secure universal access to modern energy services. Exclusion of these services affects the lives and livelihoods of billions of people. The research community has an important, but not yet well-defined, role to play.

  6. EU Research for Security

    DTIC Science & Technology

    2004-10-25

    biometrics, smart card , IPv6, Economic, business and social aspects of security in Information Society Research and Technology FP6, FP7 (Security...wireless and reconfigurability – Next generation networks and computing models – Smart Cards and Access technologies – Biometrics – Pre-normative/standards

  7. Correlation Analysis of Cultural Development and Social Security in Iran

    NASA Astrophysics Data System (ADS)

    Habibi, K.; Alizadeh, H.; Meshkini, A.; Kohsari, M. J.

    In recent years, politicians have paid more attention to planning methods considering environmental, economical, social and cultural potentials of place. According to general principles and experiences has been achieved by the developed countries, there is a direct link between social security and cultural development. Where the society and region is culturally more developed, social security level is higher and vice versa. Considering this leading point, this research aims to establish a rational correlation between the provinces of Iran considering cultural development ranking and social security levels using planning models and analysis. To reach this goal, different variables in various sectors such as physical, social, economical, etc. were classified leading to developmental indicators of the provinces in the related sectors. In addition to this, many variables concerning the social security levels in provinces such as homicide, robbery, suicide, etc. were also classified to identify the social security level in each province. According to the results, more culturally developed and wealthier provinces, like Tehran, Khorasan, Fars, have lower social security degree and less culturally developed provinces, like Sistan va Baloochestan, Kurdistan, Elam have higher social security level. In other words, the mentioned principle, the correlation between social security and cultural development, does not work in the same direction in Iranian context.

  8. U.S. Geological Survey natural hazards science strategy: promoting the safety, security, and economic well-being of the Nation

    USGS Publications Warehouse

    Holmes, Jr., Robert R.; Jones, Lucile M.; Eidenshink, Jeffery C.; Godt, Jonathan W.; Kirby, Stephen H.; Love, Jeffrey J.; Neal, Christina A.; Plant, Nathaniel G.; Plunkett, Michael L.; Weaver, Craig S.; Wein, Anne; Perry, Suzanne C.

    2013-01-01

    The mission of the U.S. Geological Survey (USGS) in natural hazards is to develop and apply hazard science to help protect the safety, security, and economic well-being of the Nation. The costs and consequences of natural hazards can be enormous, and each year more people and infrastructure are at risk. USGS scientific research—founded on detailed observations and improved understanding of the responsible physical processes—can help to understand and reduce natural hazard risks and to make and effectively communicate reliable statements about hazard characteristics, such as frequency, magnitude, extent, onset, consequences, and where possible, the time of future events. To accomplish its broad hazard mission, the USGS maintains an expert workforce of scientists and technicians in the earth sciences, hydrology, biology, geography, social and behavioral sciences, and other fields, and engages cooperatively with numerous agencies, research institutions, and organizations in the public and private sectors, across the Nation and around the world. The scientific expertise required to accomplish the USGS mission in natural hazards includes a wide range of disciplines that this report refers to, in aggregate, as hazard science. In October 2010, the Natural Hazards Science Strategy Planning Team (H–SSPT) was charged with developing a long-term (10–year) Science Strategy for the USGS mission in natural hazards. This report fulfills that charge, with a document hereinafter referred to as the Strategy, to provide scientific observations, analyses, and research that are critical for the Nation to become more resilient to natural hazards. Science provides the information that decisionmakers need to determine whether risk management activities are worthwhile. Moreover, as the agency with the perspective of geologic time, the USGS is uniquely positioned to extend the collective experience of society to prepare for events outside current memory. The USGS has critical

  9. Michigan's Talent Crisis: The Economic Case for Rebuilding Michigan's Broken Public Education System. Michigan Achieves! 2016 Michigan State of Education Report

    ERIC Educational Resources Information Center

    Arellano, Amber; Bedi, Suneet; Gallagher, Terry

    2016-01-01

    In recent months business leaders across the state have committed to a new effort to make Michigan a top ten education state by 2030. The Michigan Achieves initiative is designed to make that ambitious and urgent goal happen for "all" students in the state. These leaders know with certainty what others in Michigan are beginning to grasp:…

  10. Changes in the Multi-Level Effects of Socio-Economic Status on Reading Achievement in Sweden in 1991 and 2001

    ERIC Educational Resources Information Center

    Hansen, Kajsa Yang; Rosen, Monica; Gustafsson, Jan-Eric

    2011-01-01

    This study examines the changes in educational inequality at the school- and individual-levels in 1991 and 2001. Comparisons are made between the IEA Reading Literacy Study 1991 and the so called 10-Year Trend Study in PIRLS 2001. The between-school differences in reading achievement variance and the size of the relationship between SES and…

  11. The Effects of a School-Family-Community Partnership on the Academic Achievement, High School Graduation, and College Enrollment Rate of Economically Disadvantaged Youth

    ERIC Educational Resources Information Center

    Morgan, Yvette

    2012-01-01

    A school-family-community partnership to improve student achievement was examined at a comprehensive high school located in a low income urban community in Long Island City, New York. In this causal comparative analyses study, the researcher examines the effect of a school-family-community partnership on the educational outcomes of economically…

  12. Exploring Robust and Resilient Pathways to Water Security (Invited)

    NASA Astrophysics Data System (ADS)

    Brown, C. M.

    2013-12-01

    Lack of water security and the resultant cumulative effects of water-related hazards are understood to hinder economic growth throughout the world. Traditional methods for achieving water security as exemplified in the industrialized world have exerted negative externalities such as degradation of aquatic ecosystems. There is also growing concern that such methods may not be robust to climate variability change. It has been proposed that alternative pathways to water security must be followed in the developing world. However, it is not clear such pathways currently exist and there is an inherent moral hazard in such recommendations. This presentation will present a multidimensional definition of water security, explore the conflict in norms between engineering and ecologically oriented communities, and present a framework synthesizing those norms for assessing and innovating robust and resilient pathways to water security.

  13. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  14. Hydrological extremes and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  15. CORBA security services for health information systems.

    PubMed

    Blobel, B; Holena, M

    1998-01-01

    The structure of healthcare systems in developed countries is changing to 'shared care', enforced by economic constraints and caused by a change in the basic conditions of care. That development results in co-operative health information systems across the boundaries of organisational, technological, and policy domains. Increasingly, these distributed and, as far as their domains are concerned, heterogeneous systems are based on middleware approaches, such as CORBA. Regarding the sensitivity of personal and medical data, such open, distributed, and heterogeneous health information systems require a high level of data protection and data security, both with respect to patient information and with respect to users. This paper, relying on experience gained through our activities in CORBAmed, describes the possibilities the CORBA middleware provides to achieve application and communication security. On the background of the overall CORBA architecture, it outlines the different security services previewed in the adopted CORBA specifications which are discussed in the context of the security requirements of healthcare information systems. Security services required in the healthcare domain but not available at the moment are mentioned. A solution is proposed, which on the one hand allows to make use of the available CORBA security services and additional ones, on the other hand remains open to other middleware approaches, such as DHE or HL7.

  16. Economic Blues

    ERIC Educational Resources Information Center

    Stuart, Reginald

    2009-01-01

    Today, a national economy gone bust has derailed Black Americans' plans across the country. Gone are many of the economic gains, small as they were, achieved in the post-segregation era by millions of 1960s generation children and their children. Black America today is beset by job losses, business closures, pay cuts, furloughs, investment and…

  17. Education for Global Leadership: The Importance of International Studies and Foreign Language Education for U.S. Economic and National Security

    ERIC Educational Resources Information Center

    Committee for Economic Development, 2006

    2006-01-01

    To confront the twenty-first century challenges to our economy and national security, our education system must be strengthened to increase the foreign language skills and cultural awareness of our students. America's continued global leadership will depend on our students' abilities to interact with the world community both inside and outside our…

  18. 2003 U.S. Department of Energy Strategic Plan: Protecting National, Energy, and Economic Security with Advanced Science and Technology and Ensuring Environmental Cleanup

    SciTech Connect

    None,

    2003-09-30

    The Department of Energy contributes to the future of the Nation by ensuring energy security, maintaining the safety, security and reliability of the nuclear weapons stockpile, cleaning up the environment from the legacy of the Cold War, and developing innovations in science and technology. After 25 years in existence, the Department now operates 24 preeminent research laboratories and facilities and four power marketing administrations, and manages the environmental cleanup from 50 years of nuclear defense activities that impacted two million acres in communities across the country. The Department has an annual budget of about $23 billion and employs about 14,500 Federal and 100,000 contractor employees. The Department of Energy is principally a national security agency and all of its missions flow from this core mission to support national security. That is true not just today, but throughout the history of the agency. The origins of the Department can be traced to the Manhattan Project and the race to develop the atomic bomb during World War II. Following the war, Congress engaged in a vigorous and contentious debate over civilian versus military control of the atom. The Atomic Energy Act of 1946 settled the debate by creating the Atomic Energy Commission, which took over the Manhattan Project’s sprawling scientific and industrial complex.

  19. Achieving Energy Security in the Caribbean Basin

    DTIC Science & Technology

    2009-04-01

    however. Jamaica Broilers Ethanol, a subsidiary of the private company Jamaica Broilers Group, is spending an additional $15 million to expand its...limited basis. Jamaica Broilers , for example, produces 5MW of energy, but it is investing approximately $5 million to generate an additional 10MW of...Minister Upbeat about Jamaica’s Ethanol Prospects," 16 Dec 08 50 The BioEnergySite News Desk, "Jamaica Broilers Ethanol to Double Capacity," Feb 09

  20. Promoting Women's Workforce Security: Findings from IWPR Research on Unemployment Insurance and Job Training.

    ERIC Educational Resources Information Center

    Lovell, Vicky; Negrey, Cynthia

    Women's workforce attachment is becoming increasingly similar to men's, with rising labor force participation rates and overall occupational diversification. However, many factors impede women's ability to achieve the same employment-based economic security that men experience. Although gender-neutral on their face, public policies reinforce…

  1. Securing a Better Future: A Portrait of Female Students in Mississippi's Community Colleges. Report #C417

    ERIC Educational Resources Information Center

    Hess, Cynthia; Krohn, Sylvia; Reichlin, Lindsey; Román, Stephanie; Gault, Barbara

    2014-01-01

    Community colleges are a critical resource for women seeking to achieve economic security and stability, yet many women who are community college students face challenges that make it difficult to persist in their education and complete their degrees. To understand the circumstances and experiences of female community college students in…

  2. Strengthening National, Homeland, and Economic Security. Networking and Information Technology Research and Development Supplement to the President’s FY 2003 Budget

    DTIC Science & Technology

    2002-07-01

    Internet , the graphical user interface, high-end parallel processing, the first end-to-end optical networks, advanced computational modeling and...prototypes and drove straight through to the teams’ rendezvous site, arriving the morning of September 12. As things turned out, an overriding issue...vulnerabilities of today’s Internet with self-healing, trusted, high-bandwidth systems for secure U.S. commerce, communication, and connectivity

  3. AIDS and international security in the United Nations System.

    PubMed

    Rushton, Simon

    2010-11-01

    Two assumptions underpin much of the literature that has examined the links between HIV/AIDS and security: (1) that HIV/AIDS is now firmly established as an international security issue; and (2) that Resolution 1308, adopted by the UN Security Council in July 2000, was the decisive moment in the securitization process. This article questions both of those assumptions. It argues that even within the Security Council, HIV/AIDS' status as a bona fide threat to international peace and security is not entirely secure. Despite the fact that the Resolution was adopted unanimously, there is considerable doubt over the extent to which the Council members were persuaded that HIV/AIDS is genuinely a threat to international peace and security. Furthermore, the Council's subsequent actions suggest a retreat from the issue. The article moves on to examine statements made in and by some of the other key UN System bodies grappling with HIV/AIDS. Focusing in particular on the General Assembly, the Economic and Social Council and UNAIDS, it is argued that the international security framing of HIV/AIDS has not generally achieved a great deal of traction within these bodies. Alternative framings, in particular international development and human rights, occur far more frequently. This raises issues for our understanding of both securitization theory and the global governance of HIV/AIDS.

  4. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. Measuring Global Water Security Towards Sustainable Development Goals

    NASA Technical Reports Server (NTRS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  6. Education for Global Leadership: The Importance of International Studies and Foreign Language Education for U.S. Economic and National Security. Executive Summary

    ERIC Educational Resources Information Center

    Committee for Economic Development, 2006

    2006-01-01

    As we begin the twenty-first century, technological, economic, political, and social forces have created a new era. Technological advancements and lower trade barriers have paved the way for the globalization of markets, bringing intense competition to the U.S. economy. Political systems and movements around the world are having a profound impact…

  7. Achieving All Our Ambitions

    ERIC Educational Resources Information Center

    Hartley, Tricia

    2009-01-01

    National learning and skills policy aims both to build economic prosperity and to achieve social justice. Participation in higher education (HE) has the potential to contribute substantially to both aims. That is why the Campaign for Learning has supported the ambition to increase the proportion of the working-age population with a Level 4…

  8. Advancing Student Achievement

    ERIC Educational Resources Information Center

    Walberg, Herbert J.

    2010-01-01

    For the last half century, higher spending and many modern reforms have failed to raise the achievement of students in the United States to the levels of other economically advanced countries. A possible explanation, says Herbert Walberg, is that much current education theory is ill informed about scientific psychology, often drawing on fads and…

  9. National Strategy for Aviation Security

    DTIC Science & Technology

    2007-03-26

    for Aviation Security (hereafter referred to as the Strategy") to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort

  10. Marital Biography, Social Security Receipt, and Poverty.

    PubMed

    Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.

  11. Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment

    SciTech Connect

    Vishik, Claire; Sheldon, Frederick T; Ott, David

    2013-01-01

    Cybersecurity practice lags behind cyber technology achievements. Solutions designed to address many problems may and do exist but frequently cannot be broadly deployed due to economic constraints. Whereas security economics focuses on the cost/benefit analysis and supply/demand, we believe that more sophisticated theoretical approaches, such as economic modeling, rarely utilized, would derive greater societal benefits. Unfortunately, today technologists pursuing interesting and elegant solutions have little knowledge of the feasibility for broad deployment of their results and cannot anticipate the influences of other technologies, existing infrastructure, and technology evolution, nor bring the solutions lifecycle into the equation. Additionally, potentially viable solutions are not adopted because the risk perceptions by potential providers and users far outweighs the economic incentives to support introduction/adoption of new best practices and technologies that are not well enough defined. In some cases, there is no alignment with redominant and future business models as well as regulatory and policy requirements. This paper provides an overview of the economics of security, reviewing work that helped to define economic models for the Internet economy from the 1990s. We bring forward examples of potential use of theoretical economics in defining metrics for emerging technology areas, positioning infrastructure investment, and building real-time response capability as part of software development. These diverse examples help us understand the gaps in current research. Filling these gaps will be instrumental for defining viable economic incentives, economic policies, regulations as well as early-stage technology development approaches, that can speed up commercialization and deployment of new technologies in cybersecurity.

  12. 17 CFR 200.23a - Office of Economic Analysis.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Office of Economic Analysis. 200.23a Section 200.23a Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Organization § 200.23a Office of Economic Analysis. The Office of Economic Analysis is responsible...

  13. How to ensure nutrition security in the global economic crisis to protect and enhance development of young children and our common future.

    PubMed

    de Pee, Saskia; Brinkman, Henk-Jan; Webb, Patrick; Godfrey, Steve; Darnton-Hill, Ian; Alderman, Harold; Semba, Richard D; Piwoz, Ellen; Bloem, Martin W

    2010-01-01

    The global economic crisis, commodity price hikes, and climate change have worsened the position of the poorest and most vulnerable people. These crises are compromising the diet and health of up to 80% of the population in most developing countries and threaten the development of almost an entire generation of children ( approximately 250 million), because the period from conception until 24 mo of age irreversibly shapes people's health and intellectual ability. High food prices reduce diversity and nutritional quality of the diet and for many also reduce food quantity. Poor households are hit hardest, because they already spend 50-80% of expenditures on food, little on medicines, education, transport, or cooking fuel, and cannot afford to pay more. Reduced public spending, declining incomes, increased food and fuel prices, and reduced remittance thus impede and reverse progress made toward Millenium Development Goals 1, 4, and 5. Investments in nutrition are among the most cost-effective development interventions because of very high benefit:cost ratios, for individuals and for sustainable growth of countries, because they protect health, prevent disability, boost economic productivity, and save lives. To bridge the gap between nutrient requirements, particularly for groups with high needs, and the realistic dietary intake under the prevailing circumstances, the use of complementary food supplements to increase a meal's nutrient content is recommended. This can be in the form of, e.g., micronutrient powder or low-dose lipid-based nutrient supplements, which can be provided for free, in return for vouchers, at subsidized, or at commercial prices.

  14. Three Essays on Information Security Policies

    ERIC Educational Resources Information Center

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  15. Extreme hydrological events and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-06-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise, worldwide. Hydrological extremes jeopardize human security and cause serious threats to human life and welfare and societal livelihood. Floods and droughts can undermine societies' security, understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. Floods and droughts pose a burden and serious challenges to the state, responsible to sustain economic development, societal and environmental security - the maintenance of ecosystem services, on which a society depends. It is shown that reduction of risk of hydrological disasters improves human security.

  16. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  17. Securing Europe's future

    SciTech Connect

    Flanagan, S.J.; Hampson, F.O.

    1986-01-01

    The book provides a comprehensive review of the major political, social and economic issues that will shape the course of European security in the coming decade. It offers a thorough assessment of such critical questions as European views of the U.S. Strategic Defense Initiative, the likely contribution of new technologies and tactics to NATO's conventional defense capabilities, and domestic factors that influence security policy. It also provides original analysis of a number of issues, such as economic dimensions of security, the quest for a European defense identity, protection of Western interests outside the NATO area, and the role of the European neutral states in the security sphere, that have not received the attention they deserve. It provides a fresh review of the nuclear question and of the German security debate in the aftermath of the initial U.S. INF missile deployments. The final chapter is a careful synthesis of the various contributions that advances a framework for assessing NATO's policy alternatives.

  18. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  19. The neoliberal political economy and erosion of retirement security.

    PubMed

    Polivka, Larry; Luo, Baozhen

    2015-04-01

    The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security.

  20. Fuel Cycle Technologies 2014 Achievement Report

    SciTech Connect

    Hong, Bonnie C.

    2015-01-01

    The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities. FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.

  1. The Economics of Aging.

    ERIC Educational Resources Information Center

    Ross, Myron H., Ed.

    Papers included are as follows: "An Overview" (Ross); "The Outlook for Social Security in the Wake of the 1983 Amendments" (Munnell); "The Economics of Aging: Doomsday or Shangrila?" (Schulz); "Retirement Incentives--the Carrot and the Stick. (Why No One Works beyond 65 Anymore)" (Quinn); "Inflation and…

  2. NASA's Secured Advanced Federated Environment

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Korsmeyer, David; Paterson, Pat; Liu, Joseph; Stewart, Helen; Burchell, Scott; Chang, Pat; Spence, Matt Chew; Viernes, Conan; Goforth, Andy; Billik, Shoshana; Wheeller, Bob

    2003-01-01

    In 1999, a NASA-wide team initially set out to create a collaborative environment to enable NASA's scientists and engineers to share information and tools across NASA locations and with world-wide partners. This paper describes the team's development process and solutions in resolving conflicting security issues of building a complex intra/inter-enterprise collaborative system. Based on the federated, hierarchical, compartmentalized principles, the Secured Advanced Federated Environment (SAFE) developed by the team is becoming a foundational element for building a collaborative infrastructure for NASA. This paper also introduces the concept of a Micro Security Domain which can achieve the balance between the need to collaborate and the need to enforce enterprise and local security rules. SAFE'S federated security concepts enables networks to be formed around the functional/security requirements. With the SAFE technologies and approaches, security will not be an afterthought of the enterprise network design.

  3. Secure medical digital libraries.

    PubMed

    Papadakis, I; Chrissikopoulos, V; Polemi, D

    2001-12-01

    In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical data has many advantages compared to older approaches, but also poses extra requirements that need to be fulfilled. Thus, special attention is paid to the distinguished nature of such medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. Additionally, the proposed digital library employs smartcards for the management of the various security tokens that are used from the above services.

  4. Economic analysis

    SciTech Connect

    1980-06-01

    The Energy Policy and Conservation Act (EPCA) mandated that minimum energy efficiency standards be established for classes of refrigerators and refrigerator-freezers, freezers, clothes dryers, water heaters, room air conditioners, home heating equipment, kitchen ranges and ovens, central air conditioners, and furnaces. EPCA requires that standards be designed to achieve the maximum improvement in energy efficiency that is technologically feasible and economically justified. Following the introductory chapter, Chapter Two describes the methodology used in the economic analysis and its relationship to legislative criteria for consumer product efficiency assessment; details how the CPES Value Model systematically compared and evaluated the economic impacts of regulation on the consumer, manufacturer and Nation. Chapter Three briefly displays the results of the analysis and lists the proposed performance standards by product class. Chapter Four describes the reasons for developing a baseline forecast, characterizes the baseline scenario from which regulatory impacts were calculated and summarizes the primary models, data sources and assumptions used in the baseline formulations. Chapter Five summarizes the methodology used to calculate regulatory impacts; describes the impacts of energy performance standards relative to the baseline discussed in Chapter Four. Also discussed are regional standards and other program alternatives to performance standards. Chapter Six describes the procedure for balancing consumer, manufacturer, and national impacts to select standard levels. Details of models and data bases used in the analysis are included in Appendices A through K.

  5. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  6. Enhancing European security

    SciTech Connect

    Cuthbertson, I.M.; Robertson, D.

    1990-01-01

    This book looks beyond the current national security debate to envisage a Europe in which conventional forces have been substantially reduced and nuclear weapons no longer perform a significant deterrent role. Means through which this goal can be achieved are discussed.

  7. Unconditionally Secure Electronic Voting

    NASA Astrophysics Data System (ADS)

    Otsuka, Akira; Imai, Hideki

    In this chapter, we will show how to achieve unconditional or information-theoretic security in electronic voting with the following property: 1 Even all voters and tallying authorities have unbounded computing power, the distorted integrity of the voting results can be detected and proved incorrect by every honest voter,

  8. Economic Security and National Security -- Interaction and Synthesis

    DTIC Science & Technology

    2009-01-01

    through the binocular lenses of physics and engineering with an approach called econophysics . This approach studies the following ques­ tions: Are global...technology transfer, or the disabling of critical infrastructures. Capital Markets as Complex Dynamic Systems— Econophysics Over the past 50 years

  9. Global Health and the Global Economic Crisis

    PubMed Central

    Gill, Stephen; Bakker, Isabella

    2011-01-01

    Although the resources and knowledge for achieving improved global health exist, a new, critical paradigm on health as an aspect of human development, human security, and human rights is needed. Such a shift is required to sufficiently modify and credibly reduce the present dominance of perverse market forces on global health. New scientific discoveries can make wide-ranging contributions to improved health; however, improved global health depends on achieving greater social justice, economic redistribution, and enhanced democratization of production, caring social institutions for essential health care, education, and other public goods. As with the quest for an HIV vaccine, the challenge of improved global health requires an ambitious multidisciplinary research program. PMID:21330597

  10. Leading by Example: The Case for IT Security in Academia

    ERIC Educational Resources Information Center

    Davidson, Mary Ann

    2005-01-01

    Leadership in IT security is needed. Security matters: the ethics, the economics, and the social implications. There is much the academic community can do to help ensure cybersecurity. This document discusses steps academia can take to help ensure cybersecurity.

  11. Saudi National Security. Research report

    SciTech Connect

    Al-Ayed, I.

    1996-05-01

    The purpose of this research paper is to focus on Saudi National Security. The author highlights geographic and historic factors that impact on threats to Saudi Arabia, and the objectives for providing security. He discusses how to achieve these objectives, including military readiness and cooperation with other countries to guarantee Saudi security. This is to ensure interests which are vital to the industrial world as the result of a continued flow of oil with a reasonable price. Given is the author`s opinion about U.S. political strategy in the region to achieve stability in the Gulf Region.

  12. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  13. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  14. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  15. Measuring global water security towards sustainable development goals

    NASA Astrophysics Data System (ADS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  16. The Great Game redux: Energy security and the emergence of tripolarity in Eurasia

    NASA Astrophysics Data System (ADS)

    Ozdamar, Ibrahim Ozgur

    Securing energy resources has become a key aspect of foreign policy-making since the 1970s. States have used military and economic foreign policy tools to secure the supply of energy to their domestic markets. With the fall of the USSR in 1991, political and economic competition for penetration into energy-rich regions spread through Eurasia. Inspired from the nineteenth century term to describe Russian-British rivalry in the region, the current rivalry among great powers and their allies is called the "New Great Game". This project analyzes three political conflicts that are shaped by such rivalry that can threaten global energy security. Empirical results from the expected utility model (Bueno de Mesquita 1985) suggest the rivalry among the Western (i.e. EU, US) and Eastern (i.e. Russia, China) powers about the Iranian nuclear program, Nagorno-Karabakh and South Ossetia conflicts is likely to continue and shows some Cold War characteristics. I have also found out the expected outcomes of these conflicts and foreign policy tools and obvious and unseen strategic moves available to actors. The major conclusion of the study is that the EU and US should pursue a coordinated foreign policy and balance the Russian and Chinese influence in the region to secure access to energy resources. Most effective foreign policy tools to achieve such aim appear to be the use of economic relations as leverage against Russia and China and support economic and democratic developments of the newly established republics in Eurasia.

  17. Economics and Security: Resourcing National Priorities

    DTIC Science & Technology

    2010-05-21

    and wood as sources of energy from the surface of the earth to fos- sil fuels extracted from its interior. Third is the apparent shift in the balance of...PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Naval...SPONSORING/MONITORING AGENCY NAME( S ) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM( S ) 11. SPONSOR/MONITOR’S REPORT NUMBER( S ) 12. DISTRIBUTION

  18. Acquiring Secure Systems Through Information Economics

    DTIC Science & Technology

    2015-05-01

    Introduction “For all future weapons systems that DoD will acquire or procure, DoD will mandate specific cybersecurity standards for weapons...systems to meet. Acquisition and procurement policy and practice will be updated to promote effective cybersecurity throughout a system’s life cycle...physical damage or injury Motivating Contractor Efforts - Contractors have different priorities than the DOD when it comes to cybersecurity - Classic

  19. Economic Dimensions of Security in Central Asia

    DTIC Science & Technology

    2006-01-01

    Turkmenistan, and Uzbekistan al- ready suffer from some of the classic institutional pathologies evident in other resource-rich regimes, such as off ...industrialized north and the impoverished south during President Akayev’s tenure may have been an important con- tributor to the so-called “ Tulip Revolution” in...revenues from hard-currency export commodities are used to subsidize other sectors of the economy through the discretionary use of exchange rates, off

  20. The Economic Impact on Future European Security.

    DTIC Science & Technology

    1991-07-01

    European Bank for Reconstruction and Development (EBRD), Jacques Attali , is a former adviser to President Francois Mitterand. "Mr. Attali had never run a...Linkina NATO and the WEU, p. 10. 14. " Attali Unleashed," Wall Street Journal (New York), 17 April 1991, p. A14. 24 15. "France Threatens NATO Walkout...Jacques Attali to serve as president of the bank, but the designated American number two in command declined. Quickly, Mr. Attali appointed an

  1. The Indian National Food Security Act, 2013: a commentary.

    PubMed

    Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura

    2014-06-01

    The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.

  2. Determination of the relative economic impact of different molecular-based laboratory algorithms for respiratory viral pathogen detection, including Pandemic (H1N1), using a secure web based platform

    PubMed Central

    2011-01-01

    Background During period of crisis, laboratory planners may be faced with a need to make operational and clinical decisions in the face of limited information. To avoid this dilemma, our laboratory utilizes a secure web based platform, Data Integration for Alberta Laboratories (DIAL) to make near real-time decisions. This manuscript utilizes the data collected by DIAL as well as laboratory test cost modeling to identify the relative economic impact of four proposed scenarios of testing for Pandemic H1N1 (2009) and other respiratory viral pathogens. Methods Historical data was collected from the two waves of the pandemic using DIAL. Four proposed molecular testing scenarios were generated: A) Luminex respiratory virus panel (RVP) first with/without US centers for Disease Control Influenza A Matrix gene assay (CDC-M), B) CDC-M first with/without RVP, C) RVP only, and D) CDC-M only. Relative cost estimates of different testing algorithm were generated from a review of historical costs in the lab and were based on 2009 Canadian dollars. Results Scenarios A and B had similar costs when the rate of influenza A was low (< 10%) with higher relative cost in Scenario A with increasing incidence. Scenario A provided more information about mixed respiratory virus infection as compared with Scenario B. Conclusions No one approach is applicable to all conditions. Testing costs will vary depending on the test volume, prevalence of influenza A strains, as well as other circulating viruses and a more costly algorithm involving a combination of different tests may be chosen to ensure that tests results are returned to the clinician in a quicker manner. Costing should not be the only consideration for determination of laboratory algorithms. PMID:21645365

  3. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  4. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  5. Functional Security Model: Managers Engineers Working Together

    NASA Astrophysics Data System (ADS)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  6. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  7. COGNITIVE ECONOMICS.

    PubMed

    Kimball, Miles

    2015-06-01

    Cognitive economics is the economics of what is in people's minds. It is a vibrant area of research (much of it within behavioural economics, labour economics and the economics of education) that brings into play novel types of data, especially novel types of survey data. Such data highlight the importance of heterogeneity across individuals and highlight thorny issues for welfare economics. A key theme of cognitive economics is finite cognition (often misleadingly called "bounded rationality"), which poses theoretical challenges that call for versatile approaches. Cognitive economics brings a rich toolbox to the task of understanding a complex world.

  8. COGNITIVE ECONOMICS

    PubMed Central

    KIMBALL, MILES

    2017-01-01

    Cognitive economics is the economics of what is in people’s minds. It is a vibrant area of research (much of it within behavioural economics, labour economics and the economics of education) that brings into play novel types of data, especially novel types of survey data. Such data highlight the importance of heterogeneity across individuals and highlight thorny issues for welfare economics. A key theme of cognitive economics is finite cognition (often misleadingly called “bounded rationality”), which poses theoretical challenges that call for versatile approaches. Cognitive economics brings a rich toolbox to the task of understanding a complex world. PMID:28149186

  9. 17 CFR 200.23a - Office of Economic Analysis.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Office of Economic Analysis... Organization § 200.23a Office of Economic Analysis. The Office of Economic Analysis is responsible for providing an objective economic perspective to understand and evaluate the economic dimension of...

  10. 17 CFR 200.23a - Office of Economic Analysis.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Office of Economic Analysis... Organization § 200.23a Office of Economic Analysis. The Office of Economic Analysis is responsible for providing an objective economic perspective to understand and evaluate the economic dimension of...

  11. 17 CFR 200.23a - Office of Economic Analysis.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Office of Economic Analysis... Organization § 200.23a Office of Economic Analysis. The Office of Economic Analysis is responsible for providing an objective economic perspective to understand and evaluate the economic dimension of...

  12. United States security strategy for the east Asia-Pacific region

    SciTech Connect

    1995-02-01

    The United States National Security Strategy published in July 1994 is based on enlarging the community of market democracies while deterring and containing a range of threats to our nation, our allies and our interests. Focusing on new threats and new opportunities, its central goals are: to enhance security by maintaining a strong defense capability and promoting cooperative security measures; to open foreign markets and spur global economic growth; and to promote democracy abroad. In accordance with the National Security Strategy, this document explains United States defense policy toward furthering these goals in the Asia-Pacific region. It builds upon the Strategy`s emphasis on maintaining a strong defense capability to enhance U.S. security and to provide a foundation for regional stability through mutually beneficial security partnerships. As the Strategy states, East Asia is a region of growing importance to American goals: nowhere are the strands of our three-part strategy more intertwined; nowhere is the need for continued engagement more evident. In thinking about the Asia-Pacific region, security comes first, and a committed United States military presence will continue to serve as a bedrock for America`s security role in this dynamic area of the world. The regional security strategy for the Asia-Pacific region emphasizes strengthening the bilateral alliances that have been at the heart of United States strategy for more than forty years. The United States is also committed to contribute to regional security through active participation in new multi-lateral fora like the ASEAN Regional Forum. Through such multi-lateral mechanisms the countries of the region seek to develop new cooperative approaches to achieve greater stability and security. Additionally, the Pacific Command sponsors multi-national military activities.

  13. Final Report on Head Start Evaluation and Research: 1967-68 to the Office of Economic Opportunity. Section II: Achievement Motivation and Patterns of Reinforcement in Head Start Children.

    ERIC Educational Resources Information Center

    Espinosa, Renato

    Eighty-six Negro and Mexican-American children were divided into experimental and control groups in a study designed to learn the effects of an 8-week summer Head Start program on the achievement motive of these children. The study was based on McClelland's theory of achievement motive and the models of Atkinson and Aronson. Children were…

  14. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  15. System and method for key generation in security tokens

    DOEpatents

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.; Pooser, Raphael C.; Prowell, Stacy J.

    2015-10-27

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  16. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  17. Teacher Dispositions and Student Achievement

    ERIC Educational Resources Information Center

    Vaughn, Kathleen Adams

    2012-01-01

    In an effort to close the achievement gap between students of minority and majority populations and between students in higher and lower economic circumstances, the National Council for the Accreditation of Teacher Education (NCATE) added instruction and evaluation of teacher dispositions to its requirements for credentialing prospective teachers.…

  18. Behavioral economics.

    PubMed

    Camerer, Colin F

    2014-09-22

    Behavioral economics uses evidence from psychology and other social sciences to create a precise and fruitful alternative to traditional economic theories, which are based on optimization. Behavioral economics may interest some biologists, as it shifts the basis for theories of economic choice away from logical calculation and maximization and toward biologically plausible mechanisms.

  19. 17 CFR 240.15a-1 - Securities activities of OTC derivatives dealers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... a self-regulatory organization (§ 240.15b9-2), regular broker-dealer margin rules (§ 240.36a1-1... securities, hybrid securities, and structured notes; (iii) Engaging in cash management securities activities..., the term hybrid security means a security that incorporates payment features economically similar...

  20. 17 CFR 240.15a-1 - Securities activities of OTC derivatives dealers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... a self-regulatory organization (§ 240.15b9-2), regular broker-dealer margin rules (§ 240.36a1-1... securities, hybrid securities, and structured notes; (iii) Engaging in cash management securities activities..., the term hybrid security means a security that incorporates payment features economically similar...

  1. 17 CFR 240.15a-1 - Securities activities of OTC derivatives dealers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... a self-regulatory organization (§ 240.15b9-2), regular broker-dealer margin rules (§ 240.36a1-1... securities, hybrid securities, and structured notes; (iii) Engaging in cash management securities activities..., the term hybrid security means a security that incorporates payment features economically similar...

  2. Verifiable Middleware for Secure Agent Interoperability

    DTIC Science & Technology

    2002-10-01

    bandwidth commu- nication links. However, agents technology carries with it associated security vulnerabilities. Distributed computing in general...carries with it risks such as denial of service, Trojan horses, information leaks, and malicious code. Agents technology , by introducing autonomy and code... technology to industry because security is a necessary pre- requisite for distributed computing. To make agent-based systems economically viable, it is

  3. Why Energy is AN Economic Planetary Emergency

    NASA Astrophysics Data System (ADS)

    Difiglio, Carmine

    2014-07-01

    This paper analyzes why high and volatile oil prices cause reduced world-wide economic growth. Disruptions in the petroleum market, due to unexpected economic growth or reduced petroleum supplies, have been shown to cause sharp increases in petroleum prices as a result of the inflexibilities of petroleum supply and demand. An examination of over 40 years of data reveals that oil price shocks are invariably followed by 2-3 years of weak economic growth and weak economic growth is almost always preceded by an oil price shock. While the statistical literature provides evidence that economies have become less vulnerable to a given oil price increase than they were during the 1970s, it also shows that the elasticity of demand for oil has significantly decreased. The increased resiliency of economies to higher oil prices has been partially or fully offset by the increased sensitivity of oil prices to any oil market perturbation. This paper also reviews the current state of oil-supply security noting that previous episodes of supply instability appear to have become chronic conditions. While new unconventional oil production technologies have revitalized North American oil production, it is concluded that these technologies will have only a modest effect on world-wide oil production. The marginal cost of oil production, whether from tight-oil plays, or other unconventional sources, is expected to increase contributing to rising longterm oil prices in an international oil market that will remain vulnerable to disruptions and sharp price increases. Recurring episodes of poor world-wide economic growth are shown to affect hundreds of millions of people though unemployment in the modern economy and, in developing countries, though slower emigration out of agricultural-sector poverty. It is also noted that world-wide greenhouse gas emissions require strong national policies. Clean-energy policies are more likely to be pursued by countries enjoying strong economic growth than

  4. Irrigation infrastructure and water appropriation rules for food security

    NASA Astrophysics Data System (ADS)

    Gohar, Abdelaziz A.; Amer, Saud A.; Ward, Frank A.

    2015-01-01

    In the developing world's irrigated areas, water management and planning is often motivated by the need for lasting food security. Two important policy measures to address this need are improving the flexibility of water appropriation rules and developing irrigation storage infrastructure. Little research to date has investigated the performance of these two policy measures in a single analysis while maintaining a basin wide water balance. This paper examines impacts of storage capacity and water appropriation rules on total economic welfare in irrigated agriculture, while maintaining a water balance. The application is to a river basin in northern Afghanistan. A constrained optimization framework is developed to examine economic consequences on food security and farm income resulting from each policy measure. Results show that significant improvements in both policy aims can be achieved through expanding existing storage capacity to capture up to 150 percent of long-term average annual water supplies when added capacity is combined with either a proportional sharing of water shortages or unrestricted water trading. An important contribution of the paper is to show how the benefits of storage and a changed water appropriation system operate under a variable climate. Results show that the hardship of droughts can be substantially lessened, with the largest rewards taking place in the most difficult periods. Findings provide a comprehensive framework for addressing future water scarcity, rural livelihoods, and food security in the developing world's irrigated regions.

  5. Achieving Information Assurance

    DTIC Science & Technology

    2006-05-31

    January 2000 a computer glitch deafened National Security Agency ( NSA ) satellites for three days, while in July a National Reconnaissance radar...the National Security Administration ( NSA ) is the Information Security (INFOSEC) Methodology. 25 This assessment helps document a baseline of security...gd.tuwien.ac.at/pc/ nsa -w2ksec/defenseindepth.pdf; Internet; accessed 15 February 2004. 5 Hemos, Slashdot, News for Nerds, Stuff that Matters. “H1B Tech Workers

  6. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  7. Security in Logistics

    NASA Astrophysics Data System (ADS)

    Cempírek, Václav; Nachtigall, Petr; Široký, Jaromír

    2016-12-01

    This paper deals with security of logistic chains according to incorrect declaration of transported goods, fraudulent transport and forwarding companies and possible threats caused by political influences. The main goal of this paper is to highlight possible logistic costs increase due to these fraudulent threats. An analysis of technological processes will beis provided, and an increase of these transport times considering the possible threatswhich will beis evaluated economic costs-wise. In the conclusion, possible threat of companies'` efficiency in logistics due to the costs`, means of transport and increase in human resources` increase will beare pointed out.

  8. Food security in a world without borders.

    PubMed

    de Haen, Hartwig; Thompson, Brian

    2003-01-01

    The alleviation of poverty and the eradication of hunger and malnutrition are within reach. Considerable progress has been made over the past thirty years in reducing the numbers of the hungry, and projections over the next thirty years suggest that this progress will continue. The majority of developing countries have participated in this progress and have improved nutrition but there are significant regional differences. The current challenge is to build upon and accelerate the progress already made. Everyone is involved in this struggle against hunger and malnutrition, and to achieve these goals, global partnerships to enhance co-operation and co-ordination are being strengthened. Successful country experiences for improving food security and nutrition have demonstrated the importance of peace, political stability, and stable economic growth. There is also the need for increased foreign investment and increased ODA, particularly for African agriculture, debt relief, the better integration of LDCs in the global economy, their more secure access to markets and more equitable terms of trade, enhanced South-South co-operation, training and research and new high-yield and drought-resistant crop varieties. While all these have been commented on and recognised before, we must close the credibility gap in our political will by honouring our existing commitments for providing tangible benefits at the local level. For globalisation, the key issue is how the aggregate benefits of globalisation will be distributed and how to translate this into better nutrition. The LDCs, which are the most vulnerable and disadvantaged members of the international community, should be at the centre of this drive towards food security and take genuine ownership of policies, initiatives and activities to improve development. At the same time we need to succeed in making the developed world more aware of and responsive to the conditions of the LDCs. The most effective way to improve nutrition

  9. On the Water-Food Nexus: an Optimization Approach for Water and Food Security

    NASA Astrophysics Data System (ADS)

    Mortada, Sarah; Abou Najm, Majdi; Yassine, Ali; Alameddine, Ibrahim; El-Fadel, Mutasem

    2016-04-01

    Water and food security is facing increased challenges with population increase, climate and land use change, as well as resource depletion coupled with pollution and unsustainable practices. Coordinated and effective management of limited natural resources have become an imperative to meet these challenges by optimizing the usage of resources under various constraints. In this study, an optimization model is developed for optimal resource allocation towards sustainable water and food security under nutritional, socio-economic, agricultural, environmental, and natural resources constraints. The core objective of this model is to maximize the composite water-food security status by recommending an optimal water and agricultural strategy. The model balances between the healthy nutritional demand side and the constrained supply side while considering the supply chain in between. It equally ensures that the population achieves recommended nutritional guidelines and population food-preferences by quantifying an optimum agricultural and water policy through transforming optimum food demands into optimum cropping policy given the water and land footprints of each crop or agricultural product. Through this process, water and food security are optimized considering factors that include crop-food transformation (food processing), water footprints, crop yields, climate, blue and green water resources, irrigation efficiency, arable land resources, soil texture, and economic policies. The model performance regarding agricultural practices and sustainable food and water security was successfully tested and verified both at a hypothetical and pilot scale levels.

  10. Social security, social welfare and the aging population.

    PubMed

    Pecchenino, R A; Utendorf, K R

    1999-01-01

    This study examined the effects of pay-as-you-go social security programs under various demographic assumptions including physical capital accumulation, education of the youth, support of the elderly, social welfare, and economic growth of the community. An overlapping generations framework in which agents are three-period lived agents are analyzed in this study. Findings of the study revealed a positive relationship between educational attainment and economic growth. However, programs designed to benefit the elderly affect the youth both directly and indirectly. Furthermore, social welfare considerations of the beneficiaries may not be achieved due to the passage of time and adjustments in the plans. Thus, policy-makers must develop a more comprehensive program to promote greater social welfare.

  11. Social Security income measurement in two surveys.

    PubMed

    Iams, Howard M; Purcell, Patrick J

    2013-01-01

    As a major source of income for retired persons in the United States, Social Security benefits directly influence economic well-being. That fact underscores the importance of measuring Social Security income accurately in household surveys. Using Social Security Administration (SSA) records, we examine Social Security income as reported in two Census Bureau surveys, the Survey of Income and Program Participation (SIPP) and the Current Population Survey (CPS). Although SSA usually deducts Medicare premiums from benefit payments, both the CPS and the SIPP aim to collect and record gross Social Security benefit amounts (before Medicare premium deductions). We find that the Social Security benefit recorded in the CPS closely approximates the gross benefit recorded for CPS respondents in SSA's records, but the Social Security benefit recorded in the SIPP more closely approximates SSA's record of net benefit payments (after deducting Medicare premiums).

  12. Gender Disparities and Socio-Economic Factors on Learning Achievements in Agricultural Science in Rural and Urban Secondary Schools of Ogbomoso North Local Government Area of Oyo State, Nigeria

    ERIC Educational Resources Information Center

    Amao, S. R.; Gbadamosi, J.

    2015-01-01

    To contribute to the realization of the Millennium Development Goal (MDG) by the United Nations on the promotion of gender equity, the researchers sought to empirically verify the existence or otherwise of gender inequality in the agricultural and science achievement of urban and rural, male and female students in Ogbomoso North Local Government…

  13. Stabilization and Economic Growth Workshop

    DTIC Science & Technology

    2009-03-25

    Clifford Zinnes, senior fellow, IRIS Center (formerly Institutional Reform and the Informal Sector ), Economics Department, University of Maryland, and...Gregoire, Professor, Economic Development, U.S. Army Peacekeeping and Stability Operations Institute Paper: Capture of the Informal Sector ...of FM 3-07 in a whole-of-government context. The first workshop, on security sector reform, was held on 16 October 2008. The second workshop, on

  14. Education Secured? The School Performance of Adolescents in Secure Residential Youth Care

    ERIC Educational Resources Information Center

    Harder, Annemiek T.; Huyghen, Anne-Marie N.; Knot-Dickscheit, Jana; Kalverboer, Margrite E.; Köngeter, Stefan; Zeller, Maren; Knorth, Erik J.

    2014-01-01

    Background: Despite poor school performance by adolescents in secure residential care and the potential importance of education during care, little is known about how to achieve academic success with these adolescents. Objective: Therefore, the aim of the present study is to assess adolescents' academic achievement during secure residential…

  15. Television Economics.

    ERIC Educational Resources Information Center

    Owen, Bruce M.; And Others

    Intended as an introduction to the economics of commercial television for the general reader, this volume considers the theory and analytical basis of television and the policy implications of those economics. Part I considers the economics of television markets with particular attention of the determinants of viewer markets; the supply of…

  16. Stimulating Economics

    ERIC Educational Resources Information Center

    Banaian, King

    2009-01-01

    With the current economic slump possibly the deepest since the Great Depression, interest in the subject of macroeconomics has reignited, and the number of students majoring in economics has increased during the last two years. While this would appear to be good news for educators in the economics field, the profession is nervous about more than…

  17. Exploring water and food security: the water footprint of domestic food production in the Gaza Strip

    NASA Astrophysics Data System (ADS)

    Recanati, Francesca; Castelletti, Andrea; Dotelli, Giovanni; Melià, Paco

    2016-04-01

    Water scarcity and food security are major issues in the Gaza Strip. This area is characterized by one of the highest densities in the world and it is affected by both severe scarcity of water resources and limited trading possibilities.Given this context, the enhancement of domestic food production is considered a fundamental strategy in achieving food security in the area. For this reason, rural people play a crucial role in implementing sustainable strategies for enhancing the domestic food production while preserving water resources. In order to investigate the effectiveness of existing agricultural scenarios in achieving food security in a sustainable manner, we propose a framework to assess food production systems in terms of their contribution to the nutritional and economic conditions of rural households and their impact on water resources. In particular, the latter has been carried out through the water footprint indicator proposed by the Water Footprint Network. The case study analyzed is a sample farm located in the Gaza Strip, whose food production is based on horticulture, animal husbandry and aquaculture. The study is articulated into two main parts: first, we compare alternative scenarios of vegetal and animal food production in terms of food supply, water consumption and economic income at the household scale; then, we extend the analysis to evaluate the potential contribution of domestic food production to the food security in the whole Gaza Strip, focusing on the nutritional dimension, and providing a preliminary assessment of the environmental and economic sustainability. In particular, we evaluate water appropriation for domestic food production and compare it with the availability of water resources in the region. The outcomes highlight that the domestic food production can potentially satisfy both a basic diet and economic income for rural household, but the related appropriation of freshwater results unsustainable with respect to the fresh

  18. 17 CFR 200.23a - Office of Economic Analysis.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Office of Economic Analysis... Organization § 200.23a Office of Economic Analysis. The Office of Economic Analysis is responsible for... Commission's regulatory oversight. It performs economic analyses of proposed rule changes, current...

  19. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  20. Image Security

    DTIC Science & Technology

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  1. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  2. Graded Achievement, Tested Achievement, and Validity

    ERIC Educational Resources Information Center

    Brookhart, Susan M.

    2015-01-01

    Twenty-eight studies of grades, over a century, were reviewed using the argument-based approach to validity suggested by Kane as a theoretical framework. The review draws conclusions about the meaning of graded achievement, its relation to tested achievement, and changes in the construct of graded achievement over time. "Graded…

  3. Economic Resources for Older Women.

    ERIC Educational Resources Information Center

    Miller, Sheila J.

    Although the older person's economic stiuation has improved, older women, minorities, and rural residents have incomes significantly lower than those for the older population in general. Older married women may appear to be financially secure, but many of their resources often disappear when their husbands die. Widowhood or divorce endangers the…

  4. Radioactive source security: the cultural challenges.

    PubMed

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved.

  5. Advanced Economic Analysis

    NASA Technical Reports Server (NTRS)

    Greenberg, Marc W.; Laing, William

    2013-01-01

    An Economic Analysis (EA) is a systematic approach to the problem of choosing the best method of allocating scarce resources to achieve a given objective. An EA helps guide decisions on the "worth" of pursuing an action that departs from status quo ... an EA is the crux of decision-support.

  6. Economic Consequences Of Climate Change

    NASA Astrophysics Data System (ADS)

    Szlávik, János; Füle, Miklós

    2009-07-01

    Even though the climate conflict resulting from green houses gases (GHG) emissions was evident by the Nineties and the well-known agreements made, their enforcement is more difficult than that of other environmental agreements. That is because measures to reduce GHG emissions interfere with the heart of the economy and the market: energy (in a broader sense than the energy sector as defined by statistics) and economical growth. Analyzing the environmental policy responses to climate change the conclusion is that GHG emission reduction can only be achieved through intensive environmental policy. While extensive environmental protection complements production horizontally, intensive environmental protection integrates into production and the environment vertically. The latter eliminates the source of the pollution, preventing damage. It utilizes the biochemical processes and self-purification of the natural environment as well as technical development which not only aims to produce state-of-the-art goods, but to make production more environmentally friendly, securing a desired environmental state. While in extensive environmental protection the intervention comes from the outside for creating environmental balance, in intensive environmental protection the system recreates this balance itself. Instead of dealing with the consequences and the polluter pays principle, the emphasis is on prevention. It is important to emphasize that climate strategy decisions have complex effects regarding the aspects of sustainability (economical, social, ecological). Therefore, all decisions are political. At present, and in the near future, market economy decisions have little to do with sustainability values under normal circumstances. Taking social and ecological interests into consideration can only be successful through strategic political aims.

  7. Multi-cultural network security

    SciTech Connect

    Stevens, D.F.

    1996-04-01

    Education and awareness are widely acknowledged to be among the fundamental issues of Internet security, but only in the sense of making Internet users more security conscious. For the Internet to achieve its promise as an information highway, however, a complementary education effort is needed. If adequate Internet security is to be achieved, we must also increase the awareness of the professional security community of the requirements, attitudes, and habits of the many different cultures that participate in the Internet. Discussions of {open_quotes}the Internet{close_quotes} encourage the misapprehension that there is a single, uniform user community instead of a loose alliance of many cultures that differ in many fundamental aspects. This is true even if we limit our consideration to ethical cultures. At this Workshop alone we have representatives of administrative and military cultures, Governmental and commercial cultures, profit-cultures and non-profit cultures, research and operational cultures. Internet cultures are united in their desire to exploit the connectivity, flexibility, and rapidity of communication provided by the net, but differ greatly in their motivations, their attitudes towards authority, their willingness to cooperate within their own communities, their interest in technical arcana, and the patience with which they will put up with - or the enthusiasm with which they will embrace - the growing list of procedures deemed necessary for acceptable security. They even differ in how they define {open_quotes}acceptable security{close_quotes}.

  8. Behavioral Economics

    PubMed Central

    Reed, Derek D.; Niileksela, Christopher R.; Kaplan, Brent A.

    2013-01-01

    In recent years, behavioral economics has gained much attention in psychology and public policy. Despite increased interest and continued basic experimental studies, the application of behavioral economics to therapeutic settings remains relatively sparse. Using examples from both basic and applied studies, we provide an overview of the principles comprising behavioral economic perspectives and discuss implications for behavior analysts in practice. A call for further translational research is provided. PMID:25729506

  9. Leveraging Trade Agreements to Meet U.S. Security Aims

    DTIC Science & Technology

    2016-04-08

    does not dIsplay a currently valid 0MB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3...security goals. A review of the U.S. trade policy , and its nesting with the National Security Strategy, demonstrates how President Barack Obama’s...SUBJECT TERMS Economic policy , trade, national security, Trans-Pacific Partnership, China, Asia-Pacific 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18

  10. Security in Full-Force

    NASA Technical Reports Server (NTRS)

    2002-01-01

    When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.

  11. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  12. How economics can further the success of ecological restoration.

    PubMed

    Iftekhar, Md Sayed; Polyakov, Maksym; Ansell, Dean; Gibson, Fiona; Kay, Geoffrey M

    2017-04-01

    Restoration scientists and practitioners have recently begun to include economic and social aspects in the design and investment decisions for restoration projects. With few exceptions, ecological restoration studies that include economics focus solely on evaluating costs of restoration projects. However, economic principles, tools, and instruments can be applied to a range of other factors that affect project success. We considered the relevance of applying economics to address 4 key challenges of ecological restoration: assessing social and economic benefits, estimating overall costs, project prioritization and selection, and long-term financing of restoration programs. We found it is uncommon to consider all types of benefits (such as nonmarket values) and costs (such as transaction costs) in restoration programs. Total benefit of a restoration project can be estimated using market prices and various nonmarket valuation techniques. Total cost of a project can be estimated using methods based on property or land-sale prices, such as hedonic pricing method and organizational surveys. Securing continuous (or long-term) funding is also vital to accomplishing restoration goals and can be achieved by establishing synergy with existing programs, public-private partnerships, and financing through taxation.

  13. Black Students: Psychosocial Issues and Academic Achievement.

    ERIC Educational Resources Information Center

    Berry, Gordon LaVern, Ed.; Asamen, Joy Keiko, Ed.

    This collection examines the history and current status of the economic, political, social, and psychological factors that influence the academic achievement of low-income African Americans. The introduction, "Afro-American Students and Academic Achievement" (J. K. Asamen), outlines the historical development of black education and…

  14. Security customer services: the tangibles and intangibles.

    PubMed

    Bailey, James O

    2014-01-01

    The hospital security officer of all hospital employees, has many opportunities to provide customer service, in addition to traditional security services, according to the author. In this article, he gives examples of intangible benefits which can be achieved when carrying out tangible duties.

  15. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  16. Economy, security slow EEZ work

    NASA Astrophysics Data System (ADS)

    Maggs, William Ward

    The goal of a November 17-19, 1987, conference on the U.S. Exclusive Economic Zone (EEZ) was a cooperative scientific plan for the next decade of mapping of and research on the huge expanse of ocean floor lying within 200 nautical miles of U.S. shores. But two hard realities were evident in the speeches, discussions, and recommendations of the participants: Both economics and U.S. national security interests are stalling basic scientific research on the EEZ. The root of these problems, according to the conferees, is the lack of centralized national management of the marine dominion proclaimed by President Reagan in 1983.

  17. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NASA Astrophysics Data System (ADS)

    Wolthuis, Reinder; Broenink, Gerben; Fransen, Frank; Schultz, Sven; de Vries, Arnout

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devices are (inter)connected to form a complex end-to-end chain in using online services. In our research, we constructed a model to determine the delta between the perceived overall security and the real security in home networks. To achieve an understanding of perception and how to identify the delta between perceived and real security, our work forms the basis for examining how perception relates to behaviour. Since humans are referred to as the weakest link in security, there are also differences in behaviour and desired behaviour from a security perspective.

  18. Economics Pupils

    ERIC Educational Resources Information Center

    Scott, Alexander; Straker-Cook, Dawn

    1976-01-01

    This paper contains survey information relating to the relative performance of economics pupils at"A" level, their feelings about the subject, and the type of teaching to which they are exposed. The primary concern is to stimulate debate about the issues raised. Journal is available from: Economics Association, Room 340, Hamilton House, Mabledon…

  19. National security

    SciTech Connect

    Not Available

    1992-04-01

    This paper summarizes the views presented on October 31, 1991, at a GAO-sponsored conference on worldwide threats to U.S. national security. The conference was designed to provide insight into potential military threats to U.S. security interests and necessary modifications to current and planned U.S. forces to meet those threats. Conference participants, including defense analysts and retired military officers, discussed and analyzed the possibility of U.S. and allied involvement in various regional contingencies in Europe and the Soviet Union, Eat Asia and the Pacific, and the Near East and South Asia. Topics ranged from the possibility of nuclear war to a general discussion of low-intensity conflict. To serve as a starting point for discussion, we asked several of the participants to provide papers representing a wide range of views. The participants agreed that for many years the Soviet/Warsaw Pact threat to Europe shaped U.S. force planning but that the Soviet union no longer posed a conventional threat. Nuclear weapons held by the former Soviet republics and other nations, however, remain a concern. There was no agreement of the methodology for sizing U.S. forces. Some argued for sizing based on specific threats; other argued for flexibility to meet any and all contingencies and cited the Gulf War as a example.

  20. Are Sovereign Wealth Funds a Threat to Australia’s National Security?

    DTIC Science & Technology

    2008-12-12

    market access security, finance- credit security, techno-industrial access security, socio-economic paradigm security, trans-border community ......influence, 3) access to sensitive technology, and 4) the ideological concern of a shift in the market paradigm. There are benefits and challenges

  1. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking.

  2. Ecological economics and economic growth.

    PubMed

    Victor, Peter A

    2010-01-01

    Boulding's 1966 paper on the economics of spaceship Earth established the framework for ecological economics and an understanding of economic growth. In ecological economics, economies are conceptualized as open subsystems of the closed biosphere and are subject to biophysical laws and constraints. Economic growth measured as an increase in real gross domestic product (GDP) has generally been associated with increases in the use of energy and materials and the generation of wastes. Scale, composition, and technology are the proximate determinants of environmental impacts. They are often reduced to two: scale (GDP) and intensity (impact per unit GDP). New work described in this paper defines "green" growth as intensity that declines faster than scale increases. Similarly, "brown" growth occurs when intensity declines more slowly than increases in scale, and "black" growth happens when both scale and intensity increase. These concepts are then related to the environmental Kuznets curve, which can be understood as a transition from brown to green growth. Ecological economics provides a macroperspective on economic growth. It offers broad policy principles, and it challenges the primacy of economic growth as a policy objective, but many important questions remain.

  3. Global climate change and international security

    SciTech Connect

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  4. Swarm Economics

    NASA Astrophysics Data System (ADS)

    Kazadi, Sanza; Lee, John

    The Hamiltonian Method of Swarm Design is applied to the design of an agent based economic system. The method allows the design of a system from the global behaviors to the agent behaviors, with a guarantee that once certain derived agent-level conditions are satisfied, the system behavior becomes the desired behavior. Conditions which must be satisfied by consumer agents in order to bring forth the `invisible hand of the market' are derived and demonstrated in simulation. A discussion of how this method might be extended to other economic systems and non-economic systems is presented.

  5. Border Security: Is it Achievable on the Rio Grande?

    DTIC Science & Technology

    2011-04-30

    first. Consequently, CBP’s strategies must address the threats and challenges along the entire continuum. Gaining and maintaining effective control of...isolation. Many agencies had a piece of the jigsaw puzzle, but not enough to form a picture of a credible threat.31 Fusion Centers are operated by state...control strategy with high probability of apprehension after entry. Monitored Substantial detection resources in place, but accessibility and resources

  6. Nurturing RP-US Bilateral Security Relation

    DTIC Science & Technology

    2011-03-24

    prosperity. All of these issues are inter- related and have caused the socio- political -economic instability of the country. Philippine interests can...shared experiences and cooperative security engagements during the Second World War, Vietnam War, Korean War and the global war on terrorism have...security engagements during the Second World War, Vietnam War, Korean War and the global war on terrorism have strengthened their relationship. The

  7. DoD Installation Energy Security

    DTIC Science & Technology

    2012-05-24

    Opportunities  New revenue streams ● DoD Drivers  Economics  Energy security Smart MicroGrids 3 Military Installations and Energy Markets...58.8 MW Military Installations Often Do Not Look Like Commercial Facilities 5 DoD and Microgrids ● Must include an interconnected set of loads...grid and the local utility market Primary goal of DoD installation microgrids is to provide energy security in a cost effective manner. 6

  8. Governing for Enterprise Security

    DTIC Science & Technology

    2005-06-01

    1 2 W hat Is Governing for Enterprise Security? ................................................ 5 3 W hat Are the Risks...23 4.3 Determ ining Adequate Security ........................................................ 25 5 What Are the...security. Section 4 lays the foundation for determining how much security is enough and further expands the definition of adequate security. Section 5

  9. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  10. SEED: A Suite of Instructional Laboratories for Computer Security Education

    ERIC Educational Resources Information Center

    Du, Wenliang; Wang, Ronghua

    2008-01-01

    The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…

  11. Potential and attainable food production and food security in different regions

    PubMed Central

    Vries, F. W. T. Penning de; Rabbinge, R.; Groot, J. J. R.

    1997-01-01

    Growing prosperity in the South is accompanied by human diets that will claim more natural resources per capita. This reality, combined with growing populations, may raise the global demand for food crops two- to four-fold within two generations. Considering the large volume of natural resources and potential crop yields, it seems that this demand can be met smoothly. However, this is a fallacy for the following reasons. (i) Geographic regions differ widely in their potential food security: policy choices for agricultural use of natural resources are limited in Asia. For example, to ensure national self-sufficiency and food security, most of the suitable land (China) and nearly all of the surface water (India) are needed. Degradation restricts options further. (ii) The attainable level of agricultural production depends also on socio-economic conditions. Extensive poverty keeps the attainable food production too low to achieve food security, even when the yield gap is wide, as in Africa. (iii) Bio-energy, non-food crops and nature compete with food crops for natural resources. Global and regional food security are attainable, but only with major efforts. Strategies to achieve alternative aims will be discussed.

  12. Leader as achiever.

    PubMed

    Dienemann, Jacqueline

    2002-01-01

    This article examines one outcome of leadership: productive achievement. Without achievement one is judged to not truly be a leader. Thus, the ideal leader must be a visionary, a critical thinker, an expert, a communicator, a mentor, and an achiever of organizational goals. This article explores the organizational context that supports achievement, measures of quality nursing care, fiscal accountability, leadership development, rewards and punishments, and the educational content and teaching strategies to prepare graduates to be achievers.

  13. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  14. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity.

  15. A European Perspective on Security Research

    NASA Astrophysics Data System (ADS)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  16. Embracing the Cloud for Better Cyber Security

    SciTech Connect

    Shue, Craig A; Lagesse, Brent J

    2011-01-01

    The future of cyber security is inextricably tied to the future of computing. Organizational needs and economic factors will drive computing outcomes. Cyber security researchers and practitioners must recognize the path of computing evolution and position themselves to influence the process to incorporate security as an inherent property. The best way to predict future computing trends is to look at recent developments and their motivations. Organizations are moving towards outsourcing their data storage, computation, and even user desktop environments. This trend toward cloud computing has a direct impact on cyber security: rather than securing user machines, preventing malware access, and managing removable media, a cloud-based security scheme must focus on enabling secure communication with remote systems. This change in approach will have profound implications for cyber security research efforts. In this work, we highlight existing and emerging technologies and the limitations of cloud computing systems. We then discuss the cyber security efforts that would support these applications. Finally, we discuss the implications of these computing architecture changes, in particular with respect to malware and social engineering.

  17. Security Technologies for Open Networking Environments (STONE)

    SciTech Connect

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  18. Challenges and Responses to Asian Food Security

    NASA Astrophysics Data System (ADS)

    Teng, Paul P. S.; Oliveros, Jurise A. P.

    2015-10-01

    Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.

  19. Security Force Assistance and Security Sector Reform

    DTIC Science & Technology

    2013-09-01

    development, and planning, 63 Shultz: Security Force Assistance and Security Sector Reform budgeting and management are critical in reforming a defense...and Security Sector Reform Richard H. Shultz, Jr. JSOU Report 13-5 September 2013 Joint Special Operations University 7701 Tampa Point Boulevard...Assistance and Security Sector Reform 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  20. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  1. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    2005-01-01

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  2. [Advances and challenges in health economics].

    PubMed

    Pena, P H; Arredondo, A; Ortiz, C; Rosenthal, G

    1995-08-01

    Health economics is a specialized field of economic science that applies the economic perspective to the fields of health, the medical-industrial complex and health services. A brief review of the evolution of this speciality by subject, as well as the level achieved assessed in terms of generation, diffusion, reproduction and application of its specialized knowledge, is presented.

  3. The Economic Value of Higher Teacher Quality

    ERIC Educational Resources Information Center

    Hanushek, Eric A.

    2011-01-01

    Most analyses of teacher quality end without any assessment of the economic value of altered teacher quality. This paper combines information about teacher effectiveness with the economic impact of higher achievement. It begins with an overview of what is known about the relationship between teacher quality and student achievement. This provides…

  4. Climate-derived tensions in Arctic security.

    SciTech Connect

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  5. Airship economics

    NASA Technical Reports Server (NTRS)

    Neumann, R. D.; Hackney, L. R. M.

    1975-01-01

    Projected operating and manufacturing costs of a large airship design which are considered practical with today's technology and environment are discussed. Data and information developed during an 18-month study on the question of feasibility, engineering, economics and production problems related to a large metalclad type airship are considered. An overview of other classic airship designs are provided, and why metalclad was selected as the most prudent and most economic design to be considered in the 1970-80 era is explained. Crew operation, ATC and enroute requirements are covered along with the question of handling, maintenance and application of systems to the large airship.

  6. Behavioral economics: reunifying psychology and economics.

    PubMed

    Camerer, C

    1999-09-14

    "Behavioral economics" improves the realism of the psychological assumptions underlying economic theory, promising to reunify psychology and economics in the process. Reunification should lead to better predictions about economic behavior and better policy prescriptions.

  7. Comparing Science Achievement Constructs: Targeted and Achieved

    ERIC Educational Resources Information Center

    Ferrara, Steve; Duncan, Teresa

    2011-01-01

    This article illustrates how test specifications based solely on academic content standards, without attention to other cognitive skills and item response demands, can fall short of their targeted constructs. First, the authors inductively describe the science achievement construct represented by a statewide sixth-grade science proficiency test.…

  8. Cleaner Cooking Solutions to Achieve Health, Climate, and Economic Cobenefits

    EPA Science Inventory

    Nearly half the world’s population has to rely on solid fuels such as biomass (wood, charcoal, agricultural residues, and animal dung) and coal for household energy, burning them in inefficient open fires and stoves with inadequate ventilation. Household solid fuel combustion is...

  9. An Analysis of How Multicultural Adult Orphans Achieve Economic Success

    ERIC Educational Resources Information Center

    Simonee, Saundra W.

    2014-01-01

    Successful multicultural adult orphans who were not adopted pose an interesting challenge in their history, their physical, psychological, social emotional and personal identity development. One must understand their journey from orphanhood to adulthood and their current prominent status in life to build a contextualized personal story (Banks,…

  10. Barometers of Black Economic Achievement: the Reality and the Myth.

    ERIC Educational Resources Information Center

    Hurst, Beverly

    A comprehensive report on black employment in Chicago over the last decade is described. Employment, income, occupation, and industry are the four barometers analyzed. One finding of this analysis is that the proportion of unemployed blacks is twice that of whites. Both in Chicago and in the rest of the country, the dollar gap between median white…

  11. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  12. Developing a Security Metrics Scorecard for Healthcare Organizations.

    PubMed

    Elrefaey, Heba; Borycki, Elizabeth; Kushniruk, Andrea

    2015-01-01

    In healthcare, information security is a key aspect of protecting a patient's privacy and ensuring systems availability to support patient care. Security managers need to measure the performance of security systems and this can be achieved by using evidence-based metrics. In this paper, we describe the development of an evidence-based security metrics scorecard specific to healthcare organizations. Study participants were asked to comment on the usability and usefulness of a prototype of a security metrics scorecard that was developed based on current research in the area of general security metrics. Study findings revealed that scorecards need to be customized for the healthcare setting in order for the security information to be useful and usable in healthcare organizations. The study findings resulted in the development of a security metrics scorecard that matches the healthcare security experts' information requirements.

  13. Expeditionary Economics: A Risky Endeavor

    DTIC Science & Technology

    2012-05-22

    from the sixteenth and seventeenth centuries discuss a government-centric style of policies known as Mercantilism . This term was first coined by the...Count de Mirabeau in 1763 and addressed the governmental control of trade in order to secure state interests.21 Mercantilism encouraged importation...contributors to a nation’s wealth. In Smith’s view, the ideal economy is a self-regulating market system that automatically satisfies the economic

  14. Beyond a series of security nets: Applying STAMP & STPA to port security

    SciTech Connect

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systems and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.

  15. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE PAGES

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  16. Which Achievement Gap?

    ERIC Educational Resources Information Center

    Anderson, Sharon; Medrich, Elliott; Fowler, Donna

    2007-01-01

    From the halls of Congress to the local elementary school, conversations on education reform have tossed around the term "achievement gap" as though people all know precisely what that means. As it's commonly used, "achievement gap" refers to the differences in scores on state or national achievement tests between various…

  17. Home Economics.

    ERIC Educational Resources Information Center

    Ontario Dept. of Education, Toronto. School Planning and Building Research Section.

    This presentation of suggested layouts and specifications for home economics facilities has been prepared to be of service to school boards, architects, teachers, and administrators who are planning new schools or making renovations to existing structures. Room layouts are shown for a foods and nutrition room, or the foods and nutrition area of a…

  18. Basketball Economics.

    ERIC Educational Resources Information Center

    Scheinman, Daniel; Scheinman, Ted

    This teaching unit offers five economics lessons related to basketball. Lessons include: (1) "Money, Money, Money in the Basketball Player's World"; (2) "Take Me to the Basketball Game Lesson"; (3) "What Does It Take?"; (4) "Productivity of a Basketball Player"; and (5) "Congratulations! You Just Won…

  19. Economic impact

    SciTech Connect

    Technology Transfer Department

    2001-06-01

    In federal fiscal year 2000 (FY00), Berkeley Lab had 4,347 full- and part-time employees. In addition, at any given time of the year, there were more than 1,000 Laboratory guests. These guests, who also reside locally, have an important economic impact on the nine-county Bay Area. However, Berkeley Lab's total economic impact transcends the direct effects of payroll and purchasing. The direct dollars paid to the Lab's employees in the form of wages, salaries, and benefits, and payments made to contractors for goods and services, are respent by employees and contractors again and again in the local and greater economy. Further, while Berkeley Lab has a strong reputation for basic scientific research, many of the Lab's scientific discoveries and inventions have had direct application in industry, spawning new businesses and creating new opportunities for existing firms. This analysis updates the Economic Impact Analysis done in 1996, and its purpose is to describe the economic and geographic impact of Laboratory expenditures and to provide a qualitative understanding of how Berkeley Lab impacts and supports the local community. It is intended as a guide for state, local, and national policy makers as well as local community members. Unless otherwise noted, this analysis uses data from FY00, the most recent year for which full data are available.

  20. Resource Economics

    NASA Astrophysics Data System (ADS)

    Conrad, Jon M.

    2000-01-01

    Resource Economics is a text for students with a background in calculus, intermediate microeconomics, and a familiarity with the spreadsheet software Excel. The book covers basic concepts, shows how to set up spreadsheets to solve dynamic allocation problems, and presents economic models for fisheries, forestry, nonrenewable resources, stock pollutants, option value, and sustainable development. Within the text, numerical examples are posed and solved using Excel's Solver. These problems help make concepts operational, develop economic intuition, and serve as a bridge to the study of real-world problems of resource management. Through these examples and additional exercises at the end of Chapters 1 to 8, students can make dynamic models operational, develop their economic intuition, and learn how to set up spreadsheets for the simulation of optimization of resource and environmental systems. Book is unique in its use of spreadsheet software (Excel) to solve dynamic allocation problems Conrad is co-author of a previous book for the Press on the subject for graduate students Approach is extremely student-friendly; gives students the tools to apply research results to actual environmental issues

  1. Cable Economics.

    ERIC Educational Resources Information Center

    Cable Television Information Center, Washington, DC.

    A guide to the economic factors that influence cable television systems is presented. Designed for local officials who must have some familiarity with cable operations in order to make optimum decisions, the guide analyzes the financial framework of a cable system, not only from the operators viewpoint, but also from the perspective of the…

  2. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  3. Democracy and economic development.

    PubMed

    Rao, V

    1985-01-01

    This discussion explains why democracy as is generally understood may not be suitable to meet the challenges of a developing economy and how democratic institutions generally fail to respond to the immediate demands of a population impatient to raise its level of living. It defines the terms economic development and democracy, reviews some theoretical models of democracy which have been proposed in economic theory, proposes an approach to the process of economic development, and considers problems of development. Economic development is a process which calls for huge investments in personnel and material. Such investment programs imply cuts in current consumption that would be painful at the low levels of living that exist in almost all developing societies. Governments need to resort to strong measures, and they must enforce them vigorously in order to marshal the surpluses required for investment. If such measures were put to a popular vote, they would certainly be defeated. Mainstream economic theory assumes the virtues of a market system and the decisions arrived at by the interaction of market forces. This is the economic equivalent of democracy. Yet, mainstream economic theory devotes little attention to the conditions under which a market system generates a just solution. The democratic developing countries have all inherited a class society, with a highly skewed distribution of income. The wealthy minority often seeks to preserve its privileged position and to enjoy the benefits of development. It even seeks the help of the judiciary to preserve the sanctity of private property and to assure that its patterns of conspicuous consumption can continue. This is done in the name of democratic rights. Many developing societies are burdened with outmoded traditions and value systems that are incompatible with the production relations of the new society they hope to achieve. The international exchange of resources is believed by some to be an attempt to control the

  4. Quantifiably secure power grid operation, management, and evolution :

    SciTech Connect

    Gray, Genetha Anne.; Watson, Jean-Paul; Silva Monroy, Cesar Augusto; Gramacy, Robert B.

    2013-09-01

    This report summarizes findings and results of the Quantifiably Secure Power Grid Operation, Management, and Evolution LDRD. The focus of the LDRD was to develop decisionsupport technologies to enable rational and quantifiable risk management for two key grid operational timescales: scheduling (day-ahead) and planning (month-to-year-ahead). Risk or resiliency metrics are foundational in this effort. The 2003 Northeast Blackout investigative report stressed the criticality of enforceable metrics for system resiliency the grids ability to satisfy demands subject to perturbation. However, we neither have well-defined risk metrics for addressing the pervasive uncertainties in a renewable energy era, nor decision-support tools for their enforcement, which severely impacts efforts to rationally improve grid security. For day-ahead unit commitment, decision-support tools must account for topological security constraints, loss-of-load (economic) costs, and supply and demand variability especially given high renewables penetration. For long-term planning, transmission and generation expansion must ensure realized demand is satisfied for various projected technological, climate, and growth scenarios. The decision-support tools investigated in this project paid particular attention to tailoriented risk metrics for explicitly addressing high-consequence events. Historically, decisionsupport tools for the grid consider expected cost minimization, largely ignoring risk and instead penalizing loss-of-load through artificial parameters. The technical focus of this work was the development of scalable solvers for enforcing risk metrics. Advanced stochastic programming solvers were developed to address generation and transmission expansion and unit commitment, minimizing cost subject to pre-specified risk thresholds. Particular attention was paid to renewables where security critically depends on production and demand prediction accuracy. To address this

  5. Cyber Security and Resilient Systems

    SciTech Connect

    Robert S. Anderson

    2009-07-01

    next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  6. Reusable Security Requirements

    DTIC Science & Technology

    2016-06-13

    terms of subfactor of security quality factor, asset, threat, attacker, and situation • Standard measures for security subfactors • Parameterized...2003 by Carnegie Mellon University page 5 Carnegie Mellon Software Engineering Institute Types of Security Requirements Use Quality Model of factors...subfactors, criteria, and measures. Small number of Security Quality Subfactors: • Access Control (Identification, Authentication, and Authorization

  7. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  8. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  9. School Security Roundtable, 2000.

    ERIC Educational Resources Information Center

    Agron, Joe, Ed.; Anderson, Larry, Ed.

    A roundtable discussion is presented revealing what experts say about school security problems and how they are being addressed. Also included are trend data from the School Security 2000 survey revealing top security concerns, strategies, and security equipment preferences; how site surveys can be used to keep schools safe; and how creating a…

  10. Educational Interests and Achievement

    ERIC Educational Resources Information Center

    Thomas, Lucinda E.; and others

    1970-01-01

    Findings partially support assumption that educational interests are factors related to academic success. Seven areas of the Educational Interest Inventory used were: Business Administration, Botany, Chemistry, History and Political Science, Sociology, Economics, and Mathematics. (Author/CJ)

  11. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  12. The Role of Information Technology in National Security Policy

    DTIC Science & Technology

    1994-01-01

    processes that add to the economic and military dimensions of national security. The model uses a " systems thinking " approach. It attempts to integrate...perspective on national security into a multidisciplinary and coherent body of theory and practice from a holistic " systems thinking " view.

  13. Consumers and Food Security: Uncertain or Empowered?

    ERIC Educational Resources Information Center

    Kneafsey, Moya; Dowler, Elizabeth; Lambie-Mumford, Hannah; Inman, Alex; Collier, Rosemary

    2013-01-01

    Provoked by concerns about climate change, resource depletion and economic recession, the concept of food security has experienced a renaissance in international policy and research agendas. Despite this interest, the problem of food insecurity in wealthy countries has still not received enough attention. We argue that it is worthy of research and…

  14. Ease Security Limits on Research, Panel Says

    ERIC Educational Resources Information Center

    Monastersky, Richard

    2007-01-01

    Security restrictions imposed since 2001 have unnecessarily constrained university researchers, and those controls should be loosened in order to enhance the nation's economic and strategic competitiveness, says a report issued by the National Research Council of the National Academies. The report's authors, a committee of high-ranking officials…

  15. Quality of protection evaluation of security mechanisms.

    PubMed

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  16. Quality of Protection Evaluation of Security Mechanisms

    PubMed Central

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  17. Survey of holographic security systems

    NASA Astrophysics Data System (ADS)

    Kontnik, Lewis T.; Lancaster, Ian M.

    1990-04-01

    The counterfeiting of products and financial instruments is a major problem throughout the world today. The dimensions of the problem are growing, accelerated by the expanding availability of production technologies to sophisticated counterfeiters and the increasing capabilities of these technologies. Various optical techniques, including holography, are beingused in efforts to mark authentic products and to distinguish them from copies. Industry is recognizing that the effectiveness of these techniques depends on such factors as the economics of the counterfeiting process and the distribution channels for the products involved, in addition to the performance of the particular optical security technologies used. This paper surveys the nature of the growing counterfeit market place and reviews the utility of holographic optical security systems. In particular, we review the use of holograms on credit cards and other products; and outline certain steps the holography industry should take to promote these application.

  18. Global climate change and international security.

    SciTech Connect

    Karas, Thomas H.

    2003-11-01

    This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national and international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.

  19. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy... achieve national health security and to implement the first quadrennial National Health Security Strategy... the National Health Security Strategy of the United States of America (2009) the U.S. Government...

  20. Assessment of global water security: moving beyond water scarcity assessment

    NASA Astrophysics Data System (ADS)

    Wada, Y.; Gain, A. K.; Giupponi, C.

    2015-12-01

    Water plays an important role in underpinning equitable, stable and productive societies, and the ecosystems on which we depend. Many international river basins are likely to experience 'low water security' over the coming decades. Hence, ensuring water security along with energy and food securities has been recognised as priority goals in Sustainable Development Goals (SDGs) by the United Nations. This water security is not rooted only in the limitation of physical resources, i.e. the shortage in the availability of freshwater relative to water demand, but also on social and economic factors (e.g. flawed water planning and management approaches, institutional incapability to provide water services, unsustainable economic policies). Until recently, advanced tools and methods are available for assessment of global water scarcity. However, integrating both physical and socio-economic indicators assessment of water security at global level is not available yet. In this study, we present the first global understanding of water security using a spatial multi-criteria analysis framework that goes beyond available water scarcity assessment. For assessing water security at global scale, the term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The Water security index is calculated by aggregating the indicators using both simple additive weighting (SAW) and ordered weighted average (OWA).

  1. [Rural Manpower Development Program, Achievement Report.

    ERIC Educational Resources Information Center

    New Jersey Office of Economic Opportunity, Trenton.

    The Rural Manpower Development Program (RMDP) is an agency of the New Jersey Office of Economic Opportunity established for the purpose of demonstrating the feasibility of a comprehensive manpower service for unemployed or underemployed disadvantaged people from the rural areas of New Jersey. Included in this achievement report is historical and…

  2. Closing the Achievement Gap: Four States' Efforts

    ERIC Educational Resources Information Center

    Wixom, Micah Ann

    2015-01-01

    The achievement gap separating economically disadvantaged students from their more advantaged peers disproportionately affects students of color and has been the focus of discussion, research and controversy for more than 40 years. While the gap between black and white students narrowed considerably from the 1950s to the 1980s, that gap has…

  3. Can Economics Provide Insights into Trust Infrastructure?

    NASA Astrophysics Data System (ADS)

    Vishik, Claire

    Many security technologies require infrastructure for authentication, verification, and other processes. In many cases, viable and innovative security technologies are never adopted on a large scale because the necessary infrastructure is slow to emerge. Analyses of such technologies typically focus on their technical flaws, and research emphasizes innovative approaches to stronger implementation of the core features. However, an observation can be made that in many cases the success of adoption pattern depends on non-technical issues rather than technology-lack of economic incentives, difficulties in finding initial investment, inadequate government support. While a growing body of research is dedicated to economics of security and privacy in general, few theoretical studies in this area have been completed, and even fewer that look at the economics of “trust infrastructure” beyond simple “cost of ownership” models. This exploratory paper takes a look at some approaches in theoretical economics to determine if they can provide useful insights into security infrastructure technologies and architectures that have the best chance to be adopted. We attempt to discover if models used in theoretical economics can help inform technology developers of the optimal business models that offer a better chance for quick infrastructure deployment.

  4. Cyber security challenges in Smart Cities: Safety, security and privacy

    PubMed Central

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  5. Cyber security challenges in Smart Cities: Safety, security and privacy.

    PubMed

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  6. Prelude and Postlude to the Self: Correlates of Achieved Identity.

    ERIC Educational Resources Information Center

    Hoegh, Dana G.; Bourgeois, Martin J.

    2002-01-01

    Examined relationships between Erikson's notion of identity status and several self-related variables hypothesized to be antecedents and consequences of achieved identity. College student surveys indicated that degree of parental care and trust predicted identity achievement, which in turn predicted secure attachment and vitality. Identity…

  7. Security Design of Remote Maintenance Systems for Nuclear Power Plants Based on ISO/IEC 15408

    NASA Astrophysics Data System (ADS)

    Watabe, Ryosuke; Oi, Tadashi; Endo, Yoshio

    This paper presents a security design of remote maintenance systems for nuclear power plants. Based on ISO/IEC 15408, we list assets to be protected, threats to the assets, security objectives against the threats, and security functional requirements that achieve the security objectives. Also, we show relations between the threats and the security objectives, and relations between the security objectives and the security functional requirements. As a result, we concretize a necessary and sufficient security design of remote maintenance systems for nuclear power plants that can protect the instrumentation and control system against intrusion, impersonation, tapping, obstruction and destruction.

  8. Secure and Efficient Routable Control Systems

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  9. Risk and Protective Factors and Achievement of Children At Risk.

    ERIC Educational Resources Information Center

    Krasner, Diane

    A study was done to identify social, economic, and childhood characteristics of high and low achieving children living in adverse environmental conditions, and to test the association between achievement and specific risk and protective factors. In addition, the study identified the most powerful model for predicting achievement by comparing…

  10. Social security reform ideas in Japan.

    PubMed

    Watanabe, Noriyasu

    2002-01-01

    Japan has a complex social security system. This article discusses the demographic and economic situation in Japan as background for understanding the setting in which the social security system functions. Japan has a three-pillar system for retirement income. The first pillar is the social security pension plan; the second pillar is the voluntary occupational pension plan; and the third pillar is personal savings, including the personal pension plan. The most important part of the retirement income system is the social security pension plan, which paid benefits accounting for 64% of the total income of elderly households in 1998. The five Employees' Pension Plans are established on a compulsory social insurance basis. Most large Japanese employers have a mandatory retirement age. Over 90% of all employees, including public sector ones, must retire from their career jobs at age 60.

  11. Security-by-design handbook.

    SciTech Connect

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji; Ochiai, Kazuya; Iida, Toru

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  12. 'No delays achiever'.

    PubMed

    2007-05-01

    The latest version of the NHS Institute for Innovation and Improvement's 'no delays achiever', a web based tool created to help NHS organisations achieve the 18-week target for GP referrals to first treatment, is available at www.nodelaysachiever.nhs.uk.

  13. Vicarious Achievement Orientation.

    ERIC Educational Resources Information Center

    Leavitt, Harold J.; And Others

    This study tests hypotheses about achievement orientation, particularly vicarious achievement. Undergraduate students (N=437) completed multiple-choice questionnaires, indicating likely responses of one person to the success of another. The sex of succeeder and observer, closeness of relationship, and setting (medical school or graduate school of…

  14. Heritability of Creative Achievement

    ERIC Educational Resources Information Center

    Piffer, Davide; Hur, Yoon-Mi

    2014-01-01

    Although creative achievement is a subject of much attention to lay people, the origin of individual differences in creative accomplishments remain poorly understood. This study examined genetic and environmental influences on creative achievement in an adult sample of 338 twins (mean age = 26.3 years; SD = 6.6 years). Twins completed the Creative…

  15. Confronting the Achievement Gap

    ERIC Educational Resources Information Center

    Gardner, David

    2007-01-01

    This article talks about the large achievement gap between children of color and their white peers. The reasons for the achievement gap are varied. First, many urban minorities come from a background of poverty. One of the detrimental effects of growing up in poverty is receiving inadequate nourishment at a time when bodies and brains are rapidly…

  16. Achievement-Based Resourcing.

    ERIC Educational Resources Information Center

    Fletcher, Mike; And Others

    1992-01-01

    This collection of seven articles examines achievement-based resourcing (ABR), the concept that the funding of educational institutions should be linked to their success in promoting student achievement, with a focus on the application of ABR to postsecondary education in the United Kingdom. The articles include: (1) "Introduction" (Mick…

  17. States Address Achievement Gaps.

    ERIC Educational Resources Information Center

    Christie, Kathy

    2002-01-01

    Summarizes 2 state initiatives to address the achievement gap: North Carolina's report by the Advisory Commission on Raising Achievement and Closing Gaps, containing an 11-point strategy, and Kentucky's legislation putting in place 10 specific processes. The North Carolina report is available at www.dpi.state.nc.us.closingthegap; Kentucky's…

  18. Economic Value of Army Foreign Military Sales

    DTIC Science & Technology

    2015-12-01

    manufacturing learning curves. Additional costs were avoided by reducing gaps in production lines. Furthermore, we determined that the Army’s FMS strategy needs... learning curve, economic order quantity, cost avoidance 15. NUMBER OF PAGES 87 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...costs due to higher economic order quantities, reduced overhead costs per unit, and reduced unit costs resulting from manufacturing learning curves

  19. Secure resource management: Specifying and testing secure operating systems

    SciTech Connect

    Archer, M.; Frincke, D.A.; Levitt, K. . Div. of Computer Science)

    1990-04-10

    Much work has been devoted to methods for reasoning about the specifications of operating system specifications, the goal being to develop specifications for an operating system that are verified to be secure. Before the verification should be attempted, the specifications should be tested. This paper presents tools that can assist in the security testing of specifications. The first tool is based on the final Algebra Specification and Execution (FASE) system, and would be used to test specifications with real input values. FASE is an executable specification language which is operational in style, in which entities are represented in terms of their observable behavior. To facilitate the testing of an operating system (and its specification), use FASE we have specified a Secure Resource Manager (SRM), a generic template of an operating system. The SRM specification can be specialized to a specification of a particular operating system; the SRM is quite general and handles most features of modern nondistributed operating systems. The second tool, called the PLANNER, is used to derive a sequence of operations that exhibits a security flaw, most often a covert channel for information flow. The PLANNER is based on classical methods of AI planning, specialized to achieve goals concerned with information flow. The tools are demonstrated with respect to a simple operating system specification develop by Millen.

  20. Abortion: a national security issue.

    PubMed

    Mumford, S D

    1982-04-15

    The national security implications of abortion have not been addressed in a public forum but could come to be the single most important facet of the abortion debate. Abortion has been and will continue to be an essential variable in fertility control. Any serious effort at population growth control in the next few decades will have to recognize the role abortion has in birth rate decline. At this time an estimated 40-50 million abortions are performed worldwide each year; 1/2 of them are illegal. In the absence of abortion, annual growth would approach approximately 120 million. Growth of this magnitude would probably place intolerable strains on the economics and environments of some nations. To recognize the role of abortion in fertility control is to emphasize the inescapable need for abortion as 1 element in any comprehensive family planning service. Excessive population growth leads to chronic unemployment and the frustration of the goals of hundreds of millions of people. While this new threat to the security of individual nations and ultimately to global security has not been widely acknowledged, it is beginning to gain the attention of people of different professions and distinctive political persuasions. In many ways, rampant population growth is an even more dangerous and subtle threat to the world than thermonuclear war, for it is intrinsically less subject to rational safeguards and less amenable to organized control. Possibly the greatest and most pervasive problem is the declining ability to meet human needs in the areas of food, raw material, and resources, counterpoised against what are clearly rising expectations of growing populations. The following facts cannot be disputed: world population is a threat to the security of all nations, including the U.S.; abortion is essential to any effective population growth control effort; abortion is a national security issue; and as the availability of legal abortion in the U.S. goes, so goes the availability

  1. What Should We Do about Food Security? Discussion Paper.

    ERIC Educational Resources Information Center

    Badir, Doris R.

    1996-01-01

    Food supply and scarcity are closely linked with issues of gender and poverty. Traditional economic development models do not guarantee equitable distribution. Home economists, with their knowledge of the economic food chain and women's cooperative enterprises, can work to improve food security worldwide. (SK)

  2. National Security Technology Incubator Business Plan

    SciTech Connect

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  3. Targeting Clusters, Achieving Excellence.

    ERIC Educational Resources Information Center

    Rosenfeld, Stuart; Jacobs, Jim; Liston, Cynthia

    2003-01-01

    Suggests that groups, or clusters, of industries form partnerships with community colleges in order to positively impact economic development. Asserts that a cluster-oriented community college system requires innovation, specialized resources and expertise, knowledge of trends, and links to industry. Offers suggestions for developing such a…

  4. Achievability for telerobotic systems

    NASA Astrophysics Data System (ADS)

    Kress, Reid L.; Draper, John V.; Hamel, William R.

    2001-02-01

    Methods are needed to improve the capabilities of autonomous robots to perform tasks that are difficult for contemporary robots, and to identify those tasks that robots cannot perform. Additionally, in the realm of remote handling, methods are needed to assess which tasks and/or subtasks are candidates for automation. We are developing a new approach to understanding the capability of autonomous robotic systems. This approach uses formalized methods for determining the achievability of tasks for robots, that is, the likelihood that an autonomous robot or telerobot can successfully complete a particular task. Any autonomous system may be represented in achievability space by the volume describing that system's capabilities within the 3-axis space delineated by perception, cognition, and action. This volume may be thought of as a probability density with achievability decreasing as the distance from the centroid of the volume increases. Similarly, any task may be represented within achievability space. However, as tasks have more finite requirements for perception, cognition, and action, each may be represented as a point (or, more accurately, as a small sphere) within achievability space. Analysis of achievability can serve to identify, a priori, the survivability of robotic systems and the likelihood of mission success; it can be used to plan a mission or portions of a mission; it can be used to modify a mission plan to accommodate unpredicted occurrences; it can also serve to identify needs for modifications to robotic systems or tasks to improve achievability. .

  5. 75 FR 40867 - Modifications to the HIPAA Privacy, Security, and Enforcement Rules Under the Health Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-14

    ... a person's social security number; date of birth; driver's license number, State identification.... 104-191), which added a new part C to title XI of the Social Security Act (sections 1171-1179 of the Social Security Act, 42 U.S.C. 1320d-1320d-8). The Health Information Technology for Economic...

  6. Bio-Security Proficiencies Project for Beginning Producers in 4-H

    ERIC Educational Resources Information Center

    Smith, Martin H.; Meehan, Cheryl L.; Borba, John A.

    2014-01-01

    Improving bio-security practices among 4-H members who raise and show project animals is important. Bio-security measures can reduce the risk of disease spread and mitigate potential health and economic risks of disease outbreaks involving animal and zoonotic pathogens. Survey data provided statistical evidence that the Bio-Security Proficiencies…

  7. Domestic Agricultural Subsidies’ Impacts on National Security Objectives Relative to the SOUTHCOM AOR

    DTIC Science & Technology

    2009-06-12

    domestic policies that impact regional security concerns? Background The United States National Security Strategy, National Defense Strategy...due to the preponderance of information regarding the impacts of such subsidies on new and future trade agreements. This thesis will address the...concerns of security and economic policy as an instrument of national power, specifically focusing on the impacts for the SOUTHCOM Commander. Although

  8. Behavioral economics: Reunifying psychology and economics

    PubMed Central

    Camerer, Colin

    1999-01-01

    “Behavioral economics” improves the realism of the psychological assumptions underlying economic theory, promising to reunify psychology and economics in the process. Reunification should lead to better predictions about economic behavior and better policy prescriptions. PMID:10485865

  9. Position of the academy of nutrition and dietetics: nutrition security in developing nations: sustainable food, water, and health.

    PubMed

    Nordin, Stacia M; Boyle, Marie; Kemmer, Teresa M

    2013-04-01

    It is the position of the Academy of Nutrition and Dietetics that all people should have consistent access to an appropriately nutritious diet of food and water, coupled with a sanitary environment, adequate health services, and care that ensure a healthy and active life for all household members. The Academy supports policies, systems, programs, and practices that work with developing nations to achieve nutrition security and self-sufficiency while being environmentally and economically sustainable. For nations to achieve nutrition security, all people must have access to a variety of nutritious foods and potable drinking water; knowledge, resources, and skills for healthy living; prevention, treatment, and care for diseases affecting nutrition status; and safety-net systems during crisis situations, such as natural disasters or deleterious social and political systems. More than 2 billion people are micronutrient deficient; 1.5 billion people are overweight or obese; 870 million people have inadequate food energy intake; and 783 million people lack potable drinking water. Adequate nutrient intake is a concern, independent of weight status. Although this article focuses on nutritional deficiencies in developing nations, global solutions for excesses and deficiencies need to be addressed. In an effort to achieve nutrition security, lifestyles, policies, and systems (eg, food, water, health, energy, education/knowledge, and economic) contributing to sustainable resource use, environmental management, health promotion, economic stability, and positive social environments are required. Food and nutrition practitioners can get involved in promoting and implementing effective and sustainable policies, systems, programs, and practices that support individual, community, and national efforts.

  10. Economic disruption and childhood obesity: distraction, disconnection, displacement of children's health, and a need for social change.

    PubMed

    Balog, Joseph E

    2015-04-01

    Using and adopting Simon Szreter's framework on how economic growth had a deleterious effect on children's health during the Industrial Revolution, this article presents a parallel argument that economic growth, in modern times, also has disrupted the lives of our children expressed by increasing rates of childhood obesity. A comprehensive perspective is presented that describes how economic growth in postindustrial United States has distracted our nation's attention away from a public health's concern for the health of children and social justice. The new normal of childhood obesity represents a disconnection from the harmful reality of childhood obesity and displaces the value of childhood health too far behind adult's pursuits of utility. To provide children a fair opportunity to health, and to help children secure their own future liberty and utility, children need to be able to achieve "just levels" of health that would ordinarily exist if remediable injustices that threaten health were reasonably addressed and eliminated.

  11. 41 CFR 101-27.102 - Economic order quantity principle.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Economic order quantity... MANAGEMENT 27.1-Stock Replenishment § 101-27.102 Economic order quantity principle. The economic order quantity (EOQ) principle is a means for achieving economical inventory management. Application of the...

  12. 41 CFR 101-27.102 - Economic order quantity principle.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 2 2013-07-01 2012-07-01 true Economic order quantity... MANAGEMENT 27.1-Stock Replenishment § 101-27.102 Economic order quantity principle. The economic order quantity (EOQ) principle is a means for achieving economical inventory management. Application of the...

  13. 41 CFR 101-27.102 - Economic order quantity principle.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 41 Public Contracts and Property Management 2 2014-07-01 2012-07-01 true Economic order quantity... MANAGEMENT 27.1-Stock Replenishment § 101-27.102 Economic order quantity principle. The economic order quantity (EOQ) principle is a means for achieving economical inventory management. Application of the...

  14. 41 CFR 101-27.102 - Economic order quantity principle.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 41 Public Contracts and Property Management 2 2012-07-01 2012-07-01 false Economic order quantity... MANAGEMENT 27.1-Stock Replenishment § 101-27.102 Economic order quantity principle. The economic order quantity (EOQ) principle is a means for achieving economical inventory management. Application of the...

  15. Security system signal supervision

    SciTech Connect

    Chritton, M.R. ); Matter, J.C. )

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  16. Securing General Aviation

    DTIC Science & Technology

    2009-03-03

    ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and

  17. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  18. Culture and Achievement Motivation

    ERIC Educational Resources Information Center

    Maehr, Martin L.

    1974-01-01

    A framework is suggested for the cross-cultural study of motivation that stresses the importance of contextual conditions in eliciting achievement motivation and emphasizes cultural relativity in the definition of the concept. (EH)

  19. Achieving Salary Equity

    ERIC Educational Resources Information Center

    Nevill, Dorothy D.

    1975-01-01

    Three techniques are outlined for use by higher education institutions to achieve salary equity: salary prediction (using various statistical procedures), counterparting (comparing salaries of persons of similar rank), and grievance procedures. (JT)

  20. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  1. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  2. Filling a Security Gap

    ERIC Educational Resources Information Center

    Parks and Recreation, 1978

    1978-01-01

    A new type of public facility security system, utilizing a radio system and voice logging recorder, has effectively improved security at the John F. Kennedy Center for the Performing Arts. The system monitors security operations, provides a reliable record in the case of conflicting claims, and accurately pinpoints the time of events. (DS)

  3. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  4. Lemnos interoperable security project.

    SciTech Connect

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  5. Secure Database Management Study.

    DTIC Science & Technology

    1978-12-01

    3.1.2 McCauleYls Security Atoms Additional concepts are introduced in (MCCAES) which enhance the security aspects of the attribute- bar id model...sLgnificance. Physical access remains as an overriding factor of system security. Without protection of the physeal operating environment (computer

  6. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  7. Structuring Homeland Security

    DTIC Science & Technology

    2002-04-09

    20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for

  8. Climate change and food security.

    PubMed

    Gregory, P J; Ingram, J S I; Brklacich, M

    2005-11-29

    Dynamic interactions between and within the biogeophysical and human environments lead to the production, processing, distribution, preparation and consumption of food, resulting in food systems that underpin food security. Food systems encompass food availability (production, distribution and exchange), food access (affordability, allocation and preference) and food utilization (nutritional and societal values and safety), so that food security is, therefore, diminished when food systems are stressed. Such stresses may be induced by a range of factors in addition to climate change and/or other agents of environmental change (e.g. conflict, HIV/AIDS) and may be particularly severe when these factors act in combination. Urbanization and globalization are causing rapid changes to food systems. Climate change may affect food systems in several ways ranging from direct effects on crop production (e.g. changes in rainfall leading to drought or flooding, or warmer or cooler temperatures leading to changes in the length of growing season), to changes in markets, food prices and supply chain infrastructure. The relative importance of climate change for food security differs between regions. For example, in southern Africa, climate is among the most frequently cited drivers of food insecurity because it acts both as an underlying, ongoing issue and as a short-lived shock. The low ability to cope with shocks and to mitigate long-term stresses means that coping strategies that might be available in other regions are unavailable or inappropriate. In other regions, though, such as parts of the Indo-Gangetic Plain of India, other drivers, such as labour issues and the availability and quality of ground water for irrigation, rank higher than the direct effects of climate change as factors influencing food security. Because of the multiple socio-economic and bio-physical factors affecting food systems and hence food security, the capacity to adapt food systems to reduce their

  9. Economic impact of stimulated technological activity. Part 1: Overall economic impact of technological progress: Its measurement

    NASA Technical Reports Server (NTRS)

    1971-01-01

    Investigations were performed at the national economic level to explore the aggregate effects of technological progress on economic growth. Inadequacies in existing marco-economic yardsticks forced the study to focus on the cost savings effects achieved through technological progress. The central questions discussed in this report cover: (1) role of technological progress in economic growth, (2) factors determining the rate of economic growth due to technological progress; (3) quantitative measurements of relationships between technological progress, its determinants, and subsequent economic growth; and (4) effects of research and development activities of the space program. For Part 2, see N72-32174.

  10. An overview of American Indians and Alaska Natives in the context of Social Security and Supplemental Security Income.

    PubMed

    Smith-Kaprosy, Nolan; Martin, Patricia P; Whitman, Kevin

    2012-01-01

    This article examines the economic security of the American Indian and Alaska Native (AIAN) population by exploring AIAN receipt of Social Security benefits and Supplemental Security Income (SSI). This analysis uses data from the 2005-2009 American Community Survey Public Use Microdata Sample, which provides a larger AIAN sample size than many other sources, thereby enabling more reliable estimates. We find that adult AIANs are less likely to receive Social Security benefits and more likely to receive SSI than are adults in the total population. In both programs, median benefit amounts are lower for AIAN recipients than for recipients in the total population.

  11. China-Pakistan Economic Corridor.

    SciTech Connect

    Boyce, Tucker

    2017-01-01

    International trade and related economic activities in Central and South Asia are increasing as developing economies, particularly India and Pakistan, grow. China continues to emerge as a major regional and global power and has embarked upon numerous regional economic and political initiatives . A major development is the China - Pakistan Economic Corridor (CPEC), a host of infrastructure and trade projects worth over 40 billion American dollars . This report analyzes CPEC a nd its potential regional effects, including the trade security implications of the port and land infrastructure developments . As trade increase s in the reg ion and the major CPEC infrastructure projects are completed, there will be numerous implications on trade security and geopolitics within South Asia. CPEC projects uniquely intersect numerous regional situations, including territorial disputes in Kashmir, the Afghanistan/Pakistan border, and Chinese foreign policy a mbitions. A nuanced understanding of these effects can influence future policy adjustments in this region . The views expressed in this report are those of the author and do not necessarily reflect the position of Sandia National Laboratories or the author's current and past institutions.

  12. Squaring Farm Security and Food Security in Two Types of Alternative Food Institutions

    ERIC Educational Resources Information Center

    Guthman, Julie; Morris, Amy W.; Allen, Patricia

    2006-01-01

    Even though both farmers' markets and community supported agriculture were first developed to provide markets for farmers, recently the goals of food security have been attached to these market-based alternative food institutions, based on their potential to be "win-win" economic solutions for both small-scale farmers and low-income consumers.…

  13. Secure Transportation Management

    SciTech Connect

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  14. Medical database security evaluation.

    PubMed

    Pangalos, G J

    1993-01-01

    Users of medical information systems need confidence in the security of the system they are using. They also need a method to evaluate and compare its security capabilities. Every system has its own requirements for maintaining confidentiality, integrity and availability. In order to meet these requirements a number of security functions must be specified covering areas such as access control, auditing, error recovery, etc. Appropriate confidence in these functions is also required. The 'trust' in trusted computer systems rests on their ability to prove that their secure mechanisms work as advertised and cannot be disabled or diverted. The general framework and requirements for medical database security and a number of parameters of the evaluation problem are presented and discussed. The problem of database security evaluation is then discussed, and a number of specific proposals are presented, based on a number of existing medical database security systems.

  15. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  16. 48 CFR 3052.216-70 - Evaluation of offers subject to an economic price adjustment clause.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... subject to an economic price adjustment clause. 3052.216-70 Section 3052.216-70 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES... Evaluation of offers subject to an economic price adjustment clause. As prescribed in (HSAR) 48 CFR...

  17. 48 CFR 3016.203 - Fixed price contracts with economic price adjustments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... economic price adjustments. 3016.203 Section 3016.203 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CONTRACT METHODS AND CONTRACT TYPES TYPES OF CONTRACTS Fixed-Price Contracts 3016.203 Fixed price contracts with economic price adjustments....

  18. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... 45—Tables of Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005...

  19. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005 ER13JA12.006...

  20. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005 ER13JA12.006...

  1. The Causes of Poverty: Thinking Critically about a Key Economic Issue

    ERIC Educational Resources Information Center

    Otlin, Josh

    2008-01-01

    Economics is a central part of civic education. Students need to know about the Constitution and the party system, but active citizenship in the twenty-first century requires much more than the standard civics courses offer. Economic issues dominate public policy debates ranging from Social Security to immigration to international security. If…

  2. Developing and Implementing an Effective National Security Strategy for Croatia

    DTIC Science & Technology

    2013-03-01

    documents. The final analysis identifies problems in the insufficient national security system and the lack of political want to efficiently deal with...national security system and the lack of political want to efficiently deal with national security issues. The essay ends with several...Croatia and abroad, and all the political parties used every available means including their lives to achieve all national goals which is obvious from

  3. Information Security Status in Organisations 2008

    NASA Astrophysics Data System (ADS)

    Tawileh, Anas; Hilton, Jeremy; McIntosh, Stephen

    This paper presents the results of the latest survey on information security management and pracitces in organisations. The study is based on a holistic approach to information security that does not confine itself to technical measures and technology implementations, but encompasses other equally important aspects such as human, social, motiviational and trust. In order to achieve this purpose, a comprehensive intellectual framework of the concepts of information security using Soft Systems Methodology (SSM) was utilised. The survey questions were drived from this conceptual model to ensure their coherence, completeness and relevance to the topic being addressed. The paper concludes with a discussion of the survey results and draws significant insight into the existing status of informaiton assurance in organisations that could be useful for security practitioners, researchers and managers.

  4. Linking hospital security to customer service: making the case for 'world class' security.

    PubMed

    Hill, Scott A

    2011-01-01

    The reluctance of many hospitals today to invest money and resources into security and safety while at the same time promoting customer good will is a fallacy that has to be corrected, according to the author. He demonstrates how high customer satisfaction scores, as well as regulatory compliance, can only be achieved if a hospital takes the steps necessary to provide adequate safety and security to patients, visitors, physicians and to all who come to the hospital.

  5. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  6. Quantum Oblivious Transfer: a secure practical implementation

    NASA Astrophysics Data System (ADS)

    Nagy, Marius; Nagy, Naya

    2016-12-01

    Together with bit commitment, Oblivious Transfer is a very useful cryptographic primitive with important applications, most notably in secure multiparty computations. It has been long known that secure Quantum Oblivious Transfer can be achieved from a secure implementation of Quantum Bit Commitment. Unfortunately, it is also well known that unconditionally secure Quantum Bit Commitment is impossible, so building a secure Oblivious Transfer protocol on top of Quantum Bit Commitment is ruled out. In this paper, we propose a relatively simple quantum protocol for Oblivious Transfer which does not require qubit storage, does not rely on bit commitment as a primitive and is easily implementable with current technology, if the two actors are honest. The protocol is proven to be secure against any individual measurements and entanglement-based attacks. Any cheating attempt trying to speculate collective measurements would be considerably difficult to put in practice, even in the near future. Furthermore, the number of qubits used in our scheme (embodied as photons in a physical realization of the protocol) acts as a security parameter, making it increasingly hard to cheat.

  7. A game-theoretical approach to multimedia social networks security.

    PubMed

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.

  8. A Game-Theoretical Approach to Multimedia Social Networks Security

    PubMed Central

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  9. SALT and Spelling Achievement.

    ERIC Educational Resources Information Center

    Nelson, Joan

    A study investigated the effects of suggestopedic accelerative learning and teaching (SALT) on the spelling achievement, attitudes toward school, and memory skills of fourth-grade students. Subjects were 20 male and 28 female students from two self-contained classrooms at Kennedy Elementary School in Rexburg, Idaho. The control classroom and the…

  10. Iowa Women of Achievement.

    ERIC Educational Resources Information Center

    Ohrn, Deborah Gore, Ed.

    1993-01-01

    This issue of the Goldfinch highlights some of Iowa's 20th century women of achievement. These women have devoted their lives to working for human rights, education, equality, and individual rights. They come from the worlds of politics, art, music, education, sports, business, entertainment, and social work. They represent Native Americans,…

  11. Schools Achieving Gender Equity.

    ERIC Educational Resources Information Center

    Revis, Emma

    This guide is designed to assist teachers presenting the Schools Achieving Gender Equity (SAGE) curriculum for vocational education students, which was developed to align gender equity concepts with the Kentucky Education Reform Act (KERA). Included in the guide are lesson plans for classes on the following topics: legal issues of gender equity,…

  12. Achieving Peace through Education.

    ERIC Educational Resources Information Center

    Clarken, Rodney H.

    While it is generally agreed that peace is desirable, there are barriers to achieving a peaceful world. These barriers are classified into three major areas: (1) an erroneous view of human nature; (2) injustice; and (3) fear of world unity. In a discussion of these barriers, it is noted that although the consciousness and conscience of the world…

  13. Explorations in achievement motivation

    NASA Technical Reports Server (NTRS)

    Helmreich, Robert L.

    1982-01-01

    Recent research on the nature of achievement motivation is reviewed. A three-factor model of intrinsic motives is presented and related to various criteria of performance, job satisfaction and leisure activities. The relationships between intrinsic and extrinsic motives are discussed. Needed areas for future research are described.

  14. Increasing Male Academic Achievement

    ERIC Educational Resources Information Center

    Jackson, Barbara Talbert

    2008-01-01

    The No Child Left Behind legislation has brought greater attention to the academic performance of American youth. Its emphasis on student achievement requires a closer analysis of assessment data by school districts. To address the findings, educators must seek strategies to remedy failing results. In a mid-Atlantic district of the Unites States,…

  15. Appraising Reading Achievement.

    ERIC Educational Resources Information Center

    Ediger, Marlow

    To determine quality sequence in pupil progress, evaluation approaches need to be used which guide the teacher to assist learners to attain optimally. Teachers must use a variety of procedures to appraise student achievement in reading, because no one approach is adequate. Appraisal approaches might include: (1) observation and subsequent…

  16. Cognitive Processes and Achievement.

    ERIC Educational Resources Information Center

    Hunt, Dennis; Randhawa, Bikkar S.

    For a group of 165 fourth- and fifth-grade students, four achievement test scores were correlated with success on nine tests designed to measure three cognitive functions: sustained attention, successive processing, and simultaneous processing. This experiment was designed in accordance with Luria's model of the three functional units of the…

  17. Graders' Mathematics Achievement

    ERIC Educational Resources Information Center

    Bond, John B.; Ellis, Arthur K.

    2013-01-01

    The purpose of this experimental study was to investigate the effects of metacognitive reflective assessment instruction on student achievement in mathematics. The study compared the performance of 141 students who practiced reflective assessment strategies with students who did not. A posttest-only control group design was employed, and results…

  18. Improving Educational Achievement.

    ERIC Educational Resources Information Center

    New York University Education Quarterly, 1979

    1979-01-01

    This is a slightly abridged version of the report of the National Academy of Education panel, convened at the request of HEW Secretary Joseph Califano and Assistant Secretary for Education Mary F. Berry, to study recent declines in student achievement and methods of educational improvement. (SJL)

  19. The Achievement Club

    ERIC Educational Resources Information Center

    Rogers, Ibram

    2009-01-01

    When Gabrielle Carpenter became a guidance counselor in Northern Virginia nine years ago, she focused on the academic achievement gap and furiously tried to close it. At first, she was compelled by tremendous professional interest. However, after seeing her son lose his zeal for school, Carpenter joined forces with other parents to form an…

  20. Achievement in Problem Solving

    ERIC Educational Resources Information Center

    Friebele, David

    2010-01-01

    This Action Research Project is meant to investigate the effects of incorporating research-based instructional strategies into instruction and their subsequent effect on student achievement in the area of problem-solving. The two specific strategies utilized are the integration of manipulatives and increased social interaction on a regular basis.…

  1. Essays on Educational Achievement

    ERIC Educational Resources Information Center

    Ampaabeng, Samuel Kofi

    2013-01-01

    This dissertation examines the determinants of student outcomes--achievement, attainment, occupational choices and earnings--in three different contexts. The first two chapters focus on Ghana while the final chapter focuses on the US state of Massachusetts. In the first chapter, I exploit the incidence of famine and malnutrition that resulted to…

  2. NCLB: Achievement Robin Hood?

    ERIC Educational Resources Information Center

    Bracey, Gerald W.

    2008-01-01

    In his "Wall Street Journal" op-ed on the 25th of anniversary of "A Nation At Risk", former assistant secretary of education Chester E. Finn Jr. applauded the report for turning U.S. education away from equality and toward achievement. It was not surprising, then, that in mid-2008, Finn arranged a conference to examine the…

  3. Making MANET secured against malicious attack

    NASA Astrophysics Data System (ADS)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  4. Economic Education: Forward to the Basics.

    ERIC Educational Resources Information Center

    Smith, Robert F.

    1994-01-01

    Maintains that educators can achieve instructional goals if students are provided with effective and interesting curricular activities. Describes the Entrepreneurship Economic Education Project in Clark County, Nevada. Asserts that it could serve as a model for community involvement in economics education. (CFR)

  5. Capstone Senior Research Course in Economics

    ERIC Educational Resources Information Center

    Li, Ishuan; Simonson, Robert

    2016-01-01

    In this article, the authors describe the structure and assessment of a capstone course in economics. The outcomes are noteworthy for three reasons. First, among cited evidence to date, this is the only undergraduate economics program from a nonselective public university reporting similar achievements in undergraduate research paper publications.…

  6. A case for avoiding security-enhanced HTTP tools to improve security for Web-based applications

    SciTech Connect

    Wood, B.

    1996-03-01

    This paper describes some of the general weaknesses of the current popular Hypertext Transmission Protocol (HTTP) security standards and products in an effort to show that these standards are not appealing for many applications. The author will then show how one can treat HTTP browsers and servers as untrusted elements in the network so that one can rely on other mechanisms to achieve better overall security than can be attained through today`s security-enhanced HTTP tools.

  7. Security basics for long-term care facilities.

    PubMed

    Green, Martin

    2015-01-01

    The need for Long-Term Care (LTC) facilities is growing, the author reports, and along with it the need for programs to address the major security concerns of such facilities. In this article he explains how to apply the IAHSS Healthcare Security Industry Guidelines and the Design Guidelines to achieve a safer LTC facility.

  8. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    ERIC Educational Resources Information Center

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  9. Breastfeeding and food security.

    PubMed

    1996-01-01

    Food security is especially important for mothers with infants and young children. Poor mothers or mothers living in harsh conditions (refugee camp, war zone, economic embargo, or natural disaster) who were not encouraged to breast feed face each day the need to respond to their hungry children. Protection of optimal breast feeding practices is a top priority. There are about 50 million refugees and internally displaced people in the world. This number increases by 12% annually. Around 2 million of these people are new mothers. Urban centers in both the developed and developing countries have increasing populations of unemployed and working poor. These people cannot afford breast milk substitutes. North American food banks cannot respond to the many requests for infant formula. Lack of potable water and a dependency on unavailable infant formula and supplies partially contributed to the increase in infant mortality rates in the war zones of Iraq and Bosnia. The increased dependency of sourcing clean water, an inexpensive and inferior breast milk substitute, and fuel for preparation must not exacerbate the burden of food insecurity for new mothers. Lactating mothers need nutritional and social support so they can meet their own needs and those of their children. UN agencies, governments, and infant feeding organizations have developed guidelines to support breast feeding in emergency and relief conditions and to make sure that infant formula manufacturers do not target families in emergencies. The solution to food insecurity is to feed the mother so she can feed her child. Successful breast feeding helps the mother's self-esteem and confidence, which in turn helps her care for herself and her family. Challenges in infant feeding policies include effecting effective promotion, protection, and support of breast feeding in emergencies; reducing unnecessary risks to mothers and infants when there is a limited need for breast milk substitutes; and countering the apparent

  10. 41 CFR 101-27.102 - Economic order quantity principle.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 27-INVENTORY... quantity (EOQ) principle is a means for achieving economical inventory management. Application of the...

  11. Why food in health security (FIHS)?

    PubMed

    Wahlqvist, Mark L

    2009-01-01

    Health is intrinsic to human security (HumS) although it is somewhat anthropocentric and about our own psychosocial and biomedical status more than various external threats. The 1994 United Nations Development Program definition of HumS includes economic, food, environmental, personal, community and political security with freedom from fear and want. Environmental factors are critical for health security (HealS), especially with widespread socio-economic difficulty, and health systems less affordable or accessible. The nexus between nutritionally-related disorders and infectious disease is the most pervasive world health problem. Most if not all of the Millennium Development Goals are food-linked. Maternal nutrition has life-long health effects on the yet-to-be born child. The mix of essential nutrient deprivation and energy imbalance is rife across many societies. Food systems require deeper understanding and governance to overcome these food-related health risks which are matters of food security (FoodS). Nutritionally-related Disability Adjusted Life Years (DALYS) are improving markedly in many parts of the world, along with poverty and hunger reduction and health system advances. But recent economic, energy, food, water, climate change and health crises along with conflict are limiting. It is time for international and regional understanding of how households and communities can collectively manage these threats in affordable and sustainable ways. There is untapped problem-solving capacity at the international local level if supported by combined food--health systems expertise, innovation, infrastructure and governance. Principles of equity and ethics must apply. The Food in Health Security (FIHS) roundtable aims to develop a Network to facilitate this process.

  12. Materialism and food security.

    PubMed

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  13. Urban environment and health: food security.

    PubMed

    Galal, Osman; Corroon, Meghan; Tirado, Cristina

    2010-07-01

    The authors examine the impact of urbanization on food security and human health in the Middle East. Within-urban-population disparities in food security represent one of the most dramatic indicators of economic and health disparities. These disparities are reflected in a double burden of health outcomes: increasing levels of chronic disease as well as growing numbers of undernourished among the urban poor. These require further comprehensive solutions. Some of the factors leading to food insecurity are an overdependence on purchased food commodities, lack of sufficient livelihoods, rapid reductions in peripheral agricultural land, and adverse impacts of climate change. The Food and Agriculture Organization of the United Nations (FAO) Food Security Framework is used to examine and compare 2 cities in the Middle East: Amman, Jordan, and Manama, Bahrain.

  14. Overview of Climate Confluence Security Issues

    NASA Astrophysics Data System (ADS)

    Reisman, J. P.

    2011-12-01

    Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.

  15. Faculty achievement tracking tool.

    PubMed

    Pettus, Sarah; Reifschneider, Ellen; Burruss, Nancy

    2009-03-01

    Faculty development and scholarship is an expectation of nurse educators. Accrediting institutions, such as the Commission on Collegiate Nursing Education, the National League for Nursing Accrediting Commission, and the Higher Learning Commission, all have criteria regarding faculty achievement. A faculty achievement tracking tool (FATT) was developed to facilitate documentation of accreditation criteria attainment. Based on criteria from accrediting organizations, the roles that are addressed include scholarship, service, and practice. Definitions and benchmarks for the faculty as an aggregate are included. Undergoing reviews from different accrediting organizations, the FATT has been used once for accreditation of the undergraduate program and once for accreditation of the graduate program. The FATT is easy to use and has become an excellent adjunct for the preparation for accreditation reports. In addition, the FATT may be used for yearly evaluations, advancement, and merit.

  16. Project ACHIEVE final report

    SciTech Connect

    1997-06-13

    Project ACHIEVE was a math/science academic enhancement program aimed at first year high school Hispanic American students. Four high schools -- two in El Paso, Texas and two in Bakersfield, California -- participated in this Department of Energy-funded program during the spring and summer of 1996. Over 50 students, many of whom felt they were facing a nightmare future, were given the opportunity to work closely with personal computers and software, sophisticated calculators, and computer-based laboratories -- an experience which their regular academic curriculum did not provide. Math and science projects, exercises, and experiments were completed that emphasized independent and creative applications of scientific and mathematical theories to real world problems. The most important outcome was the exposure Project ACHIEVE provided to students concerning the college and technical-field career possibilities available to them.

  17. Vehicle Tracking and Security

    NASA Astrophysics Data System (ADS)

    Scorer, A. G.

    1998-09-01

    This paper covers the wide area and short range locational technologies that are available for vehicle tracking in particular and mobile user security in general. It also summarises the radio communications services that can deliver information to the user. It considers the use that can be made of these technologies, when combined with procedures for delivering a response, in the security field, notably in relation to personal security, high-value load protection and the after-theft tracking markets.

  18. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  19. Clean and Secure Energy from Coal

    SciTech Connect

    Smith, Philip; Davies, Lincoln; Kelly, Kerry; Lighty, JoAnn; Reitze, Arnold; Silcox, Geoffrey; Uchitel, Kirsten; Wendt, Jost; Whitty, Kevin

    2014-08-31

    The University of Utah, through their Institute for Clean and Secure Energy (ICSE), performed research to utilize the vast energy stored in our domestic coal resources and to do so in a manner that will capture CO2 from combustion from stationary power generation. The research was organized around the theme of validation and uncertainty quantification (V/UQ) through tightly coupled simulation and experimental designs and through the integration of legal, environment, economics and policy issues.

  20. Seasonality of the dietary dimension of household food security in urban Burkina Faso.

    PubMed

    Becquey, Elodie; Delpeuch, Francis; Konaté, Amadou M; Delsol, Hervé; Lange, Matthias; Zoungrana, Mahama; Martin-Prevel, Yves

    2012-06-01

    Food insecurity is affecting an increasing number of urban poor in the developing world. Yet seasonal characteristics of food intakes have rarely been studied in West African cities. The objective of the present study was to assess the seasonality of the dietary dimension of household food security in Ouagadougou (Burkina Faso). In 2007, two sets of data were collected during the lean and post-harvest seasons, respectively, on a representative sample of 1056 households. At each season, two non-consecutive 24 h recalls were performed at the household level. Food prices were also recorded. Household food security was assessed by the household's mean adequacy ratio (MAR) for energy and eleven micronutrients. Changes in the MAR according to the season were analysed by mixed multivariate linear regression. Results showed that intakes of energy and of ten micronutrients were significantly lower during the lean season than during the post-harvest season, leading to a lower MAR in the lean season (49·61 v. 53·57, P < 0·0001). This was related to less frequent consumption and consumption of smaller amounts of vegetables and of foods prepared at home. Food security relied heavily on food expenses (P < 0·0001) and on the price of meat/fish (P = 0·026). Households with economically dependent adults (P = 0·021) and larger households (P < 0·0001) were the most vulnerable, whereas education (P = 0·030), social network (P = 0·054) and urban origin other than Ouagadougou (P = 0·040) played a positive role in food security. To achieve food security in Ouagadougou, access to micronutrient-dense foods needs to be ensured in all seasons.

  1. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  2. Kaliningrad and Baltic Security

    DTIC Science & Technology

    2001-06-01

    impossible to solve. By shifting the paradigm toward regional development and regional cooperation to address common problems, the future security relationship of the Baltic littoral becomes more optimistic.

  3. Laser security systems

    NASA Astrophysics Data System (ADS)

    Kolev, Ivan S.; Stoeva, Ivelina S.

    2004-06-01

    This report presents the development of single-beam barrier laser security system. The system utilizes the near infrared (IR) range λ=(850-900)nm. The security system consists of several blocks: Transmitter; Receiver; Logical Unit; Indication; Power Supply. There are four individually software programmable security zones Z1 - Z4. The control logic is implemented on a PIC16F84 MCU. The infrared beam is a pulse pack, coded and modulated in the transmitter with frequency of 36 kHz. The receiver demodulates and decodes the beam. The software for the MCU is developed along with the electrical circuits of the security system.

  4. secureBLAST.

    PubMed

    Wiezer, Arnim; Merkl, Rainer

    2003-01-01

    secureBLAST supplements NCBI wwwblast with features necessary to control in an easy manageable way usage of BLAST data sets and their update. The concept we implemented allows to offer on a single BLAST server several data sets with individually configurable access rights. Security is provided by user authentication and encryption of the http traffic via SSL. By using secureBLAST, the administration of users and databases can be done via a web interface. Therefore, secureBLAST is valuable for institutions that have to restrict access to their datasets or just want to administer BLAST servers via a web interface.

  5. Urban School Reform, Family Support, and Student Achievement

    ERIC Educational Resources Information Center

    Greene, Kiersten; Anyon, Jean

    2010-01-01

    Teachers and other education professionals find themselves in schools and districts bombarded by reforms--each one purporting to improve student achievement, particularly in reading and mathematics. This article lays the political economic groundwork of student achievement in urban areas in an attempt to contextualize the studies of literacy in…

  6. Promoting Student Academic Achievement through Faculty Development about Inclusive Teaching

    ERIC Educational Resources Information Center

    Schmid, Megan E.; Gillian-Daniel, Donald L.; Kraemer, Sara; Kueppers, Mark

    2016-01-01

    The achievement gap, disparities in the academic achievement of marginalized students (e.g., underrepresented minority, first generation in their family to attend college, and low socio-economic status undergraduate students) relative to their non-minority peers is a pervasive problem in higher education. It impacts student access to the major and…

  7. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  8. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  9. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  10. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  11. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security of the secured area. 1542.201 Section 1542.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT...

  12. Power, Profits, and Politics: Energy Security and Cooperation in Eurasia

    NASA Astrophysics Data System (ADS)

    Svyatets, Ekaterina

    This study explores varying outcomes of energy cooperation, defined as diplomatic relations, bilateral trade, and investment in oil and natural gas. Tests of theories pertinent to energy security - broadly speaking, realism, liberalism, and domestic politics---reveal that they alone can offer only a narrow and one-sided explanation, not embracing the complexity of energy issues. Nevertheless, using them as a starting point, this study outlined a structured framework that incorporates three variables---economic potential, geopolitical rivalry, and domestic interest groups---that are applied to the cases of U.S.-Russia, U.S.-Azerbaijan, and Russia-Germany energy ties. This study concludes that if the economic potential (defined by geographic proximity and resource availability) is very high, such as in the case of Russia-Germany, states can overcome geopolitical rivalries and historical enmities in favor of energy cooperation. However, if the economic potential is relatively low (because of geographic obstacles or easily available alternative suppliers, as in the cases of U.S.-Russia and U.S.-Azerbaijan), then geopolitics prevails---for example, to bypass Russia or to limit American access to contracts in Russia when U.S.-Russian relations are strained. In all the cases explored here, domestic interest groups have mixed influence: if they are united along energy issues, they usually successfully achieve their energy policy goals, although the impact of these groups often becomes intertwined with state interests. In other situations, when powerful interest groups are divided or focused on non-energy-related issues (such as ethnic priorities), their influence over energy deals is much lower.

  13. Essays in public economics

    NASA Astrophysics Data System (ADS)

    Seligman, Jason Scott

    2002-01-01

    Three essays in the field of public economics are included in this thesis. Chapter 1 begins this work with an introduction to public economics and places the remaining chapters in context. Like all economic agents, the government must manage its cash position. Chapter 2 considers this activity. Short-term financial requirements cause the government to solicit the market for bills not previously scheduled (Cash Management Bills). Using data from the US Treasury's Proprietary Domestic Finance Database, this chapter shows that these bills have higher costs than normal bills, suggesting that both Treasury and financial markets appreciate that demand is more inelastic for these instruments. In addition, this research identifies several factors that increase finance costs for Treasury in meeting short-term financial need. Chapter 3 explores location choices for generation investment in a re-regulated electricity market. Recently, there have been significant changes in the regulation of electricity in the State of California. These changes may affect generation investment behavior within the State, an important consideration for policy makers. This work identifies the impact of public sector regulatory change on private sector investment outcomes, by comparing the location and scope of electricity generation projects before and after two specific regulatory changes in air quality management and transmission tariff charges, while controlling for expected population growth patterns within the State. Significant changes in location preference are identified using factors for the northern and southern transmission zones, NP15 and SP15, the intermediate zone ZP26, and for areas outside of ISO control. Chapter 4 considers Disability Insurance and individual public pension investment accounts. Current debate on the Social Security Administration's long-term finance of benefits includes proposals for independent private investment via individual accounts. The author investigates

  14. Assessment of economic losses from marine pollution: an introduction to economic principles and methods.

    PubMed

    Ofiara, D D

    2001-09-01

    This paper introduces economic concepts and theory pertaining to public policy issues and concerns about pollution in marine environments. Many of these concepts and theories are unfamiliar to individuals and professionals outside the field of economics, such as biologists, ecologists, environmental lawyers, and even public policymakers. Yet many of these individuals observe economics in action, often for the first time, within a public policy arena. Exposure and a better understanding of the concepts and ideas in economics that are particularly relevant for public policies can help to achieve efficiencies in the form of better designed policies, and help to bridge communications gaps across other professions and the economics profession.

  15. Foundational Security Principles for Medical Application Platforms (Extended Abstract).

    PubMed

    Vasserman, Eugene Y; Hatcliff, John

    We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals.

  16. Foundational Security Principles for Medical Application Platforms* (Extended Abstract)

    PubMed Central

    Vasserman, Eugene Y.; Hatcliff, John

    2014-01-01

    We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096

  17. Pathways from Casual Employment to Economic Security: The Australian Experience

    ERIC Educational Resources Information Center

    Burgess, John; Campbell, Iain; May, Robyn

    2008-01-01

    Casual employment is extensive and has been increasing for more than two decades in Australia. The concept of casual employment used in the Australian context is unusual, but it is directly linked to benefit and rights exclusion within the regulatory framework governing employment. The expansion in casual employment has spread across all sectors,…

  18. Security and Economic Dimensions of the Transatlantic Partnership

    DTIC Science & Technology

    2005-06-01

    Mona Siminiuc June 2005 Thesis Advisor: Robert Looney Second Reader: Hans-Eberhard Peters Approved for public release; distribution is...from the NAVAL POSTGRADUATE SCHOOL June 2005 Author: Mona Siminiuc Approved by: Robert Looney Thesis Advisor Hans...

  19. The Effect of Energy Srategy on Australian Economic Security

    DTIC Science & Technology

    2014-12-12

    Geothermal power generation would appear to be ideal for Australia’s growing energy requirements. The system has negligible carbon emissions while under...construction and no carbon emissions at all during operation. Assuming sufficient suitable bedrock is available, geothermal systems are scalable to...36 Australian Energy Distribution Systems

  20. Anticipatory child fostering and household economic security in Malawi

    PubMed Central

    Bachan, Lauren K.

    2014-01-01

    BACKGROUND While there is a rich literature on the practice of child fostering in sub-Saharan Africa, little is known about how fostering impacts receiving households, as few studies consider household conditions both before and after fostering. Despite the fact that circumstances surrounding fostering vary, the literature’s key distinction of fostering is often drawn along the simple line of whether or not a household is fostering a child. This paper argues that anticipation of fostering responsibilities, in particular, is a useful dimension to distinguish fostering experiences for receiving households. OBJECTIVE This paper examines the relationship between receiving a foster child and subsequent changes in household wealth. Particular emphasis is placed on how these changes are conditioned by differing levels of anticipation of the fostering event. METHODS This study uses data from Tsogolo la Thanzi (TLT), a longitudinal survey in Balaka, Malawi. Using data from 1754 TLT respondents, fixed effects pooled time-series models are estimated to assess whether and how receiving a foster child changes household wealth. RESULTS This paper demonstrates the heterogeneity of fostering experiences for receiving households. The results show that households that anticipate fostering responsibilities experience a greater increase in household wealth than both households that do not foster and those that are surprised by fostering. CONCLUSION Households that anticipate fostering responsibilities exhibit the greatest increase in household wealth. While fostering households that do not anticipate fostering responsibilities may not experience these gains, there is no evidence to indicate that such households are negatively impacted relative to households that do not foster. This finding suggests that additional childcare responsibilities may not be as detrimental to African households as some researchers have feared. PMID:25419172