For telehealth to succeed, privacy and security risks must be identified and addressed.
Hall, Joseph L; McGraw, Deven
2014-02-01
The success of telehealth could be undermined if serious privacy and security risks are not addressed. For example, sensors that are located in a patient's home or that interface with the patient's body to detect safety issues or medical emergencies may inadvertently transmit sensitive information about household activities. Similarly, routine data transmissions from an app or medical device, such as an insulin pump, may be shared with third-party advertisers. Without adequate security and privacy protections for underlying telehealth data and systems, providers and patients will lack trust in the use of telehealth solutions. Although some federal and state guidelines for telehealth security and privacy have been established, many gaps remain. No federal agency currently has authority to enact privacy and security requirements to cover the telehealth ecosystem. This article examines privacy risks and security threats to telehealth applications and summarizes the extent to which technical controls and federal law adequately address these risks. We argue for a comprehensive federal regulatory framework for telehealth, developed and enforced by a single federal entity, the Federal Trade Commission, to bolster trust and fully realize the benefits of telehealth.
Corporate liability: security and violence--Part II.
Fiesta, J
1996-04-01
A hospital can be held liable for injuries resulting from failure to provide adequate, reasonable security Part II of "corporate Liability: Security and Violence" addresses negligent hiring and supervision practices, injury and domestic violence in the workplace and communication procedures.
Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study
ERIC Educational Resources Information Center
Hines, Natasha
2015-01-01
Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…
A review of security of electronic health records.
Win, Khin Than
The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.
Security Requirements Management in Software Product Line Engineering
NASA Astrophysics Data System (ADS)
Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.
Responding to Campus Rape: A Practical Guide for College Administrators.
ERIC Educational Resources Information Center
Fossey, Richard; Smith, Michael Clay
1996-01-01
In addressing rape on campus, colleges and universities should provide a rape awareness program, a campus sexual harassment policy, a campus security plan focusing on prevention, procedures for notifying the community about criminal activity, adequate disciplinary procedures, and protection for minor children with whom campus employees work. A…
Britton, Katherine E; Britton-Colonnese, Jennifer D
2017-03-01
Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients' expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients' physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them.
Britton, Katherine E.; Britton-Colonnese, Jennifer D.
2017-01-01
Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients’ expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients’ physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them. PMID:28264188
One Health in food safety and security education: A curricular framework.
Angelos, J; Arens, A; Johnson, H; Cadriel, J; Osburn, B
2016-02-01
The challenges of producing and distributing the food necessary to feed an anticipated 9 billion people in developed and developing societies by 2050 without destroying Earth's finite soil and water resources present extremely complex problems that lack simple solutions. The ability of modern societies to adequately address these and other food-related problems will require an educated workforce trained not only in traditional food safety, security, and public health, but also in other areas including food production, sustainable practices, and ecosystem health. To help address the need for such an educated workforce, a curricular framework was developed to assist those tasked with designing education and training for future food systems workers. One sentence summary: A curricular framework for education and training in food safety and security was developed that incorporates One Health concepts. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backus, George A.; Strickland, James Hassler
Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, inmore » isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.« less
The Role of Food Banks in Addressing Food Insecurity: A Systematic Review.
Bazerghi, Chantelle; McKay, Fiona H; Dunn, Matthew
2016-08-01
Food banks play a major role in the food aid sector by distributing donated and purchased groceries directly to food insecure families. The public health implications of food insecurity are significant, particularly as food insecurity has a higher prevalence among certain population groups. This review consolidates current knowledge about the function and efficacy of food banks to address food insecurity. A systematic review was conducted. Thirty-five publications were reviewed, of which 14 examined food security status, 13 analysed nutritional quality of food provided, and 24 considered clients' needs in relation to food bank use. This review found that while food banks have an important role to play in providing immediate solutions to severe food deprivation, they are limited in their capacity to improve overall food security outcomes due to the limited provision of nutrient-dense foods in insufficient amounts, especially from dairy, vegetables and fruits. Food banks have the potential to improve food security outcomes when operational resources are adequate, provisions of perishable food groups are available, and client needs are identified and addressed.
Code of Federal Regulations, 2010 CFR
2010-10-01
... disclosure or destruction of manual and automatic record systems. These security safeguards shall apply to... use of records contained in a system of records are adequately trained to protect the security and... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...
Security Considerations for E-Mental Health Interventions
Bennett, Anthony James; Griffiths, Kathleen Margaret
2010-01-01
Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service delivery of eHealth interventions rely on a high standard of data security. This paper describes some of the key methodological, technical, and procedural issues that need to be considered to ensure that eHealth research and intervention delivery meet adequate security standards. The paper concludes by summarizing broad strategies for addressing the major security risks associated with eHealth interventions. These include involving information technology (IT) developers in all stages of the intervention process including its development, evaluation, and ongoing delivery; establishing a wide-ranging discourse about relevant security issues; and familiarizing researchers and providers with the security measures that must be instituted in order to protect the integrity of eHealth interventions. PMID:21169173
Genevieve S. Metson; David M. Iwaniec; Lawrence A. Baker; Elena M. Bennett; Daniel L. Childers; Dana Cordell; Nancy B. Grimm; J. Morgan Grove; Daniel A. Nidzgorski; Stuart White
2015-01-01
Phosphorus (P) is an essential fertilizer for agricultural production but is also a potent aquatic pollutant. Current P management fails to adequately address both the issue of food security due to P scarcity and P pollution threats to water bodies. As centers of food consumption and waste production, cities transport and store much P and thus provide important...
ERIC Educational Resources Information Center
Michaelson, Matthew Thomas
2008-01-01
Although schools are meant to be safe learning environments for all children, some children are not afforded equal access to the protection of their safety and security. Every day, children who might be same-sex attracted are confronted with a unique set of challenges that are not being adequately addressed by the administrators of educational…
A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.
Sittig, Dean F; Singh, Hardeep
2016-01-01
Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.
A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks
Singh, Hardeep
2016-01-01
Summary Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066
Cryptography and the Internet: lessons and challenges
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCurley, K.S.
1996-12-31
The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising newmore » questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.« less
A life-cycle approach to food and nutrition security in India.
Rai, Rajesh Kumar; Kumar, Sandhya; Sekher, Madhushree; Pritchard, Bill; Rammohan, Anu
2015-04-01
India's poor performance on critical food and nutrition security indicators despite substantial economic prosperity has been widely documented. These failings not only hamper national progress, but also contribute significantly to the global undernourished population, particularly children. While the recently passed National Food Security Act 2013 adopts a life-cycle approach to expand coverage of subsidized food grains to the most vulnerable households and address food security, there remains much to be desired in the legislation. Access to adequate food for 1.24 billion people is a multifaceted problem requiring an interconnected set of policy measures to tackle the various factors affecting food and nutrition security in India. In the present opinion paper, we discuss a fivefold strategy that incorporates a life-cycle approach, spanning reproductive health, bolstering citizen participation in existing national programmes, empowering women, advancing agriculture and better monitoring the Public Distribution System in order to fill the gaps in both access and adequacy of food and nutrition.
Food Security-A Commentary: What Is It and Why Is It So Complicated?
Gibson, Mark
2012-12-03
Every year over 10 million people die of hunger and hunger related diseases. Nearly six million of these are children under the age of five; that is one child's death approximately every six seconds. Understanding how this still occurs amid the ever increasing social enlightenment of the 21st century-and under the auspices of a vigilant global developmental community-is one of the key challenges of our time. The science of food security aims to address such concerns. By understanding the multiplicity of the phenomenon, practitioners of global multilateral hegemony seek to shape appropriate policy to address these issues. The difficulty however is that the phenomenon is increasingly wrapped up inside an ever growing bundle of societal aspirations including inter-alia under-nutrition, poverty, sustainability, free trade, national self sufficiency, reducing female subjugation and so on. Any solutions therefore, involve fully understanding just what is indeed included, implied, understood or excluded within the food security catchall. Indeed, until such time as consensus can be found that adequately binds the phenomenon within a fixed delineated concept, current efforts to address the multitude of often divergent threads only serves to dilute efforts and confound attempts to once-and-for-all bring these unacceptable figures under control.
Code of Federal Regulations, 2010 CFR
2010-10-01
... record systems. These security safeguards shall apply to all systems in which identifiable personal data... data and automated systems shall be adequately trained in the security and privacy of personal data. (4... technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and...
Code of Federal Regulations, 2010 CFR
2010-10-01
... record systems. These security safeguards shall apply to all systems in which identifiable personal data... the security and privacy of such records. (7) The disposal and destruction of records within a system... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...
NASA Astrophysics Data System (ADS)
Mortazavi-Naeini, Mohammad; Kuczera, George; Cui, Lijie
2014-06-01
Significant population increase in urban areas is likely to result in a deterioration of drought security and level of service provided by urban water resource systems. One way to cope with this is to optimally schedule the expansion of system resources. However, the high capital costs and environmental impacts associated with expanding or building major water infrastructure warrant the investigation of scheduling system operational options such as reservoir operating rules, demand reduction policies, and drought contingency plans, as a way of delaying or avoiding the expansion of water supply infrastructure. Traditionally, minimizing cost has been considered the primary objective in scheduling capacity expansion problems. In this paper, we consider some of the drawbacks of this approach. It is shown that there is no guarantee that the social burden of coping with drought emergencies is shared equitably across planning stages. In addition, it is shown that previous approaches do not adequately exploit the benefits of joint optimization of operational and infrastructure options and do not adequately address the need for the high level of drought security expected for urban systems. To address these shortcomings, a new multiobjective optimization approach to scheduling capacity expansion in an urban water resource system is presented and illustrated in a case study involving the bulk water supply system for Canberra. The results show that the multiobjective approach can address the temporal equity issue of sharing the burden of drought emergencies and that joint optimization of operational and infrastructure options can provide solutions superior to those just involving infrastructure options.
Web vulnerability study of online pharmacy sites.
Kuzma, Joanne
2011-01-01
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.
A 3S Risk ?3SR? Assessment Approach for Nuclear Power: Safety Security and Safeguards.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Forrest, Robert; Reinhardt, Jason Christian; Wheeler, Timothy A.
Safety-focused risk analysis and assessment approaches struggle to adequately include malicious, deliberate acts against the nuclear power industry's fissile and waste material, infrastructure, and facilities. Further, existing methods do not adequately address non- proliferation issues. Treating safety, security, and safeguards concerns independently is inefficient because, at best, it may not take explicit advantage of measures that provide benefits against multiple risk domains, and, at worst, it may lead to implementations that increase overall risk due to incompatibilities. What is needed is an integrated safety, security and safeguards risk (or "3SR") framework for describing and assessing nuclear power risks that canmore » enable direct trade-offs and interactions in order to inform risk management processes -- a potential paradigm shift in risk analysis and management. These proceedings of the Sandia ePRA Workshop (held August 22-23, 2017) are an attempt to begin the discussions and deliberations to extend and augment safety focused risk assessment approaches to include security concerns and begin moving towards a 3S Risk approach. Safeguards concerns were not included in this initial workshop and are left to future efforts. This workshop focused on four themes in order to begin building out a the safety and security portions of the 3S Risk toolkit: 1. Historical Approaches and Tools 2. Current Challenges 3. Modern Approaches 4. Paths Forward and Next Steps This report is organized along the four areas described above, and concludes with a summary of key points. 2 Contact: rforres@sandia.gov; +1 (925) 294-2728« less
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Aitken, Peter; Leggat, Peter; Robertson, Andrew; Harley, Hazel; Speare, Richard; Leclercq, Muriel
2009-09-01
Disaster medical assistance teams (DMATs) have responded to numerous international disasters in recent years. As part of a national survey, the present study was designed to evaluate Australian DMAT experience in relation to health and safety aspects of actual deployment. Data were collected via an anonymous mailed survey distributed by State and Territory representatives on the Australian Health Protection Committee, who identified team members associated with Australian DMAT deployments from the time of the 2004 South East Asian tsunami disaster. The response rate for this survey was 50% (59/118). Most of the personnel had deployed to the tsunami affected areas. The DMAT members were quite experienced with 53% of personnel in the 45-55 years age group (31/59) and a mean level of clinical experience of 21 years. 76% of the respondents were male (44/58). Once deployed, most felt that their basic health needs were adequately met. Almost all stated there were adequate shelter (95%, 56/59), adequate food (93%, 55/59) and adequate water (97%, 57/59). A clear majority, felt there were adequate toilet facilities (80%, 47/59), adequate shower facilities (64%, 37/59); adequate hand washing facilities (68%, 40/59) and adequate personal protective equipment (69%, 41/59). While most felt that there were adequate security briefings (73%, 43/59), fewer felt that security itself was adequate (64%, 38/59). 30% (18/59) felt that team members could not be easily identified. The optimum shift period was identified as 12h (66%, 39/59) or possibly 8h (22%, 13/59) with the optimum period of overseas deployment as 14-21 days (46%, 27/59). Missing essential items were just as likely to be related to personal comfort (28%) as clinical care (36%) or logistic support (36%). The most frequently nominated personal items recommended were: suitable clothes (49%, 29/59); toiletries (36%, 22/59); mobile phone (24%, 14/59); insect repellent (17%, 10/59) and a camera (14%, 8/59). The most common personal hardship reported during their deployment was being away from home/problems at home (24%, 14/59); however, most felt that their family was adequately informed of their whereabouts and health status (73%, 43/59). This study of Australian DMAT members suggests that, in the field, attention should be given to basics, such as adequate food, water, shelter and personal hygiene as well as appropriate clothing, sunscreen and vector protection. The inclusion of appropriate personal items can be assisted by provision of a minimum suggested personal equipment list, with local conditions and the nature of the deployment being taken into account. A personal survival kit should also be recommended. There should be medical and psychological support for team members themselves, including the provision of a dedicated team member medical cache. Concern for their own health and ability to communicate with family members at home are major issues for deployed team members and need to be addressed in mission planning. This should also recognise security issues, including briefings, evacuation plans and exit strategies. The team members concerns about adequate security and the risk profile of humanitarian intervention in natural disasters compared with complex humanitarian emergencies may help determine future deployment of civilian or defence based teams.
26 CFR 1.503(b)-1 - Prohibited transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... capable of meeting the indebtedness, it may be adequately secured. However, subordinated debentures bonds... borrowing corporation is not adequate security. Likewise, debenture bonds which are convertible on default...
26 CFR 1.503(b)-1 - Prohibited transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... capable of meeting the indebtedness, it may be adequately secured. However, subordinated debentures bonds... borrowing corporation is not adequate security. Likewise, debenture bonds which are convertible on default...
26 CFR 1.503(b)-1 - Prohibited transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... capable of meeting the indebtedness, it may be adequately secured. However, subordinated debentures bonds... borrowing corporation is not adequate security. Likewise, debenture bonds which are convertible on default...
26 CFR 1.503(b)-1 - Prohibited transactions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... capable of meeting the indebtedness, it may be adequately secured. However, subordinated debentures bonds... borrowing corporation is not adequate security. Likewise, debenture bonds which are convertible on default...
Resource Conservation and a Sustainable Las Vegas
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piechota, Thomas C.
2014-05-15
This research project developed educational, research, and outreach activities that addressed the challenges of Las Vegas as related to a secure energy supply through conservation, clean and adequate water supply, economic growth and diversification, air quality, and the best use of land, and usable public places. This was part of the UNLV Urban Sustainability Initiative (USI) that responded to a community and state need where a unifying vision of sustainability was developed in a cost-effective manner that promoted formal working partnerships between government, community groups, and industry.
Generating capacity in US electric utilities: How is it used? How much is needed over the decade
NASA Astrophysics Data System (ADS)
Keelin, T. W.; Oatman, E. N.; Gent, M. R.
1982-10-01
This report addresses: how US generating capacity is used to supply today's consumers with electricity; whether new capacity planned over the next decade is enough to provide a secure supply of electricity; how delays and cancellations of planned capacity would result in higher electricity costs and threaten the security of electricity supply; and how today's decisions determine electricity supply for the next decade and beyond. It is concluded that there is not an electricity supply crisis currently, but there is a planning crisis. This conclusion is based on the following: existing capacity supplies current needs, but provides little room for economic growth; new capacity is planned to provide a secure supply of electricity for the demand projected by utilities; if demand is lower, planned capacity will reduce costs and, if demand is higher, planned capacity will not be adequate; planned capacity may not be realized.
Security culture for nuclear facilities
NASA Astrophysics Data System (ADS)
Gupta, Deeksha; Bajramovic, Edita
2017-01-01
Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.
Statement by Dr. Kathleen C. Bailey before the Senate Armed Services Committee
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bailey, K.C.
1994-08-16
This paper presents the personal views of the author on the subject of the proposed Chemical Weapons Convention (CWC). She addresses here concerns about the national security issues which could result from ratification of this convention. She argues the convention alone is not likely to curtail production or availability of such items on the world market because of the relatively low cost. The treaty could thus put the country in a position less likely to protect itself, or adequately deal with such a threat.
Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy
2015-01-01
This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology.
Food Security—A Commentary: What Is It and Why Is It So Complicated?
Gibson, Mark
2012-01-01
Every year over 10 million people die of hunger and hunger related diseases. Nearly six million of these are children under the age of five; that is one child’s death approximately every six seconds. Understanding how this still occurs amid the ever increasing social enlightenment of the 21st century—and under the auspices of a vigilant global developmental community—is one of the key challenges of our time. The science of food security aims to address such concerns. By understanding the multiplicity of the phenomenon, practitioners of global multilateral hegemony seek to shape appropriate policy to address these issues. The difficulty however is that the phenomenon is increasingly wrapped up inside an ever growing bundle of societal aspirations including inter-alia under-nutrition, poverty, sustainability, free trade, national self sufficiency, reducing female subjugation and so on. Any solutions therefore, involve fully understanding just what is indeed included, implied, understood or excluded within the food security catchall. Indeed, until such time as consensus can be found that adequately binds the phenomenon within a fixed delineated concept, current efforts to address the multitude of often divergent threads only serves to dilute efforts and confound attempts to once-and-for-all bring these unacceptable figures under control. PMID:28239088
4 CFR 200.14 - Responsibility for maintaining adequate safeguards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... identifiable personal data and automated systems shall be adequately trained in the security and privacy of... the security and privacy of such records. (5) The disposal and destruction of identifiable personal....14 Section 200.14 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200...
10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... the security and privacy of personal data. (4) The disposal and disposition of identifiable personal... contained in a system of records are adequately trained to protect the security and privacy of such records....114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114...
Mental health nurses' perspective of workplace violence in Jordanian mental health hospitals.
Al-Azzam, Manar; Al-Sagarat, Ahmad Yahya; Tawalbeh, Loai; Poedel, Robin J
2017-10-27
The purpose was to assess the mental health nurses' perspectives of workplace violence in mental health departments in Jordan. A cross-sectional correlation study was utilized to address the study's purposes. Data were collected using self-reported questionnaires from nurses working in governmental mental health departments in Jordan. The findings indicated that 80% of the respondents were victims of at least one violent act in the last 2 years. Verbal abuse was the most indicated type of violence. Patients were considered the main source of violence. Policies and legislations addressing workplace violence should be implemented, and nurses should be trained on using such policies. Hospital managers should create a safe work environment by enforcing effective security measures and maintaining adequate staffing. © 2017 Wiley Periodicals, Inc.
Security systems engineering overview
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less
Nordin, Stacia M; Boyle, Marie; Kemmer, Teresa M
2013-04-01
It is the position of the Academy of Nutrition and Dietetics that all people should have consistent access to an appropriately nutritious diet of food and water, coupled with a sanitary environment, adequate health services, and care that ensure a healthy and active life for all household members. The Academy supports policies, systems, programs, and practices that work with developing nations to achieve nutrition security and self-sufficiency while being environmentally and economically sustainable. For nations to achieve nutrition security, all people must have access to a variety of nutritious foods and potable drinking water; knowledge, resources, and skills for healthy living; prevention, treatment, and care for diseases affecting nutrition status; and safety-net systems during crisis situations, such as natural disasters or deleterious social and political systems. More than 2 billion people are micronutrient deficient; 1.5 billion people are overweight or obese; 870 million people have inadequate food energy intake; and 783 million people lack potable drinking water. Adequate nutrient intake is a concern, independent of weight status. Although this article focuses on nutritional deficiencies in developing nations, global solutions for excesses and deficiencies need to be addressed. In an effort to achieve nutrition security, lifestyles, policies, and systems (eg, food, water, health, energy, education/knowledge, and economic) contributing to sustainable resource use, environmental management, health promotion, economic stability, and positive social environments are required. Food and nutrition practitioners can get involved in promoting and implementing effective and sustainable policies, systems, programs, and practices that support individual, community, and national efforts. Copyright © 2013 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 13 2011-01-01 2009-01-01 true Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 13 2012-01-01 2012-01-01 false Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 13 2014-01-01 2013-01-01 true Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 13 2013-01-01 2013-01-01 false Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 13 2010-01-01 2009-01-01 true Security. 1942.114 Section 1942.114 Agriculture... Security. Specific requirements for security for each loan will be included in the letter of conditions. Loans must be secured by the best security position practicable, in a manner which will adequately...
The Application of materials attractiveness in a graded approach to nuclear materials security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ebbinghaus, B.; Bathke, C.; Dalton, D.
2013-07-01
The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that ismore » necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED.« less
On the security of consumer wearable devices in the Internet of Things.
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.
On the security of consumer wearable devices in the Internet of Things
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756
Capturing security requirements for software systems.
El-Hadary, Hassan; El-Kassas, Sherif
2014-07-01
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.
Capturing security requirements for software systems
El-Hadary, Hassan; El-Kassas, Sherif
2014-01-01
Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514
Code of Federal Regulations, 2011 CFR
2011-07-01
... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
5 CFR 1312.22 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 12 2011-01-01 2011-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Security. 19.966 Section 19.966 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF... and Security § 19.966 Security. Proprietors shall provide security adequate to deter the unauthorized...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 12 2012-01-01 2012-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 12 2013-01-01 2013-01-01 false Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 12 2014-01-01 2013-01-01 true Security. 1780.14 Section 1780.14 Agriculture... (CONTINUED) WATER AND WASTE LOANS AND GRANTS General Policies and Requirements § 1780.14 Security. Loans will be secured by the best security position practicable in a manner which will adequately protect the...
7 CFR 772.6 - Subordination of security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.6 Subordination of security. (a) Eligibility. The Agency shall grant a subordination of Minor Program loan security when the transaction will... still be adequately secured after the subordination, or the value of the loan security will be increased...
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1984-01-01
The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security Requirements § 1301.73 Physical security... adequate security for the area or building. If such security requires an alarm, such alarm, upon...
Personal health record systems and their security protection.
Win, Khin Than; Susilo, Willy; Mu, Yi
2006-08-01
The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.
6 CFR 7.11 - Components' responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INFORMATION Administration § 7.11 Components' responsibilities. Each DHS component shall appoint a security... security information; (b) Report violations of the provisions of this regulation to the Chief Security... component acquire adequate security education and training, as required by the DHS classified information...
Future of Assurance: Ensuring that a System is Trustworthy
NASA Astrophysics Data System (ADS)
Sadeghi, Ahmad-Reza; Verbauwhede, Ingrid; Vishik, Claire
Significant efforts are put in defining and implementing strong security measures for all components of the comput-ing environment. It is equally important to be able to evaluate the strength and robustness of these measures and establish trust among the components of the computing environment based on parameters and attributes of these elements and best practices associated with their production and deployment. Today the inventory of techniques used for security assurance and to establish trust -- audit, security-conscious development process, cryptographic components, external evaluation - is somewhat limited. These methods have their indisputable strengths and have contributed significantly to the advancement in the area of security assurance. However, shorter product and tech-nology development cycles and the sheer complexity of modern digital systems and processes have begun to decrease the efficiency of these techniques. Moreover, these approaches and technologies address only some aspects of security assurance and, for the most part, evaluate assurance in a general design rather than an instance of a product. Additionally, various components of the computing environment participating in the same processes enjoy different levels of security assurance, making it difficult to ensure adequate levels of protection end-to-end. Finally, most evaluation methodologies rely on the knowledge and skill of the evaluators, making reliable assessments of trustworthiness of a system even harder to achieve. The paper outlines some issues in security assurance that apply across the board, with the focus on the trustworthiness and authenticity of hardware components and evaluates current approaches to assurance.
Emergency Preparedness for Catastrophic Events at Small and Medium Sized Airports: Lacking or Not?
NASA Technical Reports Server (NTRS)
Sweet, Kathleen M.
2007-01-01
The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to effectively coordinate varied aspects of security protocols between agencies and general aviation components have not been adequately addressed. Whether or not overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation's smaller airports is the main topic of this paper. For perspective, the term general aviation is generally accepted to include all flying except for military and scheduled airline operations. Genera aviation makes up more than 1 percent of the U.S. Gross Domestic Product and supports almost 1.3 mission high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry (AOPA, n.d.). In both conceptual and practical terms, this paper argues for the proactive management of security planning and repeated security awareness training from both an individual and an organizational perspective within the general aviation venue. The results of a research project incorporating survey data from general aviation and small commercial airport managers as well as Transportation Security Administration (TSA) employees are reported. Survey findings suggest that miscommunication does take place on different organizational levels and that between TSA employees and airport management interaction can be contentious and cooperation diminished. The importance of organizational training for decreasing conflict and increasing security and preparedness is discussed as a primary implication.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2014-04-01 2014-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Security. 19.704 Section... Construction, Equipment, and Security § 19.704 Security. (a) General. The proprietor of an alcohol fuel plant must provide adequate security measures at the alcohol fuel plant in order to protect against the...
2010 Panel on the Biomaterials Grand Challenges
Reichert, William “Monty”; Ratner, Buddy D.; Anderson, James; Coury, Art; Hoffman, Allan S.; Laurencin, Cato T.; Tirrell, David
2014-01-01
In 2009, the National Academy for Engineering issued the Grand Challenges for Engineering in the 21st Century comprised of 14 technical challenges that must be addressed to build a healthy, profitable, sustainable, and secure global community (http://www.engineeringchallenges.org). Although crucial, none of the NEA Grand Challenges adequately addressed the challenges that face the biomaterials community. In response to the NAE Grand Challenges, Monty Reichert of Duke University organized a panel entitled Grand Challenges in Biomaterials at the at the 2010 Society for Biomaterials Annual Meeting in Seattle. Six members of the National Academies—Buddy Ratner, James Anderson, Allan Hoffman, Art Coury, Cato Laurencin, and David Tirrell—were asked to propose a grand challenge to the audience that, if met, would significantly impact the future of biomaterials and medical devices. Successfully meeting these challenges will speed the 60-plus year transition from commodity, off-the-shelf biomaterials to bioengineered chemistries, and biomaterial devices that will significantly advance our ability to address patient needs and also to create new market opportunities. PMID:21171147
Code of Federal Regulations, 2013 CFR
2013-07-01
... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Security. § 1275.22 Section Â... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...
Governing for Enterprise Security (Briefing Charts)
2005-01-01
governance/stakeholder.html © 2005 by Carnegie Mellon University page 16 Adequate Security and Operational Risk “Appropriate business security is that which...Sherwood 03] Sherwood, John; Clark; Andrew; Lynas, David. “Systems and Business Security Architecture.” SABSA Limited, 17 September 2003. Available at
A Performance Analysis of Public Expenditure on Maternal Health in Mexico.
Servan-Mori, Edson; Avila-Burgos, Leticia; Nigenda, Gustavo; Lozano, Rafael
2016-01-01
We explore the relationship between public expenditure, coverage of adequate ANC (including timing, frequent and content), and the maternal mortality ratio--adjusted by coverage of adequate ANC--observed in Mexico in 2012 at the State level. Additionally, we examine the inequalities and concentration of public expenditure between populations with and without Social Security. Results suggest that in the 2003-2011 period, the public expenditure gap between women with and without Social Security decreased 74%, however, the distribution is less equitable among women without Social Security, across the States. Despite high levels of coverage on each dimension of ANC explored, coverage of adequate ANC was lower among Social Security than non-Social Security women. This variability results in differences up to 1.5 times in State-adjusted maternal mortality rate at the same level of expense and maternal mortality rate, respectively. The increase in the economic resources is only a necessary condition for achieving improved health outcomes. Providing adequate health services and achieving efficient, effective and transparent use of resources in health, are critical elements for health systems performance. The attainment of universal effective coverage of maternal health and reducing maternal mortality in Mexico, requires the adjustment of policy innovations including the rules of allocation and execution of health resources. Health policies should be designed on a more holistic view promoting a balance between accessibility, effective implementation and rigorous stewardship.
A Performance Analysis of Public Expenditure on Maternal Health in Mexico
Servan-Mori, Edson; Avila-Burgos, Leticia; Nigenda, Gustavo; Lozano, Rafael
2016-01-01
We explore the relationship between public expenditure, coverage of adequate ANC (including timing, frequent and content), and the maternal mortality ratio -adjusted by coverage of adequate ANC- observed in Mexico in 2012 at the State level. Additionally, we examine the inequalities and concentration of public expenditure between populations with and without Social Security. Results suggest that in the 2003–2011 period, the public expenditure gap between women with and without Social Security decreased 74%, however, the distribution is less equitable among women without Social Security, across the States. Despite high levels of coverage on each dimension of ANC explored, coverage of adequate ANC was lower among Social Security than non-Social Security women. This variability results in differences up to 1.5 times in State-adjusted maternal mortality rate at the same level of expense and maternal mortality rate, respectively. The increase in the economic resources is only a necessary condition for achieving improved health outcomes. Providing adequate health services and achieving efficient, effective and transparent use of resources in health, are critical elements for health systems performance. The attainment of universal effective coverage of maternal health and reducing maternal mortality in Mexico, requires the adjustment of policy innovations including the rules of allocation and execution of health resources. Health policies should be designed on a more holistic view promoting a balance between accessibility, effective implementation and rigorous stewardship. PMID:27043819
49 CFR 1540.5 - Terms used in this subchapter.
Code of Federal Regulations, 2014 CFR
2014-10-01
... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES... aviation areas) that are not separated by adequate security systems, measures, or procedures. This area... measures in accordance with § 1542.111 of this chapter. FAA means the Federal Aviation Administration...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... adequate resources are allocated for the design, implementation, and administration of the performance...
Code of Federal Regulations, 2011 CFR
2011-01-01
... personnel security questionnaire, a personal qualifications statement, a personnel security interview, or... adequate evidence of rehabilitation. (12) Refused, without satisfactory explanation, to answer questions...
Code of Federal Regulations, 2010 CFR
2010-01-01
... personnel security questionnaire, a personal qualifications statement, a personnel security interview, or... adequate evidence of rehabilitation. (12) Refused, without satisfactory explanation, to answer questions...
7 CFR 762.126 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 7 2012-01-01 2012-01-01 false Security requirements. 762.126 Section 762.126... AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.126 Security requirements. (a) General. (1) The lender is responsible for ensuring that proper and adequate security is obtained and maintained to fully...
Participatory communication for tuberculosis control in prisons in Bolivia, Ecuador, and Paraguay.
Waisbord, Silvio
2010-03-01
To assess the challenges in reducing tuberculosis (TB) in prisons in Bolivia, Ecuador, and Paraguay and propose ways to address them through communication interventions. Challenges to two central goals of TB control--early diagnosis of positive cases and successful application of the directly observed treatment, short course (DOTS) strategy--were examined. Data were gathered (through in-depth, structured interviews) and focus groups were conducted in the prisons that housed the largest number of male inmates in each country. Interviewees and focus group participants included program directors, administrative personnel, correctional health and security staff, and incarcerated people who were or had been under treatment for TB and had participated as 'peers' in health services. The findings showed a range of entrenched obstacles for adequate TB control. Stigmatizing attitudes and low knowledge about TB among inmates and key prison personnel discouraged people living in prisons from seeking diagnosis and treatment. Systemic problems in prison health services, along with squalid living conditions, lack of coordination between national TB programs and prison health systems, and insufficient allocation of resources to health prevented the provision of adequate TB prevention and care. In addressing the barriers to effective TB control in prison systems in Bolivia, Ecuador, and Paraguay, a participatory approach to communication is necessary.
Addressing cargo security with strategies involving private sector.
DOT National Transportation Integrated Search
2008-12-01
The public and private sectors contributing to goods movement agree that cargo security has : not been addressed nearly as much as physical and vessel security. Addressing cargo security : will require additional operational data that is not currentl...
Introduction: gendering socio cultural alcohol and drug research.
Hensing, G; Spak, F
2009-01-01
The gender gap in alcohol consumption and alcohol-related harm still is considerable and largely unexplained. This paper introduces four studies performed in Sweden that explore factors influencing gender differences in levels of consumption, adverse consequences and treatment. We summarize and discuss these four studies performed within the same cultural setting, which each analyse interaction with the gender. Two studies focus on the individual level addressing criminal behaviour, alcohol problems and mortality, and gender identity and alcohol problems in women taking psychiatric co-morbidity into account. Two studies focus on the institutional and cultural levels addressing the handling of alcohol-related problems in primary healthcare and the effectiveness of using cultural analysis in identifying gender concerns for women. Future studies need to focus more on these complex associations to secure that treatment settings provide both genders with fair and adequate treatment of high quality and that prevention activities will start to test measures that take gender into consideration.
Cardea: Providing Support for Dynamic Resource Access in a Distributed Computing Environment
NASA Technical Reports Server (NTRS)
Lepro, Rebekah
2003-01-01
The environment framing the modem authorization process span domains of administration, relies on many different authentication sources, and manages complex attributes as part of the authorization process. Cardea facilitates dynamic access control within this environment as a central function of an inter-operable authorization framework. The system departs from the traditional authorization model by separating the authentication and authorization processes, distributing the responsibility for authorization data and allowing collaborating domains to retain control over their implementation mechanisms. Critical features of the system architecture and its handling of the authorization process differentiate the system from existing authorization components by addressing common needs not adequately addressed by existing systems. Continuing system research seeks to enhance the implementation of the current authorization model employed in Cardea, increase the robustness of current features, further the framework for establishing trust and promote interoperability with existing security mechanisms.
Gama, Elvis
2016-01-01
Health insecurity has emerged as a major concern among health policy-makers particularly in low- and middle-income countries (LMICs). It includes the inability to secure adequate healthcare today and the risk of being unable to do so in the future as well as impoverishing healthcare expenditure. The increasing health insecurity among 150 million of the world’s poor has moved social protection in health (SPH) to the top of the agenda among health policy-makers globally. This paper aims to provide a debate on the potential of social protection contribution to addressing health insecurity, poverty, and vulnerability brought by healthcare expenditure in low-income countries, to explore the gaps in current and proposed social protection measures in healthcare and provide suggestions on how social protection intervention aimed at addressing health insecurity, poverty, and vulnerability may be effectively implemented. PMID:26927589
Gama, Elvis
2015-11-27
Health insecurity has emerged as a major concern among health policy-makers particularly in low- and middle-income countries (LMICs). It includes the inability to secure adequate healthcare today and the risk of being unable to do so in the future as well as impoverishing healthcare expenditure. The increasing health insecurity among 150 million of the world's poor has moved social protection in health (SPH) to the top of the agenda among health policy-makers globally. This paper aims to provide a debate on the potential of social protection contribution to addressing health insecurity, poverty, and vulnerability brought by healthcare expenditure in low-income countries, to explore the gaps in current and proposed social protection measures in healthcare and provide suggestions on how social protection intervention aimed at addressing health insecurity, poverty, and vulnerability may be effectively implemented. © 2016 by Kerman University of Medical Sciences.
A Standardization Framework for Electronic Government Service Portals
NASA Astrophysics Data System (ADS)
Sarantis, Demetrios; Tsiakaliaris, Christos; Lampathaki, Fenareti; Charalabidis, Yannis
Although most eGovernment interoperability frameworks (eGIFs) cover adequately the technical aspects of developing and supporting the provision of electronic services to citizens and businesses, they do not exclusively address several important areas regarding the organization, presentation, accessibility and security of the content and the electronic services offered through government portals. This chapter extends the scope of existing eGIFs presenting the overall architecture and the basic concepts of the Greek standardization framework for electronic government service portals which, for the first time in Europe, is part of a country's eGovernment framework. The proposed standardization framework includes standards, guidelines and recommendations regarding the design, development and operation of government portals that support the provision of administrative information and services to citizens and businesses. By applying the guidelines of the framework, the design, development and operation of portals in central, regional and municipal government can be systematically addressed resulting in an applicable, sustainable and ever-expanding framework.
A Security Audit Framework to Manage Information System Security
NASA Astrophysics Data System (ADS)
Pereira, Teresa; Santos, Henrique
The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.
Financial challenges of immunization: a look at GAVI.
Kaddar, Miloud; Lydon, Patrick; Levine, Ruth
2004-01-01
Securing reliable and adequate public funding for prevention services, even those that are considered highly cost effective, often presents a challenge. This has certainly been the case with childhood immunizations in developing countries. Although the traditional childhood vaccines cost relatively little, funding in poor countries is often at risk and subject to the political whims of donors and national governments. With the introduction of newer and more costly vaccines made possible under the Global Alliance for Vaccines and Immunization (GAVI), the future financial challenges have become even greater. Experience so far suggests that choosing to introduce new combination vaccines can significantly increase the costs of national immunization programmes. With this experience comes a growing concern about their affordability in the medium term and long term and a realization that, for many countries, shared financial responsibility between national governments and international donors may initially be required. This article focuses on how GAVI is addressing the challenge of sustaining adequate and reliable funding for immunizations in the poorest countries. PMID:15628208
48 CFR 339.7100 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7100 Definitions. As used in this subpart, the following definitions shall apply: Adequate security means, in accordance with OMB Circular A-130, Management of Federal Information Resources, Appendix 3 (Security of Federal...
48 CFR 339.7100 - Definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7100 Definitions. As used in this subpart, the following definitions shall apply: Adequate security means, in accordance with OMB Circular A-130, Management of Federal Information Resources, Appendix 3 (Security of Federal...
48 CFR 339.7100 - Definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7100 Definitions. As used in this subpart, the following definitions shall apply: Adequate security means, in accordance with OMB Circular A-130, Management of Federal Information Resources, Appendix 3 (Security of Federal...
48 CFR 339.7100 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7100 Definitions. As used in this subpart, the following definitions shall apply: Adequate security means, in accordance with OMB Circular A-130, Management of Federal Information Resources, Appendix 3 (Security of Federal...
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...
44 CFR 321.4 - Achieving production readiness.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS MAINTENANCE OF THE MOBILIZATION BASE (DEPARTMENT OF DEFENSE... sabotage through adequate physical security measures. (iv) Protection of personnel from widespread...
Code of Federal Regulations, 2010 CFR
2010-01-01
... soundness, ensure adequate portfolio diversification and are appropriate for the size and condition of the... should adequately monitor the condition of its portfolio and the adequacy of any collateral securing its...
Designing the Climate Observing System of the Future
NASA Astrophysics Data System (ADS)
Weatherhead, Elizabeth C.; Wielicki, Bruce A.; Ramaswamy, V.; Abbott, Mark; Ackerman, Thomas P.; Atlas, Robert; Brasseur, Guy; Bruhwiler, Lori; Busalacchi, Antonio J.; Butler, James H.; Clack, Christopher T. M.; Cooke, Roger; Cucurull, Lidia; Davis, Sean M.; English, Jason M.; Fahey, David W.; Fine, Steven S.; Lazo, Jeffrey K.; Liang, Shunlin; Loeb, Norman G.; Rignot, Eric; Soden, Brian; Stanitski, Diane; Stephens, Graeme; Tapley, Byron D.; Thompson, Anne M.; Trenberth, Kevin E.; Wuebbles, Donald
2018-01-01
Climate observations are needed to address a large range of important societal issues including sea level rise, droughts, floods, extreme heat events, food security, and freshwater availability in the coming decades. Past, targeted investments in specific climate questions have resulted in tremendous improvements in issues important to human health, security, and infrastructure. However, the current climate observing system was not planned in a comprehensive, focused manner required to adequately address the full range of climate needs. A potential approach to planning the observing system of the future is presented in this article. First, this article proposes that priority be given to the most critical needs as identified within the World Climate Research Program as Grand Challenges. These currently include seven important topics: melting ice and global consequences; clouds, circulation and climate sensitivity; carbon feedbacks in the climate system; understanding and predicting weather and climate extremes; water for the food baskets of the world; regional sea-level change and coastal impacts; and near-term climate prediction. For each Grand Challenge, observations are needed for long-term monitoring, process studies and forecasting capabilities. Second, objective evaluations of proposed observing systems, including satellites, ground-based and in situ observations as well as potentially new, unidentified observational approaches, can quantify the ability to address these climate priorities. And third, investments in effective climate observations will be economically important as they will offer a magnified return on investment that justifies a far greater development of observations to serve society's needs.
Climate change impact assessment on food security in Indonesia
NASA Astrophysics Data System (ADS)
Ettema, Janneke; Aldrian, Edvin; de Bie, Kees; Jetten, Victor; Mannaerts, Chris
2013-04-01
As Indonesia is the world's fourth most populous country, food security is a persistent challenge. The potential impact of future climate change on the agricultural sector needs to be addressed in order to allow early implementation of mitigation strategies. The complex island topography and local sea-land-air interactions cannot adequately be represented in large scale General Climate Models (GCMs) nor visualized by TRMM. Downscaling is needed. Using meteorological observations and a simple statistical downscaling tool, local future projections are derived from state-of-the-art, large-scale GCM scenarios, provided by the CMIP5 project. To support the agriculture sector, providing information on especially rainfall and temperature variability is essential. Agricultural production forecast is influenced by several rain and temperature factors, such as rainy and dry season onset, offset and length, but also by daily and monthly minimum and maximum temperatures and its rainfall amount. A simple and advanced crop model will be used to address the sensitivity of different crops to temperature and rainfall variability, present-day and future. As case study area, Java Island is chosen as it is fourth largest island in Indonesia but contains more than half of the nation's population and dominates it politically and economically. The objective is to identify regions at agricultural risk due to changing patterns in precipitation and temperature.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... a computing environment that has adequate computer security controls in place to prevent... NRC intends to issue a security Order to this Licensee in the near future. The Order will require compliance with specific Additional Security Measures to enhance the security for certain radioactive...
48 CFR 832.202-4 - Security for Government financing.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Security for Government... for Government financing. An offeror's financial condition may be considered adequate security to protect the Government's interest when the Government provides contract financing. In assessing the...
48 CFR 832.202-4 - Security for Government financing.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Security for Government... for Government financing. An offeror's financial condition may be considered adequate security to protect the Government's interest when the Government provides contract financing. In assessing the...
Cyber Security--Are You Prepared?
ERIC Educational Resources Information Center
Newman, Scott
2007-01-01
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
A comprehensive Network Security Risk Model for process control networks.
Henry, Matthew H; Haimes, Yacov Y
2009-02-01
The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.
Lehr, Dirk; Hillert, Andreas; Keller, Stefan
2009-01-01
Affective disorders in schoolteachers are a frequent reason for absenteeism and early retirement. The objective of this study was to clarify the relationship between effort-reward imbalance at work, overcommitment, and affective disorders. In addition, we examined the differential impact of different types of reward (salary, job security/promotion, and esteem). In a matched case-control study of 244 teachers, 122 teachers in inpatient treatment for affective disorders were compared to 122 healthy controls. Logistic regression analyses revealed strong associations between effort-reward imbalance and affective disorders. Overcommitment was not an independent risk factor for depression. The lack of esteem by supervisors or colleagues was a more important risk factor for depression than low salary or job security. Results suggest that perceived esteem is essential in understanding the nature of stress. Interventions for preventing depression in the workplace should address supervisors' and colleagues' skills in adequately appreciating their supervisees and co-workers.
McIntyre, Lynn; Glanville, N Theresa; Hilchie-Pye, Andrea
2011-03-01
Canadian agricultural policy supports higher milk prices. Consequently, poor families lack sufficient funds to purchase adequate quantities of milk. Low-income lone mothers in the Canadian province of Nova Scotia suggested their preferred strategies for improved access to milk. We then built inter-sectoral support for a policy intervention to address their recommendations. Our research-to-action process led to a policy dialogue focusing on an electronic smart card that would permit the delivery of lower-priced milk to poor households. While all agreed that milk insecurity was an important issue, the project ultimately failed because of the entrenched positions of influential stakeholder groups.
12 CFR 555.210 - What precautions must I take?
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Implement security measures designed to ensure secure operations. Such measures must be adequate to: (1) Prevent unauthorized access to your records and your customers' records; (2) Prevent financial fraud through the use of electronic means or facilities; and (3) Comply with applicable security devices...
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Code of Federal Regulations, 2010 CFR
2010-01-01
... reflect appropriate information and provide an adequate basis for an audit of the information. (b... when the bank transfers the security into the account of the customer; and (ii) For sale transactions, the time when the bank transfers the security out of the account of the customer or, if the security...
Ways to Improve DoD 8570 IY Security Certification
ERIC Educational Resources Information Center
Bates, Justin D.
2017-01-01
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
12 CFR 550.320 - What is acceptable collateral for uninsured deposits?
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Readily marketable securities of the classes in which State-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable State law. (c) Other readily marketable securities as the OTS may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...
12 CFR 550.320 - What is acceptable collateral for uninsured deposits?
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Readily marketable securities of the classes in which State-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable State law. (c) Other readily marketable securities as the OTS may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...
12 CFR 150.320 - What is acceptable collateral for uninsured deposits?
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Readily marketable securities of the classes in which state-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable state law. (c) Other readily marketable securities as the OCC may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...
12 CFR 550.320 - What is acceptable collateral for uninsured deposits?
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Readily marketable securities of the classes in which State-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable State law. (c) Other readily marketable securities as the OTS may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...
12 CFR 150.320 - What is acceptable collateral for uninsured deposits?
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Readily marketable securities of the classes in which state-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable state law. (c) Other readily marketable securities as the OCC may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...
12 CFR 550.320 - What is acceptable collateral for uninsured deposits?
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Readily marketable securities of the classes in which State-chartered corporate fiduciaries are permitted to invest fiduciary funds under applicable State law. (c) Other readily marketable securities as the OTS may determine. (d) Surety bonds, to the extent they provide adequate security, unless prohibited...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2014 CFR
2014-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2012 CFR
2012-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2013 CFR
2013-01-01
..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.8 Sale or exchange of security..., or sex in programs or activities receiving Federal financial assistance. Such provisions apply for as... security for the loan is adequate or will not change after the transaction. (iv) Sale proceeds remaining...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-15
... (Procedures, and Security for Government Financing) Activity; Comment Request AGENCY: Office of Management... contract payments and to determine if the contractor has adequate security to warrant payment in advance... correspondence. During the comment period, comments may be viewed online through FDMS. FOR FURTHER INFORMATION...
7 CFR 772.8 - Sale or exchange of security property.
Code of Federal Regulations, 2010 CFR
2010-01-01
... property. (a) For AMP loans. (1) Sale of all or a portion of the security property may be approved when all... according to lien priority. (2) Exchange of all or a portion of security property for an AMP loan may be... exchange; (iii) The AMP loan will be as adequately secured after the transaction as before; and (iv) It is...
Addressing software security risk mitigations in the life cycle
NASA Technical Reports Server (NTRS)
Gilliam, David; Powell, John; Haugh, Eric; Bishop, Matt
2003-01-01
The NASA Office of Safety and Mission Assurance (OSMA) has funded the Jet Propulsion Laboratory (JPL) with a Center Initiative, 'Reducing Software Security Risk through an Integrated Approach' (RSSR), to address this need. The Initiative is a formal approach to addressing software security in the life cycle through the instantiation of a Software Security Assessment Instrument (SSAI) for the development and maintenance life cycles.
Independent Assessment Plan: LAV-25
1989-06-27
Pages. Enter the total Block 7. Performing Organization Name(s) and number of pages. Address(es. Self -explanatory. Block 16. Price Code, Enter...organization Blocks 17. - 19. Security Classifications. performing the report. Self -explanatory. Enter U.S. Security Classification in accordance with U.S...Security Block 9. S oonsorina/Monitoring Acenc Regulations (i.e., UNCLASSIFIED). If form .Names(s) and Address(es). Self -explanatory. contains classified
17 CFR 270.14a-1 - Use of notification pursuant to regulation E under the Securities Act of 1933.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Commission adequately insures (a) that after the effective date of such notification such company will not... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY... of 1933 by a small business investment company operating under the Small Business Investment Act of...
48 CFR 32.202-4 - Security for Government financing.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Security for Government... for Government financing. (a) Policy. (1) 10 U.S.C. 2307(f) and 41 U.S.C. 255(f) require the Government to obtain adequate security for Government financing. The contracting officer shall specify in the...
48 CFR 32.202-4 - Security for Government financing.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Security for Government... for Government financing. (a) Policy. (1) 10 U.S.C. 2307(f) and 41 U.S.C. 4505 require the Government to obtain adequate security for Government financing. The contracting officer shall specify in the...
The adoption of IT security standards in a healthcare environment.
Gomes, Rui; Lapão, Luís Velez
2008-01-01
Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.
Energy and Minerals Science at the U.S. Geological Survey
Ferrero, Richard C.; Kolak, Jonathan J.; Bills, Donald J.; Bowen, Zachary H.; Cordier, Daniel J.; Gallegos, Tanya J.; Hein, James R.; Kelley, Karen D.; Nelson, Philip H.; Nuccio, Vito F.; Schmidt, Jeanine M.; Seal, Robert R.
2013-01-01
The economy, national security, and standard of living of the United States depend on adequate and reliable supplies of energy and mineral resources. Based on population and consumption trends, the Nation’s and World’s use of energy and minerals is expected to grow, driving the demand for scientific understanding of resource formation, location, and availability. The importance of environmental stewardship and human health in sustainable growth emphasizes the need for a broader understanding of energy and mineral resources. The U.S. Geological Survey (USGS) is a world leader in conducting research needed to address these challenges and to provide a scientific foundation for policy and decisionmaking with respect to resource use, sustainability, environmental protection, and an adaptive resource management approach.
Cloud computing in medical imaging.
Kagadis, George C; Kloukinas, Christos; Moore, Kevin; Philbin, Jim; Papadimitroulas, Panagiotis; Alexakos, Christos; Nagy, Paul G; Visvikis, Dimitris; Hendee, William R
2013-07-01
Over the past century technology has played a decisive role in defining, driving, and reinventing procedures, devices, and pharmaceuticals in healthcare. Cloud computing has been introduced only recently but is already one of the major topics of discussion in research and clinical settings. The provision of extensive, easily accessible, and reconfigurable resources such as virtual systems, platforms, and applications with low service cost has caught the attention of many researchers and clinicians. Healthcare researchers are moving their efforts to the cloud, because they need adequate resources to process, store, exchange, and use large quantities of medical data. This Vision 20/20 paper addresses major questions related to the applicability of advanced cloud computing in medical imaging. The paper also considers security and ethical issues that accompany cloud computing.
Steele, Ric G.; Connelly, Mark A.; Palermo, Tonya M.; Ritterband, Lee M.
2014-01-01
Objective To provide an overview of common challenges that pediatric eHealth researchers may encounter when planning, developing, testing, and disseminating eHealth interventions along with proposed solutions for addressing these challenges. Methods The article draws on the existing eHealth literature and the authors’ collective experience in pediatric eHealth research. Results and conclusions The challenges associated with eHealth interventions and their proposed solutions are multifaceted and cut across a number of areas from eHealth program development through dissemination. Collaboration with a range of individuals (e.g., multidisciplinary colleagues, commercial entities, primary stakeholders) is the key to eHealth intervention success. To ensure adequate resources for design, development, and planning for sustainability, a number of public and private sources of funding are available. A study design that addresses ethical concerns and security issues is critical to ensure scientific integrity and intervention dissemination. Table I summarizes key issues to consider during eHealth intervention development, testing, and dissemination. PMID:24816766
42 CFR 3.106 - Security requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...
42 CFR 3.106 - Security requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...
42 CFR 3.106 - Security requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., maintenance, storage, removal, disclosure, transmission and destruction. (b) Security framework. A PSO must... subsection. In addressing the framework that follows, the PSO may develop appropriate and scalable security...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies...
Big data, little security: Addressing security issues in your platform
NASA Astrophysics Data System (ADS)
Macklin, Thomas; Mathews, Joseph
2017-05-01
This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.
Code of Federal Regulations, 2010 CFR
2010-04-01
... income will be adequate to pay all expenses and the loan principal and interest payments, indicating... will be adequate to pay all expenses and the loan principal and interest payments, indicating... constitutions and bylaws, corporate charters, or other organizational documents when mortgaging tribal property...
31 CFR 103.36 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and maintain a record of the name, permanent address, and social security number of the person... secure the name, permanent address, and social security number of each person having a financial interest... to secure the required social security number, it shall not be deemed to be in violation of this...
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... meet the following standards: (1) Address each vulnerability identified in the facility's Security Vulnerability Assessment, and identify and describe the security measures to address each such vulnerability; (2... updates, revises or otherwise alters its Security Vulnerability Assessment pursuant to § 27.215(d), the...
Olson, Brad; Soldz, Stephen; Davis, Martha
2008-01-29
The Psychological Ethics and National Security (PENS) task force was assembled by the American Psychological Association (APA) to guide policy on the role of psychologists in interrogations at foreign detention centers for the purpose of U.S. national security. The task force met briefly in 2005, and its report was quickly accepted by the APA Board of Directors and deemed consistent with the APA Ethics Code by the APA Ethics Committee. This rapid acceptance was unusual for a number of reasons but primarily because of the APA's long-standing tradition of taking great care in developing ethical policies that protected anyone who might be impacted by the work of psychologists. Many psychological and non-governmental organizations (NGOs), as well as reputable journalists, believed the risk of harm associated with psychologist participation in interrogations at these detention centers was not adequately addressed by the report. The present critique analyzes the assumptions of the PENS report and its interpretations of the APA Ethics Code. We demonstrate that it presents only one (and not particularly representative) side of a complex set of ethical issues. We conclude with a discussion of more appropriate psychological contributions to national security and world peace that better respect and preserve human rights.
Olson, Brad; Soldz, Stephen; Davis, Martha
2008-01-01
The Psychological Ethics and National Security (PENS) task force was assembled by the American Psychological Association (APA) to guide policy on the role of psychologists in interrogations at foreign detention centers for the purpose of U.S. national security. The task force met briefly in 2005, and its report was quickly accepted by the APA Board of Directors and deemed consistent with the APA Ethics Code by the APA Ethics Committee. This rapid acceptance was unusual for a number of reasons but primarily because of the APA's long-standing tradition of taking great care in developing ethical policies that protected anyone who might be impacted by the work of psychologists. Many psychological and non-governmental organizations (NGOs), as well as reputable journalists, believed the risk of harm associated with psychologist participation in interrogations at these detention centers was not adequately addressed by the report. The present critique analyzes the assumptions of the PENS report and its interpretations of the APA Ethics Code. We demonstrate that it presents only one (and not particularly representative) side of a complex set of ethical issues. We conclude with a discussion of more appropriate psychological contributions to national security and world peace that better respect and preserve human rights. PMID:18230171
ERIC Educational Resources Information Center
New York State Office of the Comptroller, Albany.
Findings of an audit of the New York State Education Department's procedures to maintain security over Pupil Evaluation Program (PEP) and Program Evaluation Test (PET) examination materials are presented in this report. The audit sought to determine whether the department's security procedures adequately prevented unauthorized access to exam…
24 CFR 320.3 - Eligible issuers of securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) Have management with adequate experience, and access to adequate facilities to issue or service... policies of the issuer permit any discrimination based on race, religion, color, national origin, age, or... its business operations in accordance with accepted mortgage banking practices, ethics, and standards...
26 CFR 31.6051-1 - Statements for employees.
Code of Federal Regulations, 2011 CFR
2011-04-01
... employer. (b) The name and address of the employee, and his social security account number if wages as... address of the employer, (ii) The name, address, and social security account number of the employee, (iii... filing the Social Security Administration copies of the statement, see § 31.6081(a)-1(a)(2). (ii...
Cha, Shi-Cho; Chen, Jyun-Fu
2017-01-01
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900
Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu
2017-10-14
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.
Secure and interoperable communication infrastructures for PPDR organisations
NASA Astrophysics Data System (ADS)
Müller, Wilmuth; Marques, Hugo; Pereira, Luis; Rodriguez, Jonathan; Brouwer, Frank; Bouwers, Bert; Politis, Ilias; Lykourgiotis, Asimakis; Ladas, Alexandros; Adigun, Olayinka; Jelenc, David
2016-05-01
The growing number of events affecting public safety and security (PS&S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on agencies and organisation responsible for PS&S. In order to respond timely and in an adequate manner to such events, Public Protection and Disaster Relief (PPDR) organisations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies such as TETRA, TETRAPOL or P25, do not currently provide broadband capability nor is expected such technologies to be upgraded in the future. This presents a major limitation in supporting new services and information flows. Furthermore, there is no known standard that addresses interoperability of these technologies. In this contribution the design of a next generation communication infrastructure for PPDR organisations which fulfills the requirements of secure and seamless end-to-end communication and interoperable information exchange within the deployed communication networks is presented. Based on Enterprise Architecture of PPDR organisations, a next generation PPDR network that is backward compatible with legacy communication technologies is designed and implemented, capable of providing security, privacy, seamless mobility, QoS and reliability support for mission-critical Private Mobile Radio (PMR) voice and broadband data services. The designed solution provides a robust, reliable, and secure mobile broadband communications system for a wide variety of PMR applications and services on PPDR broadband networks, including the ability of inter-system, interagency and cross-border operations with emphasis on interoperability between users in PMR and LTE.
Struble, Marie Boyle; Aomari, Laurie Lindsay
2003-08-01
It is the position of the American Dietetic Association (ADA) that access to adequate amounts of safe, nutritious, and culturally appropriate food at all times is a fundamental human right. Hunger continues to be a worldwide problem of staggering proportions. The Association supports programs and encourages practices that combat hunger and malnutrition, produce food security, promote self-sufficiency, and are environmentally and economically sustainable. The Association is aware that hunger exists in a world of plenty and that poverty, gender inequity, ethnocentrism, racism, and the lack of political will are key constraints to solving the problems of global hunger and malnutrition. Recognizing that simplistic approaches are inadequate, the ADA identifies sustainable development as the long-term strategy to ending world hunger and achieving food security. Sustainable development requires political, economic, and social changes that include empowering the disenfranchised, widening access to assets and other resources, narrowing the gap between rich and poor, and adjusting consumption patterns so as to foster good stewardship of nature. Additionally, because the health status of future generations is related to the well-being of their mothers, achieving food security will also require increased access for women to education, adequate health care and sanitation, and economic opportunities. This position paper reviews the complex issues of global food insecurity and discusses long-term solutions for achieving world food security. Achieving the end of world hunger has been and is now within our grasp. There is sufficient food to feed everyone, and solutions can be realized now that will benefit all of humanity. As noted in the paper, most people who examine the costs of ending versus not ending world hunger are bewildered by the question of why humanity did not solve the problem a long time ago. The Association supports programs and encourages practices that combat hunger and malnutrition, produce food security, promote self-sufficiency, respect local cultures, and are environmentally and economically sustainable. The ADA recognizes that decisions and actions that dietetics professionals make as practitioners and consumers can help reduce the extent of poverty and hunger both here and abroad. This paper provides information, resources, and strategies to assist dietetics professionals in improving the public's understanding of key issues, becoming advocates of the poor, and influencing the political will to end world hunger.
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1
Thomas D'Agostino
2017-12-09
Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.
2016-07-13
adequate security testing , and segment their networks and systems into separate defended enclaves. Finally, cyber defenders should posi- tion themselves...explicitly tied to following security practices, and there should be consequences for security failures that are regularly tested via a continuing testing ...program. Users should be routinely tested and probed, and those who do not perform well should face escalating consequences. For example, cyber
49 CFR 393.136 - What are the rules for securing large boulders?
Code of Federal Regulations, 2011 CFR
2011-10-01
... adequately secured. (3) Rock which has been formed or cut to a shape and which provides a stable base for... blocking used to support the boulder. (e) Securement of a non-cubic shaped boulder—with a stable base. In... piece of natural, irregularly shaped rock weighing in excess of 5,000 kg (11,000 lb.) or with a volume...
49 CFR 374.309 - Terminal facilities.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Passenger security. All terminals and stations must provide adequate security for passengers and their attendants and be regularly patrolled. (b) Outside facilities. At terminals and stations that are closed when... accommodations, and telephone numbers for local taxi service and police. (c) Maintenance. Terminals shall be...
2007-05-01
business processes and services. 4. Security operations management addresses the day-to-day activities that the organization performs to protect the...Management TM – Technology Management Security Operations Management SOM – Security Operations Management 5.7.2 Important Operations Competency...deals with the provision of access rights to informa- tion and technical assets SOM – Security Operations Management , which addresses the fundamental
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security...
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
48 CFR 832.202-4 - Security for Government financing.
Code of Federal Regulations, 2010 CFR
2010-10-01
... accepted accounting principles and must be audited and certified by an independent public accountant or an... for Government financing. An offeror's financial condition may be considered adequate security to... offeror's financial condition, the contracting officer may obtain, to the extent required, the following...
48 CFR 432.202-4 - Security for Government financing.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Security for Government financing. 432.202-4 Section 432.202-4 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE... for Government financing. Prior to determining that an offeror's financial condition is adequate...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
2007-12-01
and Security 6. AUTHOR( S ) David V. Schulz 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Naval Postgraduate School...Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME( S ) AND ADDRESS(ES) N/A 10. SPONSORING...responding agencies. In fact, the slow Katrina response was attributed to “coordination difficulties” between the military, law enforcement, and
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
10 CFR 71.87 - Routine determinations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Routine determinations. 71.87 Section 71.87 Energy NUCLEAR...; (c) Each closure device of the packaging, including any required gasket, is properly installed and secured and free of defects; (d) Any system for containing liquid is adequately sealed and has adequate...
4 CFR 200.14 - Responsibility for maintaining adequate safeguards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... identifiable personal data and automated systems shall be adequately trained in the security and privacy of....14 Section 200.14 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200... records in which identifiable personal data are processed or maintained, including all reports and output...
77 FR 43665 - Requirements for Distribution of Byproduct Material
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-25
... will not constitute an unreasonable risk to the common defense and security and to the health and... adequately ensured that the health and safety of the public were protected consistent with NRC policies... sources or devices are inherently adequate to protect health and minimize danger to life and property. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... to adequately implement anti-money laundering procedures by failing adequately to perform due...-priced and thinly traded securities'' implicates anti-money laundering monitoring concerns.\\15\\ \\15... Role of Domestic Shell Companies in Financial Crime and Money Laundering (2006), available at http...
Code of Federal Regulations, 2013 CFR
2013-10-01
... record systems. The Chief Information Officer has the responsibility of maintaining adequate technical... the Chief Information Officer. The log shall be maintained at all times. (6) The Institute shall... identifiable personal information. Such safeguards must be sufficient to prevent negligent, accidental, or...
Code of Federal Regulations, 2012 CFR
2012-10-01
... record systems. The Chief Information Officer has the responsibility of maintaining adequate technical... the Chief Information Officer. The log shall be maintained at all times. (6) The Institute shall... identifiable personal information. Such safeguards must be sufficient to prevent negligent, accidental, or...
Code of Federal Regulations, 2014 CFR
2014-10-01
... record systems. The Chief Information Officer has the responsibility of maintaining adequate technical... the Chief Information Officer. The log shall be maintained at all times. (6) The Institute shall... identifiable personal information. Such safeguards must be sufficient to prevent negligent, accidental, or...
Code of Federal Regulations, 2011 CFR
2011-10-01
... record systems. The Chief Information Officer has the responsibility of maintaining adequate technical... the Chief Information Officer. The log shall be maintained at all times. (6) The Institute shall... identifiable personal information. Such safeguards must be sufficient to prevent negligent, accidental, or...
ERIC Educational Resources Information Center
Johnson, David P.
2017-01-01
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…
Household food security and adequacy of child diet in the food insecure region north in Ghana.
Agbadi, Pascal; Urke, Helga Bjørnøy; Mittelmark, Maurice B
2017-01-01
Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity). In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators. Using data from households and 6-23 month old children in the 2012 Feed the Future baseline survey (n = 871), descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID's Food and Nutrition Technical Assistance Project. Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards. Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results call for research into factors besides household food security in the search for determinants of child diet adequacy. In this study at least, household food security was a very weak marker of child diet adequacy. This finding is of significance to public health practice, since it calls into question any assumption that having enough food in a household necessarily results in adequately fed children.
Household food security and adequacy of child diet in the food insecure region north in Ghana
Agbadi, Pascal; Urke, Helga Bjørnøy; Mittelmark, Maurice B.
2017-01-01
Background and objectives Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity). In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators. Methods Using data from households and 6–23 month old children in the 2012 Feed the Future baseline survey (n = 871), descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID’s Food and Nutrition Technical Assistance Project. Results Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards. Conclusions Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results call for research into factors besides household food security in the search for determinants of child diet adequacy. In this study at least, household food security was a very weak marker of child diet adequacy. This finding is of significance to public health practice, since it calls into question any assumption that having enough food in a household necessarily results in adequately fed children. PMID:28494024
Falling short: how state laws can address health information exchange barriers and enablers.
Schmit, Cason D; Wetter, Sarah A; Kash, Bita A
2018-06-01
Research on the implementation of health information exchange (HIE) organizations has identified both positive and negative effects of laws relating to governance, incentives, mandates, sustainability, stakeholder participation, patient engagement, privacy, confidentiality, and security. We fill a substantial research gap by describing whether comprehensive state and territorial HIE legal frameworks address identified legal facilitators and barriers. We used the Westlaw database to identify state and territorial laws relating to HIEs in effect on June 7, 2016 (53 jurisdictions). We blind-coded all laws and addressed coding discrepancies in peer-review meetings. We recorded a consensus code for each law in a master database. We compared 20 HIE legal attributes with identified barriers to and enablers of HIE activity in the literature. Forty-two states, the District of Columbia, and 2 territories have laws relating to HIEs. On average, jurisdictions address 8.32 of the 20 criteria selected in statutes and regulations. Twenty jurisdictions unambiguously address ≤5 criteria in statutes and regulations. None of the significant legal criteria are unambiguously addressed in >60% of the 53 jurisdictions. Laws can be barriers to or enablers of HIEs. However, jurisdictions are not addressing many significant issues identified by researchers. Consequently, there is a substantial risk that existing legal frameworks are not adequately supporting HIEs. The current evidence base is insufficient for comparative assessments or impact rankings of the various factors. However, the detailed Centers for Disease Control and Prevention dataset of HIE laws could enable investigations into the types of laws that promote or impede HIEs.
Analytical Characterization of Internet Security Attacks
ERIC Educational Resources Information Center
Sellke, Sarah H.
2010-01-01
Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…
38 CFR 1.602 - Utilization of access.
Code of Federal Regulations, 2010 CFR
2010-07-01
... individual and organization will comply with all security requirements VBA deems necessary to ensure the integrity and confidentiality of the data and VBA's automated computer systems. (b) An organization granted... regular, adequate training on proper security, including the items listed in § 1.603(a). Where an...
38 CFR 1.602 - Utilization of access.
Code of Federal Regulations, 2011 CFR
2011-07-01
... individual and organization will comply with all security requirements VBA deems necessary to ensure the integrity and confidentiality of the data and VBA's automated computer systems. (b) An organization granted... regular, adequate training on proper security, including the items listed in § 1.603(a). Where an...
38 CFR 1.602 - Utilization of access.
Code of Federal Regulations, 2014 CFR
2014-07-01
... individual and organization will comply with all security requirements VBA deems necessary to ensure the integrity and confidentiality of the data and VBA's automated computer systems. (b) An organization granted... regular, adequate training on proper security, including the items listed in § 1.603(a). Where an...
38 CFR 1.602 - Utilization of access.
Code of Federal Regulations, 2012 CFR
2012-07-01
... individual and organization will comply with all security requirements VBA deems necessary to ensure the integrity and confidentiality of the data and VBA's automated computer systems. (b) An organization granted... regular, adequate training on proper security, including the items listed in § 1.603(a). Where an...
Linking hospital security to customer service: making the case for 'world class' security.
Hill, Scott A
2011-01-01
The reluctance of many hospitals today to invest money and resources into security and safety while at the same time promoting customer good will is a fallacy that has to be corrected, according to the author. He demonstrates how high customer satisfaction scores, as well as regulatory compliance, can only be achieved if a hospital takes the steps necessary to provide adequate safety and security to patients, visitors, physicians and to all who come to the hospital.
IT security evaluation - “hybrid” approach and risk of its implementation
NASA Astrophysics Data System (ADS)
Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.
2018-05-01
It is relevant to evolve processes of evaluation of the IT security nowadays. Creating and application of the common evaluation approaches for an IT component, which are processed by the governmental and civil organizations, are still not solving problem. It is suggested to create a more precise and complex assessment tool for an IT security – the “hybrid” method of the IT security evaluation for a particular object, which is based on a range of adequate assessment tools.
17 CFR 37.1400 - Core Principle 14-System safeguards.
Code of Federal Regulations, 2014 CFR
2014-04-01
... procedures, and automated systems, that: (1) Are reliable and secure; and (2) Have adequate scalable capacity... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Core Principle 14-System... SWAP EXECUTION FACILITIES System Safeguards § 37.1400 Core Principle 14—System safeguards. The swap...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-18
... Networks Security--Isolation or Protection From Unauthorized Passenger Domain Systems Access AGENCY... systems and data networks. The applicable airworthiness regulations do not contain adequate or appropriate... connected networks. The network architecture would be used for a diverse set of functions, including: 1...
7 CFR 1436.8 - Security for loan.
Code of Federal Regulations, 2010 CFR
2010-01-01
... adequate size and value at the time of the application as determined by the county committee to adequately... such collateral except for prior liens on the underlying real estate that by operation of law attach to the collateral if it is or will become a fixture. If any such prior lien on the real estate will...
7 CFR 1436.8 - Security for loan.
Code of Federal Regulations, 2011 CFR
2011-01-01
... adequate size and value at the time of the application as determined by the county committee to adequately... such collateral except for prior liens on the underlying real estate that by operation of law attach to the collateral if it is or will become a fixture. If any such prior lien on the real estate will...
Wu, Yelena P; Steele, Ric G; Connelly, Mark A; Palermo, Tonya M; Ritterband, Lee M
2014-07-01
To provide an overview of common challenges that pediatric eHealth researchers may encounter when planning, developing, testing, and disseminating eHealth interventions along with proposed solutions for addressing these challenges. The article draws on the existing eHealth literature and the authors' collective experience in pediatric eHealth research. The challenges associated with eHealth interventions and their proposed solutions are multifaceted and cut across a number of areas from eHealth program development through dissemination. Collaboration with a range of individuals (e.g., multidisciplinary colleagues, commercial entities, primary stakeholders) is the key to eHealth intervention success. To ensure adequate resources for design, development, and planning for sustainability, a number of public and private sources of funding are available. A study design that addresses ethical concerns and security issues is critical to ensure scientific integrity and intervention dissemination. Table I summarizes key issues to consider during eHealth intervention development, testing, and dissemination. © The Author 2014. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Developing a Security Profile.
ERIC Educational Resources Information Center
Woodcock, Chris
1999-01-01
Examines the questions schools should address when re-evaluating how to protect people, property, and assets. Questions addressed include where and how to begin to improve security in a school, getting the most protection economically, establishing where electronic security should be used, using surveillance cameras and systems, and what the role…
Social Security Administration
... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...
NINJA: a noninvasive framework for internal computer security hardening
NASA Astrophysics Data System (ADS)
Allen, Thomas G.; Thomson, Steve
2004-07-01
Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive scans with an adequate framework performed on a daily basis reduce the amount of security work load as well as the timeliness in performing remediation, as verified by the NINJA framework. A vulnerability assessment/auditing architecture based on mobile agent technology is proposed and examined at the end of the article as an enhancement to the current NINJA architecture.
Mutchler, Jan E; Li, Yang; Xu, Ping
2018-04-16
Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.
75 FR 11610 - Notice Announcing Addresses for Service of Process
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-11
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0076] Notice Announcing Addresses for Service of Process AGENCY: Social Security Administration. ACTION: Notice announcing addresses for summonses and complaints. SUMMARY: The Office of the General Counsel (OGC) is responsible for processing and...
78 FR 7431 - Cbr Systems, Inc.; Analysis of Proposed Consent Order To Aid Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... include any sensitive personal information, like anyone's Social Security number, date of birth, driver's... limited to, the following: name, address, email address, telephone number, date of birth, Social Security... collects personal information, such as fathers' Social Security numbers, and the company collects...
Important features of Sustainable Aggregate Resource Management
Solar, Slavko V.; Shields, Deborah J.; Langer, William H.
2004-01-01
Every society, whether developed, developing or in a phase of renewal following governmental change, requires stable, adequate and secure supplies of natural resources. In the latter case, there could be significant need for construction materials for rebuilding infrastructure, industrial capacity, and housing. It is essential that these large-volume materials be provided in a rational manner that maximizes their societal contribution and minimizes environmental impacts. We describe an approach to resource management based on the principles of sustainable developed. Sustainable Aggregate Resource Management offers a way of addressing the conflicting needs and interests of environmental, economic, and social systems. Sustainability is an ethics based concept that utilizes science and democratic processes to reach acceptable agreements and tradeoffs among interests, while acknowledging the fundamental importance of the environment and social goods. We discuss the features of sustainable aggregate resource management.
Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2009-01-01
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.
Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae
2009-01-01
Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568
Barefield, Amanda C.; Meyer, John D.
2013-01-01
The proliferation of online education programs creates a myriad of challenges for those charged with implementation and delivery of these programs. Although creating and sustaining quality education is a shared responsibility of faculty, staff, and academic leaders, this article focuses on the pivotal role of leadership in securing the necessary resources, developing the organizational structures, and influencing organizational culture. The vital foundation for a successful outcome when implementing online education programs is the role of leadership in providing adequate and appropriate support. Abundant literature extols the roles of leadership in project management; however, there is a dearth of models or systematic methods for leaders to follow regarding how to implement and sustain online programs. Research conducted by the authors culminated in the development of an Administrative Support Matrix, thus addressing the current gap in the literature. PMID:23346030
A security architecture for health information networks.
Kailar, Rajashekar; Muralidhar, Vinod
2007-10-11
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.
A Security Architecture for Health Information Networks
Kailar, Rajashekar
2007-01-01
Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862
Position of the Academy of Nutrition and Dietetics: Food Insecurity in the United States.
Holben, David H; Marshall, Michelle Berger
2017-12-01
It is the position of the Academy of Nutrition and Dietetics that systematic and sustained action is needed to achieve food and nutrition security in the United States. To achieve food security, effective interventions are needed, along with adequate funding for, and increased utilization of, food and nutrition assistance programs; inclusion of nutrition education in such programs; strategies to support individual and household economic stability; and research to measure impact on food insecurity- and health-related outcomes. Millions of individuals living in the United States experience food insecurity. Negative nutritional and non-nutritional outcomes are associated with food insecurity across the lifespan, including substandard academic achievement, inadequate intake of key nutrients, increased risk for chronic disease, and poor psychological and cognitive functioning. Registered dietitian nutritionists and nutrition and dietetics technicians, registered, play key roles in addressing food insecurity and are uniquely positioned to make valuable contributions through competent and collaborative practice, provision of comprehensive food and nutrition education and training, innovative research related to all aspects of food insecurity, and advocacy efforts at the local, state, regional, and national levels. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
Food production & availability--essential prerequisites for sustainable food security.
Swaminathan, M S; Bhavani, R V
2013-09-01
Food and nutrition security are intimately interconnected, since only a food based approach can help in overcoming malnutrition in an economically and socially sustainable manner. Food production provides the base for food security as it is a key determinant of food availability. This paper deals with different aspects of ensuring high productivity and production without associated ecological harm for ensuring adequate food availability. By mainstreaming ecological considerations in technology development and dissemination, we can enter an era of evergreen revolution and sustainable food and nutrition security. Public policy support is crucial for enabling this.
75 FR 16123 - Dave & Buster’s, Inc.; Analysis of Proposed Consent Order to Aid Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-31
... computer networks or to conduct security investigations, such as by employing an intrusion detection system and monitoring system logs; (b) failed to adequately restrict third-party access to its networks, such... reasonable and appropriate security for personal information on its computer networks. Among other things...
17 CFR 171.3 - Business address; hours.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Business address; hours. 171.3 Section 171.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... MEMBER RESPONSIBILITY ACTIONS General Provisions § 171.3 Business address; hours. The principal office of...
17 CFR 12.3 - Business address; hours.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours. The...
17 CFR 12.3 - Business address; hours.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours. The...
17 CFR 171.3 - Business address; hours.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Business address; hours. 171.3 Section 171.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... MEMBER RESPONSIBILITY ACTIONS General Provisions § 171.3 Business address; hours. The principal office of...
17 CFR 12.3 - Business address; hours.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours. The...
17 CFR 12.3 - Business address; hours.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours. The...
17 CFR 171.3 - Business address; hours.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Business address; hours. 171.3 Section 171.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... MEMBER RESPONSIBILITY ACTIONS General Provisions § 171.3 Business address; hours. The principal office of...
Succession Planning in State Health Agencies in the United States: A Brief Report.
Harper, Elizabeth; Leider, Jonathon P; Coronado, Fatima; Beck, Angela J
2017-11-02
Approximately 25% of the public health workforce plans to retire by 2020. Succession planning is a core capability of the governmental public health enterprise; however, limited data are available regarding these efforts in state health agencies (SHAs). We analyzed 2016 Workforce Gaps Survey data regarding succession planning in SHAs using the US Office of Personnel Management's (OPM's) succession planning model, including 6 domains and 27 activities. Descriptive statistics were calculated for all 41 responding SHAs. On average, SHAs self-reported adequately addressing 11 of 27 succession planning activities, with 93% of SHAs adequately addressing 1 or more activities and 61% adequately addressing 1 or more activities in each domain. The majority of OPM-recommended succession planning activities are not being addressed, and limited succession planning occurs across SHAs. Greater activity in the OPM-identified succession planning domains may help SHAs contend with significant turnover and better preserve institutional knowledge.
31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or enrolled retirement plan agent's name, prior address, new address, social security number or tax... individuals licensed to practice before the Internal Revenue Service who have a social security number or tax... Internal Revenue Service who have a social security number or tax identification number that ends with the...
29 CFR 5.5 - Contract provisions and related matters.
Code of Federal Regulations, 2010 CFR
2010-07-01
... contain the name, address, and social security number of each such worker, his or her correct... maintained under 29 CFR 5.5(a)(3)(i), except that full social security numbers and home addresses shall not... identifying number for each employee (e.g., the last four digits of the employee's social security number...
76 FR 20986 - Privacy Act of 1974; Notice of New System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... but are not limited to: name, social security number, addresses, phone numbers, e- mail address, birth... persons when (1) the Agency suspects or has confirmed that the security or confidentiality of information... or fraud, or harm to the security or integrity of this system or other systems or programs (whether...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-10
... borrowers who participate in the HECM program: Name, title, property addresses, birthdates, Social Security... submitted to the Office of Management and Budget (OMB), the Senate Committee on Homeland Security and... addresses, birthdates, Social Security Numbers, phone numbers and dates of death; case-level details on the...
75 FR 34286 - Federal Acquisition Regulation; FAR Case 2009-018, Payrolls and Basic Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-16
... removed the requirement to submit complete social security numbers and home addresses of individual... of full social security numbers and home addresses of individual workers from the prime contractor on... for each employee (e.g., the last four digits of the employee's social security number). The...
17 CFR 10.4 - Business address; hours.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Business address; hours. 10.4 Section 10.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE General Provisions § 10.4 Business address; hours. The Office of Proceedings is located at Three Lafayette...
17 CFR 10.4 - Business address; hours.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Business address; hours. 10.4 Section 10.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE General Provisions § 10.4 Business address; hours. The Office of Proceedings is located at Three Lafayette...
17 CFR 10.4 - Business address; hours.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Business address; hours. 10.4 Section 10.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE General Provisions § 10.4 Business address; hours. The Office of Proceedings is located at Three Lafayette...
17 CFR 10.4 - Business address; hours.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Business address; hours. 10.4 Section 10.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE General Provisions § 10.4 Business address; hours. The Office of Proceedings is located at Three Lafayette...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., INVESTMENT COMPANY ACT OF 1940 § 270.45a-1 Confidential treatment of names and addresses of dealers of registered investment company securities. (a) Exhibits calling for the names and addresses of dealers to or... names and addresses of dealers of registered investment company securities. 270.45a-1 Section 270.45a-1...
DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections
ERIC Educational Resources Information Center
Data Quality Campaign, 2010
2010-01-01
The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…
The changing face of crises and aid in the Asia-Pacific.
Gursky, Elin A; Burkle, Frederick M; Hamon, David W; Walker, Peter; Benjamin, Georges C
2014-01-01
Both US foreign policy and global attention attest to the strategic, economic, and political importance of Asia. Yet, the region faces urgent challenges that must be addressed if it is to remain stable and prosperous. The densely populated countries of the Asia-Pacific are beleaguered by poverty, population displacement, decreasing access to potable water and adequate sanitation, and high rates of disease morbidity and mortality. New and reemerging diseases known to have originated in Asia over the past decades have spread globally by international trade, tourism, worker migration, and agricultural exportation. Unremitting naturally occurring and man-made disasters have strained Southeast Asia's already fragile disaster and public health response infrastructures and the essential services they provide (eg, surveillance, vaccination, maternal and child health, and mental health programs). Following disasters, governments often contract with the broader humanitarian community (eg, indigenous and international NGOs) and seek the assistance of militaries to provide essential services. Yet, their roles and capabilities in addressing acute and chronic health issues in the wake of complex disasters remain unclear. Current mechanisms of nation-state and outside organization interaction, including dissimilar operational platforms, may limit true partnership on behalf of the health security mission. Additionally, concerns regarding skill sets and the lack of standards-based training raise questions about the balance between developing internal response capabilities and professionalizing external, deployable resources. Both the mega-disasters that are forecast for the region and the global health security threats that are expected to emanate from them require an increased focus on improving the Asia-Pacific's emergency preparedness and response posture.
The Changing Face of Crises and Aid in the Asia-Pacific
Burkle, Frederick M.; Hamon, David W.; Walker, Peter; Benjamin, Georges C.
2014-01-01
Both US foreign policy and global attention attest to the strategic, economic, and political importance of Asia. Yet, the region faces urgent challenges that must be addressed if it is to remain stable and prosperous. The densely populated countries of the Asia-Pacific are beleaguered by poverty, population displacement, decreasing access to potable water and adequate sanitation, and high rates of disease morbidity and mortality. New and reemerging diseases known to have originated in Asia over the past decades have spread globally by international trade, tourism, worker migration, and agricultural exportation. Unremitting naturally occurring and man-made disasters have strained Southeast Asia's already fragile disaster and public health response infrastructures and the essential services they provide (eg, surveillance, vaccination, maternal and child health, and mental health programs). Following disasters, governments often contract with the broader humanitarian community (eg, indigenous and international NGOs) and seek the assistance of militaries to provide essential services. Yet, their roles and capabilities in addressing acute and chronic health issues in the wake of complex disasters remain unclear. Current mechanisms of nation-state and outside organization interaction, including dissimilar operational platforms, may limit true partnership on behalf of the health security mission. Additionally, concerns regarding skill sets and the lack of standards-based training raise questions about the balance between developing internal response capabilities and professionalizing external, deployable resources. Both the mega-disasters that are forecast for the region and the global health security threats that are expected to emanate from them require an increased focus on improving the Asia-Pacific's emergency preparedness and response posture. PMID:25268048
Increasing the Number of Children Whose Parents Have Stable Employment. KIDS COUNT Indicator Brief
ERIC Educational Resources Information Center
Shore, Rima; Shore, Barbara
2009-01-01
When parents have secure employment and earn enough to meet their families' basic needs, children benefit in many ways. They are more likely to have decent and stable housing, good nutrition, and adequate health care. Secure employment supports healthy development in other ways as well. It can alleviate parental stress, prevent depression, and…
76 FR 4706 - Self-Defense of Vessels of the United States
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-26
... view the comments and Coast Guard Port Security Advisory (PSA) 3-09, which provides guidance to the... guidance published by the Coast Guard in Port Security Advisory (PSA) 3-09 provide an adequate framework... regard to the use of force against pirates is currently provided in PSA 3-09. The Coast Guard seeks...
The Social Security Program and the Private Sector Alternative: Lessons from History.
ERIC Educational Resources Information Center
Quadagno, Jill
1987-01-01
Used historical evidence to analyze how private sector benefits worked in the past in light of the debate surrounding the Social Security benefits and the federal deficit. Among conclusions reached are that the private sector failed to provide adequate protection for older citizens, and that benefits were inequitably distributed on basis of gender…
The President's Veto of the Minimum Wage Bill: Impact on Poor and Minority Workers.
ERIC Educational Resources Information Center
Shapiro, Isaac
Restoration of an adequate minimum wage remains a critical ingredient in efforts to provide income security for poor and minority workers. The experience of recent years indicates that work does not provide economic security for many poor, Black, and Hispanic workers. National and minority unemployment rates have dropped during the economic…
31 CFR 306.11 - Forms of registration for transferable securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
...) (123-45-6789). (d) Life tenant under will. A security may be registered in the name of a life tenant followed by an adequate identifying reference to the will. Example: Anne B. Smith, life tenant under the will of Adam A. Smith, deceased (12-3456789). The life tenant will be considered a fiduciary. (e...
Securing the Human: The Journey Toward World Law and Justice. The Whole Earth Papers, No. 14.
ERIC Educational Resources Information Center
Mische, Patricia; And Others
The document contains a variety of papers that examine the linkages between local concerns and global concerns and explore alternative world futures. An introductory article, "Securing the Human," discusses how the world community needs to develop adequate means to deal with crimes against humans. These means include sound analysis, spiritual…
Computer Security Systems Enable Access.
ERIC Educational Resources Information Center
Riggen, Gary
1989-01-01
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
7 CFR 1962.13 - Notification to potential purchasers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... address of the debtor. (2) The name and address of any secured party. (3) The Social Security number or... exclude those borrowers whose only crops for sale require FSA Farm Programs (formerly ASCS) marketing...
Food production & availability - Essential prerequisites for sustainable food security
Swaminathan, M.S.; Bhavani, R.V.
2013-01-01
Food and nutrition security are intimately interconnected, since only a food based approach can help in overcoming malnutrition in an economically and socially sustainable manner. Food production provides the base for food security as it is a key determinant of food availability. This paper deals with different aspects of ensuring high productivity and production without associated ecological harm for ensuring adequate food availability. By mainstreaming ecological considerations in technology development and dissemination, we can enter an era of evergreen revolution and sustainable food and nutrition security. Public policy support is crucial for enabling this. PMID:24135188
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pepper, Susan E.
2014-10-10
Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department contributes to the National Nuclear Security Administration Office of Nonproliferation and International Security Next Generation Safeguards Initiative (NGSI) through university engagement, safeguards internships, safeguards courses, professional development, recruitment, and other activities aimed at ensuring the next generation of international safeguards professionals is adequately prepared to support the U.S. safeguards mission. This report is a summary of BNL s work under the NGSI program in Fiscal Year 2014.
2005-02-14
hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed , and...the national level, the National Security Act of 1947 (NSA 47) mandates the need for interagency cooperation.6 In this regard, the National Security...within DoD, it lacks a central body or mechanism to provide the overarching, truly ’global’ oversight and guidance needed to ensure adequate interagency
Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.
Coles, Graeme D; Wratten, Stephen D; Porter, John R
2016-01-01
Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively, requirements for high-quality protein are met more efficiently by animal production from such land. We present a model that can be used to assess dietary energy and quality-corrected protein production from various crop and crop/animal production systems, and demonstrate its utility. We extend our analysis with an accompanying economic analysis of commercially-available, pre-prepared or simply-cooked foods that can be produced from our case-study crop and animal products. We calculate the per-person, per-day cost of both quality-corrected protein and dietary energy as provided in the processed foods. We conclude that mixed dairy/cropping systems provide the greatest quantity of high-quality protein per unit price to the consumer, have the highest food energy production and can support the dietary requirements of the highest number of people, when assessed as all-year-round production systems. Global food and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies.
Price, Michelle A; Beilman, Gregory J; Fabian, Timothy C; Hoyt, David B; Jurkovich, Gregory J; Knudson, M Margaret; MacKenzie, Ellen J; Marshall, Vivienne S; Overton, Kimberly E; Peitzman, Andrew B; Phillips, Monica J; Pruitt, Basil A; Smith, Sharon L; Stewart, Ronald M; Jenkins, Donald H
2016-09-01
To increase trauma-related research and elevate trauma on the national research agenda, the National Trauma Institute (NTI) issued calls for proposals, selected funding recipients, and coordinated 16 federally funded (Department of Defense) trauma research awards over a 4-year period. We sought to collect and describe the lessons learned from this activity to inform future researchers of barriers and facilitators. Fifteen principal investigators participated in semistructured interviews focused on study management issues such as securing institutional approvals, screening and enrollment, multisite trials management, project funding, staffing, and institutional support. NTI Science Committee meeting minutes and study management data were included in the analysis. Simple descriptive statistics were generated and textual data were analyzed for common themes. Principal investigators reported challenges in obtaining institutional approvals, delays in study initiation, screening and enrollment, multisite management, and study funding. Most were able to successfully resolve challenges and have been productive in terms of scholarly publications, securing additional research funding, and training future trauma investigators. Lessons learned in the conduct of the first two funding rounds managed by NTI are instructive in four key areas: regulatory processes, multisite coordination, adequate funding, and the importance of an established research infrastructure to ensure study success. Recommendations for addressing institution-related and investigator-related challenges are discussed along with ongoing advocacy efforts to secure sustained federal funding of a national trauma research program commensurate with the burden of injury.
Orrell, Peter; Bennett, Alison E.
2013-01-01
Can above–belowground interactions help address issues of food security? We address this question in this manuscript, and review the intersection of above–belowground interactions and food security. We propose that above–belowground interactions could address two strategies identified by Godfray etal. (2010): reducing the Yield Gap, and Increasing Production Limits. In particular, to minimize the difference between potential and realized production (The Yield Gap) above–belowground interactions could be manipulated to reduce losses to pests and increase crop growth (and therefore yields). To Increase Production Limits we propose two mechanisms: utilizing intercropping (which uses multiple aspects of above–belowground interactions) and breeding for traits that promote beneficial above–belowground interactions, as well as breeding mutualistic organisms to improve their provided benefit. As a result, if they are managed correctly, there is great potential for above–belowground interactions to contribute to food security. PMID:24198821
Ejection of a rear facing, golf cart passenger.
Schau, Kyle; Masory, Oren
2013-10-01
The following report details the findings of a series of experiments and simulations performed on a commercially available, shuttle style golf cart during several maneuvers involving rapid accelerations of the vehicle. It is determined that the current set of passive restraints on these types of golf carts are not adequate in preventing ejection of a rear facing passenger during rapid accelerations in the forward and lateral directions. Experimental data and simulations show that a hip restraint must be a minimum of 13 in. above the seat in order to secure a rear facing passenger during sharp turns, compared to the current restraint height of 5 in. Furthermore, it is determined that a restraint directly in front of the rear facing passenger is necessary to prevent ejection. In addressing these issues, golf cart manufacturers could greatly reduce the likelihood of injury due to ejection of a rear facing, golf cart passenger. Copyright © 2013 Elsevier Ltd. All rights reserved.
Geothermal FIT Design: International Experience and U.S. Considerations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rickerson, W.; Gifford, J.; Grace, R.
2012-08-01
Developing power plants is a risky endeavor, whether conventional or renewable generation. Feed-in tariff (FIT) policies can be designed to address some of these risks, and their design can be tailored to geothermal electric plant development. Geothermal projects face risks similar to other generation project development, including finding buyers for power, ensuring adequate transmission capacity, competing to supply electricity and/or renewable energy certificates (RECs), securing reliable revenue streams, navigating the legal issues related to project development, and reacting to changes in existing regulations or incentives. Although FITs have not been created specifically for geothermal in the United States to date,more » a variety of FIT design options could reduce geothermal power plant development risks and are explored. This analysis focuses on the design of FIT incentive policies for geothermal electric projects and how FITs can be used to reduce risks (excluding drilling unproductive exploratory wells).« less
Anderson, Amber McKee; Labay, Vladimir
2006-04-01
Radio Frequency Identification (RFID) is quickly growing in its applications. A variety of uses for the technology are beginning to be developed, including chips which can be used in identification cards, in individual items, and for human applications, allowing a chip to be embedded under the skin. Such chips could provide numerous benefits ranging from day-to-day convenience to the increased ability of the federal government to adequately ensure the safety of its citizens. However, there are also valid concerns about the potential of this technology to infringe on privacy, creating fears of a surveillance society. These are concerns that must be addressed quickly, with sensitivity to individual interests and societal welfare, allowing humanity to reap the benefits of convenience and safety without paying an unacceptable price in the loss of privacy.
[Telematics in the public health sector. Where is the protection of health data?].
Voßhoff, Andrea; Raum, Bertram; Ernestus, Walter
2015-10-01
There is a long history of telematics in the German health system. Apart from the growing technical possibilities in the field, it is important to concentrate on the protection of health data in telematics applications. Health data in the hands of service providers or other third parties entails certain risks for the patient's personality rights, because these institutions may not be bound by the practice of medical confidentiality. In addition, big data processing risks make the individual lives of patients and insured persons totally transparent. Measures to reduce these risks have to be taken by the providers as well as by the users of telematics infrastructure; they are the ones who should explicitly address the relevant risks and dangers in a data protection and IT-security concept and develop adequate strategies to cope with these dangers. Additionally, the German legislator remains obliged to create a regulatory framework for the protection of patients' rights.
Integrating Infrastructure and Institutions for Water Security in Large Urban Areas
NASA Astrophysics Data System (ADS)
Padowski, J.; Jawitz, J. W.; Carrera, L.
2015-12-01
Urban growth has forced cities to procure more freshwater to meet demands; however the relationship between urban water security, water availability and water management is not well understood. This work quantifies the urban water security of 108 large cities in the United States (n=50) and Africa (n=58) based on their hydrologic, hydraulic and institutional settings. Using publicly available data, urban water availability was estimated as the volume of water available from local water resources and those captured via hydraulic infrastructure (e.g. reservoirs, wellfields, aqueducts) while urban water institutions were assessed according to their ability to deliver, supply and regulate water resources to cities. When assessing availability, cities relying on local water resources comprised a minority (37%) of those assessed. The majority of cities (55%) instead rely on captured water to meet urban demands, with African cities reaching farther and accessing a greater number and variety of sources for water supply than US cities. Cities using captured water generally had poorer access to local water resources and maintained significantly more complex strategies for water delivery, supply and regulatory management. Eight cities, all African, are identified in this work as having water insecurity issues. These cities lack sufficient infrastructure and institutional complexity to capture and deliver adequate amounts of water for urban use. Together, these findings highlight the important interconnection between infrastructure investments and management techniques for urban areas with a limited or dwindling natural abundance of water. Addressing water security challenges in the future will require that more attention be placed not only on increasing water availability, but on developing the institutional support to manage captured water supplies.
2002-09-01
ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Egov 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING...initiatives. The federal government has 55 databases that deal with security threats, but inter- agency access depends on establishing agreements through...which that information can be shared. True cooperation also will require government -wide commitment to enterprise architecture, integrated
Usage of insecure E-mail services among researchers with different scientific background.
Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago
2011-08-01
Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.
Does Financial Literacy Contribute to Food Security?
Carman, Katherine G; Zamarro, Gema
2016-01-01
Food insecurity, not having consistent access to adequate food for active, healthy lives for all household members, is most common among low income households. However, income alone is not sufficient to explain who experiences food insecurity. This study investigates the relationship between financial literacy and food security. We find that low income households who exhibit financial literacy are less likely to experience food insecurity.
Program Oversight of Contractors on the Battlefield
2011-03-23
contractor to another. For example, under Blackwater Security Firm‟s contract for private security services in Iraq, the contract paid workers guarding...subcontracting relationship with Blackwater . 38 The Coalition Provisional Authority (CPA) provided less than adequate control for approximately $8.8...the Army‟s LOGCAP, the Navy ‟s Construction Capabilities Contract Program, and the Air Force‟s Contract Augmentation Program. These programs remain
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Strategic Pivot Toward the Asia-Pacific: Implications for USMC
2013-03-01
S) AND ADDRESS(ES) Dr. Gabriel Marcella Department of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9...Gabriel Marcella Department of National Security and Strategy Project Adviser This manuscript is submitted in partial fulfillment of the
Maintaining the Status Quo in the Taiwan Strait
2013-03-01
of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) U.S. Army...Count: 5,308 14. ABSTRACT In order to ensure vital U.S. interests concerning security and economic freedom in the region, the status quo in the...international/regional support of Taiwan, Taiwanese military deterrence backed by strategically ambiguous U.S. assurances of security , intertwined
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less
Assessing Nutritional Diversity of Cropping Systems in African Villages
DeClerck, Fabrice; Diru, Willy; Fanzo, Jessica; Gaynor, Kaitlyn; Lambrecht, Isabel; Mudiope, Joseph; Mutuo, Patrick K.; Nkhoma, Phelire; Siriri, David; Sullivan, Clare; Palm, Cheryl A.
2011-01-01
Background In Sub-Saharan Africa, 40% of children under five years in age are chronically undernourished. As new investments and attention galvanize action on African agriculture to reduce hunger, there is an urgent need for metrics that monitor agricultural progress beyond calories produced per capita and address nutritional diversity essential for human health. In this study we demonstrate how an ecological tool, functional diversity (FD), has potential to address this need and provide new insights on nutritional diversity of cropping systems in rural Africa. Methods and Findings Data on edible plant species diversity, food security and diet diversity were collected for 170 farms in three rural settings in Sub-Saharan Africa. Nutritional FD metrics were calculated based on farm species composition and species nutritional composition. Iron and vitamin A deficiency were determined from blood samples of 90 adult women. Nutritional FD metrics summarized the diversity of nutrients provided by the farm and showed variability between farms and villages. Regression of nutritional FD against species richness and expected FD enabled identification of key species that add nutrient diversity to the system and assessed the degree of redundancy for nutrient traits. Nutritional FD analysis demonstrated that depending on the original composition of species on farm or village, adding or removing individual species can have radically different outcomes for nutritional diversity. While correlations between nutritional FD, food and nutrition indicators were not significant at household level, associations between these variables were observed at village level. Conclusion This study provides novel metrics to address nutritional diversity in farming systems and examples of how these metrics can help guide agricultural interventions towards adequate nutrient diversity. New hypotheses on the link between agro-diversity, food security and human nutrition are generated and strategies for future research are suggested calling for integration of agriculture, ecology, nutrition, and socio-economics. PMID:21698127
Rights-Based Approaches to Ensure Sustainable Nutrition Security.
Banerjee, Sweta
2016-01-01
In India, a rights-based approach has been used to address large-scale malnutrition, including both micro- and macro-level nutrition deficiencies. Stunting, which is an intergenerational chronic consequence of malnutrition, is especially widespread in India (38% among children under 5 years old). To tackle this problem, the government of India has designed interventions for the first 1,000 days, a critical period of the life cycle, through a number of community-based programs to fulfill the rights to food and life. However, the entitlements providing these rights have not yet produced the necessary changes in the malnutrition status of people, especially women and children. The government of India has already implemented laws and drafted a constitution that covers the needs of its citizens, but corruption, bureaucracy, lack of awareness of rights and entitlements and social discrimination limit people's access to basic rights and services. To address this crisis, Welthungerhilfe India, working in remote villages of the most backward states in India, has shifted from a welfare-based approach to a rights-based approach. The Fight Hunger First Initiative, started by Welthungerhilfe in 2011, is designed on the premise that in the long term, poor people can only leave poverty behind if adequate welfare systems are in place and if basic rights are fulfilled; these rights include access to proper education, sufficient access to adequate food and income, suitable health services and equal rights. Only then can the next generation of disadvantaged populations look forward to a new and better future and can growth benefit the entire society. The project, co-funded by the Federal Ministry for Economic Cooperation and Development, is a long-term multi-sectoral program that involves institution-building and empowerment. © 2016 S. Karger AG, Basel.
Changing the paradigm of emergency response: The need for first-care providers.
Bobko, Joshua P; Kamin, Richard
2015-01-01
There is a major gap in the security of the critical infrastructure - civilian medical response to atypical emergencies. Clear evidence demonstrates that, despite ongoing improvements to the first-responder system, there exists an inherent delay in the immediate medical care at the scene of an emergency. This delay can only be reduced through a societal shift in reliance on police and fire response and by extending the medical system into all communities. Additionally, through analysis of military data, it is known that immediately addressing the common injury patterns following a traumatic event will save lives. The predictable nature of these injuries, coupled with an unavoidable delay in the arrival of first responders, necessitates the need for immediate care on scene. Initial care is often rendered by bystanders, typically armed only with basic first-aid training based on medical emergencies and does not adequately address the traumatic injury patterns seen in disasters. Implementing an approach similar to the American Cardiac Arrest Act can improve outcomes to traumatic events. This paper analyses the latest data on active shooter incidents and proposes that the creation of a network of trauma-trained medic extenders would improve all communities' resilience to catastrophic disaster.
... work loads Lack of adequate social and coping skills Academic, occupational, or social pressures Loss of job, home, money, status, self-esteem, personal security 4.1 STIGMA IN THE MILITARY ...
2008-11-24
ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public...for current usage. It now reads: “My organization has committed adequate budget and resources to interorganizational collaboration.” This statement ...Mean Item Standard Deviation My organization commits adequate human and financial resources to training with other organizations. 1 3.3 1.4 My
Secure and Efficient Network Fault Localization
2012-02-27
ORGANIZATION NAME(S) AND ADDRESS (ES) Carnegie Mellon University,School of Computer Science,Computer Science Department,Pittsburgh,PA,15213 8. PERFORMING...ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT...efficiency than previously known protocols for fault localization. Our proposed fault localization protocols also address the security threats that
The SAIL Databank: building a national architecture for e-health research and evaluation.
Ford, David V; Jones, Kerina H; Verplancke, Jean-Philippe; Lyons, Ronan A; John, Gareth; Brown, Ginevra; Brooks, Caroline J; Thompson, Simon; Bodger, Owen; Couch, Tony; Leake, Ken
2009-09-04
Vast quantities of electronic data are collected about patients and service users as they pass through health service and other public sector organisations, and these data present enormous potential for research and policy evaluation. The Health Information Research Unit (HIRU) aims to realise the potential of electronically-held, person-based, routinely-collected data to conduct and support health-related studies. However, there are considerable challenges that must be addressed before such data can be used for these purposes, to ensure compliance with the legislation and guidelines generally known as Information Governance. A set of objectives was identified to address the challenges and establish the Secure Anonymised Information Linkage (SAIL) system in accordance with Information Governance. These were to: 1) ensure data transportation is secure; 2) operate a reliable record matching technique to enable accurate record linkage across datasets; 3) anonymise and encrypt the data to prevent re-identification of individuals; 4) apply measures to address disclosure risk in data views created for researchers; 5) ensure data access is controlled and authorised; 6) establish methods for scrutinising proposals for data utilisation and approving output; and 7) gain external verification of compliance with Information Governance. The SAIL databank has been established and it operates on a DB2 platform (Data Warehouse Edition on AIX) running on an IBM 'P' series Supercomputer: Blue-C. The findings of an independent internal audit were favourable and concluded that the systems in place provide adequate assurance of compliance with Information Governance. This expanding databank already holds over 500 million anonymised and encrypted individual-level records from a range of sources relevant to health and well-being. This includes national datasets covering the whole of Wales (approximately 3 million population) and local provider-level datasets, with further growth in progress. The utility of the databank is demonstrated by increasing engagement in high quality research studies. Through the pragmatic approach that has been adopted, we have been able to address the key challenges in establishing a national databank of anonymised person-based records, so that the data are available for research and evaluation whilst meeting the requirements of Information Governance.
The SAIL Databank: building a national architecture for e-health research and evaluation
Ford, David V; Jones, Kerina H; Verplancke, Jean-Philippe; Lyons, Ronan A; John, Gareth; Brown, Ginevra; Brooks, Caroline J; Thompson, Simon; Bodger, Owen; Couch, Tony; Leake, Ken
2009-01-01
Background Vast quantities of electronic data are collected about patients and service users as they pass through health service and other public sector organisations, and these data present enormous potential for research and policy evaluation. The Health Information Research Unit (HIRU) aims to realise the potential of electronically-held, person-based, routinely-collected data to conduct and support health-related studies. However, there are considerable challenges that must be addressed before such data can be used for these purposes, to ensure compliance with the legislation and guidelines generally known as Information Governance. Methods A set of objectives was identified to address the challenges and establish the Secure Anonymised Information Linkage (SAIL) system in accordance with Information Governance. These were to: 1) ensure data transportation is secure; 2) operate a reliable record matching technique to enable accurate record linkage across datasets; 3) anonymise and encrypt the data to prevent re-identification of individuals; 4) apply measures to address disclosure risk in data views created for researchers; 5) ensure data access is controlled and authorised; 6) establish methods for scrutinising proposals for data utilisation and approving output; and 7) gain external verification of compliance with Information Governance. Results The SAIL databank has been established and it operates on a DB2 platform (Data Warehouse Edition on AIX) running on an IBM 'P' series Supercomputer: Blue-C. The findings of an independent internal audit were favourable and concluded that the systems in place provide adequate assurance of compliance with Information Governance. This expanding databank already holds over 500 million anonymised and encrypted individual-level records from a range of sources relevant to health and well-being. This includes national datasets covering the whole of Wales (approximately 3 million population) and local provider-level datasets, with further growth in progress. The utility of the databank is demonstrated by increasing engagement in high quality research studies. Conclusion Through the pragmatic approach that has been adopted, we have been able to address the key challenges in establishing a national databank of anonymised person-based records, so that the data are available for research and evaluation whilst meeting the requirements of Information Governance. PMID:19732426
2008-01-01
S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Air Force Academy,Institute...for National Security Studies,USAFA,CO,80840 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME( S ) AND ADDRESS(ES) 10...SPONSOR/MONITOR’S ACRONYM( S ) 11. SPONSOR/MONITOR’S REPORT NUMBER( S ) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution
2013-12-01
NUMBERS 6. AUTHOR(S) Thomas P. Guglielmo 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8... PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/A 10. SPONSORING/MONITORING AGENCY REPORT...improvised explosive devices (IEDs). In an analysis conducted by the Homeland Security News Wire after the Boston Marathon bombings, it was
Educating Special Forces Junior Leaders for a Complex Security Environment
2009-07-01
Security Environment 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR( S ) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK...UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) Joint Special Operations University,357 Tully Street Alison Building,Hurlburt Field,FL...32544 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME( S ) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM( S ) 11. SPONSOR
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-15
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p..., Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-05
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0071] Social Security Ruling, SSR 13-1p..., Misconduct, or Discrimination by Administrative Law Judges (ALJs); Correction AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling; Correction. SUMMARY: The Social Security Administration...
The Challenges of Seeking Security While Respecting Privacy
NASA Astrophysics Data System (ADS)
Kantor, Paul B.; Lesk, Michael E.
Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
..., if so, address the impact. The state's conclusion must be supported by an adequate technical analysis...'' provisions, the state's SIP revision must be supported by an adequate technical analysis, including, but not... disapproval where the Agency states: ``* * *without an adequate technical analysis EPA does not believe that...
The Asia-Pacific: A Region in Transition
2004-01-01
NAME(S) AND ADDRESS(ES) Asia-Pacific Center for Security Studies ,2058 Maluhia Road ,Honolulu,HI,96815 8. PERFORMING ORGANIZATION REPORT NUMBER 9...Center for Security Studies Reprint permission: Contact the editors at 2058 Maluhia Road, Honolulu, HI 96815 All views expressed in the chapters of...this book are those of the authors and do not necessarily reflect the views of the Asia-Pacific Center for Security Studies (APCSS) or any
Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661
Villagómez-Ornelas, Paloma; Hernández-López, Pedro; Carrasco-Enríquez, Brenda; Barrios-Sánchez, Karina; Pérez-Escamilla, Rafael; Melgar-Quiñónez, Hugo
2014-01-01
This article validates the statistical consistency of two food security scales: the Mexican Food Security Scale (EMSA) and the Latin American and Caribbean Food Security Scale (ELCSA). Validity tests were conducted in order to verify that both scales were consistent instruments, conformed by independent, properly calibrated and adequately sorted items, arranged in a continuum of severity. The following tests were developed: sorting of items; Cronbach's alpha analysis; parallelism of prevalence curves; Rasch models; sensitivity analysis through mean differences' hypothesis test. The tests showed that both scales meet the required attributes and are robust statistical instruments for food security measurement. This is relevant given that the lack of access to food indicator, included in multidimensional poverty measurement in Mexico, is calculated with EMSA.
Successful practices in the use of secure e-mail.
Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt
2014-01-01
Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 "super user" physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients.
ERIC Educational Resources Information Center
Halsband, Robin; Hassel, Bryan C.
2004-01-01
One of the single biggest challenges for a charter school is securing financing for an adequate facility. While a stellar building provides no guarantee that a school will be a success, having adequate facilities that at least meet the needs of an academic program without robbing the budget can go a long way toward creating an environment…
Does Financial Literacy Contribute to Food Security?
Carman, Katherine G.; Zamarro, Gema
2016-01-01
Food insecurity, not having consistent access to adequate food for active, healthy lives for all household members, is most common among low income households. However, income alone is not sufficient to explain who experiences food insecurity. This study investigates the relationship between financial literacy and food security. We find that low income households who exhibit financial literacy are less likely to experience food insecurity. PMID:26949563
Testing the Waters: Climate Change in Africa and Anticipating Regional Conflicts
2011-05-04
be adequately assessed without careful consideration of the history of economic change and political activities within populations‟ respective areas...to the defined National Security objectives of the USG in Africa. This training often consists of operational activities such as counter-piracy...thus, the USG. However, it is telling that African military leaders have identified security forces training in more fundamental activities such as
Executive Guide: Information Security Management. Learning From Leading Organizations
1998-05-01
data. In September 1996, we reported that audit reports and agency self - assessments issued during the previous 2 years showed that weak information...company has developed an efficient and disciplined process for ensuring that information security-related risks to business operations are considered and...protection group at the utility was required to approve all new applications to indicate that risks had been adequately considered. Providing self
ERIC Educational Resources Information Center
Wren, Andrew
2008-01-01
Administrators are constantly seeking ways to cost-effectively and adequately increase security and improve efficiency in K-12 schools. While video is not a new tool to schools, the shift from analog to network technology has increased the accessibility and usability in a variety of applications. Properly installed and used, video is a powerful…
7 CFR 1735.91 - Location of facilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... AGRICULTURE GENERAL POLICIES, TYPES OF LOANS, LOAN REQUIREMENTS-TELECOMMUNICATIONS PROGRAM Requirements for... must be located so that they can be efficiently operated by the borrower and provide adequate security...
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
The US Army and Future Security Force Assistance Operations
2013-04-01
havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the future...safe havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the...organizations at all levels. 5 SFA extends well beyond military-to-military training and conceptually addresses security as a system of
Godrich, Stephanie L.; Lo, Johnny; Davies, Christina R.; Darby, Jill; Devine, Amanda
2017-01-01
Improving the suboptimal vegetable consumption among the majority of Australian children is imperative in reducing chronic disease risk. The objective of this research was to determine whether there was a relationship between food security determinants (FSD) (i.e., food availability, access, and utilisation dimensions) and adequate vegetable consumption among children living in regional and remote Western Australia (WA). Caregiver-child dyads (n = 256) living in non-metropolitan/rural WA completed cross-sectional surveys that included questions on FSD, demographics and usual vegetable intake. A total of 187 dyads were included in analyses, which included descriptive and logistic regression analyses via IBM SPSS (version 23). A total of 13.4% of children in this sample had adequate vegetable intake. FSD that met inclusion criteria (p ≤ 0.20) for multivariable regression analyses included price; promotion; quality; location of food outlets; variety of vegetable types; financial resources; and transport to outlets. After adjustment for potential demographic confounders, the FSD that predicted adequate vegetable consumption were, variety of vegetable types consumed (p = 0.007), promotion (p = 0.017), location of food outlets (p = 0.027), and price (p = 0.043). Food retail outlets should ensure that adequate varieties of vegetable types (i.e., fresh, frozen, tinned) are available, vegetable messages should be promoted through food retail outlets and in community settings, towns should include a range of vegetable purchasing options, increase their reliance on a local food supply and increase transport options to enable affordable vegetable purchasing. PMID:28054955
Godrich, Stephanie L; Lo, Johnny; Davies, Christina R; Darby, Jill; Devine, Amanda
2017-01-03
Improving the suboptimal vegetable consumption among the majority of Australian children is imperative in reducing chronic disease risk. The objective of this research was to determine whether there was a relationship between food security determinants (FSD) (i.e., food availability, access, and utilisation dimensions) and adequate vegetable consumption among children living in regional and remote Western Australia (WA). Caregiver-child dyads ( n = 256) living in non-metropolitan/rural WA completed cross-sectional surveys that included questions on FSD, demographics and usual vegetable intake. A total of 187 dyads were included in analyses, which included descriptive and logistic regression analyses via IBM SPSS (version 23). A total of 13.4% of children in this sample had adequate vegetable intake. FSD that met inclusion criteria ( p ≤ 0.20) for multivariable regression analyses included price; promotion; quality; location of food outlets; variety of vegetable types; financial resources; and transport to outlets. After adjustment for potential demographic confounders, the FSD that predicted adequate vegetable consumption were, variety of vegetable types consumed ( p = 0.007), promotion ( p = 0.017), location of food outlets ( p = 0.027), and price ( p = 0.043). Food retail outlets should ensure that adequate varieties of vegetable types (i.e., fresh, frozen, tinned) are available, vegetable messages should be promoted through food retail outlets and in community settings, towns should include a range of vegetable purchasing options, increase their reliance on a local food supply and increase transport options to enable affordable vegetable purchasing.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...
Hybrid architecture for building secure sensor networks
NASA Astrophysics Data System (ADS)
Owens, Ken R., Jr.; Watkins, Steve E.
2012-04-01
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
17 CFR 38.1050 - Core Principle 20.
Code of Federal Regulations, 2014 CFR
2014-04-01
... automated systems, that are reliable, secure, and have adequate scalable capacity; (b) Establish and... CONTRACT MARKETS System Safeguards § 38.1050 Core Principle 20. Each designated contract market shall: (a...
17 CFR 38.1050 - Core Principle 20.
Code of Federal Regulations, 2013 CFR
2013-04-01
... automated systems, that are reliable, secure, and have adequate scalable capacity; (b) Establish and... CONTRACT MARKETS System Safeguards § 38.1050 Core Principle 20. Each designated contract market shall: (a...
Defense Technology Security Administration Strategic Plan 2009-2010
2008-12-22
NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Technology Security Administration ( DTSA ),Washington,DC 8. PERFORMING ORGANIZATION...Security Administration This document is unclassifi ed in its entirety. Photography courtesy of Defense Link and DTSA . Document printed 2009. DTSA ...STRATEGIC PLAN 2009-2010 C O N T E N T S Message from the Director 2 Envisioning 2010 3 Our Way Ahead 5 We Are DTSA 18 Metrics Matrix 24 DTSA
77 FR 49439 - National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-16
.... ADDRESSES: Defense Language and National Security Education Office, 1101 Wilson Boulevard, Suite 1210... National Security Education Office (DLNSEO), 1101 Wilson Boulevard, Suite 1210, Rosslyn, Virginia 22209...
Aviation Security: Efforts to Measure Effectiveness and Address Challenges
2003-11-05
AND SUBTITLE AVIATION SECURITY Efforts to Meassure Effectiveness and Address Challenges 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT...screeners in becoming more adept at detecting hard -to-spot threat objects. However, TIP was shut down immediately following the September 11
Maritime Security: Malaysia’s Persistent Problem
2012-01-01
navies, and air forces of the littoral states.”20 In his keynote address at the 2011 Shangri-La Dialogue, Prime Minister Dato’ Sri Najib Tun Razak ...Monitor, Vol. 4 No. 3, 2006. Razak , Dato’ Sri Najib Tun, Prime Minister Malaysia. Keynote Address. Shangri-La Dialogue. Singapore, June 3, 2011... Razak , Dato’ Sri Najib , Deputy Prime Minister Malaysia, Address. Shangri-La Dialogue. Enhancing Maritime Security Cooperation. Singapore, 2005
Computer Network Security: Best Practices for Alberta School Jurisdictions.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton.
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
School Security: For Whom and with What Results?
ERIC Educational Resources Information Center
Servoss, Timothy J.; Finn, Jeremy D.
2014-01-01
This study utilized school-level data from several combined national databases to address two questions regarding school security policy: (1) What are the school characteristics related to levels of security? (2) How does security relate to school suspension, dropout, and college attendance rates? Among the predictors of school security, having a…
Olds, Jessica; Reilly, Rachel; Yerrell, Paul; Stajic, Janet; Micklem, Jasmine; Morey, Kim; Brown, Alex
International frameworks supported by national principles in Australia stipulate that prisoners should be provided with health services equivalent to those provided in the general community. However, a number of barriers unique to the prison system may hinder the provision of equitable healthcare for this population. In Australia, Indigenous people carry a greater burden of cancer mortality, which the Cancer Data and Aboriginal Disparities (CanDAD) project is seeking to address. During the course of recruiting participants to the CanDAD study, Indigenous Australian prisoners with cancer emerged as an important, under-researched but difficult to access sub-group. This scoping review sought to identify barriers and facilitators of access to adequate and equitable healthcare for Indigenous Australian prisoners with cancer in Australia. This review demonstrated a lack of research and, as such, the scoping review was extended to prisoners with cancer in Australia, New Zealand, the United States and Canada. This approach was taken in order to summarise the existing body of evidence regarding the barriers and facilitators of access to adequate and equitable healthcare for those who are incarcerated and suffering from cancer, and highlight areas that may require further investigation. Eight studies or commentaries were found to meet the inclusion criteria. This limited set of findings pointed to a range of possible barriers faced by prisoners with cancer, including a tension between the prisons' concern with security versus the need for timely access to medical care. Findings identified here offer potential starting points for research and policy development. Further research is needed to better elucidate how barriers to adequate cancer care for prisoners may be identified and overcome, in Australia and internationally. Furthermore, given Indigenous Australians' over-burden of cancer mortality and over-representation in the prison system, further research is needed to identify whether there are a unique set of barriers for this group.
ERIC Educational Resources Information Center
Francois, Michael T.
2016-01-01
Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…
Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.
ERIC Educational Resources Information Center
Trinkaus-Randall, Gregor
1998-01-01
Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…
Secure Naming and Addressing Operations for Store, Carry and Forward Networks
NASA Technical Reports Server (NTRS)
Eddy, Wesley M.; Ivancic, William D.; Iannicca, Dennis C.; Ishac, Joseph; Hylton, Alan G.
2014-01-01
This paper describes concepts for secure naming and addressing directed at Store, Carry and Forward (SCF) distributed applications, where disconnection and intermittent connectivity between forwarding systems is the norm. The paper provides a brief overview of store, carry and forward distributed applications followed by an in depth discussion of how to securely: create a namespace; allocate names within the namespace; query for names known within a local processing system or connected subnetwork; validate ownership of a given name; authenticate data from a given name; and, encrypt data to a given name. Critical issues such as revocation of names, mobility and the ability to use various namespaces to secure operations or for Quality-of-Service are also presented. Although the concepts presented for naming and addressing have been developed for SCF, they are directly applicable to fully connected systems.
Insider Threat Security Reference Architecture
2012-04-01
this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture
Nahalomo, Aziiza; Iversen, Per Ole; Rukundo, Peter Milton; Kaaya, Archileo; Kikafunda, Joyce; Eide, Wenche Barth; Marais, Maritha; Wamala, Edward; Kabahenda, Margaret
2018-05-24
In developing countries like Uganda, the human right to adequate food (RtAF) is inextricably linked to access to land for households to feed themselves directly through production or means for its procurement. Whether RtAF is enjoyed among Ugandan land evictees, is unknown. We therefore explored this among land evictees (rights-holders) in Wakiso and Mpigi districts in rural Central Uganda. We assessed food accessibility and related coping strategies, diet quality and nutritional status of children 6-59 months old, and their caregivers. Effectiveness of the complaint and redress mechanisms in addressing RtAF violations was also explored. In this cross-sectional study, quantitative data was collected using a structured questionnaire, with food security and nutritional assessment methods from a total of 215 land evictees including 187 children aged 6-59 months. Qualitative data was collected by reviewing selected national and international documents on the RtAF and key informant interviews with 15 purposively sampled duty-bearers. These included individuals or representatives of the Uganda Human Rights Commission, Resident District Commissioner, Sub-county Chiefs, and local Council leaders. We found that 78% of land evictees had insufficient access to food while 69.4% had consumed a less diversified diet. A majority of evictees (85.2%) relied on borrowing food or help from others to cope with food shortages. Of the 187 children assessed, 9.6% were wasted, 18.2% were underweight and 34.2% were stunted. Small, but significant associations, were found between food accessibility, diet quality, food insecurity coping strategies; and the nutritional status of evictees. We observed that administrative, quasi-judicial and judicial mechanisms to provide adequate legal remedies regarding violations of the RtAF among evictees in Uganda are in place, but not effective in doing so. Land eviction without adequate legal remedies is a contributor to food insecurity and undernutrition in rural Central Uganda. It is essential that the Government strengthens and enforces the policy and legal environment to ensure adequate and timely compensation of evictees in order to reduce their vulnerability to food insecurity.
Subscribe to the Transportation Secure Data Center Newsletter |
Newsletter Subscribe to the Transportation Secure Data Center Newsletter Subscribe to receive via email the Transportation Secure Data Center (TSDC) newsletter. Email Address Subscribe Newsletter
77 FR 25993 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... disposing of records in the system: Storage: Electronic storage media. Retrievability: Name, Social Security... effective on June 1, 2012 unless comments are received which result in a contrary determination. ADDRESSES... records in the system: Name, Social Security Number (SSN), date of birth, home address, place of birth...
Making the Case for Humanitarian Intervention: National Interest and Moral Imperative
2015-03-01
School REPORT NUMBER Monterey, CA 93943-5000 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING NIA AGENCY REPORT...71 Weitz, Project on National Security Reform, 505 –6. 72 Cohen, One Hundred Days of Silence, 6. 73 Weitz, Project on National Security Reform, 987
Maritime Defense and Security Research Program: Final Report, 2004-2011
2011-11-01
NAME(S) AND ADDRESS(ES) Assistant Secretary of Defense for Homeland Defense and America‘s Security Affairs Washington D.C. 10 . SPONSOR/MONITOR’S...34 10 . Assessment of Maritime Domain Protection Capabilities Maritime Intercept Analysis...69 10 . MISRAD Leadership Summit, February 2005 ...............................70 11. MDA Executive Interagency Workshop, October
76 FR 12208 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... or other forms of information technology. Mail, e-mail, or fax your comments and recommendations on...: 202-395-6974, E-mail address: [email protected] (SSA) Social Security Administration, DCBFM... above e-mail address. 1. Request for Social Security Earnings Information--20 CFR 404.810 and 401.100...
Code of Federal Regulations, 2010 CFR
2010-04-01
... name, address, telephone number, and social security number (if available) of the patient receiving the...; (ii) The name, address, telephone number, and social security number (if available) of the patient... the manufacturer of the tracked device for audit upon written request by an authorized representative...
Code of Federal Regulations, 2011 CFR
2011-04-01
... name, address, telephone number, and social security number (if available) of the patient receiving the...; (ii) The name, address, telephone number, and social security number (if available) of the patient... the manufacturer of the tracked device for audit upon written request by an authorized representative...
75 FR 82565 - Federal Acquisition Regulation; Federal Acquisition Circular 2005-48; Introduction
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-30
... delete the requirement for submission of full social security numbers and home addresses of individual... subcontractors to maintain the full social security number and current address of each covered worker, and... Department of Labor for purposes of an investigation or audit of compliance with prevailing wage requirements...
Health Inequalities and Infectious Disease Epidemics: A Challenge for Global Health Security
Kumar, Supriya
2014-01-01
In today's global society, infectious disease outbreaks can spread quickly across the world, fueled by the rapidity with which we travel across borders and continents. Historical accounts of influenza pandemics and contemporary reports on infectious diseases clearly demonstrate that poverty, inequality, and social determinants of health create conditions for the transmission of infectious diseases, and existing health disparities or inequalities can further contribute to unequal burdens of morbidity and mortality. Yet, to date, studies of influenza pandemic plans across multiple countries find little to no recognition of health inequalities or attempts to engage disadvantaged populations to explicitly address the differential impact of a pandemic on them. To meet the goals and objectives of the Global Health Security Agenda, we argue that international partners, from WHO to individual countries, must grapple with the social determinants of health and existing health inequalities and extend their vision to include these factors so that disease that may start among socially disadvantaged subpopulations does not go unnoticed and spread across borders. These efforts will require rethinking surveillance systems to include sociodemographic data; training local teams of researchers and community health workers who are able to not only analyze data to recognize risk factors for disease, but also use simulation methods to assess the impact of alternative policies on reducing disease; integrating social science disciplines to understand local context; and proactively anticipating shortfalls in availability of adequate healthcare resources, including vaccines. Without explicit attention to existing health inequalities and underlying social determinants of health, the Global Health Security Agenda is unlikely to succeed in its goals and objectives. PMID:25254915
Using RFID to Enhance Security in Off-Site Data Storage
Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638
Using RFID to enhance security in off-site data storage.
Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.
He, Ying; Johnson, Chris
2017-12-01
Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Successful Practices in the Use of Secure E-mail
Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt
2014-01-01
Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 “super user” physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients. PMID:24937149
46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.
Code of Federal Regulations, 2010 CFR
2010-10-01
... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information Security...
75 FR 73947 - Securities of Nonmember Insured Banks
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-30
..., DC, and should be addressed as follows: Accounting and Securities Disclosure Section, Division of..., Accounting and Securities Disclosure Section, Division of Supervision and Consumer Protection, 550 17th... comment. SUMMARY: The FDIC is revising its securities disclosure regulations applicable to state nonmember...
24 CFR 576.403 - Shelter and housing standards.
Code of Federal Regulations, 2012 CFR
2012-04-01
... acceptable place to sleep and adequate space and security for themselves and their belongings. (4) Interior... themselves and their belongings. Each resident must be provided an acceptable place to sleep. (3) Interior...
24 CFR 576.403 - Shelter and housing standards.
Code of Federal Regulations, 2014 CFR
2014-04-01
... acceptable place to sleep and adequate space and security for themselves and their belongings. (4) Interior... themselves and their belongings. Each resident must be provided an acceptable place to sleep. (3) Interior...
24 CFR 576.403 - Shelter and housing standards.
Code of Federal Regulations, 2013 CFR
2013-04-01
... acceptable place to sleep and adequate space and security for themselves and their belongings. (4) Interior... themselves and their belongings. Each resident must be provided an acceptable place to sleep. (3) Interior...
41 CFR 101-25.101-3 - Supply through consolidated purchase for direct delivery to use points.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS... to assure adequate supply. (4) Where contracts for production quantities are necessary to secure...
41 CFR 101-25.101-3 - Supply through consolidated purchase for direct delivery to use points.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS... to assure adequate supply. (4) Where contracts for production quantities are necessary to secure...
49 CFR 260.51 - Conditions of guarantee.
Code of Federal Regulations, 2010 CFR
2010-10-01
... adequate experience and expertise to make, secure, service, and collect the loans. (d) The Lender may sell... purchased. The Lender will remain bound to all obligations under the loan guarantee and the provisions of...
ERIC Educational Resources Information Center
Cummings, E. Mark
2003-01-01
Advocates renewed efforts toward assessing attachment on a single continuum of emotional security. Contends that theory is essential to guide attachment assessment and that the constructs of secure base and emotional security provide the needed conceptual foundation. Addresses challenges to the scoring of attachment on a security continuum.…
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2013 CFR
2013-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
17 CFR 230.239 - Exemption for offers and sales of certain security-based swaps.
Code of Federal Regulations, 2014 CFR
2014-04-01
... specified Internet address or includes in its agreement covering the security-based swap that the eligible... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exemption for offers and sales of certain security-based swaps. 230.239 Section 230.239 Commodity and Securities Exchanges...
2004-06-01
Viewpoint Component Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business...security concern, when applied to the different viewpoints, addresses both stakeholders, and is described as a business security model or component...Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business Stakeholder IT Architect
Zembe-Mkabile, Wanga; Surender, Rebecca; Sanders, David; Swart, Rina; Ramokolo, Vundli; Wright, Gemma; Doherty, Tanya
2018-01-01
Food security and good nutrition are key determinants of child well-being. There is strong evidence that cash transfers such as South Africa’s Child Support Grant (CSG) have the potential to help address some of the underlying drivers of food insecurity and malnutrition by providing income to caregivers in poor households, but it is unclear how precisely they work to affect child well-being and nutrition. We present results from a qualitative study conducted to explore the role of the CSG in food security and child well-being in poor households in an urban and a rural setting in South Africa. Setting Mt Frere, Eastern Cape (rural area); Langa, Western Cape (urban township). Participants CSG recipient caregivers and community members in the two sites. We conducted a total of 40 in-depth interviews with mothers or primary caregivers in receipt of the CSG for children under the age of 5 years. In addition, five focus group discussions with approximately eight members per group were conducted. Data were analysed using manifest and latent thematic content analysis methods. Results The CSG is too small on its own to improve child nutrition and well-being. Providing for children’s diets and nutrition competes with other priorities that are equally important for child well-being and nutrition. Conclusions In addition to raising the value of the CSG so that it is linked to the cost of a nutritious basket of food, more emphasis should be placed on parallel structural solutions that are vital for good child nutrition outcomes and well-being, such as access to free quality early child development services that provide adequate nutritious meals, access to adequate basic services and the promotion of appropriate feeding, hygiene and care practices. PMID:29691242
Zembe-Mkabile, Wanga; Surender, Rebecca; Sanders, David; Swart, Rina; Ramokolo, Vundli; Wright, Gemma; Doherty, Tanya
2018-04-24
Food security and good nutrition are key determinants of child well-being. There is strong evidence that cash transfers such as South Africa's Child Support Grant (CSG) have the potential to help address some of the underlying drivers of food insecurity and malnutrition by providing income to caregivers in poor households, but it is unclear how precisely they work to affect child well-being and nutrition. We present results from a qualitative study conducted to explore the role of the CSG in food security and child well-being in poor households in an urban and a rural setting in South Africa. Mt Frere, Eastern Cape (rural area); Langa, Western Cape (urban township). CSG recipient caregivers and community members in the two sites . We conducted a total of 40 in-depth interviews with mothers or primary caregivers in receipt of the CSG for children under the age of 5 years. In addition, five focus group discussions with approximately eight members per group were conducted. Data were analysed using manifest and latent thematic content analysis methods. The CSG is too small on its own to improve child nutrition and well-being. Providing for children's diets and nutrition competes with other priorities that are equally important for child well-being and nutrition. In addition to raising the value of the CSG so that it is linked to the cost of a nutritious basket of food, more emphasis should be placed on parallel structural solutions that are vital for good child nutrition outcomes and well-being, such as access to free quality early child development services that provide adequate nutritious meals, access to adequate basic services and the promotion of appropriate feeding, hygiene and care practices. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Command and Control in a Complex World
2012-05-22
definition of command and control does not adequately address changes introduced through technology trends, our understanding of the global operating...processes. The current joint definition of command and control does not adequately address changes introduced through technology trends, our...the problem is actually solved. There are no definitive , objective solutions to wicked problems. For a complete definition of wicked problems, see
ASIS healthcare security benchmarking study.
2001-01-01
Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.
[Obstetricians/gynaecologists and breastfeeding: practice, attitudes, training and knowledge].
Simard-Émond, Laurence; Sansregret, Andrée; Dubé, Johanne; Mayrand, Marie-Hélène
2011-02-01
Sole use of breastfeeding is recommended during the first six months of life. The treating physician's opinion influences whether or not the patient will opt for breastfeeding. We wanted to ascertain if obstetricians-gynaecologists and obstetrics and gynaecology residents from Quebec offered counselling on breastfeeding and to examine various aspects of their disposition towards such counselling. A questionnaire evaluating five aspects of physicians' disposition towards breastfeeding was used: practice and confidence, attitudes, training, knowledge. We emailed obstetrics and gynaecology residents from Quebec and members of the Association des obstétriciens et gynécologues du Québec who had a valid email address to invite them to complete the questionnaire, which was offered on a secured website. Only 49% of obstetricians-gynaecologists and 35% of residents periodically offer counselling on breastfeeding. Furthermore, 56% and 35% respectively of both groups have confidence in their ability to meet the needs of breastfeeding patients, while 79% of the former and 93% of the latter believe that such counselling comes under their authority. On average, obstetricians-gynaecologists answered correctly 82% of the questions concerning theoretical knowledge. Only 16% of obstetricians-gynaecologists and 22% of residents believe they have received an "at least adequate" training on how to support breastfeeding women. Respondents have not adequately integrated breastfeeding counselling into their practice, in spite of the fact that they had adequate theoretical knowledge on the matter and that they were convinced that such a role was important and that it came under their authority. A more practical form of training could enhance their confidence level and encourage them to integrate such counselling into the obstetrical follow-up.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-02
.... Office of Personnel Management, the U.S. Department of Agriculture's National Finance Center (NFC), and... birth, Social Security Number (SSN), gender, state of residence, information about prior coverage... residential address (if different than the mailing address), date of birth, Social Security Number (if the...
State of Hispanic America: Working toward a More Secure Future. White Paper
ERIC Educational Resources Information Center
Vargas Poppe, Samanatha
2016-01-01
This document provides an analysis of key themes, as they relate to the U.S. Latino population, included in the President's 2016 State of the Union Address. Addressing these issues is critical to extend opportunity to more people to help ensure national prosperity and security for generations to come.
2012-06-17
53 Democratic Leadership Council, “A New Covenant for American Security: address at Georgetown University,” http://www.dlc.org/ndol_ci.cfm?kaid...Company Publishers, Inc., 2002. Democratic Leadership Council, “A New Covenant for American Security: address at Georgetown University,” http
Kimmerly, David P
2009-01-01
This article is a summary based on a December 2007 paper prepared by the author in partial fulfillment of the requirements for a master's degree in business and organizational security management at Webster University. The project described was intended to assess Chicago-area healthcare organization security departments' preparedness and response capabilities for a potential influenza pandemic. While the author says healthcare organizations are learning from the pandemics of the past, little research has been conducted on the requirements necessary within hospital security departments. The article explores staffing, planning, preparation and response capabilities within a healthcare security context to determine existing resources available to the healthcare security community. Eleven completed surveys were received from hospital security managers throughout the geographical Chicago area. They reveal that hospital security managers are conscious of the risks of a pandemic influenza outbreak. Yet, it was found that several gaps existed within hospital security department staffing and response capabilities, as hospital security departments may not have the available resources necessary to adequately maintain their operations during a pandemic incident.
Secure Communication via Key Generation with Quantum Measurement Advantage in the Telecom Band
2013-10-30
II: Summary of Project In this basic research program we proposed to investigate the use of keyed communication in quantum noise as a key generation...implement quantum limited detection in our running-code OCDMA experiment to demonstrate (a) quantum measurement advantage creation between two users, (b...neither is adequate against known-plaintext attacks. This is a serious security problem facing the whole field of quantum cryptography in regard to both
Integrating hospitals into community emergency preparedness planning.
Braun, Barbara I; Wineman, Nicole V; Finn, Nicole L; Barbera, Joseph A; Schmaltz, Stephen P; Loeb, Jerod M
2006-06-06
Strong community linkages are essential to a health care organization's overall preparedness for emergencies. To assess community emergency preparedness linkages among hospitals, public health officials, and first responders and to investigate the influence of community hazards, previous preparation for an event requiring national security oversight, and experience responding to actual disasters. With expert advice from an advisory panel, a mailed questionnaire was used to assess linkage issues related to training and drills, equipment, surveillance, laboratory testing, surge capacity, incident management, and communication. A simple random sample of 1750 U.S. medical-surgical hospitals. Of 678 hospital representatives that agreed to participate, 575 (33%) completed the questionnaire in early 2004. Respondents were hospital personnel responsible for environmental safety, emergency management, infection control, administration, emergency services, and security. Prevalence and breadth of participation in community-wide planning; examination of 17 basic elements in a weighted analysis. In a weighted analysis, most hospitals (88.2% [95% CI, 84.1% to 92.3%]) engaged in community-wide drills and exercises, and most (82.2% [CI, 77.8% to 86.5%]) conducted a collaborative threat and vulnerability analysis with community responders. Of all respondents, 57.3% (CI, 52.1% to 62.5%) reported that their community plans addressed the hospital's need for additional supplies and equipment, and 73.0% (CI, 68.1% to 77.9%) reported that decontamination capacity needs were addressed. Fewer reported a direct link to the Health Alert Network (54.4% [CI, 49.3% to 59.5%]) and around-the-clock access to a live voice from a public health department (40.0% [CI, 35.0% to 45.0%]). Performance on many of 17 basic elements was better in large and urban hospitals and was associated with a high number of perceived hazards, previous national security event preparation, and experience in actual response. Responses reflect hospitals' self-perception of linkages. The quality of linkages and the extent of possible biases favoring positive responses were not assessed. In this baseline assessment, most hospitals reported substantial integration. However, results suggest that relationships between hospitals, public health departments, and other critical response entities are not adequately robust. Suggestions for enhancing linkages are discussed.
SEED: A Suite of Instructional Laboratories for Computer Security Education
ERIC Educational Resources Information Center
Du, Wenliang; Wang, Ronghua
2008-01-01
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
45 CFR 30.23 - Enforcement policy.
Code of Federal Regulations, 2012 CFR
2012-10-01
... of deterrence and securing compliance, present and future, will be adequately served by the Secretary's acceptance of the sum to be agreed upon. ... § 30.23 Enforcement policy. The Secretary may compromise statutory penalties, forfeitures, or claims...
45 CFR 30.23 - Enforcement policy.
Code of Federal Regulations, 2011 CFR
2011-10-01
... of deterrence and securing compliance, present and future, will be adequately served by the Secretary's acceptance of the sum to be agreed upon. ... § 30.23 Enforcement policy. The Secretary may compromise statutory penalties, forfeitures, or claims...
45 CFR 30.23 - Enforcement policy.
Code of Federal Regulations, 2013 CFR
2013-10-01
... of deterrence and securing compliance, present and future, will be adequately served by the Secretary's acceptance of the sum to be agreed upon. ... § 30.23 Enforcement policy. The Secretary may compromise statutory penalties, forfeitures, or claims...
45 CFR 30.23 - Enforcement policy.
Code of Federal Regulations, 2014 CFR
2014-10-01
... of deterrence and securing compliance, present and future, will be adequately served by the Secretary's acceptance of the sum to be agreed upon. ... § 30.23 Enforcement policy. The Secretary may compromise statutory penalties, forfeitures, or claims...
45 CFR 30.23 - Enforcement policy.
Code of Federal Regulations, 2010 CFR
2010-10-01
... of deterrence and securing compliance, present and future, will be adequately served by the Secretary's acceptance of the sum to be agreed upon. ... § 30.23 Enforcement policy. The Secretary may compromise statutory penalties, forfeitures, or claims...
Evaluation of design and construction issues of thin HMA overlays.
DOT National Transportation Integrated Search
2015-04-01
While the overall implementation of thin HMA overlays in Texas has been successful, some issues need to be addressed: : appropriate blending of SAC A and SAC B aggregate to ensure adequate skid resistance; best practices to achieve adequate bonding :...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-04-01
This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less
76 FR 34650 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-14
... The agenda is expected to include the following items: --Cloud Security and Privacy Panel discussion on addressing security and privacy for different types of cloud computing, --Presentation from...
FAA computer security : recommendations to address continuing weaknesses
DOT National Transportation Integrated Search
2000-12-01
In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2011 CFR
2011-04-01
... security deposits. (c) In order to be considered for the return of the security deposit, a family which vacates its unit will provide the owner with its forwarding address or arrange to pick up the refund. (d...
24 CFR 880.608 - Security deposits.
Code of Federal Regulations, 2010 CFR
2010-04-01
... security deposits. (c) In order to be considered for the return of the security deposit, a family which vacates its unit will provide the owner with its forwarding address or arrange to pick up the refund. (d...
75 FR 69515 - Agency Information Collection Activities: Proposed Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-12
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request The Social Security Administration (SSA) publishes a list of information collection packages requiring..., E-mail address: [email protected] . (SSA) Social Security Administration, DCBFM, Attn...
77 FR 35739 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-14
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Comment Request The Social Security Administration (SSA) publishes a list of information collection packages requiring...: 202-395-6974, Email address: [email protected] . (SSA), Social Security Administration...
78 FR 39055 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-28
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Comment Request The Social Security Administration (SSA) publishes a list of information collection packages requiring... address: [email protected] . (SSA) Social Security Administration, DCRDP, Attn: Reports...
77 FR 33546 - Agency Information Collection Activities: Proposed Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-06
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request The Social Security Administration (SSA) publishes a list of information collection packages requiring...: 202-395-6974, Email address: [email protected] ; (SSA), Social Security Administration...
78 FR 56264 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Comment Request The Social Security Administration (SSA) publishes a list of information collection packages requiring..., Email address: [email protected] . (SSA), Social Security Administration, DCRDP, Attn: Reports...
76 FR 52043 - Agency Information Collection Activities: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-19
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Comment Request The Social Security Administration (SSA) publishes a list of information collection packages requiring.... E-mail address: [email protected] . (SSA) Social Security Administration, DCBFM. Attn...
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... transportation systems to ensure freedom of movement for people and commerce. To achieve this mission, TSA is... security screening and identity verification of individuals, including identification media and identifying... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...
78 FR 34264 - Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-07
...-AA03 Technical Corrections to the HIPAA Privacy, Security, and Enforcement Rules AGENCY: Office for... corrections address certain inadvertent errors and omissions in the HIPAA Privacy, Security, and Enforcement... (HHS or ``the Department'') published a final rule to implement changes to the HIPAA Privacy, Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division... FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards... Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD...
Hamelin, Anne-Marie; Mercier, Céline; Bédard, Annie
2010-06-01
This paper reports results from a case study on household food insecurity needs and the interventions that address them. It aimed at comparing households' perceptions on food insecurity experience and vulnerability to those of other stakeholders: community workers, programme managers and representatives from donor agencies. Semi-structured interviews with 55 households and 59 other stakeholders were conducted. Content analysis was performed, using a framework encompassing food sufficiency, characterization of household food insecurity and vulnerability of households to food insecurity. Overall, the results draw attention to a gap between households and the other stakeholders, where the later do not seem always able to assess the realities of food-insecure households. Other areas of divergences include: characteristics of food insecurity, relative importance of various risk factors related to food insecurity and the effectiveness of the community assistance to enhance the households' ability to face food insecurity. These divergent perceptions may jeopardize the implementation of sustainable solutions to food insecurity. Training of stakeholders for a better assessment of households' experience and needs, and systematic evaluation of interventions, appear urgent and highly relevant for an adequate response to households' needs. Collaboration between all stakeholders should lead to knowledge sharing and advocacy for policies dedicated to poverty reduction.
75 FR 39611 - Agency Information Collection Activities: Proposed Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-09
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request The Social Security Administration (SSA) publishes a list of information collection packages requiring...-6974, E-mail address: [email protected] . (SSA) Social Security Administration, DCBFM, Attn...
75 FR 4606 - Agency Information Collection Activities: Proposed Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-28
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request The Social Security Administration (SSA) publishes a list of information collection packages requiring...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...
76 FR 40768 - Occupational Information Development Advisory Panel Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-11
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0044] Occupational Information Development Advisory Panel Meeting AGENCY: Social Security Administration (SSA). ACTION: Notice of upcoming panel... addressed to the Occupational Information Development Advisory Panel, Social Security Administration, 6401...
31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.
Code of Federal Regulations, 2010 CFR
2010-07-01
... address, new address, social security number or tax identification number and the date. (d) Renewal of... Service who have a social security number or tax identification number that ends with the numbers 0, 1, 2..., 2004. (2) All individuals licensed to practice before the Internal Revenue Service who have a social...
Establishing an academic biobank in a resource-challenged environment.
Soo, Cassandra Claire; Mukomana, Freedom; Hazelhurst, Scott; Ramsay, Michele
2017-05-24
Past practices of informal sample collections and spreadsheets for data and sample management fall short of best-practice models for biobanking, and are neither cost effective nor efficient to adequately serve the needs of large research studies. The biobank of the Sydney Brenner Institute for Molecular Bioscience serves as a bioresource for institutional, national and international research collaborations. It provides high-quality human biospecimens from African populations, secure data and sample curation and storage, as well as monitored sample handling and management processes, to promote both non-communicable and infectious-disease research. Best-practice guidelines have been adapted to align with a low-resource setting and have been instrumental in the development of a quality-management system, including standard operating procedures and a quality-control regimen. Here, we provide a summary of 10 important considerations for initiating and establishing an academic research biobank in a low-resource setting. These include addressing ethical, legal, technical, accreditation and/or certification concerns and financial sustainability.
The global summit on nurse faculty migration.
Thompson, Patricia E; Benton, David C; Adams, Elizabeth; Morin, Karen H; Barry, Jean; Prevost, Suzanne S; Vlasich, Cynthia; Oywer, Elizabeth
2014-01-01
As global demand for health care workers burgeons, information is scant regarding the migration of faculty who will train new nurses. With dual roles as clinicians and educators, and corresponding dual sets of professional and legal obligations, nurse faculty may confront unique circumstances in migration that can impact nations' ability to secure an adequate, stable nursing workforce. In a seminal effort to address these concerns, the Honor Society of Nursing, Sigma Theta Tau International, and the International Council of Nurses invited a diverse group of international experts to a summit designed to elucidate forces that drive nurse faculty migration. The primary areas of consideration were the impact on nurse faculty migration of rapid health care workforce scale-up, international trade agreements, and workforce aging. Long-term summit goals included initiating action affecting national, regional, and global supplies of nurse educators and helping to avert catastrophic failure of health care delivery systems caused by an inadequate ability to educate next-generation nurses. Copyright © 2014 Elsevier Inc. All rights reserved.
Establishing an academic biobank in a resource-challenged environment
Soo, C C; Mukomana, F; Hazelhurst, S; Ramsay, M
2018-01-01
Past practices of informal sample collections and spreadsheets for data and sample management fall short of best-practice models for biobanking, and are neither cost effective nor efficient to adequately serve the needs of large research studies. The biobank of the Sydney Brenner Institute for Molecular Bioscience serves as a bioresource for institutional, national and international research collaborations. It provides high-quality human biospecimens from African populations, secure data and sample curation and storage, as well as monitored sample handling and management processes, to promote both non-communicable and infectious-disease research. Best-practice guidelines have been adapted to align with a low-resource setting and have been instrumental in the development of a quality-management system, including standard operating procedures and a quality-control regimen. Here, we provide a summary of 10 important considerations for initiating and establishing an academic research biobank in a low-resource setting. These include addressing ethical, legal, technical, accreditation and/or certification concerns and financial sustainability. PMID:28604319
Code of Federal Regulations, 2013 CFR
2013-01-01
... Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.3 Definitions. The following definitions apply... (such as general aviation areas) that are not separated by adequate security systems, measures, or...
Updated Classrooms for Updated Curriculum.
ERIC Educational Resources Information Center
Phillips, Joanne B.
1986-01-01
Based on an unspecified number of teachers surveyed and onsite visits, agreement exists about some features of optimum facilities for secondary classes in electronic technology. All involved wanted more security, adequate wiring, protection for the equipment, and environmental control. (MLF)
Exploring the Future of Security in the Caribbean: a Regional Security Partnership?
2007-12-14
by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and
Security risks associated with radio frequency identification in medical environments.
Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio
2012-12-01
Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.
Trust-Based Security Level Evaluation Using Bayesian Belief Networks
NASA Astrophysics Data System (ADS)
Houmb, Siv Hilde; Ray, Indrakshi; Ray, Indrajit; Chakraborty, Sudip
Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis.
78 FR 39054 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-28
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202- 395-6974, Email address: [email protected] . (SSA) Social Security Administration...
77 FR 71204 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-29
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA), Social Security Administration...
78 FR 56265 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA), Social Security Administration...
Protecting and securing networked medical devices.
Riha, Chris
2004-01-01
Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.
76 FR 71105 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-16
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: (202) 395-6974, Email address: [email protected] . (SSA), Social Security Administration...
ERIC Educational Resources Information Center
Benson, Allen C.
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
The Chain-Link Fence Model: A Framework for Creating Security Procedures
ERIC Educational Resources Information Center
Houghton, Robert F.
2013-01-01
A long standing problem in information technology security is how to help reduce the security footprint. Many specific proposals exist to address specific problems in information technology security. Most information technology solutions need to be repeatable throughout the course of an information systems lifecycle. The Chain-Link Fence Model is…
ERIC Educational Resources Information Center
Lopez, Robert H.
2012-01-01
The problem addressed was the need to maintain data security in the field of information technology. Specifically, the breakdown of communication between business leaders and data security specialists create risks to data security. The purpose of this qualitative phenomenological study was to determine which factors would improve communication…
Security Techniques for Sensor Systems and the Internet of Things
ERIC Educational Resources Information Center
Midi, Daniele
2016-01-01
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…
Cyber Defense: An International View
2015-09-01
NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING ORGANIZATION REPORT...role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and strategic research...honor Soldiers—past and present. U.S. Army War College SLDR Senior Leader Development and Resiliency i STRATEGIC STUDIES INSTITUTE The Strategic
U.S.-China Relations: Policy Issues
2010-03-12
China (PRC) include promoting U.S. trade and investment, protecting national security interests, addressing global environmental and climate change...influence and natural resources. Other U.S. concerns include the bilateral trade deficit with China and allegations of PRC unfair trade practices, PRC...with the PRC include promoting U.S. trade and investment, protecting national security interests, addressing global environmental and climate change
2008-06-13
USE PRIVATE SECURITY CONTRACTORS TO PROTECT U.S. DIPLOMATS 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 6. AUTHOR( S ...Special Agent Derek Dela-Cruz 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS(ES) U.S. Army Command and General Staff College...
Technologies to counter aviation security threats
NASA Astrophysics Data System (ADS)
Karoly, Steve
2017-11-01
The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.
76 FR 23640 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-27
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...
78 FR 33142 - Agency Information Collection Activities; Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-03
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities; Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA) Social Security Administration, DCRDP...
78 FR 79723 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-31
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA) Social Security Administration, OLCA...
Code of Federal Regulations, 2011 CFR
2011-10-01
... private security functions; (A) All armored vehicles, helicopters, and other military vehicles must be... personnel performing private security functions in designated areas are addressed in Department of Defense... performance of private security functions or other supplies or services. (c) DoD requires contractors...
78 FR 72744 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-03
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA) Social Security Administration, OLCA...
75 FR 35512 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...
78 FR 70391 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-25
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, Email address: [email protected] . (SSA), Social Security Administration, OLCA...
75 FR 59318 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-27
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202- 395-6974, E-mail address: [email protected] . (SSA) Social Security Administration...
76 FR 18290 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-01
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] ; (SSA), Social Security Administration...
76 FR 19175 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-06
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...
76 FR 48200 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974, E-mail address: [email protected] . (SSA), Social Security Administration...
76 FR 17977 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-31
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202- 395-6974, E-mail address: [email protected] . (SSA) Social Security Administration...
76 FR 5233 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection...: 202-395-6974. E-mail address: [email protected] . (SSA) Social Security Administration...
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
Security in the Cache and Forward Architecture for the Next Generation Internet
NASA Astrophysics Data System (ADS)
Hadjichristofi, G. C.; Hadjicostis, C. N.; Raychaudhuri, D.
The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network functionalities since contemporary communication profiles tend to be data-driven rather than host-based. To address this paradigm shift in data propagation, a next generation architecture has been proposed, the Cache and Forward (CNF) architecture. This research investigates security aspects of this new Internet architecture. More specifically, we discuss content privacy, secure routing, key management and trust management. We identify security weaknesses of this architecture that need to be addressed and we derive security requirements that should guide future research directions. Aspects of the research can be adopted as a step-stone as we build the future Internet.
Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk
2014-01-01
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205
Becerra, Monideepa B; Allen, Nickolas L; Becerra, Benjamin J
Food insecurity has been shown to negatively impact health outcomes, disease management and hospitalizations. Despite the increasing burden of type II diabetes mellitus (T2DM) in the United States, little research exists on the role of food insecurity and its association to T2DM-related healthcare utilization. The purpose of our study was to address such a gap in the literature by evaluating the role of food insecurity and T2DM-related past 12-month hospitalization or emergency department (ED) admission among adults with healthcare professional diagnosed T2DM. We utilized the California Health Interview Survey (CHIS), 2009, 2011/2012 data to select CHIS participants who were aged 18 or older and reported doctor diagnosis of T2DM; resulting in a total of 8252 participants. Food insecurity was defined as: living at or above 200% federal poverty level (FPL), living below 200% FPL but food secure, living below 200% FPL and food insecure. A secondary exposure variable of interest was self-efficacy, based on the CHIS-provided variable of confidence to manage T2DM. All analyses were survey weighted with alpha less than .05 noting significance. Those with low food security (12.96%) and low-self efficacy (15.14%), reported significantly higher prevalence of T2DM-related healthcare utilization, as compared to their counterparts. Both living with low food security and having low self-efficacy were also associated with over two-fold increase in healthcare utilization. Our results demonstrate the cumulative need for community-based resources to improve the continuum of care and ensure that such at-risk populations have adequate resources for disease management. Copyright © 2016 Elsevier Inc. All rights reserved.
Li, Yuxuan; Zhang, Weifeng; Ma, Lin; Huang, Gaoqiang; Oenema, Oene; Zhang, Fusuo; Dou, Zhengxia
2013-07-01
China has made remarkable strides in recent decades to grow enough food to feed 20% of the world's population with only 9% of the world's arable land. Meanwhile, the nation is experiencing exacerbated air and water pollution problems. Agricultural growth and the pollution aggravation are closely linked with policies affecting fertilizer production and use. Essentially nonexistent in 1950, China's fertilizer industry is now a robust conglomerate producing fertilizers in amounts that not only meet domestic demand but also contribute to international trade. The industry's growth stemmed from a series of policy progressions, featuring (i) a total control system with state ownership and central planning (1949-1984), (ii) a dual system of central planning and market adjustment (1985-1997), (iii) a market-driven system with government-mandated price caps (1998-2009), and (iv) a complete market-oriented system (since 2009). In conjunction with the policy changes were massive subsidy programs totaling more than $18 billion in 2010. The support policies and subsidies helped grow the industry and safeguard an adequate supply of fertilizers at affordable costs to farmers, but the artificially low-priced fertilizers also contributed to a nationwide trend of fertilizer overuse, leading to nutrient pollution. China needs innovative policies and programs to address food security and sustainability challenges. In this study, we review and analyze policies and programs related to China's fertilizer production and use in a 60-yr span (1950-2010) and discuss its impact on the development of the industry, food security, and pressing environmental issues. Finally, our study analyzes long-term trends in fertilizer use in China and offers some key viewpoints to stimulate debates among all stakeholders. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.
Realization and Addressing Analysis In Blockchain Bitcoin
NASA Astrophysics Data System (ADS)
Sakti Arief Daulay, Raja; Michrandi Nasution, Surya; Paryasto, Marisa W.
2017-11-01
The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working mechanism of blockchain in making address bitcoin which is already in the blockchain system.
Should Medicare's trust fund be removed from the budget?
Burke, M
1990-03-05
The recent proposal to to roll back the recent increase in the Social Security payroll tax has some health care executives worried. The Hospital Insurance Trust Fund is closely linked to the Social Security fund, and what affects one will surely affect the other. However, analysts say that the question of whether the trust funds should or should not be part of the federal budget masks a much bigger question. Are the Administration, Congress, and the American public ready to raise taxes to adequately fund Medicare?
1987-09-24
Some concerns take on rating (e.g., ’Zl’) that adequately reflects increased significance in the network how well the system provides each service...to how well a M.•.imum, Fair, Good); however, in specific spicific approach may be expected to achieve cases, ratings such as "plesent" or "approved...established thresholds, Supportive policies include idertification and and for detecting the fact that access to a authentication policies as well as
Testing and Evaluation of the Bear Medical Systems, Inc. Bear 33 Volume Ventilator System
1990-12-01
approved for publication. RICHARD J. KNECHT, Lt Col, USAF, NC ROGER L STORK , Col, USAF, BSC Project Scientist Chief, Crew Systems Branch EORCHENDER...no problems. After the vibration tests, a visual inspection of the humidifier revealed that a screw and metal clip from a terminal on the incoming...hexagonal J-bolt nuts, which secure the sled to the litter, with larger wing nuts. This modification will allow the sled to be adequately secured by
46 CFR 503.58 - Appeals of denials of mandatory declassification review requests.
Code of Federal Regulations, 2011 CFR
2011-10-01
... PUBLIC INFORMATION Information Security Program § 503.58 Appeals of denials of mandatory declassification... Interagency Security Classification Appeals Panel. The appeal should be addressed to, Executive Secretary, Interagency Security Classification Appeals Panel, Attn: Classification Challenge Appeals, c/o Information...
Code of Federal Regulations, 2013 CFR
2013-10-01
... personnel performing private security functions in designated areas are addressed in Department of Defense... contract is for the performance of private security functions or other supplies or services. (c) DoD... of the contractor who are responsible for performing private security functions comply with orders...
76 FR 36137 - National Infrastructure Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-21
... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0034] National Infrastructure Advisory...
76 FR 60100 - The Singapore Fund, Inc.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-28
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29817; 812-13944] The Singapore Fund, Inc.; Notice of Application September 22, 2011. AGENCY: Securities and Exchange Commission.... ADDRESSES: Secretary, Securities and Exchange Commission, 100 F Street, NE., Washington, DC 20549-1090...
78 FR 67434 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-12
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA) Social Security...
77 FR 29441 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-17
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA), Social Security...
78 FR 21181 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-09
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA) Social Security...
77 FR 6853 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-09
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA), Social Security...
78 FR 9102 - Agency Information Collection Activities: Proposed Request and Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-07
... SOCIAL SECURITY ADMINISTRATION Agency Information Collection Activities: Proposed Request and Comment Request The Social Security Administration (SSA) publishes a list of information collection... Officer for SSA, Fax: 202-395-6974, Email address: [email protected] . (SSA) Social Security...
ERIC Educational Resources Information Center
Schneider, Tod
2010-01-01
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
31 CFR 1021.410 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2012 CFR
2012-07-01
... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...
31 CFR 1021.410 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2013 CFR
2013-07-01
... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...
31 CFR 1021.410 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2011 CFR
2011-07-01
... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...
31 CFR 1021.410 - Additional records to be made and retained by casinos.
Code of Federal Regulations, 2014 CFR
2014-07-01
... name, permanent address, and social security number of the person involved. Where the deposit, account..., and social security number of each person having a financial interest in the deposit, account or line... been unable to secure the required social security number, it shall not be deemed to be in violation of...
ERIC Educational Resources Information Center
Ilvonen, Ilona
2013-01-01
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
ERIC Educational Resources Information Center
National Crime Prevention Centre, Ottawa (Ontario).
This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and…
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-02-01
This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-20
... supported by an adequate technical analysis. Second, EPA recommended the various types of information that... technical analysis, including, but not limited to, information concerning emissions in the state...: ``* * * without an adequate technical analysis EPA does not believe that states can sufficiently address the...
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program CRITERIA FOR LAND MANAGEMENT AND USE Requirements for State Flood Plain Management Regulations § 60.13 Noncompliance. If a State fails to submit adequate flood plain management regulations applicable to State-owned properties pursuant...
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program CRITERIA FOR LAND MANAGEMENT AND USE Requirements for State Flood Plain Management Regulations § 60.13 Noncompliance. If a State fails to submit adequate flood plain management regulations applicable to State-owned properties pursuant...
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program CRITERIA FOR LAND MANAGEMENT AND USE Requirements for State Flood Plain Management Regulations § 60.13 Noncompliance. If a State fails to submit adequate flood plain management regulations applicable to State-owned properties pursuant...
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program CRITERIA FOR LAND MANAGEMENT AND USE Requirements for State Flood Plain Management Regulations § 60.13 Noncompliance. If a State fails to submit adequate flood plain management regulations applicable to State-owned properties pursuant...
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program CRITERIA FOR LAND MANAGEMENT AND USE Requirements for State Flood Plain Management Regulations § 60.13 Noncompliance. If a State fails to submit adequate flood plain management regulations applicable to State-owned properties pursuant...
What are the needs of adolescents and young adults after a cancer treatment? A Delphi study.
Galán, S; de la Vega, R; Tomé Pires, C; Racine, M; Solé, E; Jensen, M P; Miró, J
2017-03-01
Advances in the early detection of cancer and the development of more effective treatments have resulted in a larger number of adolescents and young adults (AYAs), becoming cancer survivors. However, knowledge regarding their needs and if those needs are adequately addressed remains limited. The aims of this study were to: (1) better understand the needs of AYAs after cancer treatment; (2) analyse the importance of those needs; (3) determine which needs are not adequately addressed; and (4) test the hypothesis that AYA cancer survivors have different needs than adult survivors. Twenty-nine health oncology professionals, 17 AYA survivors and 12 relatives of AYA survivors participated in the Delphi study. The needs identified could be classified into six categories, and all were rated as highly important by all participants. The category perceived as least adequately addressed across the three groups was 'Counselling and psychological support.' The findings provide important new information regarding the needs of AYA cancer survivors that can inform the development of interventions to improve the quality of life of these individuals. © 2016 John Wiley & Sons Ltd.
Homeland Security Planning for Urban Area Schools
2008-03-01
about the safety and well-being of their families while they are at the scene and this may affect their job performance . Butler , et al recommend...TITLE AND SUBTITLE Homeland Security Planning for Urban Area Schools 6. AUTHOR(S) Craig Gjelsten 5. FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME...S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY
Globalized Security Reshaping America’s Defense Trade Policy
2001-04-01
AU/SCHOOL/NNN/2001-04 THE ATLANTIC COUNCIL OF THE UNITED STATES AIR UNIVERSITY NATIONAL DEFENSE FELLOWSHIP PROGRAM GLOBALIZED SECURITY RESHAPING...Author(s) Sullivan, Shannon M. Project Number Task Number Work Unit Number Performing Organization Name(s) and Address(es) Air University Maxwell...Makins, President of the Atlantic Council of the United States, did appreciate these factors , and he steered me into what became a fascinating
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Identify and describe how security measures selected by the facility will address the applicable risk-based... explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes identified by the Department; (3) Identify and describe how security measures selected and utilized by the...
ERIC Educational Resources Information Center
St. Lifer, Evan
1994-01-01
Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…
78 FR 69099 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-18
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0034... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency... . SUPPLEMENTARY INFORMATION: Collection of Information Title: FEMA Preparedness Grants: Homeland Security Grant...
78 FR 50430 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-19
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0020... addressed to the Desk Officer for the Department of Homeland Security, Federal Emergency Management Agency... . SUPPLEMENTARY INFORMATION: Collection of Information Title: FEMA Preparedness Grants: Port Security Grant...
42 CFR 3.106 - Security requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies... 42 Public Health 1 2010-10-01 2010-10-01 false Security requirements. 3.106 Section 3.106 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PATIENT SAFETY...
42 CFR 3.106 - Security requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies... 42 Public Health 1 2011-10-01 2011-10-01 false Security requirements. 3.106 Section 3.106 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PATIENT SAFETY...
NASA Astrophysics Data System (ADS)
Toapanta, Moisés; Mafla, Enrique; Orizaga, Antonio
2017-08-01
We analyzed the problems of security of the information of the civil registries and identification at world level that are considered strategic. The objective is to adopt the appropriate security protocols in a conceptual model in the identity management for the Civil Registry of Ecuador. In this phase, the appropriate security protocols were determined in a Conceptual Model in Identity Management with Authentication, Authorization and Auditing (AAA). We used the deductive method and exploratory research to define the appropriate security protocols to be adopted in the identity model: IPSec, DNSsec, Radius, SSL, TLS, IEEE 802.1X EAP, Set. It was a prototype of the location of the security protocols adopted in the logical design of the technological infrastructure considering the conceptual model for Identity, Authentication, Authorization, and Audit management. It was concluded that the adopted protocols are appropriate for a distributed database and should have a direct relationship with the algorithms, which allows vulnerability and risk mitigation taking into account confidentiality, integrity and availability (CIA).
Fernando, Juanita
2010-01-01
This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.
Security and privacy issues in implantable medical devices: A comprehensive survey.
Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E
2015-06-01
Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.
Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert
2013-06-01
To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.
Security model for picture archiving and communication systems.
Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K
2000-05-01
The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.
Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte
2013-01-01
Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS.
ERIC Educational Resources Information Center
Bigelow, Ralph Emerson
1975-01-01
Addresses the relation of the social security number to the issue of privacy, examines the attributes of the social security number as an identifier for student records, and suggests alternatives. (Author)
Food insecurity in the context of HIV/AIDS: a framework for a new era of programming.
Frega, Romeo; Duffy, Francesca; Rawat, Rahul; Grede, Nils
2010-12-01
Food insecurity can be both a consequence and a driver of HIV/AIDS. It is often difficult to disentangle these two roles of food insecurity, since the HIV epidemic has different drivers in different settings. The advent of antiretroviral treatment in resource-limited settings adds an additional layer of complexity. This paper seeks to organize current thinking by reviewing the existing literature on food insecurity and HIV/AIDS and describing the complex interactions between them. Based on literature review, the paper proposes a framework to understand the linkages, distinguishing four types of interventions to address them. It is hoped that the model, albeit simplified as is any framework, will help to structure research, policy, and programming in the field of HIV/AIDS and food insecurity. Finally, the paper intends to widen the lens to regard food not just as a means to provide calories or an income transfer but also as a carrier of adequate nutrition in the context of HIV. An adequate response to HIV/AIDS and food insecurity must be tailored to specific settings. Interventions distinguished in this paper are aimed at both promoting food security and providing antiretroviral treatment and nutrition support. The four types of interventions are containing HIV and preventing AIDS through comprehensive treatment regimes that include nutritional support; mitigating the effects of AIDS through support; providing HIV-sensitive, but not HIV-exclusive, safety nets at the individual, household, and community levels; and limiting the exposure to risk through HIV prevention activities.
Strengthening the Security of ESA Ground Data Systems
NASA Astrophysics Data System (ADS)
Flentge, Felix; Eggleston, James; Garcia Mateos, Marc
2013-08-01
A common approach to address information security has been implemented in ESA's Mission Operations (MOI) Infrastructure during the last years. This paper reports on the specific challenges to the Data Systems domain within the MOI and how security can be properly managed with an Information Security Management System (ISMS) according to ISO 27001. Results of an initial security risk assessment are reported and the different types of security controls that are being implemented in order to reduce the risks are briefly described.
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
How to Perform a Security Audit: Is Your School's or District's Network Vulnerable?
ERIC Educational Resources Information Center
Dark, Melissa; Poftak, Amy
2004-01-01
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
75 FR 37410 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-29
[email protected] . All written inquiries should contain the full name, Social Security Number (SSN....army.mil . All written inquiries should contain the full name, Social Security Number (SSN), date of...), DD Form 1821 (Contractor Crewmember Record); name, Social Security Number (SSN), home address, date...
75 FR 77921 - Office of Administrative Services; Mandatory Declassification Review Address
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-14
... relating to national security information in accordance with Executive Order 13526 and directives issued there-under by the Information Security Oversight Office (ISOO). OPIC does not have the authority to classify national security information. Documents that are originally classified outside of OPIC must be...
Vuong, Thuy Ngoc; Gallegos, Danielle; Ramsey, Rebecca
2015-03-08
Food security exists when all people, at all times, have physical, economic and socially acceptable access to safe, sufficient, and adequately nutritious food in order to meet their dietary needs for an active and healthy life. For high income countries and those experiencing the nutrition transition, food security is not only about the quantity of available food but also the nutritional quality as related to over- and under-nutrition. Vietnam is currently undergoing this nutrition transition, and as a result the relationship between food insecurity, socio-demographic factors and weight status is complex. The primary objective of this study was to therefore measure the prevalence of household food insecurity in a disadvantaged urban district in Ho Chi Minh City (HCMC) in Vietnam using a more comprehensive tool. This study also aims to examine the relationships between food insecurity and socio-demographic factors, weight status, and food intakes. A cross-sectional study was conducted using multi-stage sampling. Adults who were mainly responsible for cooking were interviewed in 250 households. Data was collected on socioeconomic and demographic factors using previously validated tools. Food security was assessed using the Latin American and Caribbean Household Food Security Scale (ELCSA) tool and households were categorized as food secure or mildly, moderately or severely food insecure. Questions regarding food intake were based on routinely used and validated questions in HCMC, weight status was self-reported. Cronbach's alpha coefficient was 0.87, showing the ELCSA had a good internal reliability. Approximately 34.4% of households were food insecure. Food insecurity was inversely related to total household income (OR = 0.09, 95% CI = 0.04 - 0.22) and fruit intakes (OR = 2.2, 95% CI 1.31 - 4.22). There was no association between weight and food security status. Despite rapid industrialization and modernization, food insecurity remains an important public health issue in large urban areas of HCMC, suggesting that strategies to address food insecurity should be implemented in urban settings, and not just rural locations. Fruit consumption among food insecure households may be compromised because of financial difficulties, which may lead to poorer health outcomes particularly related to non-communicable disease prevention and management.
46 CFR 15.715 - Automated vessels.
Code of Federal Regulations, 2010 CFR
2010-10-01
... GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS... automated system in establishing initial manning levels; however, until the system is proven reliable, a manning level adequate to operate in a continuously attended mode will be specified on a vessel's COI. It...
46 CFR 15.715 - Automated vessels.
Code of Federal Regulations, 2012 CFR
2012-10-01
... GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS... automated system in establishing initial manning levels; however, until the system is proven reliable, a manning level adequate to operate in a continuously attended mode will be specified on a vessel's COI. It...
46 CFR 15.715 - Automated vessels.
Code of Federal Regulations, 2011 CFR
2011-10-01
... GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS... automated system in establishing initial manning levels; however, until the system is proven reliable, a manning level adequate to operate in a continuously attended mode will be specified on a vessel's COI. It...
46 CFR 15.715 - Automated vessels.
Code of Federal Regulations, 2014 CFR
2014-10-01
... GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS... automated system in establishing initial manning levels; however, until the system is proven reliable, a manning level adequate to operate in a continuously attended mode will be specified on a vessel's COI. It...
46 CFR 15.715 - Automated vessels.
Code of Federal Regulations, 2013 CFR
2013-10-01
... GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS... automated system in establishing initial manning levels; however, until the system is proven reliable, a manning level adequate to operate in a continuously attended mode will be specified on a vessel's COI. It...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Food Security Act of 1985; and other statutes giving agricultural lending authority to FmHA or its...), Water and Waste Disposal (WWD), Association Recreation, Watershed (WS), Resource Conservation and... program standards; however, is so remotely located it would not serve as an adequate residential unit or...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Food Security Act of 1985; and other statutes giving agricultural lending authority to FmHA or its...), Water and Waste Disposal (WWD), Association Recreation, Watershed (WS), Resource Conservation and... program standards; however, is so remotely located it would not serve as an adequate residential unit or...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Food Security Act of 1985; and other statutes giving agricultural lending authority to FmHA or its...), Water and Waste Disposal (WWD), Association Recreation, Watershed (WS), Resource Conservation and... program standards; however, is so remotely located it would not serve as an adequate residential unit or...
5 CFR 9701.408 - Developing performance and addressing poor performance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.408...
2016-11-01
in the FY2017 NDAA Congressional Research Service Summary During the lame duck session, the 114th Congress is expected to consider various...the lame duck session beginning in November is expected to address the NDAA conference report. Security cooperation provisions in the conference report...U.S. security assistance authorities, see Defense Security Cooperation Agency (DSCA), Defense Institute of Security Cooperation Studies , “Chapter 2
HOMELAND SECURITY: Challenges and Strategies in Addressing Short- and Long-Term National Needs
2001-11-07
air travel has already prompted attention to chronic problems with airport security that we and others have been pointing to for years. Moreover, the...capital for certain areas such as intelligence, public health and airport security will also be necessary as well to foster and maintain the skill...Weaknesses in Airport Security and Options for Assigning Screening Responsibilities, (GAO-01-1165T, Sept. 21, 2001). Aviation Security: Terrorist Acts
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1984-04-13
AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No
The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare
2015-10-01
INDMDUALIZATION OF MODERN WARFARE Glenn J. Voelz U.S. ARMY WAR COLLEGE ~~ ..... ~O.L STRATEGIC STUDIES INSTITUTE Report Documentation Page Form...ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and
Extracellular Matrix Induced Integrin Signal Transduction and Breast Cancer Invasion.
1995-10-01
Metalloproteinase, breast, mammary, integrin, collagen, RGDS, matrilysin 49 breast cancer 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY...Organization Name(s) and Address(es). Self-explanatory. Block 16. Price Code. Enter appropriate price Block 8. Performinc!_rcanization Report code...areas of necrosis in the center of the tumor; a portion of the mammary gland can be seen in the lower right . The matrilysin in situ showed
Overcoming the Illusion of Security: Creating a New Spacefaring Security Strategy Paradigm
2014-03-01
satellites also means the radio frequency spectrum is becoming saturated. As space becomes more congested it almost naturally becomes more...share. As a minimum, the global architecture must include the continued deconfliction of orbital slots and radio frequencies , integrated domain...Norfolk, VA 23511-1702 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11 . SPONSOR/MONITOR’S REPORT
Sun-Burned: Space Weather’s Impact On U.S. National Security
2013-06-01
for navigation, the wideband global satellite communications system used for secure links in multiple frequencies , the space-based infrared system...used for early warning missile detection, the advanced extremely high frequency used for jam resistant strategic communications , and the defense...NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11 . SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for
Contingency Base Camp Operations and Management: Staffing and Organization
2013-09-17
security, safety , environmental and health risks to deployed forces. This study was undertaken to address operations and management (O&M) requirements...security, safety , envi- ronmental and health risks to deployed forces. This study was undertaken to address operations and management (O&M) requirements... food service oversight • Joint Visitor Bureau ERDC/CERL TR-13-18 16 • MWR. TF Archer was significantly augmented with engineer personnel to
The Strategic Importance of the Global Oil Market
2015-06-01
of 1997 as a Visiting Scholar on Economic Faculty at Harvard University, funded by a U.S. Secretary of the Army Research & Study Fellowship. He was...ORGANIZATION NAME(S) AND ADDRESS(ES) U.S. Army War College,Strategic Studies Institute,47 Ashburn Drive,Carlisle,PA,17013-5010 8. PERFORMING...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and
Center for Nonlinear Phenomena and Magnetic Materials
1992-12-04
S) AND ADDRESS(ES) B. PERFORMING ORGANIZATION Howard University /ComSERC REPORT NUMBER 2216 6th St., N.W. Suite 205 NA Washington, D.C. 20059 9...contract on the research environment at Howard University 14. SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY...October 25, 1991: Dr. Gerald Chachere, Math Dept., Howard University . Visualization - Improved Marching Cubes. January 27, 1992: Dr. Gerald Chachere, Math
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-18
... State's conclusion should be supported by an adequate technical analysis. EPA recommended the various...) must be supported by an adequate technical analysis.\\5\\ EPA recommended the various types of... evaluate or demonstrate with a technical analysis that these measures address the requirements of 110(a)(2...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-26
... adequate technical analysis. Second, EPA recommended the various types of information that could be... submission, it did not further evaluate or demonstrate with a technical analysis that this measure and their.... Unfortunately, without an adequate technical analysis EPA does not believe that states can sufficiently address...
The Goal-Means (GM) Meta Model
2009-05-01
WORK UNIT NUMBER 15 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) National Security Innovations, Inc. 8 Faneuil Hall Marketplace Boston...MA 02109 8. PERFORMING ORGANIZATION REPORT NUMBER N/A 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) AFRL/RIED 525...many different performers
32 CFR Appendix A to Part 50 - Life Insurance Products and Securities
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...
32 CFR Appendix A to Part 50 - Life Insurance Products and Securities
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-06
..., 1601-- NEW SUMMARY: The Department of Homeland Security, Office of Health Affairs, Chemical Defense... DEPARTMENT OF HOMELAND SECURITY Agency Information Collection Activities: Request for Expressions... and Budget. Comments should be addressed to OMB Desk Officer, Department of Homeland Security and sent...