78 FR 51266 - International Security Advisory Board (ISAB) Meeting Notice
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-20
... DEPARTMENT OF STATE [Public Notice 8419] International Security Advisory Board (ISAB) Meeting.... App Sec. 10(a)(2), the Department of State announces a meeting of the International Security Advisory... all aspects of arms control, disarmament, political-military affairs, international security and...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2010 CFR
2010-04-01
... over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND... § 229.308 (Item 308) Internal control over financial reporting. (a) Management's annual report on internal control over financial reporting. Provide a report of management on the registrant's internal...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 229.308T - (Item 308T) Internal control over financial reporting.
Code of Federal Regulations, 2010 CFR
2010-04-01
... over financial reporting. 229.308T Section 229.308T Commodity and Securities Exchanges SECURITIES AND... § 229.308T (Item 308T) Internal control over financial reporting. Note to Item 308T: This is a special... internal control over financial reporting. Provide a report of management on the registrant's internal...
75 FR 1455 - Custody of Funds or Securities of Clients by Investment Advisers
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
... the internal controls relating to the custody of those assets from an independent public accountant... must obtain or receive an internal control report within six months of the effective date. Section III... securities (SIFMA(AMG) Letter), requiring an internal control report only instead of both the report and a...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Internal risk management control system requirements for supervised investment bank holding companies. 240.17i-4 Section 240.17i-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Internal risk management control system requirements for supervised investment bank holding companies. 240.17i-4 Section 240.17i-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Internal risk management control systems for OTC derivatives dealers. 240.15c3-4 Section 240.15c3-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Under Secretary for Arms Control and International Security of Authority To Submit Reports Regarding the... by law, I hereby delegate to the Under Secretary for Arms Control and International Security the... Resolution); with the Director of National Intelligence, at the direction of the President, preparing the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... attestation reports on internal control over financial reporting. 210.2-02T Section 210.2-02T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL... attestation reports on internal control over financial reporting. (a) The requirements of § 210.2-02(f) shall...
77 FR 64150 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-18
...) requires an annual study and evaluation of internal accounting controls under the Securities Exchange Act... an annual report on the adequacy of their internal accounting controls from an independent accountant... service only their own companies' securities. [[Page 64151
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES... System, the Office of the Comptroller of the Currency or the Federal Deposit Insurance Corporation...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-27
... the provisions of the Department of Defense National Industrial Security Program Operating Manual, an... Department of Defense National Industrial Security Program Operating Manual (unless such requirements are in..., Arms Control and International Security, Department of State. [FR Doc. 2010-21450 Filed 8-26-10; 8:45...
An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies
2012-09-01
FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security
International Nuclear Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doyle, James E.
2012-08-14
This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less
Williams, J.V.
1984-04-26
Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Internal risk management... Supervised Investment Bank Holding Company Rules § 240.17i-4 Internal risk management control system...) As part of its internal risk management control system, a supervised investment bank holding company...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Internal risk management... Supervised Investment Bank Holding Company Rules § 240.17i-4 Internal risk management control system...) As part of its internal risk management control system, a supervised investment bank holding company...
15 CFR 752.11 - Internal Control Programs.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Internal Control Programs. 752.11 Section 752.11 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS SPECIAL COMPREHENSIVE LICENSE § 752.11 Internal Control...
Maritime security report. October 1998 [U.S. international crime control strategy
DOT National Transportation Integrated Search
1998-10-01
To coordinate all relevant Federal agencies, the International Crime Control Strategy (ICCS) was developed. The ICCS is intended to provide a framework for integrating all facets for the Federal response to the direct and immediate threat internation...
Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 3
2009-04-01
international standard for information security management systems like ISO /IEC 27001 :2005 [1] existed. Since that time, the organization has developed control...of ISO /IEC 27001 and the desire to make decisions based on business value and risk has prompted Ford’s IT Security and Controls organi- zation to begin...their conventional application security operation.u References 1. ISO /IEC 27001 :2005. “Information Technology – Security Techniques – Information
2007-12-01
Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28
The Security Factor in School Renovations.
ERIC Educational Resources Information Center
Fickes, Michael
1998-01-01
Discusses how one Indiana high school used its renovation as an opportunity to reevaluate the school's security design. Security considerations in the building's external and internal environment include lighting, directional signage, parking, access control technology, and issues regarding the use of closed circuit television. (GR)
17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Internal risk management...-Counter Markets § 240.15c3-4 Internal risk management control systems for OTC derivatives dealers. (a) An OTC derivatives dealer shall establish, document, and maintain a system of internal risk management...
The Role of Pulsed Power in International Security and Counterterrorism
2013-06-01
penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE JUN 2003...2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE The Role Of Pulsed Power In International Security And Counterterrorism 5a...In spite of the international sanctions, the Third Reich enjoyed the second-largest industrial base on earth . In a number of technical disciplines
Leveraging the laboratory response network model for the global health security agenda.
Mangal, Chris N; Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.
Leveraging the Laboratory Response Network Model for the Global Health Security Agenda
Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... Arms Control and International Security determined and certified to Congress that lifting sanctions on the following Chinese entities, their sub-units and successors is important to the national security... Security and Nonproliferation, Department of State, Telephone (202) 647-4930. SUPPLEMENTARY INFORMATION...
Cryptanalysis and improvement of a quantum communication-based online shopping mechanism
NASA Astrophysics Data System (ADS)
Huang, Wei; Yang, Ying-Hui; Jia, Heng-Yue
2015-06-01
Recently, Chou et al. (Electron Commer Res 14:349-367, 2014) presented a novel controlled quantum secure direct communication protocol which can be used for online shopping. The authors claimed that their protocol was immune to the attacks from both external eavesdropper and internal betrayer. However, we find that this protocol is vulnerable to the attack from internal betrayer. In this paper, we analyze the security of this protocol to show that the controller in this protocol is able to eavesdrop the secret information of the sender (i.e., the customer's shopping information), which indicates that it cannot be used for secure online shopping as the authors expected. Accordingly, an improvement of this protocol, which could resist the controller's attack, is proposed. In addition, we present another protocol which is more appropriate for online shopping. Finally, a discussion about the difference in detail of the quantum secure direct communication process between regular quantum communications and online shopping is given.
25 CFR 543.16 - What are the minimum internal controls for information technology?
Code of Federal Regulations, 2012 CFR
2012-04-01
... controls for information technology? (a) Physical security measures restricting access to agents, including... longer required. (2) In the event of remote access, the information technology employees must prepare a... 25 Indians 2 2012-04-01 2012-04-01 false What are the minimum internal controls for information...
25 CFR 543.16 - What are the minimum internal controls for information technology?
Code of Federal Regulations, 2011 CFR
2011-04-01
... controls for information technology? (a) Physical security measures restricting access to agents, including... longer required. (2) In the event of remote access, the information technology employees must prepare a... 25 Indians 2 2011-04-01 2011-04-01 false What are the minimum internal controls for information...
17 CFR 240.3b-15 - Definition of ancillary portfolio management securities activities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... governing body of the dealer and included in the internal risk management control system for the dealer... of incidental trading activities for portfolio management purposes; and (3) Are limited to risk... portfolio management securities activities. 240.3b-15 Section 240.3b-15 Commodity and Securities Exchanges...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-27
... reporting entity's own account and for customers. The reporting entity should include reportable securities....- resident end-investor. Securities held as part of a direct investment relationship should not be reported... Management and Budget (OMB) in accordance with the Paperwork Reduction Act and assigned control number 1505...
World population, world health and security: 20th century trends.
Bashford, A
2008-03-01
The connection between infectious disease control and national security is now firmly entrenched. This article takes a historical look at another security issue once prominent in debate on foreign policy and international relations, but now more or less absent: overpopulation. It explores the nature of the debate on population as a security question, and its complicated historical relation to the development of world health.
Nordling, Jamie Koenig; Boldt, Lea J.; O'Bleness, Jessica; Kochanska, Grazyna
2015-01-01
Although attachment security has been associated with children's rule-compatible conduct, the mechanism through which attachment influences early regard for rules is not well established. We hypothesized that effortful control would mediate the link between security and indicators of children's emerging regard for rules (discomfort following rule violations, internalization of parents' and experimenter's rules, few externalizing behaviors). In a longitudinal study, the Attachment Q-Set was completed by parents, effortful control was observed, and Regard for Rules was observed and rated by parents. The proposed model fit the data well: Children's security to mothers predicted their effortful control, which in turn had a direct link to a greater Regard for Rules. Children's security with fathers did not predict effortful control. The mother-child relationship appears particularly important for positive developmental cascades of self-regulation and socialization. PMID:27158193
77 FR 75679 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-21
... et seq.). Rule 17Ad-13 requires an annual study and evaluation of internal accounting controls under... transfer agents to obtain an annual report on the adequacy of their internal accounting controls from an... service only their own companies' securities. Approximately 150 independent, professional transfer agents...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... Exchange shall establish and maintain procedures and internal controls reasonably designed to adequately... controls designed to protect confidential and proprietary information, which should help ensure that the... that are reasonably designed to prevent trade-throughs and establish, maintain and enforce written...
Advanced approach to information security management system model for industrial control system.
Park, Sanghyun; Lee, Kyungho
2014-01-01
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS.
Tappero, Jordan W; Cassell, Cynthia H; Bunnell, Rebecca E; Angulo, Frederick J; Craig, Allen; Pesik, Nicki; Dahl, Benjamin A; Ijaz, Kashef; Jafari, Hamid; Martin, Rebecca
2017-12-01
To achieve compliance with the revised World Health Organization International Health Regulations (IHR 2005), countries must be able to rapidly prevent, detect, and respond to public health threats. Most nations, however, remain unprepared to manage and control complex health emergencies, whether due to natural disasters, emerging infectious disease outbreaks, or the inadvertent or intentional release of highly pathogenic organisms. The US Centers for Disease Control and Prevention (CDC) works with countries and partners to build and strengthen global health security preparedness so they can quickly respond to public health crises. This report highlights selected CDC global health protection platform accomplishments that help mitigate global health threats and build core, cross-cutting capacity to identify and contain disease outbreaks at their source. CDC contributions support country efforts to achieve IHR 2005 compliance, contribute to the international framework for countering infectious disease crises, and enhance health security for Americans and populations around the world.
Advanced Approach to Information Security Management System Model for Industrial Control System
2014-01-01
Organizations make use of important information in day-to-day business. Protecting sensitive information is imperative and must be managed. Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). ISO 27000 series is the international standard ISMS used to protect confidentiality, integrity, and availability of sensitive information. While an ISMS based on ISO 27000 series has no particular flaws for general information systems, it is unfit to manage sensitive information for industrial control systems (ICSs) because the first priority of industrial control is safety of the system. Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. This new ISMS must be mutually exclusive of an ICS. This paper provides a new paradigm of ISMS for ICSs, which will be shown to be more suitable than the existing ISMS. PMID:25136659
Population growth and global security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mumford, S.
A new threat to international and domestic security has emerged in the past three decades: uncontrolled world population growth. Current world population growth control efforts are ineffective. Unchecked growth will threaten global security by depleting food, energy, and other resources. Immigration is another complicating factor that is straining the carrying capacity of some overpopulated regions. Barriers to effective action include the desire of decision-makers to avoid the controversy of abortion and the role of the Catholic church in lobbying against birth control. (3 graphs, 12 photos, 2 tables)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1985-01-01
The House of Representatives, Committee on Foreign Affairs, Subcommittee on Arms Control, International Security and Science held hearings on April 24 and May 1, 1985, to consider the implications of the strategic defense initiative and antisatellite weapons policy for arms control in space. This document is the transcript of that hearing and includes the prepared statements of congressmen, two former secretaries of defense and representatives of several organizations concerned with arms control. Previously published reports and the text of the ABM Treaty are attached as appendices.
Nuclear Arms Control, Nonproliferation, and Counterterrorism: Impacts on Public Health
Pregenzer, Arian
2014-01-01
Reducing the risks of nuclear war, limiting the spread of nuclear weapons, and reducing global nuclear weapons stockpiles are key national and international security goals. They are pursued through a variety of international arms control, nonproliferation, and counterterrorism treaties and agreements. These legally binding and political commitments, together with the institutional infrastructure that supports them, work to establish global norms of behavior and have limited the spread of weapons of mass destruction. Beyond the primary security objectives, reducing the likelihood of the use of nuclear weapons, preventing environmental releases of radioactive material, increasing the availability of safe and secure nuclear technology for peaceful purposes, and providing scientific data relevant to predicting and managing the consequences of natural or human-caused disasters worldwide provide significant benefits to global public health. PMID:24524501
Cox report and the US-China arms control technical exchange program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Di Capua, M S
The ACE program furthered the national security interests of the US by promoting technical approaches to the implementation and verification of arms control treaties that the international community embraces. The Cox Committee report suggests that uncontrolled interactions were taking place between US and Chinese nuclear weapons scientists in the course of the ACE program. On the contrary, elaborate controls were in place at the very beginning and remained in place to control the interactions and protect US national security information. The ACE program payoff to national security was just beginning and its suspension, resulting from the Cox reports allegations, ismore » a setback to US-China progress on arms control.« less
22 CFR 120.1 - General authorities and eligibility.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 120.1 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.1 General authorities and eligibility. (a) Section 38 of the Arms Export Control Act (22 U.S... any time by the Under Secretary of State for Arms Control and International Security or the Assistant...
22 CFR 120.1 - General authorities and eligibility.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 120.1 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.1 General authorities and eligibility. (a) Section 38 of the Arms Export Control Act (22 U.S... any time by the Under Secretary of State for Arms Control and International Security or the Assistant...
Nuclear Arms Control, Nonproliferation, and Counterterrorism: Impacts on Public Health
Dreicer, Mona; Pregenzer, Arian
2014-04-01
Reducing the risks of nuclear war, limiting the spread of nuclear weapons and reducing global nuclear weapons stockpiles are key national and international security goals. They are pursued through a variety of international arms control, nonproliferation and counter-terrorism treaties and agreements. These legally binding and political commitments, together with the institutional infrastructure that supports them, work to establish global norms of behavior and have limited the spread of weapons of mass destruction. Beyond the primary security objectives, reducing the likelihood of the use of nuclear weapons, preventing environmental releases of radioactive material, increasing the availability of safe and secure nuclearmore » technology for peaceful purposes, and providing scientific data relevant to predicting and managing the consequences of natural or human-caused disasters world-wide provide significant benefits to global public health.« less
1975-04-15
flue gas desulfurization technology seems to oe progressing so that by the late 1970s utilities may be able to burn high-sultur coal directly with...CObHqat ion•.V Conferva 1i on 0’ I , gas . and shale Coa I Lir.’I ronmcntal control Nuclear fission Nuclear fusion Other a. So I a r B...abandonment of all import controls , its findings on th: key problem of import dependence and security did not reflect a dear conviction that a
Nuclear Terrorism - Dimensions, Options, and Perspectives in Moldova
NASA Astrophysics Data System (ADS)
Vaseashta, Ashok; Susmann, P.; Braman, Eric W.; Enaki, Nicolae A.
Securing nuclear materials, controlling contraband and preventing proliferation is an international priority to resolve using technology, diplomacy, strategic alliances, and if necessary, targeted military exercises. Nuclear security consists of complementary programs involving international legal and regulatory structure, intelligence and law enforcement agencies, border and customs forces, point and stand-off radiation detectors, personal protection equipment, preparedness for emergency and disaster, and consequence management teams. The strategic goal of UNSCR 1540 and the GICNT is to prevent nuclear materials from finding their way into the hands of our adversaries. This multi-jurisdictional and multi-agency effort demands tremendous coordination, technology assessment, policy development and guidance from several sectors. The overall goal envisions creating a secured environment that controls and protects nuclear materials while maintaining the free flow of commerce and individual liberty on international basis. Integral to such efforts are technologies to sense/detect nuclear material, provide advance information of nuclear smuggling routes, and other advanced means to control nuclear contraband and prevent proliferation. We provide an overview of GICNT and several initiatives supporting such efforts. An overview is provided of technological advances in support of point and stand-off detection and receiving advance information of nuclear material movement from perspectives of the Republic of Moldova.
17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... unenforceable; (6) Procedures are in place to identify and address any deficiencies in the operating systems and... control systems for OTC derivatives dealers. 240.15c3-4 Section 240.15c3-4 Commodity and Securities...-Counter Markets § 240.15c3-4 Internal risk management control systems for OTC derivatives dealers. (a) An...
17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... unenforceable; (6) Procedures are in place to identify and address any deficiencies in the operating systems and... control systems for OTC derivatives dealers. 240.15c3-4 Section 240.15c3-4 Commodity and Securities...-Counter Markets § 240.15c3-4 Internal risk management control systems for OTC derivatives dealers. (a) An...
17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... unenforceable; (6) Procedures are in place to identify and address any deficiencies in the operating systems and... control systems for OTC derivatives dealers. 240.15c3-4 Section 240.15c3-4 Commodity and Securities...-Counter Markets § 240.15c3-4 Internal risk management control systems for OTC derivatives dealers. (a) An...
Cassell, Cynthia H.; Bunnell, Rebecca E.; Angulo, Frederick J.; Craig, Allen; Pesik, Nicki; Dahl, Benjamin A.; Ijaz, Kashef; Jafari, Hamid; Martin, Rebecca
2017-01-01
To achieve compliance with the revised World Health Organization International Health Regulations (IHR 2005), countries must be able to rapidly prevent, detect, and respond to public health threats. Most nations, however, remain unprepared to manage and control complex health emergencies, whether due to natural disasters, emerging infectious disease outbreaks, or the inadvertent or intentional release of highly pathogenic organisms. The US Centers for Disease Control and Prevention (CDC) works with countries and partners to build and strengthen global health security preparedness so they can quickly respond to public health crises. This report highlights selected CDC global health protection platform accomplishments that help mitigate global health threats and build core, cross-cutting capacity to identify and contain disease outbreaks at their source. CDC contributions support country efforts to achieve IHR 2005 compliance, contribute to the international framework for countering infectious disease crises, and enhance health security for Americans and populations around the world. PMID:29155656
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... audited by independent public accountants to all CDS Clearing Members engaged in security-based swap... clearing security-based swaps a report by independent public accountants regarding CME Group's system of... CME Group Inc. by independent public accountant regarding its system of internal accounting control...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quirk, W.J.; Canada, J.; de Vore, L.
1994-04-01
This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.
Toward a Dependable Peace: A Proposal for an Appropriate Security System.
ERIC Educational Resources Information Center
Johansen, Robert C.
This booklet proposes that citizens and governments think imaginatively about national and international security and take action for comprehensive arms reductions. The document is presented in eight chapters. Chapter I reports that global insecurity exists despite continuous arms control negotiations since World War II. Chapter II discusses…
20 CFR 411.595 - What oversight procedures are planned for the EN payment systems?
Code of Federal Regulations, 2013 CFR
2013-04-01
... EN payment systems? 411.595 Section 411.595 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.595 What oversight... activities to identify areas for improvement. Internal reviews of our systems security controls are regularly...
20 CFR 411.595 - What oversight procedures are planned for the EN payment systems?
Code of Federal Regulations, 2012 CFR
2012-04-01
... EN payment systems? 411.595 Section 411.595 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.595 What oversight... activities to identify areas for improvement. Internal reviews of our systems security controls are regularly...
20 CFR 411.595 - What oversight procedures are planned for the EN payment systems?
Code of Federal Regulations, 2014 CFR
2014-04-01
... EN payment systems? 411.595 Section 411.595 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.595 What oversight... activities to identify areas for improvement. Internal reviews of our systems security controls are regularly...
20 CFR 411.595 - What oversight procedures are planned for the EN payment systems?
Code of Federal Regulations, 2010 CFR
2010-04-01
... EN payment systems? 411.595 Section 411.595 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.595 What oversight... activities to identify areas for improvement. Internal reviews of our systems security controls are regularly...
20 CFR 411.595 - What oversight procedures are planned for the EN payment systems?
Code of Federal Regulations, 2011 CFR
2011-04-01
... EN payment systems? 411.595 Section 411.595 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Employment Network Payment Systems § 411.595 What oversight... activities to identify areas for improvement. Internal reviews of our systems security controls are regularly...
Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran
2016-01-01
Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.
Moghaddasi, Hamid; Kamkarhaghighi, Mehran
2016-01-01
Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823
Security in Father-child Relationship and Behavior Problems in Sexually Abused Children.
Parent-Boursier, Claudel; Hébert, Martine
2015-01-01
While the influence of mother-child relationships on children's recovery following sexual abuse has been documented, less is known about the possible contribution of father-child relationships on outcomes. The present study explored the contribution of children's perception of security in their relationship to the father on internalizing and externalizing behavior problems, while controlling for sociodemographic variables and variables associated with the mother-child relationship. Participants were 142 children who disclosed sexual abuse involving a perpetrator other than the biological father. Regression analyses indicated that children's perception of security to fathers contributed to the prediction of parental reports of children's behavior problems, even after controlling for maternal psychological distress and perception of security to mothers.
2015-05-21
lie outside their span of control. This monograph therefore assumes no significant changes to whole-of- government collaboration, legislated ...with several other military and whole-of-government BPC efforts. Security cooperation and security assistance (SA) are legislated portfolios of...Plan Colombia, the campaign proposed in 1999 by the Colombian President to reduce internal conflict, led to increased US confidence and support for
A model for international border management systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duggan, Ruth Ann
2008-09-01
To effectively manage the security or control of its borders, a country must understand its border management activities as a system. Using its systems engineering and security foundations as a Department of Energy National Security Laboratory, Sandia National Laboratories has developed such an approach to modeling and analyzing border management systems. This paper describes the basic model and its elements developed under Laboratory Directed Research and Development project 08-684.
2016-12-01
as a Fulbright Scholar at Durham University’s Institute of Advanced Study . Dr. Manjikian’s publications in- clude Apocalypse and Post -Politics: The...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S
Rath, Johannes; Ischi, Monique; Perkins, Dana
2014-09-01
This paper provides an overview of the various dual-use concepts applied in national and international non-proliferation and anti-terrorism legislation, such as the Biological and Toxin Weapons Convention, the Chemical Weapons Convention and United Nations Security Council Resolution 1540, and national export control legislation and in relevant codes of conduct. While there is a vast literature covering dual-use concepts in particular with regard to life sciences, this is the first paper that incorporates into such discussion the United Nations Security Council Resolution 1540. In addition, recent developments such as the extension of dual-use export control legislation in the area of human rights protection are also identified and reviewed. The discussion of dual-use concepts is hereby undertaken in the context of human- and/or national-security-based approaches to security. This paper discusses four main concepts of dual use as applied today in international and national law: civilian versus military, peaceful versus non-peaceful, legitimate versus illegitimate and benevolent versus malevolent. In addition, the usage of the term to describe positive technology spin-offs between civilian and military applications is also briefly addressed. Attention is also given to the roles civil society and research ethics may play in the governance of dual-use sciences and technologies.
Cyber secure systems approach for NPP digital control systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCreary, T. J.; Hsu, A.
2006-07-01
Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less
NASA Astrophysics Data System (ADS)
Shuja Syed, Ahmed
2013-12-01
The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want to thank the Organizing Committee, the Institutions and Sponsors supporting the Conference, especially 'Centre for Emerging Sciences, Engineering & Technology (CESET), Islamabad', the IOP Publishers and everyone who contributed to the organization of this meeting, for their invaluable efforts to make this event a great success. Professor Dr Ahmed Shuja Syed Chief Editor The PDF also contains lists of the boards, committees and sponsors.
[Important issues of biological safety].
Onishchenko, G G
2007-01-01
The problem of biological security raises alarm due to the real growth of biological threats. Biological security includes a wide scope of problems, the solution of which becomes a part of national security as a necessary condition for the constant development of the country. A number of pathogens, such as human immunodeficiency virus, exotic Ebola and Lassa viruses causing hemorrhagic fever,rotaviruses causing acute intestinal diseases, etc. were first discovered in the last century. Terrorist actions committed in the USA in 2001 using the anthrax pathogen made the problem of biological danger even more important. In Russian Federation, biological threats are counteracted through the united state policy being a part of general state security policy. The biological Security legislation of Russian Federation is chiefly based on the 1992 Federal Law on Security. On the basis of cumulated experience, the President of Russia ratified Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond on 4 December, 2003. The document determines the main directions and stages of the state development in the area of chemical and biological security. The Federal target program Russian Federation's National Program for Chemical and Biological Security is being developed, and its development is to be completed soon in order to perfect the national system for biological security and fulfill Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond, ratified by the President. The new global strategy for control over infectious diseases, presented in the materials of Saint Petersburg summit of the Group of Eight, as well as the substantive part of its elements in Sanitary International Standards, are to a large degree an acknowledgement of the Russian Federation's experience and the algorithm for fighting extremely dangerous infections. This Russia's experience has resulted in the following global achievements: smallpox elimination in the USSR (1936); the USSR's suggestions on the program of smallpox elimination in the world and 2 billion doses of the vaccine transferred to the possession of the WHO (since 1958); the global elimination of the disease (1980); effective control over avian influenza at the epizootic stage, recognized internationally at Beijing International Congress, 17-18 January, 2006.
Information Security in the Age of Cloud Computing
ERIC Educational Resources Information Center
Sims, J. Eric
2012-01-01
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Components of a Course on National Security Policy.
ERIC Educational Resources Information Center
Quester, George H.
1987-01-01
Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…
2011-08-26
peoples, such as the Inuit , have been accorded greater control of their own lives, while multilateral organizations have been crafted to provide a forum...stakeholders in the Inuit community, and not all of the agreements made between aboriginal groups and national governments have been honored. As a...North America and the Arctic Council”; and, (3) Udloriak Hanson from the Inuit Tapiriit Kanatami, “Sovereignty, Resource Development and Security
Examining Long Term Climate Related Security Risks through the Use of Gaming and Scenario Planning
2016-10-24
114 Examining Long-Term Climate-Related Security Risks through the Use of Gaming and Scenario Planning Catherine M. Schkoda, Shawna G. Cuan, and...E. D. McGrady Abstract: This paper examines four possible climate change-related security risks that emerged from an international game and scenario...potential for an emerging disparity between regions over the consensus and control of climate change-related technologies. Keywords: gaming , scenario
46 CFR 184.602 - Internal communications systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... controlled from the operating station, an efficient communications system must be provided between the... 46 Shipping 7 2010-10-01 2010-10-01 false Internal communications systems. 184.602 Section 184.602 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS...
Security and privacy issues of personal health.
Blobel, Bernd; Pharow, Peter
2007-01-01
While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.
Security in Father-child Relationship and Behavior Problems in Sexually Abused Children
Parent-Boursier, Claudel; Hébert, Martine
2017-01-01
While the influence of mother-child relationships on children’s recovery following sexual abuse has been documented, less is known about the possible contribution of father-child relationships on outcomes. The present study explored the contribution of children’s perception of security in their relationship to the father on internalizing and externalizing behavior problems, while controlling for sociodemographic variables and variables associated with the mother-child relationship. Participants were 142 children who disclosed sexual abuse involving a perpetrator other than the biological father. Regression analyses indicated that children’s perception of security to fathers contributed to the prediction of parental reports of children’s behavior problems, even after controlling for maternal psychological distress and perception of security to mothers. PMID:29321696
Breaking the rules? X-ray examination of hematopoietic stem cell grafts at international airports.
Petzer, Andreas L; Speth, Hans-Georg; Hoflehner, Elisabeth; Clausen, Johannes; Nachbaur, David; Gastl, Günther; Gunsilius, Eberhard
2002-06-15
Hematopoietic stem cell grafts from unrelated donors are commonly transported by aircraft. They must not be subjected to x-rays during security checks, which may cause inconvenient discussions between the courier and the airport security staff. We exposed hematopoietic stem cells from mobilized peripheral blood to a widely used x-ray hand-luggage control system. Cell viability as well as growth in vitro of mature progenitor cells (colony-forming cells), primitive progenitor cells (long-term culture-initiating cells), and lymphocytes were not altered even after 10 passages through the hand-luggage control system. Thus, repeated exposure to the low radiation dose of hand-luggage control systems (1.5 +/- 0.6 microSv per exposure) seems to be harmless for hematopoietic stem cells, which should simplify the international transport of stem cell grafts.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... includes technical data, within a foreign business entity, foreign governmental entity, or international...: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of Respondents: 100,000... by the Directorate of Defense Trade Controls (DDTC) in accordance with the International Traffic in...
Instrumentation, Control, and Intelligent Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-09-01
Abundant and affordable energy is required for U.S. economic stability and national security. Advanced nuclear power plants offer the best near-term potential to generate abundant, affordable, and sustainable electricity and hydrogen without appreciable generation of greenhouse gases. To that end, Idaho National Laboratory (INL) has been charged with leading the revitalization of nuclear power in the U.S. The INL vision is to become the preeminent nuclear energy laboratory with synergistic, world-class, multi-program capabilities and partnerships by 2015. The vision focuses on four essential destinations: (1) Be the preeminent internationally-recognized nuclear energy research, development, and demonstration laboratory; (2) Be a majormore » center for national security technology development and demonstration; (3) Be a multi-program national laboratory with world-class capabilities; (4) Foster academic, industry, government, and international collaborations to produce the needed investment, programs, and expertise. Crucial to that effort is the inclusion of research in advanced instrumentation, control, and intelligent systems (ICIS) for use in current and advanced power and energy security systems to enable increased performance, reliability, security, and safety. For nuclear energy plants, ICIS will extend the lifetime of power plant systems, increase performance and power output, and ensure reliable operation within the system's safety margin; for national security applications, ICIS will enable increased protection of our nation's critical infrastructure. In general, ICIS will cost-effectively increase performance for all energy security systems.« less
NASA Technical Reports Server (NTRS)
Skeberdis, Daniel
2016-01-01
This is a presentation at the MOWG fall meeting that will discuss CCS purpose, future status, security enhancements, arbitrary ephemeris mission features, overview of CCS 7.3, approach for the use of NORAD TLEs, account and data security, CCS System virtualization, control box visualization modification and other enhancements.
The DISAM Journal of International Security Assistance Management. Volume 24, Number 3, Spring 2002
2002-01-01
to security cooperation such as human rights, economics, export control, and disarmament. Others are more regionally centered in South America and...Military Affairs “ Export Control” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62 John R...related legislation recently enacted for fiscal year (FY) 2002. While funding for the fiscal year was appropriated by the Foreign Operations, Export
Bibliography on peace, security, and international conflict management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This bibliography presents an annotated list of approximately one hundred titles for public libraries seeking to serve the college-educated nonspecialist in the fields of peace, security, and international conflict management. representative titles have been selected in eight subject areas: (1) arms control, disarmament, and proliferation; (2) causes and nature of international conflict; (3) conflict management, diplomacy, and negotiation; (4) human rights and ethnic and religious conflicts; (5) international law and international order; (6) international organizations and transnationalism; (7) other approaches to, and overviews of, security and peace; and (8) religion and ethics. Three criteria determined selection of titles: the bookmore » is in print and is expected to remain in print for the foreseeable future; the book is of interest to the college-educated lay reader with a serious interest in the subject; and the list, as a whole, illustrates the full spectrum of debate, both in selection of topics and selection of titles. As an aid to the identification and acquisition of any of these materials, the editors have provided a bibliographic citation with an annotation that includes the following: author, title, statement of responsibility, publisher, publication information, pagination, and ISBN or ISSN.« less
A Security-façade Library for Virtual-observatory Software
NASA Astrophysics Data System (ADS)
Rixon, G.
2009-09-01
The security-façade library implements, for Java, IVOA's security standards. It supports the authentication mechanisms for SOAP and REST web-services, the sign-on mechanisms (with MyProxy, AstroGrid Accounts protocol or local credential-caches), the delegation protocol, and RFC3820-enabled HTTPS for Apache Tomcat. Using the façade, a developer who is not a security specialist can easily add access control to a virtual-observatory service and call secured services from an application. The library has been an internal part of AstroGrid software for some time and it is now offered for use by other developers.
2006-02-17
included system-unique specifications derived to counter these threats. But the international security environment has changed --- and it will continue... Netowrk -Centric Command and Control 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 20 19a. NAME
Internal contamination of an irradiator discovered during security enhancement.
Harvey, R P
2014-08-01
High-risk radioactive sources regulated under Increased Controls Regulations have been protected by licensed facilities, but the federal government has placed significant emphasis on these sources and has developed initiatives to assist radioactive material licensees. The Department of Energy's Global Threat Reduction Initiative (GTRI) Domestic Threat Reduction Program is a voluntary federally funded program for security enhancements of high-risk radiological material. During the hardening or security enhancement process by the United States Department of Energy (U.S. DOE) contractors, a small amount of radioactive contamination was discovered in a Cesium irradiator. Ultimately, it was decided to pursue disposal with U.S. DOE's Off-Site Recovery Program (OSRP). Radiological devices may have a leaking source or known internal contamination that may cause difficulty during security enhancement. If the licensee understands this, it may provide facilities the opportunity to plan and prepare for unusual circumstances.
Chen, Shaun C; Hsu, Guoo-Shyng Wang; Chiu, Chihwei P
2009-01-01
Food security plays a central role in governing agricultural policies in Taiwan. In addition to overuse or the illegal use of pesticide, meat leanness promoters, animal drugs and melamine in the food supply; as well as foodborne illness draws the greatest public concern due to incidents that occur every year in Taiwan. The present report demonstrates the implementation of a food safety control system in Taiwan. In order to control foodborne outbreaks effectively, the central government of the Department of Health of Taiwan launched the food safety control system which includes both the good hygienic practice (GHP) and the HACCP plan, in the last decade. From 1998 to the present, 302 food affiliations that implemented the system have been validated and accredited by a well-established audit system. The implementation of a food safety control system in compliance with international standards is of crucial importance to ensure complete safety and the high quality of foods, not only for domestic markets, but also for international trade.
Code of Federal Regulations, 2010 CFR
2010-07-01
... care under CHAMPUS. (ii) International military education and training (IMET). Subject to reimbursement... education and training. Subject to reimbursement for both inpatient and outpatient care at the appropriate..., Navy International Logistics Control Office (NAVIL CO), Unified Commander, the affected office, and the...
Fitzmaurice, Arthur G; Mahar, Michael; Moriarty, Leah F; Bartee, Maureen; Hirai, Mitsuaki; Li, Wenshu; Gerber, A Russell; Tappero, Jordan W; Bunnell, Rebecca
2017-12-01
The Global Health Security Agenda (GHSA), a partnership of nations, international organizations, and civil society, was launched in 2014 with a mission to build countries' capacities to respond to infectious disease threats and to foster global compliance with the International Health Regulations (IHR 2005). The US Centers for Disease Control and Prevention (CDC) assists partner nations to improve IHR 2005 capacities and achieve GHSA targets. To assess progress through these CDC-supported efforts, we analyzed country activity reports dating from April 2015 through March 2017. Our analysis shows that CDC helped 17 Phase I countries achieve 675 major GHSA accomplishments, particularly in the cross-cutting areas of public health surveillance, laboratory systems, workforce development, and emergency response management. CDC's engagement has been critical to these accomplishments, but sustained support is needed until countries attain IHR 2005 capacities, thereby fostering national and regional health protection and ensuring a world safer and more secure from global health threats.
Mahar, Michael; Moriarty, Leah F.; Bartee, Maureen; Hirai, Mitsuaki; Li, Wenshu; Gerber, A. Russell; Tappero, Jordan W.; Bunnell, Rebecca
2017-01-01
The Global Health Security Agenda (GHSA), a partnership of nations, international organizations, and civil society, was launched in 2014 with a mission to build countries’ capacities to respond to infectious disease threats and to foster global compliance with the International Health Regulations (IHR 2005). The US Centers for Disease Control and Prevention (CDC) assists partner nations to improve IHR 2005 capacities and achieve GHSA targets. To assess progress through these CDC-supported efforts, we analyzed country activity reports dating from April 2015 through March 2017. Our analysis shows that CDC helped 17 Phase I countries achieve 675 major GHSA accomplishments, particularly in the cross-cutting areas of public health surveillance, laboratory systems, workforce development, and emergency response management. CDC’s engagement has been critical to these accomplishments, but sustained support is needed until countries attain IHR 2005 capacities, thereby fostering national and regional health protection and ensuring a world safer and more secure from global health threats. PMID:29155676
12 CFR 225.24 - Procedures for other nonbanking proposals.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., internal controls and risk management systems that will be utilized in the conduct of the proposed... FEDERAL RESERVE SYSTEM BANK HOLDING COMPANIES AND CHANGE IN BANK CONTROL (REGULATION Y) Regulations... listed activities. A bank holding company seeking to acquire or control voting securities or assets of a...
Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue
2016-01-01
Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.
Believing Your Eyes: Strengthening the Reliability of Tags and Seals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brim, Cornelia P.; Denlinger, Laura S.
2013-07-01
NNSA’s Office of Nonproliferation and International Security (NIS) is working together with scientific experts at the DOE national laboratories to develop the tools needed to safeguard and secure nuclear material from diversion, theft, and sabotage--tasks critical to support future arms control treaties that may involve the new challenge of monitoring nuclear weapons dismantlement. Use of optically stimulated luminescent material is one method to enhance the security and robustness of existing tamper indicating devices such as tags and seals.
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the...) Alternatively, a smart bucket system that electronically identifies and tracks the gaming machine number, and...
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Alternatively, it may be adequately secured (e.g., locked container to which only accounting personnel can gain... secured (e.g., locked container to which only accounting personnel can gain access) until retrieved by the... identifies and tracks the gaming machine number, and facilitates the proper recognition of gaming revenue...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-20
...The Bureau of Industry and Security (BIS) maintains, as part of its Export Administration Regulations (EAR), the Commerce Control List (CCL), which identifies certain of the items subject to Department of Commerce jurisdiction. This final rule revises the CCL to implement changes made to the Wassenaar Arrangement's List of Dual-Use Goods and Technologies (Wassenaar List) maintained and agreed to by governments participating in the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies (Wassenaar Arrangement, or WA) at the December 2012 WA Plenary Meeting (the Plenary). The Wassenaar Arrangement advocates implementation of effective export controls on strategic items with the objective of improving regional and international security and stability. This rule harmonizes the CCL with the changes made to the WA List at the Plenary by revising ECCNs controlled for national security reasons in each category of the CCL, except category 8, as well as amending the General Software Note, WA reporting requirements, and definitions section in the EAR. BIS is adding unilateral controls to the CCL for specific software and technology for aviation control systems, which the WA agreements removed from the WA List, i.e., EAR national security controls.
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lehman, R.F. II
1993-03-01
This presentation encourages current efforts in arms control, non- proliferation, and peacekeeping. Verification is heralded as a confidence building method to bring about more openness in international relations. It is purported that openness has already enhanced democratic forces around the world. The insistence on strict compliance with the decisions of the United Nations Security Council is a show of support for international law. It is recommended that international norms on human rights, non-proliferation, and non-aggression be strengthened.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Barrett, Damon
2010-03-01
This commentary addresses some of the challenges posed by the broader normative, legal and policy framework of the United Nations for the international drug control system. The 'purposes and principles' of the United Nations are presented and set against the threat based rhetoric of the drug control system and the negative consequences of that system. Some of the challenges posed by human rights law and norms to the international drug control system are also described, and the need for an impact assessment of the current system alongside alternative policy options is highlighted as a necessary consequence of these analyses. Copyright (c) 2010 Elsevier B.V. All rights reserved.
2010-03-18
Michael Jacobson and Matthew Levitt, “ Follow the Money ,” Los Angeles Times, December 23, 2008. . International Terrorism and Transnational Crime...221 See for example R. T. Naylor, “Wash-Out: A Critique of Follow - the - Money Methods in Crime Control Policy,” Crime, Law, and
46 CFR 27.205 - What are the requirements for internal communication systems on towing vessels?
Code of Federal Regulations, 2010 CFR
2010-10-01
... systems on towing vessels? 27.205 Section 27.205 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY... fitted with a communication system between the engine room and the operating station that— (1) Consists... required to have internal communication systems. (c) When the operating-station's engine controls and the...
Choi, Eun Kyung; Lee, Jong-Koo
2016-12-01
This paper focus upon the changes of global infectious disease governance in 2000s and the transformation of infectious disease control system in South Korea. Traditionally, infectious disease was globally governed by the quarantine regulated by the international conventions. When an infectious disease outbreak occurred in one country, each country prevented transmission of the disease through the standardized quarantine since the installation of international sanitary convention in 1892. Republic of Korea also organized the infectious disease control system with quarantine and disease report procedure after the establishment of government. Additionally, Korea National Health Institute(KNIH) was founded as research and training institute for infectious disease. However, traditional international health regulation system faced a serious challenge by the appearance of emerging and re-emerging infectious disease in 1990s. As a result, global infectious disease governance was rapidly changed under the demand to global disease surveillance and response. Moreover, global health security frame became important after 2001 bioterror and 2003 SARS outbreak. Consequently, international health regulation was fully revised in 2005, which included not only infectious disease but also public health emergency. The new international health regime was differently characterized in several aspects; reinforcement of global cooperation and surveillance, enlargement of the role of supranational and international agencies, and reorganization of national capacity. KNIH was reorganized with epidemic control and research since late 1990s. However, in 2004 Korea Center for Disease Control and Prevention(KCDC) was established as a disease control institution with combining quarantine and other functions after 2003 SARS outbreak. KCDC unified national function against infectious disease including prevention, protection, response and research, as a national representative in disease control. The establishment of KCDC can be understood as the adoption of new international health regulation system based upon SARS experience.
26 CFR 1.1081-3 - Exchanges of stock or securities solely for stock or securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Exchanges of stock or securities solely for stock or securities. 1.1081-3 Section 1.1081-3 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF... § 1.1081-3 Exchanges of stock or securities solely for stock or securities. The exchange, without the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-11
... technology controlled under multilateral control lists (Missile Technology Control Regime, Australia Group... or ballistic missile sytems. The latter category includes (a) items of the same kind as those on... potential of making a material contribution to WMD or cruise or ballistic missile systems, (b) items on U.S...
International Internships in Nuclear Safeguards and Security: Challenges and Successes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duncan, Cristen L.; Heinberg, Cynthia L.; Killinger, Mark H.
2010-04-20
All students in the Russian safeguards and security degree programs at the National Research Nuclear University MEPhI and Tomsk Polytechnic University, sponsored by the Material Protection, Control and Accounting (MPC&A) Education Project, take part in a domestic internship at a Russian enterprise or facility. In addition, a select few students are placed in an international internship. These internships provide students with a better view of how MPC&A and nonproliferation in general are addressed outside of Russia. The possibility of an international internship is a significant incentive for students to enroll in the safeguards and security degree programs. The U.S. membersmore » of the MPC&A Education Project team interview students who have been nominated by their professors. These students must have initiative and reasonable English skills. The project team and professors then select students to be tentatively placed in various international internships during the summer or fall of their final year of study. Final arrangements are then made with the host organizations. This paper describes the benefits of the joint United States/Russia cooperation for next-generation workforce development, some of the international internships that have been carried out, the benefits of these international internships, and lessons learned in implementing them.« less
IT Security Support for Spaceport Command and Control System
NASA Technical Reports Server (NTRS)
McLain, Jeffrey
2013-01-01
During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.
Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy
Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.
Patient-Controlled Healthcare Protection Act of 2009
Rep. Gohmert, Louie [R-TX-1
2009-07-31
House - 09/14/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
Sandia SCADA Program -- High Surety SCADA LDRD Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
CARLSON, ROLF E.
2002-04-01
Supervisory Control and Data Acquisition (SCADA) systems are a part of the nation's critical infrastructure that is especially vulnerable to attack or disruption. Sandia National Laboratories is developing a high-security SCADA specification to increase the national security posture of the U.S. Because SCADA security is an international problem and is shaped by foreign and multinational interests, Sandia is working to develop a standards-based solution through committees such as the IEC TC 57 WG 15, the IEEE Substation Committee, and the IEEE P1547-related activity on communications and controls. The accepted standards are anticipated to take the form of a Common Criteriamore » Protection Profile. This report provides the status of work completed and discusses several challenges ahead.« less
78 FR 32459 - Manufacturer of Controlled Substances; Notice of Registration; Mallinckrodt, LLC.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
... plans to manufacture the listed controlled substances for internal use and for sale to other companies... ensure that the company's registration is consistent with the public interest. The investigation has included inspection and testing of the company's physical security systems, verification of the company's...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-27
... control lists (Missile Technology Control Regime, Australia Group, Chemical Weapons Convention, Nuclear... the development of weapons of mass destruction (WMD) or cruise or ballistic missile systems. The... contribution to WMD or cruise or ballistic missile systems, (b) other items with the potential of making such a...
25 CFR 543.16 - What are the minimum internal controls for information technology?
Code of Federal Regulations, 2010 CFR
2010-04-01
... technology? 543.16 Section 543.16 Indians NATIONAL INDIAN GAMING COMMISSION, DEPARTMENT OF THE INTERIOR HUMAN... controls for information technology? (a) Physical security measures restricting access to agents, including... longer required. (2) In the event of remote access, the information technology employees must prepare a...
NASA Astrophysics Data System (ADS)
Papa, Mauricio; Shenoi, Sujeet
The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64805; File No. SR-ISE-2011-30] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders July 5, 2011. I. Introduction On May 23, 2011, the International Securities Exchange, LLC...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65548; File No. SR-ISE-2011-39] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders October 13, 2011. I. Introduction On July 1, 2011, the International Securities Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Temporarily... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and Exchange... Clearing and Outsourcing Solutions, Inc. (``Apex Clearing'') as an ISE member organization, subject to Apex...
Strategy to Enhance International Supply Chain Security
2007-07-01
as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a travel ...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security strategy of...living or traveling abroad. • Assisting U.S. businesses in the international marketplace. • Coordinating and providing support for international
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad
Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fullymore » integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may lead to more proliferation resistant and physically secure design features for SMRs.« less
76 FR 81005 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-27
.... For more information, contact Richard W. Hartman II, Executive Director of the International Security..., 2011. Richard W. Hartman II, Executive Director, International Security Advisory Board, U.S. Department...
78 FR 66984 - International Security Advisory Board (ISAB); Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-07
... information, contact Richard W. Hartman II, Executive Director of the International Security Advisory Board, U.... Richard W. Hartman, II, Executive Director, International Security Advisory Board, U.S. Department of...
76 FR 58076 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-19
... information, contact Richard W. Hartman II, Executive Director of the International Security Advisory Board..., 2011. Richard W. Hartman II, Executive Director, International Security Advisory Board, U.S. Department...
Rogers, Kimberly; Ward, Sarah; Ojo, Olubumni; Kakaī, Clement Glele; Agbeko, Tamekloe Tsidi; Garba, Hassan; MacGurn, Amanda; Oppert, Marydale; Kone, Idrissa; Bamsa, Olutola; Schneider, Dana; Brown, Clive
2017-01-01
Recent multinational disease outbreaks demonstrate the risk of disease spreading globally before public health systems can respond to an event. To ensure global health security, countries need robust multisectoral systems to rapidly detect and respond to domestic or imported communicable diseases. The US Centers for Disease Control and Prevention International Border Team works with the governments of Nigeria, Togo, and Benin, along with Pro-Health International and the Abidjan-Lagos Corridor Organization, to build sustainable International Health Regulations capacities at points of entry (POEs) and along border regions. Together, we strengthen comprehensive national and regional border health systems by developing public health emergency response plans for POEs, conducting qualitative assessments of public health preparedness and response capacities at ground crossings, integrating internationally mobile populations into national health surveillance systems, and formalizing cross-border public health coordination. Achieving comprehensive national and regional border health capacity, which advances overall global health security, necessitates multisectoral dedication to the aforementioned components. PMID:29155668
Merrill, Rebecca D; Rogers, Kimberly; Ward, Sarah; Ojo, Olubumni; Kakaī, Clement Glele; Agbeko, Tamekloe Tsidi; Garba, Hassan; MacGurn, Amanda; Oppert, Marydale; Kone, Idrissa; Bamsa, Olutola; Schneider, Dana; Brown, Clive
2017-12-01
Recent multinational disease outbreaks demonstrate the risk of disease spreading globally before public health systems can respond to an event. To ensure global health security, countries need robust multisectoral systems to rapidly detect and respond to domestic or imported communicable diseases. The US Centers for Disease Control and Prevention International Border Team works with the governments of Nigeria, Togo, and Benin, along with Pro-Health International and the Abidjan-Lagos Corridor Organization, to build sustainable International Health Regulations capacities at points of entry (POEs) and along border regions. Together, we strengthen comprehensive national and regional border health systems by developing public health emergency response plans for POEs, conducting qualitative assessments of public health preparedness and response capacities at ground crossings, integrating internationally mobile populations into national health surveillance systems, and formalizing cross-border public health coordination. Achieving comprehensive national and regional border health capacity, which advances overall global health security, necessitates multisectoral dedication to the aforementioned components.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... Organizations; International Securities Exchange, LLC; Notice of Designation of a Longer Period for Commission Action on Proposed Rule Change To List and Trade Option Contracts Overlying 10 Shares of a Security August 9, 2012. On June 20, 2012, the International Securities Exchange, LLC (``Exchange'') filed with...
Migrants, refugees and insecurity. Current threats to peace?
Lohrmann, R
2000-01-01
Since the early 1980s, international migration has moved beyond humanitarian, economic development, labor market and societal integration concerns, raising complex interactive security implications for governments of migrant sending, receiving and transit countries, as well as for multilateral bodies. This article examines the effects of international migration on varied understandings and perceptions of international security. It discusses why international migration has come to be perceived as a security issue, both in industrialized and developing countries. Questions are raised on the migration-security nexus and the way in which the concepts "security" and "migration" are used. The real and perceived impacts of international migration upon national and regional security, both in industrialized and developing countries, are analyzed. The policies developed by governments and multilateral agencies since the mid-1980s to mitigate the destabilizing effects of certain kinds of international population movement and human displacement are examined. The conclusions stress the need for the establishment of a comprehensive framework of international cooperation among origin and receiving countries and international organizations to address the destabilizing implications of international migration.
Iraq: Post-Saddam Governance and Security
2009-04-02
after British forces defeated the Ottomans in World War I and took control of the territory in 1918 . Britain had tried to take Iraq from the Ottomans...International Religions Freedom Report, September 2008; DOD Measuring Stability Report, March 2009; various press and other documents...September 19, 2008, report on International Religious Freedom attributed restrictions on the free exercise of religion (by religious minorities) to
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
Arms Control and Nonproliferation: A Catalog of Treaties and Agreements
2007-01-29
U.S. security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early...Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and...the former Soviet Union. The United States is also a leader of an international regime that attempts to limit the spread of nuclear weapons. This
Arms Control and Nonproliferation: A Catalog of Treaties and Agreements
2007-06-01
security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early 1970s...Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and biological...former Soviet Union. The United States is also a leader of an international regime that attempts to limit the spread of nuclear weapons. This regime
29 CFR 2590.715-2719 - Internal claims and appeals and external review processes.
Code of Federal Regulations, 2011 CFR
2011-07-01
... may not own or control, or be owned or controlled by a health insurance issuer, a group health plan... SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH... for group health plans and health insurance issuers that are not grandfathered health plans under...
Code of Federal Regulations, 2013 CFR
2013-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2012 CFR
2012-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2014 CFR
2014-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2010 CFR
2010-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2011 CFR
2011-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
An approach for investigation of secure access processes at a combined e-learning environment
NASA Astrophysics Data System (ADS)
Romansky, Radi; Noninska, Irina
2017-12-01
The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pickett, Chris A; Tolk, Keith M; Keel, Frances M
2010-01-01
The Institute of Nuclear Materials Management (INMM) held an International Workshop, 'Containment & Surveillance (C/S): Concepts for the 21st Century,' June 6-11, 2010, at the Oak National Laboratory, in Oak Ridge, Tennessee. The National Nuclear Security Administration (NNSA) Office of Nonproliferation Research and Development and Office of Nonproliferation and International Security sponsored the event. The workshop focused on determining concepts and needs for 21st century containment and surveillance (C/S) systems that support International Atomic Energy Agency (IAEA) safeguards and future arms control agreements. Panel discussions by subject matter experts and international practitioners addressed daily topical themes encompassing the following areasmore » of C/S: authentication; tagging, sealing, and containment verification; and surveillance systems. Each panel discussion was followed by a question-and-answer session with the audience and an afternoon breakout session. The facilitated breakout sessions were used to compile information and determine future needs. Individuals attending the workshop included C/S experts and practitioners; IAEA and arms control inspectors; technology providers; vendors; students; and individuals with an interest in, or desire to learn about, future C/S system needs. The primary goal of the workshop was to produce a document that details the future research and development needs for C/S systems that support nuclear safeguards and arms control missions. This talk will present a compilation of the information obtained from breakout sessions at the workshop.« less
Emerging Techniques for Field Device Security
Schwartz, Moses; Bechtel Corp.; Mulder, John; ...
2014-11-01
Critical infrastructure, such as electrical power plants and oil refineries, rely on embedded devices to control essential processes. State of the art security is unable to detect attacks on these devices at the hardware or firmware level. We provide an overview of the hardware used in industrial control system field devices, look at how these devices have been attacked, and discuss techniques and new technologies that may be used to secure them. We follow three themes: (1) Inspectability, the capability for an external arbiter to monitor the internal state of a device. (2) Trustworthiness, the degree to which a systemmore » will continue to function correctly despite disruption, error, or attack. (3) Diversity, the use of adaptive systems and complexity to make attacks more difficult by reducing the feasible attack surface.« less
Access Control of Web and Java Based Applications
NASA Technical Reports Server (NTRS)
Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan
2011-01-01
Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.
Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz
2015-01-01
Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts between security strategies and health system preservation, and lack of interoperability between security and indigenous health organizations with respect to logistics and sharing information. The cases demonstrate both the opportunities and risks of international security organizations involvement in health sector protection, recovery and reconstruction. We discuss two potential approaches to engaging these organizations in health system support that may increase the chances of realizing these opportunities while mitigating risks.
International Competitiveness: A National Security Perspective
1989-06-01
Maxwell AFB AL 36112-5532. International Competitiveness A National Security Perspective 0 C 0 Thank you for your assistance / , ’I RELSEARCJ RhINORT NO...AU-ARI-88-11 International Competitiveness A National Security Perspective RONALD H. DABROWSKI, Maj, USAF Research Fellow Airpower Research Institute...26 International Competition ......................... 26 Identification of Firms Involved ..................... 26 Continued Leadership in
CERT Resilience Management Model, Version 1.0
2010-05-01
practice such as ISO 27000 , COBIT, or ITIL. If you are a member of an established process improvement community, particularly one centered on CMMI...Systems Audit and Control Association ISO International Organization for Standardization ISSA Information Systems Security Association IT
25 CFR 543.7 - What are the minimum internal control standards for bingo?
Code of Federal Regulations, 2010 CFR
2010-04-01
... information technology security standards can be found in § 543.16 of this part.) (2) The game software... applicable voucher system, player interface or other transaction history records to verify the validity of...
The impact of potential political security level on international tourism
Young-Rae Kim; Chang Huh; Seung Hyun Kim
2002-01-01
The purpose of this study was to investigate the impact of potential political security in an effort to fill in two foregoing research gaps in international tourism. To investigate the relationship between political security and international tourism, a simple regression model was employed. Secondary data were collected from a variety of sources, such as international...
U.S. Support of Plan Colombia: Rethinking the Ends and Means
2001-05-01
to thrive as long as there are dark corners of the international systems where traditional sovereign controls are weak or non -existent. The illicit...security debate involving U.S. policy in Colombia and the implementation of Plan Colombia. DOUGLAS C. LOVELACE, JR. Director Strategic Studies...crime more efficiently through effective international cooperation, which includes the press, judicial systems, and government officials on a broad
Iraq: Post-Saddam Governance and Security
2008-12-17
Ottomans in World War I and took control of the territory in 1918 . Britain had tried to take Iraq from the Ottomans earlier in World War I but were...population. Sources: CIA The World Factbook; State Department International Religions Freedom Report, September 2008; DOD Measuring Stability...politically. Similarly, the September 19, 2008 report on International Religious Freedom attributed restrictions on the free exercise of religion (by
Iraq: Post-Saddam Governance and Security
2008-11-19
control of the territory in 1918 . Britain had tried to take Iraq from the Ottomans earlier in World War I but were defeated at Al Kut in 1916...Sources: CIA The World Factbook; State Department International Religions Freedom Report, September 2007; DOD Measuring Stability Report, September...2008 report on International Religious Freedom attributed restrictions on the free exercise of religion (by religious minorities) to “terrorists
Impact of Export Control and Technology Transfer Regimes: International Perspectives
2012-01-07
major national security and public policy issue. Exploring the ITAR environment through a set of case studies was the central idea in a project...cover) was based on a survey of UK stakeholders. The results were unambiguous and striking. Our British partners conclude ITAR is a good idea gone...ITAR) regime is a major national security and public policy issue. Exploring the ITAR environment through a set of case studies was the central idea
The Security of Russia's Nuclear Arsenal: The Human Factor
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ball, D.Y.
1999-10-12
Assertions by the Russian military that all of their nuclear weapons are secure against theft and that nuclear units within the military are somehow insulated from the problems plaguing the Russian military should not be accepted uncritically. Accordingly, we should not give unwarranted credence to the pronouncements of military figures like Cal.-Gen. Igor Valynkin, Chief of the Defense Ministry's 12th Main Directorate, which oversees the country's nuclear arsenal. He contends that ''Russian nuclear weapons are under reliable supervision'' and that ''talk about the unreliability of our control over nuclear weapons has only one pragmatic goal--to convince international society that themore » country is incapable of maintaining nuclear safety and to introduce international oversight over those weapons, as it is done, for example, in Iraq.'' While the comparison to Iraq is preposterous, many analysts might agree with Valynkin's sanguine appraisal of the security of Russia's nuclear weapons. In contrast, I argue that the numerous difficulties confronting the military as a whole should cause concern in the West over the security of the Russian nuclear arsenal.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-07
..., Office of Missile, Biological, and Chemical Nonproliferation, Bureau of International Security and... DEPARTMENT OF STATE [Public Notice: 7678] Bureau of International Security and Nonproliferation; Termination of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against a Foreign Person AGENCY...
NASA Astrophysics Data System (ADS)
Dabova, E. L.
2013-11-01
In addition to facilitating peaceful trade and economic development, sovereign territory, territorial waters and international waters are being used by various criminal groups that pose threats to governments, businesses and civilian population in Southeast Asia. Nonstate criminal maritime activities were not receiving appropriate attention as they were overshadowed by traditional military security challenges. Yet more and more frequently, the non-traditional actors challenge lines of communication, jeopardize access to strategic resources, complicate traditional defence tasks, and harm the environment. Understanding the nature of non-traditional threats, and the ways to combat them, requires international legal, historical and political science analysis within a united problem-oriented approach. A fair critique to pure interest, power and knowledge -based theories of regime formation was developed by E.K. Leonard's1, who explained the evolution of the international system from the global governance perspective. The present study is based on the premise that pure nation-state approaches are incapable of providing a theoretical ground for addressing the growing influence of international criminal networks in South East Asia. From an international relations theory perspective, the author of this study agrees with D.Snidal2 that the hegemonic stability theory has "limits" and is insufficient in describing modern challenges to sustainable international security regime, including non-traditional threats, where collective action is more efficient from an interest and capability standpoint. At the same time the author of this study does not share the viewpoint on "marginalization"3 of international law in current international order due to its fragmentation and regionalization4 and "global power shifts"5 . The United Nations, as a global institution at the top of the vertical hierarchy of international legal order, and the EU as an example of "self-contained" regime along with other subsystems like South East Asia may have different approaches to global governance, international constitutional order, or particular cases such as the measure of infringement of human rights when targeting individuals suspected of terrorist links. Yet international law remains the key part of the Asian and global security regime. The hypothesis of this study is that the "void of governance" regime in territorial and international waters provides lucrative environment for developing terrorism, piracy, environmental degradation, and other criminal activities that pose untraditional threats to the regional security. This "void of governance" regime can be caused by either, or both, de jure or de facto insufficient control over particular marine territories.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61317; File No. SR-ISE-2009-103] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Market Data Fees January 8, 2010. I. Introduction On November 25, 2009, the International...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-28
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... on May 5, 2010, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed.... Specifically, the Exchange proposes to adopt a $0.18 per contract execution fee for ``professional customers...
Under Secretary of Defense for Policy > Home
Weapons of Mass Destruction Cyber Policy Space Policy ASD for International Security Affairs ASD for collapse content Assistant Secretary of Defense Robert Karem ASD for International Security Affairs Randall Assistant Secretary of Defense Katie Wheelbarger PDASD for International Security Affairs David Helvey PDASD
The Value of a European Security and Defense Policy
2007-05-08
Union, Theory in International Affairs, US Foreign and Security Policy, Crisis Management, Crisis Response, 16. SECURITY CLASSIFICATION OF: 17...1 2. The importance of theory in...will examine which paradigm of international relations is most suited to explain current developments in the EU and which theory in international
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-11
... DEPARTMENT OF STATE [Public Notice 8183] Bureau of International Security and Nonproliferation Imposition of Missile Sanctions on Two Chinese Foreign Persons AGENCY: Bureau of International Security and Nonproliferation, Department of State. ACTION: Notice. SUMMARY: A determination has been made that two foreign...
1983-05-01
THE ARMED FORCES AREA 6 WORK UNIT NUMBERS -. FORT LESLEY J. MC NAIR WASHINGTON, DC 20319 11. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE "Vt...yearly dollar volume and lead directly to cost- effective .- national security. Such business generates research funding that can have important military...Mbreover, there is no central focus for these policies and no foru to discuss their effect on national security and international catetiiveness. The
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1998-11-01
The Board`s mission is to ensure that the use of nuclear energy in Canada does not pose undue risk to health, safety, security and the environment. The annual report of the Board presents information on regulatory requirements; nuclear facilities, from uranium mines to nuclear power plants and related operations; regulation of nuclear materials; radioactive waste management; compliance monitoring; research; non-proliferation, safeguards and security; international activities, and public information. A financial statement is also included.
Nuclear Coexistence: Rethinking U.S. Policy to Promote Stability in an Era of Proliferation
1994-04-01
The Spread of Nuclear Weapons 1989 -90 (Boulder: Westview Press, 1990). 22. See William C. Martel and Steven E. Miller, "Controlling Borders and Nuclear...Security, Fall 1989 , Vol. 14, No. 2, pp. 140-41, for J. Robert Oppenheimer’s concerns about the dangers of the develop- ment of thermonuclear weapons. 4...Paradox of Technology," International Security, Vol. 14, No. 2 (Fall 1989 ), pp. 198-202. 6. Some argue that the U.S. strategy has relatively little
A Critical Review of Options for Tool and Workpiece Sensing
1989-06-02
Tool Temperature Control ." International Machine Tool Design Res., Vol. 7, pp. 465-75, 1967. 5. Cook, N. H., Subramanian, K., and Basile, S. A...if necessury and identify by block riumber) FIELD GROUP SUB-GROUP 1. Detectors 3. Control Equipment 1 08 2. Sensor Characteristics 4. Process Control ...will provide conceptual designs and recommend a system (Continued) 20. DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION 0
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
Code of Federal Regulations, 2010 CFR
2010-01-01
... program. (b) Identify reasonably foreseeable internal and external risks to the security, confidentiality... in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including: (1) Employee training and management; (2...
75 FR 2482 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
...: Bureau of Industry and Security (BIS). Title: Chemical Weapons Convention Declaration and Report Handbook... the Chemical Weapons Convention (CWC), an international arms control treaty. The Chemical Weapons Convention Implementation Act of 1998 and Commerce Chemical Weapons Convention Regulations (CWCR) specify the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...
The Impact of Regional Higher Education Spaces on the Security of International Students
ERIC Educational Resources Information Center
Forbes-Mewett, Helen
2016-01-01
The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…
Proliferation Control Regimes: Background and Status
2006-12-26
developing a national capability to conduct forensic analysis of evidence from bio-crimes and terrorism. Given the difficulty of differentiating between...North Korea in 2004 galvanized the international community to examine strengthening implementation of national export controls and interdiction ... interdiction of WMD-related equipment shipments at sea, on land, and by air. President Bush announced the Proliferation Security Initiative (PSI) on May 31
A Short Guide to U.S. Arms Control Policy.
ERIC Educational Resources Information Center
Howard, Norman, Ed.; Sussman, Colleen, Ed.
Steps the United States is taking to lessen the danger of war while building international confidence and security are described. The commitment of the United States to arms control is based on the conviction that the United States and the Soviet Union have a common interest in the avoidance of nuclear war and the survival of the human race. A…
25 CFR 542.10 - What are the minimum internal control standards for keno?
Code of Federal Regulations, 2011 CFR
2011-04-01
... access to keno balls in play. (v) Back-up keno ball inventories shall be secured in a manner to prevent... procedures that provide at least the level of control described by the standards in this section, as approved.... (4) When it is necessary to void a ticket, the void information shall be inputted in the computer and...
25 CFR 542.10 - What are the minimum internal control standards for keno?
Code of Federal Regulations, 2010 CFR
2010-04-01
... access to keno balls in play. (v) Back-up keno ball inventories shall be secured in a manner to prevent... procedures that provide at least the level of control described by the standards in this section, as approved.... (4) When it is necessary to void a ticket, the void information shall be inputted in the computer and...
Using Artificial Physics to Control Agents
1999-11-01
unlimited 13. SUPPLEMENTARY NOTES IEEE International Conference on Information, Intelligence, and Systems, Oct 31 -Nov 3,1999. Bethesda, MD 14. ABSTRACT...distributed control can also perform distributed computation. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same...1995. [9] H. Pattee. Artificial life needs a real epistemology. In Moran, Moreno, Merelo, and Chacon , editors, Advances in Artificial Life, pages
Combating terrorism : linking threats to strategies and resources testimony
DOT National Transportation Integrated Search
2000-07-26
This is the statement of Norman J. Rabkin, Director, National Security Preparedness Issues, National Security and International Affairs division before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on...
McLaughlin, Katie A.; Zeanah, Charles H.; Fox, Nathan A.; Nelson, Charles A.
2011-01-01
Background Children reared in institutions experience elevated rates of psychiatric disorders. Inability to form a secure attachment relationship to a primary caregiver is posited to be a central mechanism in this association. We determined whether the ameliorative effect of a foster care (FC) intervention on internalizing disorders in previously institutionalized children was explained by the development of secure attachment among children placed in FC and evaluated the role of lack of attachment in an institutionalized sample on the etiology of internalizing disorders within the context of a randomized trial. Methods A sample of 136 children (aged 6-30 months) residing in institutions was recruited in Bucharest, Romania. Children were randomized to FC (n=68) or to care as usual (CAU; n=68). Foster parents were recruited, trained, and overseen by the investigative team. Attachment security at 42 months was assessed using the Strange Situation Procedure, and internalizing disorders at 54 months were assessed using the Preschool Age Psychiatric Assessment. Results Girls in FC had fewer internalizing disorders than girls in CAU (OR=0.17, p=006). The intervention had no effect on internalizing disorders in boys (OR=0.47, p=.150). At 42 months, girls in FC were more likely to have secure attachment than girls in CAU (OR=12.5, p<.001), but no difference was observed in boys (OR=2.0, p=.205). Greater attachment security predicted lower rates of internalizing disorders in both sexes. Development of attachment security fully mediated intervention effects on internalizing disorders in girls. Conclusion Placement into FC facilitated the development of secure attachment and prevented the onset of internalizing disorders in institutionalized girls. The differential effects of FC on attachment security in boys and girls explained gender differences in the intervention effects on psychopathology. Findings provide evidence for the critical role of disrupted attachment in the etiology of internalizing disorders in children exposed to institutionalization. PMID:21733136
Global climate change and international security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karas, Thomas H.
2003-11-01
This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national andmore » international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-30
... continuing effort to attract more activity in large-sized FX options. \\3\\ See Securities Exchange Act Release... SECURITIES AND EXCHANGE COMMISSION [Release No. 3464743; File No. SR-ISE-2011-35] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed...
Institutionalization of Information Security: Case of the Indonesian Banking Sector
ERIC Educational Resources Information Center
Nasution, Muhamad Faisal Fariduddin Attar
2012-01-01
This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of information security governance and practices and how such internalization develops an organizational resistance towards security breach. The study argues that information…
Towards a policy for human security: psychosocial contributions.
Tullio, Francesco
2007-01-01
Inspired by the correspondence between Einstein and Freud in 1936, this paper focuses on the multidimensional aspect of security, exploring its implications within the psychosocial approach. Reflections are therefore centred on the psychological aspects of conflict, on bio-psychic responses to violent solicitation and on ways in which individual emotions are managed and controlled by the State. Some social and economic mechanisms comprising the present global social scenario are explored: the intermesh between economic/industrial organisations and Security Institutions, and the consumerist economic model and its individual/collective consequences, ultimately environmental destruction. As suggested by Einstein, the creation of a supranational organisation would be an essential step towards an effective and economically sustainable international system. This can be achieved through a process that implies the evolution of cultural parameters and the transformation of national institutions. In this sense, the author suggests a decisive role for civil society organisations such as the International Physicians for the Prevention of Nuclear War (IPPNW).
12 CFR 615.5174 - Farmer Mac securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
...(f). (b) Board and management responsibilities. Your board of directors must adopt written policies... personnel or committees must state the extent of management's authority and responsibilities for managing... internal controls are in place to prevent loss, in accordance with § 615.5133(e). Management must submit...
12 CFR 615.5174 - Farmer Mac securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
...(f). (b) Board and management responsibilities. Your board of directors must adopt written policies... personnel or committees must state the extent of management's authority and responsibilities for managing... internal controls are in place to prevent loss, in accordance with § 615.5133(e). Management must submit...
12 CFR 615.5174 - Farmer Mac securities.
Code of Federal Regulations, 2012 CFR
2012-01-01
...(f). (b) Board and management responsibilities. Your board of directors must adopt written policies... personnel or committees must state the extent of management's authority and responsibilities for managing... internal controls are in place to prevent loss, in accordance with § 615.5133(e). Management must submit...
12 CFR 615.5174 - Farmer Mac securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
.... (b) Board and management responsibilities. Your board of directors must adopt written policies that... personnel or committees must state the extent of management's authority and responsibilities for managing... internal controls are in place to prevent loss, in accordance with § 615.5133(e). Management must submit...
12 CFR 615.5174 - Farmer Mac securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
...(f). (b) Board and management responsibilities. Your board of directors must adopt written policies... personnel or committees must state the extent of management's authority and responsibilities for managing... internal controls are in place to prevent loss, in accordance with § 615.5133(e). Management must submit...
19 CFR 19.13 - Requirements for establishment of warehouse.
Code of Federal Regulations, 2010 CFR
2010-04-01
...; DEPARTMENT OF THE TREASURY CUSTOMS WAREHOUSES, CONTAINER STATIONS AND CONTROL OF MERCHANDISE THEREIN... secured area separated from the remainder of the premises to be used exclusively for the storage of imported merchandise, domestic spirits, and merchandise subject to internal-revenue tax transferred into...
Quality Assurance through ISO 9000.
ERIC Educational Resources Information Center
Zuckerman, Amy
2000-01-01
Created in 1987 by the International Organization for Standardization, in Geneva, Switzerland, ISO 9000 is attempting to develop a world standard to help companies and other institutions measure and monitor their quality-control efforts. This article describes four school districts' successful efforts to secure ISO 9000 certification. (MLH)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66880; File No. SR-ISE-2012-16] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Procedures for Executing the Stock Leg(s) of Stock-Option Orders April 30, 2012. I. Introduction On February 29, 2012, the International...
Towards a Global Maritime Surveillance- A New European Challenge for European Security
NASA Astrophysics Data System (ADS)
Claverie, Alain; Barbagelata, Andrea; Pasco, Xavier; Darnis, Jean Pierre
2005-03-01
The illegal immigration connected to traffic and criminal activity is creating problems in Europe. Maritime surveillance is one of the most problematic dimensions.The political decision and the international agreement of the development of VTMS and the AIS are a first step towards securing the maritime traffic and protecting the maritime borders.The weight of the terrorism through the emergence of new set of threats is changing the situation in creating new needs of control through a global approach. The recent sea trial of the US department of Homeland Security is an indicator of this evolution. Space technologies have unique capabilities to support this kind of global approaches:• GNSS and the satellite telecommunication fleet (e.g. INMARSAT, ORBCOM) have a direct contribution to the extension of the AIS.• Satellite remote sensing is the logic extension of the control of the "VTMS" area.The new generation of satellite fleet (e.g. Pléiades, TerraSar, COSMO/SkyMed, Radarsat) should ensure an acceptable first level of control.The revisitation time, the near real time transmission with fast processing is an effective answer to the need of the Maritime Security Authorities.
Information Warfare and International Law
1998-01-01
OMB control number. 1. REPORT DATE 1998 2. REPORT TYPE 3. DATES COVERED 00-00-1998 to 00-00-1998 4. TITLE AND SUBTITLE Information Warfare and...international law where those dictates endanger or conflict with the pursuit of their fundamental interests , including national security. The Legal...34war," and may not be covered by the humanitarian provisions that attempt to lessen war’s cruelty.28 FIGURE 3 The Purpose of This Book The
Technology and Policy: Looking to the Future
NASA Astrophysics Data System (ADS)
Sylvester, Kory
2009-05-01
As the proper scope and nature of arms control continues to be debated, it is certain that technical capabilities and advice will play a significant role. While national priorities and strategic objectives and broader perspectives of international security and foreign policy will ultimately dictate, technical expertise and assessment is critical to the identification, development and evaluation of alternatives. Strategic linkages between arms control, nonproliferation, and homeland security have perhaps never been so intertwined. Incomplete information and strongly held but disparate views about the potential of science and technology to amplify threats as readily as they mitigate them creates a highly dynamic environment for policymakers. To contribute meaningfully scientists and engineers will have to remain engaged with national security debates and think about the strategic and policy environment in which technical questions are posed to them, and how to identify and frame the important questions that aren't.
NASA Astrophysics Data System (ADS)
Williams, Christopher
2000-07-01
The nature of international education as a field of studies has been affected by global changes over the past decade. At the same time, the concept of global security has emerged, bringing together studies related to development, the environment and the understanding of violence. Although much of the education literature reflects the global security approach, it is not a field that has been subjected to much analysis as a whole. This paper provides an assessment of international education as a discipline, and outlines the global security framework. It examines how this framework is reflected in the forms of analysis used by international educationists. Finally it suggests how the central purpose of global security, namely ensuring human survival, could be adopted within international education to provide a clear sense of direction. This has specific implications for such areas as curriculum, assessment, educational provision and planning.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70357; File No. SR-MIAX-2013-42] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate... provisions of Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70873; File No. SR-ISE-2013-56] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70872; File No. SR-ISE-2013-57] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64562; File No. SR-ISE-2011-29] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Second Market Fees May 27, 2011. Pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65499; File No. SR-ISE-2011-64] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70884; File No. SR-ISE-2013-59] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... November 15, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64292; File No. SR-ISE-2011-22] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network Fees April 11, 2011. Pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66525; File No. SR-ISE-2012-09] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network Fees March 7, 2012. Pursuant to Section 19(b)(1) of the Securities...
Near-Term Options for Improving Security at Los Angeles International Airport
2004-09-26
the Transportation Security Administration (TSA), the Los Angeles Police Department ( LAPD ), and LAX to make sure the list was reasonable...World Airports; the Transportation Security Agency; the Los Angeles International Airport Police Department ; the Los Angeles Police Department ; the Los ...Airports. iii PREFACE This document assesses near-term security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65087; File No. SR-ISE-2011-47] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... August 10, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
Cooperative global security programs modeling & simulation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Briand, Daniel
2010-05-01
The national laboratories global security programs implement sustainable technical solutions for cooperative nonproliferation, arms control, and physical security systems worldwide. To help in the development and execution of these programs, a wide range of analytical tools are used to model, for example, synthetic tactical environments for assessing infrastructure protection initiatives and tactics, systematic approaches for prioritizing nuclear and biological threat reduction opportunities worldwide, and nuclear fuel cycle enrichment and spent fuel management for nuclear power countries. This presentation will describe how these models are used in analyses to support the Obama Administration's agenda and bilateral/multinational treaties, and ultimately, to reducemore » weapons of mass destruction and terrorism threats through international technical cooperation.« less
Ormerod, Thomas C; Dando, Coral J
2015-02-01
Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts. In an in vivo double-blind randomized-control trial conducted in international airports, security agents detected 66% of deceptive passengers using the veracity test method compared with less than 5% using behavioral indicator recognition. As well as revealing advantages of veracity testing over behavioral indicator identification, the study provides the highest levels to date of deception detection in a realistic setting where the known base rate of deceptive individuals is low.
Administrator, National Security Education Program
1993-01-19
1. Administer, direct, and manage the resources for the lit program. 2. Establish and direct an international education center, as approved by the...approve the hiring of, and evaluate the performance of personnel who staff the international education center. 4. Ensure appropriate internal management...Administrator, National Security Education Program * References: (a) DoD Directive 1025.2 , "National Security * Education Program," January 13, 1993
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of China Ruitai International Holdings Co., Ltd.; Order of Suspension of Trading September 30, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Ruitai International Holdings Co.,...
U.S. Immigration Policy and the National Interest.
ERIC Educational Resources Information Center
Fauriol, Georges
1984-01-01
The national security of the United States depends upon its domestic strength and international stability. This strength requires an ability to control national borders, the maintenance of an independent foreign policy, a prosperous economy, and a cohesive domestic political environment. Uncontrolled migration is undermining this strength. (RM)
Code of Federal Regulations, 2013 CFR
2013-07-01
... Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Licenses, Authorizations..., bodies, commissions, agencies, departments and other entities of the Security Council, General Assembly...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Licenses, Authorizations..., bodies, commissions, agencies, departments and other entities of the Security Council, General Assembly...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Licenses, Authorizations..., bodies, commissions, agencies, departments and other entities of the Security Council, General Assembly...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY FOREIGN TERRORIST ORGANIZATIONS SANCTIONS REGULATIONS Licenses, Authorizations..., bodies, commissions, agencies, departments and other entities of the Security Council, General Assembly...
77 FR 46683 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-06
...: Bureau of Industry and Security. Title: Chemical Weapons Convention Provisions of the Export... Respondents: 10. Average Hours per Response: 30 minutes. Needs and Uses: The Chemical Weapons Convention (CWC) is a multilateral arms control treaty that seeks to achieve an international ban on chemical weapons...
46 CFR 501.5 - Functions of the organizational components of the Federal Maritime Commission.
Code of Federal Regulations, 2010 CFR
2010-10-01
... internal controls systems that provide accountability for agency funds; administers the Commission's travel... appeals officer under the Freedom of Information Act, the Privacy Act, and the Federal Activities... of this chapter to direct and administer the Commission's information security program, which...
15 CFR 742.15 - Encryption items.
Code of Federal Regulations, 2011 CFR
2011-01-01
... information of the public and private sector is protected. Consistent with our international obligations as a... information, and thereby may be used by persons abroad to harm U.S. national security, foreign policy and law... encryption hardware, are controlled because of this functional capacity to encrypt information, and not...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62523; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to... Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71066; File No. SR-ISE-2013-66] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70362; File No. SR-ISE-2013-42] Self-Regulatory..., 2013, International Securities Exchange, LLC (``Exchange'') filed with the Securities and Exchange...\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to list and trade options on the Nations VolDex...
14 CFR 1203.304 - Internal effect.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.304 Internal effect. The effect of security protection on... effects and added costs inherent in a security classification must be assessed in light of the detrimental...
14 CFR 1203.304 - Internal effect.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.304 Internal effect. The effect of security protection on... effects and added costs inherent in a security classification must be assessed in light of the detrimental...
2011-01-01
CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded...Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on the International Security and Defense Policy
McLaughlin, Katie A; Zeanah, Charles H; Fox, Nathan A; Nelson, Charles A
2012-01-01
Children reared in institutions experience elevated rates of psychiatric disorders. Inability to form a secure attachment relationship to a primary caregiver is posited to be a central mechanism in this association. We determined whether the ameliorative effect of a foster care (FC) intervention on internalizing disorders in previously institutionalized children was explained by the development of secure attachment among children placed in FC. Second we evaluated the role of lack of attachment in an institutionalized sample on the etiology of internalizing disorders within the context of a randomized trial. A sample of 136 children (aged 6-30 months) residing in institutions was recruited in Bucharest, Romania. Children were randomized to FC (n = 68) or to care as usual (CAU; n = 68). Foster parents were recruited, trained, and overseen by the investigative team. Attachment security at 42 months was assessed using the Strange Situation Procedure, and internalizing disorders at 54 months were assessed using the Preschool Age Psychiatric Assessment. Girls in FC had fewer internalizing disorders than girls in CAU (OR = 0.17, p = .006). The intervention had no effect on internalizing disorders in boys (OR = 0.47, p = .150). At 42 months, girls in FC were more likely to have secure attachment than girls in CAU (OR = 12.5, p < .001), but no difference was observed in boys (OR = 2.0, p = .205). Greater attachment security predicted lower rates of internalizing disorders in both sexes. Development of attachment security fully mediated intervention effects on internalizing disorders in girls. Placement into FC facilitated the development of secure attachment and prevented the onset of internalizing disorders in institutionalized girls. The differential effects of FC on attachment security in boys and girls explained gender differences in the intervention effects on psychopathology. Findings provide evidence for the critical role of disrupted attachment in the etiology of internalizing disorders in children exposed to institutionalization. © 2011 The Authors. Journal of Child Psychology and Psychiatry © 2011 Association for Child and Adolescent Mental Health.
77 FR 31391 - Manufacturer of Controlled Substances; Notice of Registration; Mallinckrodt LLC
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-25
... substances for internal use and for sale to other companies. No comments or objections have been received... public interest at this time. DEA has investigated Mallinckrodt, LLC., to ensure that the company's... the company's physical security systems, verification of the company's compliance with state and local...
15 CFR 748.9 - Support documents for license applications.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Foreign Aid, U.S. Agency for International Development, for export to a member agency in the foreign... circumstances beyond your control. An exception will not be granted contrary to the objectives of the U.S... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...
15 CFR 748.9 - Support documents for license applications.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Foreign Aid, U.S. Agency for International Development, for export to a member agency in the foreign... circumstances beyond your control. An exception will not be granted contrary to the objectives of the U.S... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...
15 CFR 748.9 - Support documents for license applications.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Foreign Aid, U.S. Agency for International Development, for export to a member agency in the foreign... circumstances beyond your control. An exception will not be granted contrary to the objectives of the U.S... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...
25 CFR 543.7 - What are the minimum internal control standards for bingo?
Code of Federal Regulations, 2011 CFR
2011-04-01
... software upgrades, data storage media replacement, etc.). The information recorded must be used when...., draw objects and back-up draw objects); and (ii) Random number generator software. (Additional information technology security standards can be found in § 543.16 of this part.) (2) The game software...
25 CFR 543.7 - What are the minimum internal control standards for bingo?
Code of Federal Regulations, 2012 CFR
2012-04-01
... software upgrades, data storage media replacement, etc.). The information recorded must be used when...., draw objects and back-up draw objects); and (ii) Random number generator software. (Additional information technology security standards can be found in § 543.16 of this part.) (2) The game software...
2013-03-01
international organized crime , illegal immigration, financial institution fraud and money laundering. Policymakers increasingly view domestic law...approach to crime control, focusing upon the identification, analysis and management of persisting and developing problems or risks (de Lint, 2006
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
TVT-Secur mini-sling for stress urinary incontinence: a review of outcomes at 12 months.
Walsh, Colin A
2011-09-01
• Synthetic mid-urethral slings (MUSs) are considered the first choice surgical procedure for stress urinary incontinence. Recent publications have raised concerns about the efficacy of third generation single-incision mini-slings. The present paper is a systematic review of studies reporting 12-month outcomes after the TVT-Secur (TVT-S) procedure. • Pubmed/Medline online databases, abstracts from recent International Continence Society and International Urogynecological Association annual scientific meetings and the Clinicaltrials.gov and Controlled-trials.com online trial registries were searched for English-language articles containing the terms 'TVT-Secur', 'TVT Secur' or 'mini-sling'. The primary outcomes were objective and subjective cure rates at 12 months. Secondary outcomes included peri-operative (vaginal perforation, urinary retention, urinary tract infection [UTI]) and postoperative (mesh exposure, de novo overactive bladder (OAB), dyspareunia and return to theatre) complication rates. • Among 1178 women undergoing the TVT-S procedure, from 10 studies, both objective and subjective cure rate at 12 months was 76%, with objective cure significantly higher in women undergoing the 'U-type' approach. Vaginal perforation was a complication in 1.5% of cases, with a 2.4% incidence of mesh exposure in the first year. The incidence of de novo OAB symptoms was 10%. Rates of urinary retention (2.3%), UTI (4.4%), dyspareunia (1%) and return to theatre for complications (0.8%) were low. In the first year after a TVT-S procedure 5% of women required repeat continence surgery. • Longer-term studies and randomized comparisons with more established MUSs are required before TVT-S should be routinely used in the surgical treatment of stress urinary incontinence. © 2011 THE AUTHOR. BJU INTERNATIONAL © 2011 BJU INTERNATIONAL.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Patch International, Inc., QuadTech International, Inc., Strategic Resources, Ltd., and Virtual Medical Centre, Inc.; Order of Suspension of Trading... lack of current and accurate information concerning the securities of Virtual Medical Centre, Inc...
The enhancement of security in healthcare information systems.
Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De
2012-06-01
With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.
Brock, Rebecca L.; Kochanska, Grazyna
2015-01-01
Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent–child attachment security as a mechanism that may account for the impact of interparental conflict on children’s long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent–child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children’s internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children’s development. PMID:25797703
Brock, Rebecca L; Kochanska, Grazyna
2016-02-01
Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent-child attachment security as a mechanism that may account for the impact of interparental conflict on children's long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent-child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children's internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children's development.
Feasibility Study of a Vision-Based Landing System for Unmanned Fixed-Wing Aircraft
2017-06-01
International Journal of Computer Science and Network Security 7 no. 3: 112–117. Accessed April 7, 2017. http://www.sciencedirect.com/science/ article /pii...the feasibility of applying computer vision techniques and visual feedback in the control loop for an autonomous system. This thesis examines the...integration into an autonomous aircraft control system. 14. SUBJECT TERMS autonomous systems, auto-land, computer vision, image processing
Technology Against Terrorism: The Federal Effort
1991-07-01
control appli - control and airport security plans. Some difficulties cations, irises of those seeking entry would be have arisen: now that specific...Washington International Air- tion. Among more advanced technologies are four of port as a test-bed. Sandia is applying to airport interest: voice...and 300 by 1999. criteria as well as evaluation standards and proce- In further tests carried out at JFK Airport in New dures for future EDS devices
[The control of foodstuffs at the beginning of 1993].
Babusiaux, C
1992-11-01
The 1st January 1993 the frontiers between the Member States of the European Community and the customs controls will disappear. The abolition of this type of control won't affect the food security. The french administration has strong legal rules to ensure the protection of consumer's health. The regulations prepared by European Community in order to allow the free circulation of goods also ensure a high level of consumer's protection. In case of harmonization, each Member state keeps some rights when there are risks for consumer's health. In absence of community regulations the principal of mutual acknowledgement aiming to avoid the barriers to trade can then not be applied for health and security necessities. The authorities controls are now resolutely inserted in an european context: priority to controls during production, harmonized methods of intervention to promote the required acknowledgement of controls enforced in each Member state, involvement in an european alert system, and development of the cooperation between the national administrative authorities of inspection. Regarding the matter of food security the authorities need the assistance of the scientific community and of its national and international representative organisations. They take an essential part in diagnosing, emergency and advice during the elaboration of regulations. Their power should be even greater with the implementation of the european scientific cooperation.
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caskey, D.L.; Olascoaga, M.T.
1990-01-01
Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less
Schendel, Diana E; Bresnahan, Michaeline; Carter, Kim W; Francis, Richard W; Gissler, Mika; Grønborg, Therese K; Gross, Raz; Gunnes, Nina; Hornig, Mady; Hultman, Christina M; Langridge, Amanda; Lauritsen, Marlene B; Leonard, Helen; Parner, Erik T; Reichenberg, Abraham; Sandin, Sven; Sourander, Andre; Stoltenberg, Camilla; Suominen, Auli; Surén, Pål; Susser, Ezra
2013-11-01
The International Collaboration for Autism Registry Epidemiology (iCARE) is the first multinational research consortium (Australia, Denmark, Finland, Israel, Norway, Sweden, USA) to promote research in autism geographical and temporal heterogeneity, phenotype, family and life course patterns, and etiology. iCARE devised solutions to challenges in multinational collaboration concerning data access security, confidentiality and management. Data are obtained by integrating existing national or state-wide, population-based, individual-level data systems and undergo rigorous harmonization and quality control processes. Analyses are performed using database federation via a computational infrastructure with a secure, web-based, interface. iCARE provides a unique, unprecedented resource in autism research that will significantly enhance the ability to detect environmental and genetic contributions to the causes and life course of autism.
Coding ethical behaviour: the challenges of biological weapons.
Rappert, Brian
2003-10-01
Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duran, Felicia Angelica; Waymire, Russell L.
2013-10-01
Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documentsmore » have also been provided to KHNP-CRI.« less
2010-06-01
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century, 947. 11 Marco A. Ferroni and Ashoka Mody, International Public...Security and Defence Policy, 67–70; Howorth, Security and Defence Policy in the European Union, 152–154. 47 Hubert Zimmermann, “Security Exporters...consilium.europa.eu/showPage.aspx?id=1519&lang=en (accessed 12 March 2010). Ferroni, Marco A. and Ashoka Mody. International Public Goods: Incentives
2014-11-01
Canada (Department of National Defence), 2014 c© Sa Majesté la Reine en droit du Canada (Ministère de la Défense nationale), 2014 Abstract In recent...2006), Network security mechanisms utilising network address translation, International journal of critical infrastructures, 2(1), 10–49. [5] Dunlop...Lu, S. (2008), Full service hopping for proactive cyber-defense, In ICNSC 2008: IEEE International Conference on Networking, Sensing and Control, pp
MODIS. Volume 1: MODIS level 1A software baseline requirements
NASA Technical Reports Server (NTRS)
Masuoka, Edward; Fleig, Albert; Ardanuy, Philip; Goff, Thomas; Carpenter, Lloyd; Solomon, Carl; Storey, James
1994-01-01
This document describes the level 1A software requirements for the moderate resolution imaging spectroradiometer (MODIS) instrument. This includes internal and external requirements. Internal requirements include functional, operational, and data processing as well as performance, quality, safety, and security engineering requirements. External requirements include those imposed by data archive and distribution systems (DADS); scheduling, control, monitoring, and accounting (SCMA); product management (PM) system; MODIS log; and product generation system (PGS). Implementation constraints and requirements for adapting the software to the physical environment are also included.
The Social and Economic Security of International Students: A New Zealand Study
ERIC Educational Resources Information Center
Sawir, Erlenawati; Marginson, Simon; Nyland, Chris; Ramia, Gaby; Rawlings-Sanaei, Felicity
2009-01-01
International education has generated complex problems of governance. As well as being beneficiaries of educational services and consumers of a product, international students are also migrants, workers and beings with civil rights. Arguably, the regulation of international student security as consumer protection fails to recognize this full range…
2013-05-24
Secretary of Homeland Security also has the responsibility for establishing International Security Cooperation with the countries of Canada and Mexico ...and goals”84 to improve its culture and morale issues. However, further study is required to determine ways to: de -conflict the overlap of...National Preparedness Description is one of the requirements for Presidental Policy Directive-8. 55 the Joint Staff integrates internal and external
Trub, Leora; Quinlan, Ella; Starks, Tyrel J; Rosenthal, Lisa
2017-09-01
With increasing numbers of same-sex couples raising children in the United States, discriminatory attitudes toward children of same-sex parents (ACSSP) are of increasing concern. As with other forms of stigma and discrimination, lesbian, gay, and bisexual (LGB) individuals are at risk for internalizing these societal attitudes, which can negatively affect parenting-related decisions and behaviors and the mental and physical health of their children. Secure attachment is characterized by positive views of the self as loveable and worthy of care that are understood to develop in early relationships with caregivers. Secure attachment has been associated with positive mental and physical health, including among LGB individuals and couples. This study aimed to test the potential buffering role of secure attachment against stigma internalization by examining associations among secure attachment, discrimination, internalized homonegativity (IH), and ACSSP in an online survey study of 209 U.S. adults in same-sex relationships. Bootstrap analyses supported our hypothesized moderated mediation model, with secure attachment being a buffer. Greater discrimination was indirectly associated with more negative ACSSP through greater IH for individuals with mean or lower levels, but not for individuals with higher than average levels of secure attachment, specifically because among those with higher levels of secure attachment, discrimination was not associated with IH. These findings build on and extend past research, with important implications for future research and clinical work with LGB individuals, same-sex couples, and their families, including potential implementation of interventions targeting attachment security. © 2016 Family Process Institute.
NASA Astrophysics Data System (ADS)
Blount, P. J.
2017-06-01
Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal structures that surround core security projects being pursued in and through space.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... Secure Solutions USA, SBM Management Services, LP, ALSCO Portland Industrial, VWR International, Inc... G4S Secure Solutions USA, SBM Management Services, LP, Alsco Portland Industrial, VWR International... workers from Express Temporaries, Aerotek Commercial Staffing, G4S Secure Solutions USA, SBM Management...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-20
... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Amend the...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as described... Commission is publishing this notice to solicit comments on the proposed rule change from interested persons...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68491; File No. SR-ISE-2012-101] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate... Prices Until the Close of Trading on the Second Business Day Prior to Monthly Expiration in Unusual...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69659; File No. SR-MIAX-2013-22] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate... the Second Business Day Prior to Expiration in Unusual Market Conditions May 29, 2013. Pursuant to...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62280] Order Granting Application for Extension... International Securities Exchange, LLC Relating to the Ownership Interest of International Securities Exchange Holdings, Inc. in an Electronic Communications Network June 11, 2010. I. Introduction On December 22, 2008...
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-12-31
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General`s Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-01-01
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General's Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
17 CFR 1.14 - Risk assessment recordkeeping requirements for futures commission merchants.
Code of Federal Regulations, 2010 CFR
2010-04-01
... alternative funding; (C) Establishing and maintaining internal controls with respect to market risk, credit... market, credit or other risk present in the activities of the affiliated person; and (v) The extent to... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Risk assessment recordkeeping...
15 CFR Supplement No. 4 to Part 744 - Entity List
Code of Federal Regulations, 2014 CFR
2014-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... the EAR. (See § 744.11 of the EAR). Presumption of denial 77 FR 25057, 4/27/12. Zurmat Group of... Electronic Solutions, a.k.a., the following one alias:—Mercury Group International, 380 Vansickle Rd Unit 660...
15 CFR Supplement No. 4 to Part 744 - Entity List
Code of Federal Regulations, 2013 CFR
2013-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY... the EAR. (See § 744.11 of the EAR). Presumption of denial 77 FR 25057, 4/27/12. Zurmat Group of... Group International, 380 Vansickle Rd Unit 660, St. Catharines, ON L2126P7, Canada; and 127 Rue Wilson...
Chemical Sniffing Instrumentation for Security Applications.
Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F
2016-07-27
Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).
Neutron and Gamma Imaging for National Security Applications
NASA Astrophysics Data System (ADS)
Hornback, Donald
2017-09-01
The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Demuth, Scott Francis; Sprinkle, James K.
As preparation to the year-end deliverable (Provide SSBD Best Practices for Generic Dry-Storage Pilot Scale Plant) for the Work Package (FT-15LA040501–Safeguards and Security by Design for Extended Dry Storage), the initial step was to select a generic dry-storage pilot plant design for SSBD. To be consistent with other DOE-NE Fuel Cycle Research and Development (FCR&D) activities, the Used Fuel Campaign was engaged for the selection of a design for this deliverable. For the work Package FT-15LA040501–“Safeguards and Security by Design for Extended Dry Storage”, SSBD will be initiated for the Generic Dry-Storage Pilot Scale Plant described by the layout ofmore » Reference 2. SSBD will consider aspects of the design that are impacted by domestic material control and accounting (MC&A), domestic security, and international safeguards.« less
VanTieghem, Michelle R.; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L.; Telzer, Eva H.; Caldera, Christina; Louie, Jennifer Y.; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2018-01-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e. positive valence bias) and family-level protective factors (i.e. secure parent-child relationships) moderate risk for internalizing symptoms in Previously Institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving. PMID:28401841
Vantieghem, Michelle R; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L; Telzer, Eva H; Caldera, Christina; Louie, Jennifer Y; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2017-05-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e., positive valence bias) and family-level protective factors (i.e., secure parent-child relationships) moderate risk for internalizing symptoms in previously institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving.
Roles for international military medical services in stability operations (security sector reform).
Bricknell, M C M; Thompson, D
2007-06-01
This is the second in a series of three papers that examine the role of international military medical services in stability operations in unstable countries. The paper discusses security sector reform in general terms and highlights the interdependency of the armed forces, police, judiciary and penal systems in creating a 'secure environment'. The paper then looks at components of a local military medical system for a counter-insurgency campaign operating on interior lines and the contribution and challenges faced by the international military medical community in supporting the development of this system. Finally the paper highlights the importance of planning the medical support of the international military personnel who will be supporting wider aspects of security sector reform. The paper is based on background research and my personal experience as Medical Director in the Headquarters of the NATO International Stability Assistance Force in Afghanistan in 2006.
77 FR 59690 - Titan Resources International, Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Titan Resources International, Corp.; Order of... a lack of current and accurate information concerning the securities of Titan Resources International, Corp. (``Titan''). Titan is a Wyoming corporation purportedly based in Ontario, Canada. Questions...
CMMI(Registered) for Acquisition, Version 1.3. CMMI-ACQ, V1.3
2010-11-01
and Software Engineering – System Life Cycle Processes [ ISO 2008b] ISO /IEC 27001 :2005 Information technology – Security techniques – Information...International Organization for Standardization and International Electrotechnical Commission. ISO /IEC 27001 Information Technology – Security Techniques...International Organization for Standardization/International Electrotechnical Commission ( ISO /IEC) body of standards. CMMs focus on improving processes
Scientific Openness and National Security at the National Laboratories
NASA Astrophysics Data System (ADS)
McTague, John
2000-04-01
The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.
31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or enrolled retirement plan agent's name, prior address, new address, social security number or tax... individuals licensed to practice before the Internal Revenue Service who have a social security number or tax... Internal Revenue Service who have a social security number or tax identification number that ends with the...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA 165.113 Section 165.113 Navigation and Navigable Waters..., MA (a) Location. The permanent security zone consists of four sectors that may be activated in part...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA 165.113 Section 165.113 Navigation and Navigable Waters..., MA (a) Location. The permanent security zone consists of four sectors that may be activated in part...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA. 165.113 Section 165.113 Navigation and Navigable Waters..., MA. (a) Location. The permanent security zone consists of four sectors that may be activated in part...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA. 165.113 Section 165.113 Navigation and Navigable Waters..., MA. (a) Location. The permanent security zone consists of four sectors that may be activated in part...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA 165.113 Section 165.113 Navigation and Navigable Waters..., MA (a) Location. The permanent security zone consists of four sectors that may be activated in part...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63955; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval of a Proposed Rule Change To Modify Qualified Contingent Cross Order Rules February 24, 2011. I. Introduction On July 14, 2010, the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70877; File No. SR-MIAX-2013-48] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend MIAX Rules 1302, 1304 and the MIAX Options Fee Schedule...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-21
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Limit Up/Limit Down March 15, 2013. Pursuant to Section 19(b)(1) of the... Securities and Exchange Commission (``Commission'') the proposed rule change as described in Items I and II...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-07
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65861; File No. SR-ISE-2011-77] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network and Gateway Fees December 1, 2011. Pursuant to Section 19(b)(1) of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-31
...); ISE Semiconductors (BYT); ISE Electronic Trading (DMA); ISE-Revere Natural Gas (FUM); ISE Water (HHO... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63761; File No. SR-ISE-2011-04] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Establish a...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65583; File No. SR-ISE-2011-68] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend the Volume Threshold for Tier-Based Rebates for Qualified Contingent Cross Orders and Solicitation Orders Executed...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65898; File No. SR-ISE-2011-78] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend the Threshold Levels for Tier-Based Rebates for Qualified Contingent Cross Orders and Solicitation Orders Executed...
Computer loss experience and predictions
NASA Astrophysics Data System (ADS)
Parker, Donn B.
1996-03-01
The types of losses organizations must anticipate have become more difficult to predict because of the eclectic nature of computers and the data communications and the decrease in news media reporting of computer-related losses as they become commonplace. Total business crime is conjectured to be decreasing in frequency and increasing in loss per case as a result of increasing computer use. Computer crimes are probably increasing, however, as their share of the decreasing business crime rate grows. Ultimately all business crime will involve computers in some way, and we could see a decline of both together. The important information security measures in high-loss business crime generally concern controls over authorized people engaged in unauthorized activities. Such controls include authentication of users, analysis of detailed audit records, unannounced audits, segregation of development and production systems and duties, shielding the viewing of screens, and security awareness and motivation controls in high-value transaction areas. Computer crimes that involve highly publicized intriguing computer misuse methods, such as privacy violations, radio frequency emanations eavesdropping, and computer viruses, have been reported in waves that periodically have saturated the news media during the past 20 years. We must be able to anticipate such highly publicized crimes and reduce the impact and embarrassment they cause. On the basis of our most recent experience, I propose nine new types of computer crime to be aware of: computer larceny (theft and burglary of small computers), automated hacking (use of computer programs to intrude), electronic data interchange fraud (business transaction fraud), Trojan bomb extortion and sabotage (code security inserted into others' systems that can be triggered to cause damage), LANarchy (unknown equipment in use), desktop forgery (computerized forgery and counterfeiting of documents), information anarchy (indiscriminate use of crypto without control), Internet abuse (antisocial use of data communications), and international industrial espionage (governments stealing business secrets). A wide variety of safeguards are necessary to deal with these new crimes. The most powerful controls include (1) carefully controlled use of cryptography and digital signatures with good key management and overriding business and government decryption capability and (2) use of tokens such as smart cards to increase the strength of secret passwords for authentication of computer users. Jewelry-type security for small computers--including registration of serial numbers and security inventorying of equipment, software, and connectivity--will be necessary. Other safeguards include automatic monitoring of computer use and detection of unusual activities, segmentation and filtering of networks, special paper and ink for documents, and reduction of paper documents. Finally, international cooperation of governments to create trusted environments for business is essential.
Schleifer, Rebecca; Pol, Luciana
2017-06-01
Discrimination and inequality shape women's experiences of drug use and in the drug trade and the impact of drug control efforts on them, with disproportionate burdens faced by poor and otherwise marginalized women. In recent years, UN member states and UN drug control and human rights entities have recognized this issue and made commitments to integrate a 'gender perspective' into drug control policies, with 'gender' limited to those conventionally deemed women. But the concept of gender in international law is broader, rooted in socially constructed and culturally determined norms and expectations around gender roles, sex, and sexuality. Also, drug control policies often fail to meaningfully address the specific needs and circumstances of women (inclusively defined), leaving them at risk of recurrent violations of their rights in the context of drugs. This article explores what it means to 'mainstream' this narrower version of gender into drug control efforts, using as examples various women's experiences as people who use drugs, in the drug trade, and in the criminal justice system. It points to international guidelines on human rights and drug control as an important tool to ensure attention to women's rights in drug control policy design and implementation.
Building Partner Country Capacity for Stability Operations
2011-01-01
international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this... Quantic Thurston, MG-942-A, 2010 (available at http://www.rand.org/pubs/monographs/MG942.html). This research brief was written by Kristin J. Leuschner...AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY
NASA Astrophysics Data System (ADS)
Hedjazi, Babak
2007-12-01
This dissertation is fundamentally about the formation of new regional spaces in Central Eurasia viewed from a dynamic, comparative and historical approach. Analyzing the global-local economic and political interactions and their consequences on resource rich countries of the Caspian Sea enable us to reframe security as a central element of the new global order. In this respect, the dissertation examines how two particular states, Azerbaijan and Iran, respond to the changing global security environment and optimize their capacity to absorb or control change. Here, security as I conceive is multidimensional and engages various social, political and economic domains. My research is articulated along three hypotheses regarding the formation of a new regional space and its consequences on territorial polarization and interstate rivalry. These hypotheses, respectively and cumulatively, elucidate global and domestic contexts of regional space formation, regional strategic and discursive trajectories, and regional tensions of global/local interactions. In order to empirically test these hypotheses, a series of thirty interviews were conducted by the author with local and foreign business representatives, civilian and government representatives, and corroborated by economic data collected from the International Energy Agency. The findings of the research validate the primary assumption of the dissertation that Azerbaijan and Iran have chosen the regional scale to address discrepancies between their aspired place in the new world order and the reality of their power and international status. Extending the argument for structural scarcity of oil towards contenders, this dissertation concludes that the Caspian oil has become a fundamental element of the regional discourse. The mismatch between the rhetoric of sovereign rights and energy security on one side and the reality of regional countries' powerlessness and their need to reach international markets on the other side are fundamental focal points of divergent regional trajectories of Azerbaijan and Iran. Divergent readings of energy security and its provision by Azerbaijan and Iran on the one hand, and how energy security is interpreted and incorporated in institutionalized regulation and new regimes of governance by consumer countries on the other hand, shape the new configuration of the Caspian Sea regionalism.
Information Systems Security Management: A Review and a Classification of the ISO Standards
NASA Astrophysics Data System (ADS)
Tsohou, Aggeliki; Kokolakis, Spyros; Lambrinoudakis, Costas; Gritzalis, Stefanos
The need for common understanding and agreement of functional and non-functional requirements is well known and understood by information system designers. This is necessary for both: designing the "correct" system and achieving interoperability with other systems. Security is maybe the best example of this need. If the understanding of the security requirements is not the same for all involved parties and the security mechanisms that will be implemented do not comply with some globally accepted rules and practices, then the system that will be designed will not necessarily achieve the desired security level and it will be very difficult to securely interoperate with other systems. It is therefore clear that the role and contribution of international standards to the design and implementation of security mechanisms is dominant. In this paper we provide a state of the art review on information security management standards published by the International Organization for Standardization and the International Electrotechnical Commission. Such an analysis is meaningful to security practitioners for an efficient management of information security. Moreover, the classification of the standards in the clauses of ISO/IEC 27001:2005 that results from our analysis is expected to provide assistance in dealing with the plethora of security standards.
12 CFR 220.108 - International Bank Securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 3 2011-01-01 2011-01-01 false International Bank Securities. 220.108 Section 220.108 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CREDIT BY BROKERS AND DEALERS (REGULATION T) Interpretations § 220.108 International Bank...
12 CFR 220.108 - International Bank Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false International Bank Securities. 220.108 Section 220.108 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CREDIT BY BROKERS AND DEALERS (REGULATION T) Interpretations § 220.108 International Bank...
Defense.gov Special Report: Travels With Hagel
Halifax International Security Forum. Story U.S., Canada Sign Asia-Pacific Cooperation Framework Defense Cooperation Framework as both leaders take part in the Halifax International Security Forum. Story Travel Visits First Zumwalt-class Destroyer Photo Essays Photo Essay: Hagel Attends Halifax International
Alotaibi, Badriah M; Yezli, Saber; Bin Saeed, Abdul-Aziz A; Turkestani, Abdulhafeez; Alawam, Amnah H; Bieh, Kingsley L
2017-05-01
Hajj is one of the largest and the most ethnically and culturally diverse mass gatherings worldwide. The use of appropriate surveillance systems ensures timely information management for effective planning and response to infectious diseases threats during the pilgrimage. The literature describes infectious diseases prevention and control strategies for Hajj but with limited information on the operations and characteristics of the existing Hajj infectious diseases surveillance systems. We reviewed documents, including guidelines and reports from the Saudi Ministry of Health's database, to describe the characteristics of the infectious diseases surveillance systems that were operational during the 2015 Hajj, highlighting best practices and gaps and proposing strategies for strengthening and improvement. Using Pubmed and Embase online search engines and a combination of search terms including, 'mass gatherings' 'Olympics' 'surveillance' 'Hajj' 'health security', we explored the existing literature and highlighted some lessons learnt from other international mass gatherings. A regular indicator-based infectious disease surveillance system generates routine reports from health facilities within the Kingdom to the regional and central public health directorates all year round. During Hajj, enhanced indicator-based notifiable diseases surveillance systems complement the existing surveillance tool to ensure timely reporting of event information for appropriate action by public health officials. There is need to integrate the existing Hajj surveillance data management systems and to implement syndromic surveillance as an early warning system for infectious disease control during Hajj. International engagement is important to strengthen Hajj infectious diseases surveillance and to prevent disease transmission and globalization of infectious agents which could undermine global health security. © International Society of Travel Medicine, 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com
Huth-Bocks, Alissa C.; Muzik, Maria; Beeghly, Marjorie; Earls, Lauren; Stacks, Ann M.
2015-01-01
There is growing evidence that ‘secure-base scripts’ (Waters & Waters, 2006) are an important part of the cognitive underpinnings of internal working models of attachment. Recent research in middle class samples has shown that secure-base scripts are linked to maternal attachment-oriented behavior and child outcomes. However, little is known about the correlates of secure base scripts in higher-risk samples. Participants in the current study included 115 mothers who were oversampled for childhood maltreatment and their infants. Results revealed that a higher level of secure base scriptedness was significantly related to more positive and less negative maternal parenting in both unstructured free play and structured teaching contexts, and to higher reflective functioning scores on the Parent Development Interview-Revised Short Form (Slade, Aber, Berger, Bresgi, & Kaplan, 2003). Associations with parent-child secure base scripts, specifically, indicate some level of relationship-specificity in attachment scripts. Many, but not all, significant associations remained after controlling for family income and maternal age. Findings suggest that assessing secure base scripts among mothers known to be at risk for parenting difficulties may be important for interventions aimed at altering problematic parental representations and caregiving behavior. PMID:25319230
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-07
...-AA87 Security Zone; 23rd Annual North American International Auto Show, Detroit River, Detroit, MI... officials at the 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in... 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in downtown Detroit...
Information Badging Information Foreign National Requirements SLAC Internal Gate Information Site Entry Form this is a SLAC-Internal page for videos on how to use the automated gates. Security Assistance The Main and holidays. See Gate Information this is a SLAC-Internal page for more information about the
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-17
... Contract Services, Encore, International Business Machines (IBM), Akzo Nobel, US Security, ASF Logistics... Services, Encore, International Business Machines (IBM), Akzo Nobel, US Security, ASF Logistics, LLC... class 4-8 trucks. The company reports that workers leased from Encore, International Business Machines...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-07
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-818] Certain Devices With Secure... AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that a complaint was filed with the U.S. International Trade Commission on November 4, 2011, under section 337 of...
NASA Astrophysics Data System (ADS)
Nagaratnam, Nataraj
Bit by bit, our planet is getting smarter. By this, we mean the systems that run, the way we live and work as a society. Three things have brought this about - the world is becoming instrumented, interconnected and intelligent. Given the planet is becoming instrumented and interconnected, this opens up more risks that need to be managed. Escalating security and privacy concerns along with a renewed focus on organizational oversight are driving governance, risk management and compliance (GRC) to the forefront of the business. Compliance regulations have increasingly played a larger role by attempting to establish processes and controls that mitigate the internal and external risks organizations have today. To effectively meet the requirements of GRC, companies must prove that they have strong and consistent controls over who has access to critical applications and data.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62125; File No. SR-ISE-2010-48] Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by International Securities Exchange LLC To Amend ISE Rule 2102 To Provide for a Trading Pause for Individual Securities When the Price Moves Ten Percent or...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65054; File No. SR-ISE-2011-36] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Adopt the Content Outline for the Proprietary Traders Examination (Series 56) August 8, 2011. Pursuant to Section 19(b)(1...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... change from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63758; File No. SR-ISE-2011-05] Self-Regulatory... Purchase of Equity Interests by International Securities Exchange Holdings, Inc. in Ballista Holdings LLC...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69114; File No. SR-ISE-2013-18] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Address Order Handling Under the Options Order Protection and Locked/Crossed Market Plan, the Authority of the Exchange To Cancel Orders When a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-31
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71182; File No. SR-ISE-2013-71] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To More Specifically Address the Number and Size of Contra- Parties to a Qualified Contingent Cross Order December 24, 2013....
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-17
...., International Securities Exchange LLC, The NASDAQ Stock Market LLC, New York Stock Exchange LLC, NYSE Amex LLC... include all remaining National Market System (``NMS'') stocks (``Phase III Securities'').\\9\\ The new pilot... executions, so that the rule will continue to operate in the same manner after changes to the single stock...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... Organizations; International Securities Exchange, LLC; Notice of Designation of a Longer Period for Commission Action on Proposed Rule Change To List and Trade Option Contracts Overlying 10 Shares of a Security June... Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to list and trade...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-27
... Organizations; International Securities Exchange, LLC; Notice of Withdrawal of Proposed Rule Change To List and... proposed rule change to list and trade option contracts overlying 10 shares of a security. Notice of the proposed rule change was published in the Federal Register on April 24, 2012.\\3\\ The Commission received...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-09
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66084; File No. SR-ISE-2011-84] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Fees for Certain Complex Orders Executed on the Exchange January 3, 2012. Pursuant to Section 19(b)(1) of the...
Aeronautics and Space Report of the President: Fiscal Year 1996 Activities
NASA Technical Reports Server (NTRS)
1996-01-01
Topics considered include: (1) Space launch activities: space shuttle missions; expendable launch vehicles. (2) Space science: astronomy and space physics; solar system exploration. (3) Space flight and technology: life and microgravity sciences; space shuttle technology; reuseable launch vehicles; international space station; energy; safety and mission assurance; commercial development and regulation of space; surveillance. (4) Space communications: communications satellites; space network; ground networks; mission control and data systems. (5) Aeronautical activities: technology developments; air traffic control and navigation; weather-related aeronautical activities; flight safety and security; aviation medicine and human factors. (6) Studies of the planet earth: terrestrial studies and applications: atmospheric studies: oceanographic studies; international aeronautical and space activities; and appendices.
NASA Astrophysics Data System (ADS)
Kurnianto, Ari; Isnanto, Rizal; Widodo, Aris Puji
2018-02-01
Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS) ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.
26 CFR 1.355-3 - Active conduct of a trade or business.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 4 2011-04-01 2011-04-01 false Active conduct of a trade or business. 1.355-3... TAX (CONTINUED) INCOME TAXES Effects on Shareholders and Security Holders § 1.355-3 Active conduct of... section 355 only if— (i) The distributing and the controlled corporations are each engaged in the active...
Laboratory Test of Reciprocating Internal Combustion Engines
2016-02-04
testing require extremely accurate fuel consumption measurement, and the ability to temperature condition the fuel. Most dynamometer manufacturers...include, but are not limited to, differences in fuels, lubrication, temperatures , engine control module parameters, component wear, exhaust, and air...exhaust gas recirculation (EGR) fuel consumption 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 38
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-02
..., Hillsborough Village, Muntin Lupa City, Philippines, 1780, Respondent; Celltron Marketing Company, a.k.a... Section 38 of the Arms Export Control Act (22 U.S.C. 2778 (2000)) (``AECA''). Specifically, Chua was... Powers Act (50 U.S.C. 1701-1706); 18 U.S.C. 793, 794 or 798; section 4(b) of the Internal Security Act of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-20
... B[ouml]rse''). NYSE Euronext owns 100% of the equity interest of NYSE Group, Inc., a Delaware corporation (``NYSE Group''), which in turn directly or indirectly owns (1) 100% of the equity interest of... together with its related persons, from having voting control over more than 20% of the outstanding capital...
ERIC Educational Resources Information Center
Gray, David H.
2008-01-01
Since the attacks of September 11, national and international security has been driven to the center stage of our present-day society, thus becoming a primary concern and focus in the United States. The purpose of this study was to conduct an instructional needs assessment for the establishment of a Masters of Arts program in International Studies…
77 FR 21142 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-09
..., international security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman..., DC 20520, telephone: (202) 736-4290. Dated: March 28, 2012. Richard W. Hartman II, Executive Director...
76 FR 36167 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-21
..., international security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman..., DC 20520, telephone: (202) 736-4290. Dated: June 13, 2011. Richard W. Hartman, II., Executive...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less
Zeegers, Moniek A J; Colonnesi, Cristina; Stams, Geert-Jan J M; Meins, Elizabeth
2017-12-01
Major developments in attachment research over the past 2 decades have introduced parental mentalization as a predictor of infant-parent attachment security. Parental mentalization is the degree to which parents show frequent, coherent, or appropriate appreciation of their infants' internal states. The present study examined the triangular relations between parental mentalization, parental sensitivity, and attachment security. A total of 20 effect sizes (N = 974) on the relation between parental mentalization and attachment, 82 effect sizes (N = 6,664) on the relation between sensitivity and attachment, and 24 effect sizes (N = 2,029) on the relation between mentalization and sensitivity were subjected to multilevel meta-analyses. The results showed a pooled correlation of r = .30 between parental mentalization and infant attachment security, and rs of .25 for the correlations between sensitivity and attachment security, and between parental mentalization and sensitivity. A meta-analytic structural equation model was performed to examine the combined effects of mentalization and sensitivity as predictors of infant attachment. Together, the predictors explained 12% of the variance in attachment security. After controlling for the effect of sensitivity, the relation between parental mentalization and attachment remained, r = .24; the relation between sensitivity and attachment remained after controlling for parental mentalization, r = .19. Sensitivity also mediated the relation between parental mentalization and attachment security, r = .07, suggesting that mentalization exerts both direct and indirect influences on attachment security. The results imply that parental mentalization should be incorporated into existing models that map the predictors of infant-parent attachment. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Understanding the Value of a Computer Emergency Response Capability for Nuclear Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gasper, Peter Donald; Rodriguez, Julio Gallardo
The international nuclear community has a great understanding of the physical security needs relating to the prevention, detection, and response of malicious acts associated with nuclear facilities and radioactive material. International Atomic Energy Agency (IAEA) Nuclear Security Recommendations (INFCIRC_225_Rev 5) outlines specific guidelines and recommendations for implementing and maintaining an organization’s nuclear security posture. An important element for inclusion into supporting revision 5 is the establishment of a “Cyber Emergency Response Team (CERT)” focused on the international communities cybersecurity needs to maintain a comprehensive nuclear security posture. Cybersecurity and the importance of nuclear cybersecurity require that there be a specificmore » focus on developing an International Nuclear CERT (NS-CERT). States establishing contingency plans should have an understanding of the cyber threat landscape and the potential impacts to systems in place to protect and mitigate malicious activities. This paper will outline the necessary components, discuss the relationships needed within the international community, and outline a process by which the NS-CERT identifies, collects, processes, and reports critical information in order to establish situational awareness (SA) and support decision-making« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Tornado Gold International Corp., Twin Faces East Entertainment Corp., Universal Ice Blast, Inc., US Farms, Inc., US Microbics... concerning the securities of Tornado Gold International Corp. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: BP International, Inc., CyGene Laboratories, Inc., Delek Resources, Inc., Flooring America, Inc., International Diversified... there is a lack of current and accurate information concerning the securities of CyGene Laboratories...
Going nuclear: The spread of nuclear weapons 1986-1987
DOE Office of Scientific and Technical Information (OSTI.GOV)
Spector, L.S.
1987-01-01
In the third annual report of the Carnegie Endowment for International Peace on the spread of nuclear weapons, Spector provides a critical survey of the status of nuclear proliferation throughout the world and examines the nuclear potential of nations in the Middle East, Asia, Africa, and Latin America. Drawing on both historical documents and up-to-date reports, the author addresses such specific topics as Israel's nuclear arsenal, nuclear terrorism and its global security implications, arms control and nuclear safeguards, international treaties, weapons buildup, and political radicalism and unrest in nuclear-threshold nations.
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
Choices in International Conflict: With a Focus on Security Issues in Asia.
ERIC Educational Resources Information Center
Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James
Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
International Outreach and Coordination Strategy for the National Strategy for Maritime Security
2005-11-01
economic stability of the international community, all nations have a vital interest in ensuring that the maritime domain remains secure and open for the free and legitimate use of all. Public and private entities must work in concert to succeed. Accordingly, in order to enhance global maritime security, the Department of State will leverage its diplomatic resources and influence, while coordinating closely with other components of the US Government, to promote and enhance close cooperation among sovereign nations, international and regional organizations and the maritime
New technology for food systems and security.
Yau, N J Newton
2009-01-01
In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.
MCloud: Secure Provenance for Mobile Cloud Users
2016-10-03
Feasibility of Smartphone Clouds , 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). 04-MAY- 15, Shenzhen, China...final decision. MCloud: Secure Provenance for Mobile Cloud Users Final Report Bogdan Carbunar Florida International University Computing and...Release; Distribution Unlimited UU UU UU UU 03-10-2016 31-May-2013 30-May-2016 Final Report: MCloud: Secure Provenance for Mobile Cloud Users The views
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Bad debts, losses, and gains with respect to securities held by financial institutions. 1.582-1 Section 1.582-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Banking Institutions...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-15
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ROK Entertainment Group, Inc., RussOil Corp., Tricell, Inc., Tunex International, Inc. (n/k/a Aone Dental International Group, Inc.), and Wireless Age... there is a lack of current and accurate information concerning the securities of Wireless Age...
Analyzing Global Interdependence. Volume III. Methodological Perspectives and Research Implications,
1974-11-01
exposition of their relevance to U. S. - U. S. S.R. security relations is Glenn H. Snyder, "’Prisoner’s Dilemma’ and ’Chicken Models ’ in International...by both. The -9- same dilemma may well occur in some arms acquisitions, fishing, inflation control, or oil production situations. The fact that the...magnitudes) or individually (who goes to jail, who has which arms the other does not, who gets what from their inflation controller or oil production
Future Trends and US National Security
2015-01-01
the officer corps and has served in a variety of command and control and communications information positions at squadron, head- quarters, agency...Second, the book is a vehicle to present the top-level scholarship produced by ACSC students (and other AU scholars) to a wider community ; in fact...diverse domains as national/international communications ; Internet access; global navigation; military intelli- gence, surveillance, and
2015-07-31
conducted this attestation engagement in accordance with examination engagement standards established by the American Institute of Certified Public...Accountants and with generally accepted government auditing standards. We appreciate the courtesies extended to the staff. Please direct questions to me at...2015-154 Contents Audit Opinion __________________________________________________________________________1 Internal Controls
2010-01-05
Research, 2009. 219 See for example Michael Jacobson and Matthew Levitt, “ Follow the Money ,” Los Angeles Times, December 23, 2008. 220 See for example...R. T. Naylor, “Wash-Out: A Critique of Follow - the - Money Methods in Crime Control Policy,” Crime, Law, and Social Change, Vol. 32, 1999, pp. 1-57
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2013 CFR
2013-01-01
....C. 80a-1 et seq.); (7) Finance company; (8) Broker-dealer within the meaning of 15 U.S.C. 78c(a)(4..., pension, or profit-sharing trust qualified under section 401 of the Internal Revenue Code; (11) Bank... that H is a holding company which controls a life insurance company, a casualty insurer and a finance...
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2012 CFR
2012-01-01
....C. 80a-1 et seq.); (7) Finance company; (8) Broker-dealer within the meaning of 15 U.S.C. 78c(a)(4..., pension, or profit-sharing trust qualified under section 401 of the Internal Revenue Code; (11) Bank... that H is a holding company which controls a life insurance company, a casualty insurer and a finance...
16 CFR 802.64 - Acquisitions of voting securities by certain institutional investors.
Code of Federal Regulations, 2014 CFR
2014-01-01
....C. 80a-1 et seq.); (7) Finance company; (8) Broker-dealer within the meaning of 15 U.S.C. 78c(a)(4..., pension, or profit-sharing trust qualified under section 401 of the Internal Revenue Code; (11) Bank... that H is a holding company which controls a life insurance company, a casualty insurer and a finance...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
...-Proliferation Reports to Congress By virtue of the authority vested in me as the Secretary of State, including... International Security, to the extent authorized by law, the authority to approve submission of reports to Congress pursuant to: (1) Section 1344 of the Foreign Relations Authorization Act, Fiscal Year 2003, Public...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-23
... limitations would apply only for so long as NYSE Group directly or indirectly controls any NYSE U.S. Regulated... (``Deutsche B[ouml]rse''). NYSE Euronext owns 100% of the equity interest of NYSE Group, Inc., a Delaware corporation (``NYSE Group''), which in turn directly or indirectly owns (1) 100% of the equity interest of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-15
... Rule Change Relating To Amending the Direct Edge ECN Fee Schedule; Correction AGENCY: Securities and... Effectiveness of Proposed Rule Change Relating to Amending the Direct Edge ECN Fee Schedule by the International...
Confidence building in Northeast Asia: Possible first steps for cooperation on the Korean peninsula
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vannoni, M.; Biringer, K.
International relations are often devoted to establishing agreements that define, control, or regulate issues of potential conflict or dispute. These agreements span a full range of national and international issues from human rights to resource allocations and national security. The scope of these agreements can vary from bilateral arrangements to global treaties or control regimes. In many cases, elements of the agreement are monitored to verify compliance or increase confidence among parties that the terms of the agreement are being met. This article outlines options for cooperation on the Korean peninsula that could build confidence and reduce tension. The rolemore » of monitoring technology in helping to implement such agreements is also described.« less
LANL Safeguards and Security Assurance Program. Revision 6
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-04-03
The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weston, B.H.
This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.
Personal control of privacy and data: Estonian experience.
Priisalu, Jaan; Ottis, Rain
2017-01-01
The Republic of Estonia leads Europe in the provision of public digital services. The national communications and transactions platform allows for twenty-first century governance by allowing for transparency, e-safety (inter alia privacy), e-security, entrepreneurship and, among other things, rising levels of prosperity, and well-being for all its Citizens. However, a series of Information Infrastructure attacks against the Estonian e-society infrastructure in 2007 became one of best known incidents and experiences that fundamentally changed both Estonian and international discussions about Cyber Security and Privacy. Estonian experience shows that an open and transparent attitude provides a good foundation for trust between the Citizen and the State, and gives more control to the real owner of the data - the Citizen. Another important lesson is that the Citizen needs to be confident in the government's ability to keep their data safe -- in terms of confidentiality, integrity and availability - establishing a strong link between privacy and information security. This paper discusses certain critical choices, context, and events connected to the birth and growth of the Estonian e-society in terms of Privacy.
The USEPA's National Homeland Security Research Center (NHSRC)Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle recently evaluated the performance of the Science Applications International Co...
Rep. Hastings, Alcee L. [D-FL-23
2009-01-15
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Dodo, Mahamat K
2014-01-01
Climate Change like many global problems nowadays is recognized as a threat to the international security and cooperation. In theoretical terms, it is being securitized and included in the traditional security studies. Climate change and its accompanying environmental degradation are perceived to be a threat that can have incalculable consequences on the international community. The consequences are said to have more effects in small island developing nations and Africa where many States are fragile and overwhelmed with mounting challenges. In recent years, the security implications of the climate change are being addressed from national, regional and multilateral level. Against this backdrop, this paper intends to contribute to the debate on climate change and international security and present a broader perspective on the discussion. The paper will draw from the EU-Africa partnership on climate change and is structured as follows: the first part introduces the background of the international climate change policy and its securitization, the second part covers the EU-Africa relations and EU-Africa partnership on climate change, and the third part discusses the Congo Basin Forest Partnership as a concrete example of EU-Africa Partnership on Climate Change. Lastly, the paper concludes by drawing some conclusions and offers some policy perspectives and recommendations. Q54; 055; 052; 01;
2011-08-25
Security Cooperation Agency INL Bureau of International Narcotics and Law Enforcement Affairs JSSP Justice Sector Security Program PAE Pacific...regional training centers. The programs were the Justice Sector Security Program ( JSSP ), the Corrections System Support Program (CSSP), and the...Civilian Police International. JSSP and CSSP are considered rule of law programs. Rule of law is most commonly understood to be a foundational
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Amerex Group, Inc., AmeriChip International, Inc., Amish Naturals, Inc., Banker's Store Inc. (The), Champion Parts, Inc., and Gray Peaks, Inc... securities of AmeriChip International, Inc. because it has not filed any periodic reports since the period...
75 FR 22151 - National Maritime Security Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-27
... field are encouraged to apply: Port Operations Management/Port Authorities. Maritime Security Operations and Training. Marine Salvage Operations. Maritime Security Related Academics/Public Policy. Marine Facilities and Terminals Security Management. Vessel Owners/Operators. Maritime Labor. International and...
Defense Security Cooperation Agency Vision 2020. Update 1
2015-10-01
the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers
Homeland Security and Information.
ERIC Educational Resources Information Center
Relyea, Harold C.
2002-01-01
Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)
International Safeguards and the Pacific Northwest National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olsen, Khris B.; Smith, Leon E.; Frazar, Sarah L.
Established in 1965, Pacific Northwest National Laboratory’s (PNNL) strong technical ties and shared heritage with the nearby U.S. Department of Energy Hanford Site were central to the early development of expertise in nuclear fuel cycle signatures, separations chemistry, plutonium chemistry, environmental monitoring, modeling and analysis of reactor systems, and nuclear material safeguards and security. From these Hanford origins, PNNL has grown into a multi-program science and engineering enterprise that utilizes this diversity to strengthen the international safeguards regime. Today, PNNL supports the International Atomic Energy Agency (IAEA) in its mission to provide assurances to the international community that nations domore » not use nuclear materials and equipment outside of peaceful uses. PNNL also serves in the IAEA’s Network of Analytical Laboratories (NWAL) by providing analysis of environmental samples gathered around the world. PNNL is involved in safeguards research and development activities in support of many U.S. Government programs such as the National Nuclear Security Administration’s (NNSA) Office of Research and Development, NNSA Office of Nonproliferation and Arms Control, and the U.S. Support Program to IAEA Safeguards. In addition to these programs, PNNL invests internal resources including safeguards-specific training opportunities for staff, and laboratory-directed research and development funding to further ideas that may grow into new capabilities. This paper and accompanying presentation highlight some of PNNL’s contributions in technology development, implementation concepts and approaches, policy, capacity building, and human capital development, in the field of international safeguards.« less
Elbe, Stefan
2014-12-01
Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.
Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.
Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-06-01
The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.
DOT National Transportation Integrated Search
1996-09-01
While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...
Interpreting international governance standards for health IT use within general medical practice.
Mahncke, Rachel J; Williams, Patricia A H
2014-01-01
General practices in Australia recognise the importance of comprehensive protective security measures. Some elements of information security governance are incorporated into recommended standards, however the governance component of information security is still insufficiently addressed in practice. The International Organistion for Standardisation (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security. This standard, applicable to organisations of all sizes, offers a framework against which to assess and implement the governance components of information security. The standard demonstrates the relationship between governance and the management of information security, provides strategic principles and processes, and forms the basis for establishing a positive information security culture. An analysis interpretation of this standard for use in Australian general practice was performed. This work is unique as such interpretation for the Australian healthcare environment has not been undertaken before. It demonstrates an application of the standard at a strategic level to inform existing development of an information security governance framework.
A European Perspective on Security Research
NASA Astrophysics Data System (ADS)
Liem, Khoen; Hiller, Daniel; Castex, Christoph
Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.
Child rights, right to water and sanitation, and human security.
Pink, Ross
2012-06-15
The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
Maritime security report. June 1999 [Inter-American Port Security Program
DOT National Transportation Integrated Search
1999-06-01
Three international port security training courses were organized and managed by the U.S. Maritime Administration (MARAD) and conducted during the fall of 1998 in Panama, Peru, and Barbados as principal activities of the Inter-American Port Security ...
A National Security Strategy for Sweden: Balancing Risks and Opportunities in the 21st Century
2010-04-01
Command and Staff College. International Security Studies: AY10 Coursebook . Montgomery, 2009. Air Command and Staff College. War Studies Course: AY10... Coursebook . Montgomery, 2009. Assadourian, Eric (Project Director at the World Watch Institute). Vital Signs 2007-2008; The Trends that are Shaping Our...Air Command and Staff College International Security Studies: AY10 Coursebook . Montgomery, 2009. Edgar, Johan, Linda Hjerten, Mira Micic and Eric
The International Criminal Court as a Component of U.S. National Security Strategy
2012-04-21
Security Strategy 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER LTC Jonathan R. Hirsch, U.S. Army...98) Prescribed by ANSI Std. Z39.18 USAWC CIVILIAN RESEARCH PROJECT THE INTERNATIONAL CRIMINAL COURT AS A COMPONENT OF U.S...Security Strategy FORMAT: Civilian Research Project DATE: 21 April 2012 WORD COUNT: 11,629 PAGES: 46 KEY TERMS: Lawfare, Contractor
ERIC Educational Resources Information Center
Library of Congress, Washington, DC. Congressional Research Service.
To provide a handy reference for those concerned with ways to avoid the further spread, or proliferation, of nuclear weapons, the House Committee on Foreign Affairs and the Senate Committee on Governmental Affairs have since 1977 sponsored periodic publication of the Nuclear Proliferation Factbook. This fourth edition of the factbook includes a…
26 CFR 301.6511(d)-1 - Overpayment of income tax on account of bad debts, worthless securities, etc.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Overpayment of income tax on account of bad debts, worthless securities, etc. 301.6511(d)-1 Section 301.6511(d)-1 Internal Revenue INTERNAL REVENUE... Limitations Limitations on Assessment and Collection § 301.6511(d)-1 Overpayment of income tax on account of...
42 CFR 433.37 - Reporting provider payments to Internal Revenue Service.
Code of Federal Regulations, 2010 CFR
2010-10-01
... identification of providers by— (1) Social security number if— (i) The provider is in solo practice; or (ii) The... security number or employer identification number. ... identification number for all other providers. (c) Compliance with section 6041 of the Internal Revenue Code. The...
Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar
NASA Astrophysics Data System (ADS)
Botel, Gabriel
This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.
Proliferation, Potential TMD Roles, Demarcation and ABM Treaty Compatibility.
1994-09-01
Dr. Sergei Blagovolin Dr. Stephen Cambone Amb. Sidney Graybeal Dr. Patricia McFate Dr. Alexander Savelyev Mr. Willis Stanley Ms. Linda Vlahos...control, missile defense, and other international security issues. He served as the director of this study. Dr. Alexander Savelyev is Vice President of...Interview with Dr. Sergei Blagovolin and Alexander Savelyev , July 15,1994, 69. Interview with Amb. Kathleen Bailey, former Assistant Director of
Source Physics Experiment: Research in Support of Verification and Nonproliferation
2011-09-01
designed to provide a carefully controlled seismic and strong motion data set from buried explosions at the Nevada National Security Site (NNSS). The...deposition partitioned into internal (heat and plastic strain) and kinetic (e.g., radiated seismic ) energy, giving more confidence in predicted free...ample information to study dry and water-saturated fractures, local lithology and topography on the radiated seismic wavefield. Spallation on
Iraq: Post-Saddam Governance and Security
2009-03-02
three provinces of the Ottoman empire after British forces defeated the Ottomans in World War I and took control of the territory in 1918 . Britain...imported by government from national funds. Sources: CIA The World Factbook; State Department International Religions Freedom Report, September 2008...attributed restrictions on the free exercise of religion (by religious minorities) to “terrorists, extremists, and criminal gangs,” while praising the
Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M
Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.
A wireless electronic monitoring system for securing milk from farm to processor
NASA Astrophysics Data System (ADS)
Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin
2008-04-01
The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.
International challenges and public policy issues.
Morris, N
1999-01-01
The paper presents an overview of current public policy issues relating to biological standardisation and control, drawing on the extensive background material assembled for two recent international reviews, and previously published work. It identifies a number of factors which are destabilising the current system and promoting a climate for change. These include the squeeze on public sector resources, the growth in volume and complexity of biologicals, developing world needs, concerns about harmonisation and new social and ethical issues. It is argued that this situation presents important opportunities for reviewing the existing boundaries between regulatory scientists, industry, and the public, for international agreement on priorities and for harmonisation and mutual recognition. While considerable progress has already been made on these issues at national, regional and global level, there is a need for fuller international participation and the additional impetus that would come from a higher-profile commitment by governments. Such commitment will also be important for the vital questions of sustaining the scientific base and securing the resource for an effective, truly worldwide programme of standardisation and control. An international approach will also be essential in steering biologicals control through the difficult social and ethical questions of the future. WHO, in collaboration with national authorities, has a key role to play in these developments.
77 FR 14525 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-12
... maintains the CDC Computer Security Incident Response Team; (4) performs cyber security incident reporting... systems planning and support; internal security and emergency preparedness; and management analysis and... security; education, training, and workforce development in information and IT disciplines; development and...
Training on Transport Security of Nuclear/Radioactive Materials for Key Audiences
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Ronald; Liu, Yung; Shuler, J.M.
Beginning in 2013, the U.S. Department of Energy (DOE) Packaging Certification Program (PCP), Office of Packaging and Transportation, Office of Environmental Management has sponsored a series of three training courses on Security of Nuclear and Other Radioactive Materials during Transport. These courses were developed and hosted by Argonne National Laboratory staff with guest lecturers from both the U.S. and international organizations and agencies including the U.S. Nuclear Regulatory Commission (NRC), Federal Bureau of Investigation (FBI), the U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), DOE national laboratories, the International Atomic Energy Agency (IAEA), the World Nuclear Transport Institutemore » (WNTI), and the World Institute for Nuclear Security (WINS). Each of the three courses held to date were one-week in length. The courses delved in detail into the regulatory requirements for transport security, focusing on international and U.S.-domestic requirements and guidance documents. Lectures, in-class discussions and small group exercises, including tabletop (TTX) and field exercises were designed to enhance the learning objectives for the participants. For example, the field exercise used the ARG-US radio frequency identification (RFID) remote surveillance system developed by Argonne for DOE/PCP to track and monitor packages in a mock shipment, following in-class exercises of developing a transport security plan (TSP) for the mock shipment, performing a readiness review and identifying needed corrective actions. Participants were able to follow the mock shipment on the webpage in real time in the ARG-US Command Center at Argonne including “staged” incidents that were designed to illustrate the importance of control, command, communication and coordination in ensuring transport security. Great lessons were learned based on feedback from the participant’s course evaluations with the series of the courses. Since the development of the relevant teaching materials for the course have largely been completed, tailoring the course for targeted audiences becomes a relatively easy task, requiring less effort and providing more flexibility for both the lecturers and future participants. One-day or two-day courses with focus specifically on the U.S. transport security requirements can be delivered, at locations away from Argonne, by one or two principal lecturers to targeted audiences such as regulators, shippers, carriers, state and local law enforcement personnel, and emergency responders. This paper will highlight the lessons learned in hosting previous one-week courses and discuss the development of options for detailed and/or customized courses/workshops for targeted key audiences.« less
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 2 2011-04-01 2011-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
Radiation exposure control from the application of nuclear gauges in the mining industry in Ghana.
Faanu, A; Darko, E O; Awudu, A R; Schandorf, C; Emi-Reynolds, G; Yeboah, J; Glover, E T; Kattah, V K
2010-05-01
The use of nuclear gauges for process control and elemental analysis in the mining industry in Ghana, West Africa, is wide spread and on the increase in recent times. The Ghana Radiation Protection Board regulates nuclear gauges through a system of notification and authorization by registration or licensing, inspection, and enforcement. Safety assessments for authorization and enforcement have been established to ensure the safety and security of radiation sources as well as protection of workers and the general public. Appropriate training of mine staff is part of the efforts to develop the necessary awareness about the safety and security of radiation sources. The knowledge and skills acquired will ensure the required protection and safety at the workplaces. Doses received by workers monitored over a period between 1998 and 2007 are well below the annual dose limit of 20 mSv recommended by the International Commission on Radiological Protection.
Security Concepts for Satellite Links
NASA Astrophysics Data System (ADS)
Tobehn, C.; Penné, B.; Rathje, R.; Weigl, A.; Gorecki, Ch.; Michalik, H.
2008-08-01
The high costs to develop, launch and maintain a satellite network makes protecting the assets imperative. Attacks may be passive such as eavesdropping on the payload data. More serious threat are active attacks that try to gain control of the satellite, which may lead to the total lost of the satellite asset. To counter these threats, new satellite and ground systems are using cryptographic technologies to provide a range of services: confidentiality, entity & message authentication, and data integrity. Additionally, key management cryptographic services are required to support these services. This paper describes the key points of current satellite control and operations, that are authentication of the access to the satellite TMTC link and encryption of security relevant TM/TC data. For payload data management the key points are multi-user ground station access and high data rates both requiring frequent updates and uploads of keys with the corresponding key management methods. For secure satellite management authentication & key negotiation algorithms as HMAC-RIPEMD160, EC- DSA and EC-DH are used. Encryption of data uses algorithms as IDEA, AES, Triple-DES, or other. A channel coding and encryption unit for payload data provides download data rates up to Nx250 Mbps. The presented concepts are based on our experience and heritage of the security systems for all German MOD satellite projects (SATCOMBw2, SAR-Lupe multi- satellite system and German-French SAR-Lupe-Helios- II systems inter-operability) as well as for further international (KOMPSAT-II Payload data link system) and ESA activities (TMTC security and GMES).
75 FR 75952 - U.S. Agency for International Mandatory Declassification Review Address
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-07
... Development. ACTION: Notice. SUMMARY: Pursuant to the Information Security Oversight Offices Classified National Security Information Directive No. 1, this notice provides the U.S. Agency for International... public in advising them where to send such requests for declassification review. FOR FURTHER INFORMATION...
Threats to security and ischaemic heart disease deaths: the case of homicides in Mexico.
Lee, Eileen H; Bruckner, Tim A
2017-02-01
Ischaemic heart disease (IHD) ranks as the leading cause of death worldwide. Whereas much attention focuses on behavioural and lifestyle factors, less research examines the role of acute, ambient stressors. An unprecedented rise in homicides in Mexico over the past decade and the attendant media coverage and publicity have raised international concern regarding its potential health sequelae. We hypothesize that the rise in homicides in Mexico acts as an ecological threat to security and elevates the risk of both transient ischaemic events and myocardial infarctions, thereby increasing IHD deaths. We applied time-series methods to monthly counts of IHD deaths and homicides in Mexico for 156 months spanning January 2000 to December 2012. Methods controlled for strong temporal patterns in IHD deaths, the unemployment rate and changes in the population size at risk. After controlling for trend and seasonality in IHD deaths, a 1-unit increase in the logged count of homicides coincides with a 7% increase in the odds of IHD death in that same month (95% confidence interval: 0.04 - 0.10). Inference remains robust to additional sensitivity checks, including a state-level fixed effects analysis. Our findings indicate that the elevated level of homicides in Mexico serves as a population-level stressor that acutely increases the risk of IHD death. This research adds to the growing literature documenting the role of ambient threats, or perceived threats, to security on cardiovascular health. © The Author 2016; all rights reserved. Published by Oxford University Press on behalf of the International Epidemiological Association
2011-05-04
Nations General Assembly. China looks to secure the support and votes of these African states to help influence international politics moving forward. 1S...support and votes of th~se African states to help influence international politics moving forward. . . Conclusion: China’s declaration of their... international focus with the recognition of a new advei·sary. The attack on the World Trade Center brought telTorism to the forefront of the natiohal security
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-04
... Industry Regulatory Authority, Inc.; International Securities Exchange LLC; The NASDAQ Stock Market LLC... Whether To Disapprove Proposed Rule Changes Relating to Trading Halts Due to Extraordinary Market.... (``FINRA''), International Securities Exchange LLC (``ISE''), The NASDAQ Stock Market LLC (``Nasdaq...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend Rule 604, Continuing Education for Registered Persons, and To Adopt a... proposing to amend Rule 604 to clarify the current continuing education requirements for registered persons...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-11
...-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Establish an Administrative Information Subscriber (AIS) and AIS Port...-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change The Exchange is...
Cost Comparison Among Provable Data Possession Schemes
2016-03-01
possession,” in Proceedings of the 11th International Conference on Ap- plied Cryptography and Network Security. Berlin, Heidelberg: Springer-Verlag, 2013...curves,” in Security and Cryptography (SECRYPT), 2013 International Conference on, July 2013, pp. 1–12. [19] R. S. Kumar and A. Saxena, “Data integrity
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Axcess International, Inc., Gamma Pharmaceuticals, Inc., Innovex, Inc, Knight Energy Corp., Komodo, Inc., Uphonia, Inc., and Wilson Brothers USA, Inc., Order of Suspension of Trading September 12, 2013. It appears to the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Fearless International, Inc., Glassmaster Company, Global Entertainment Holdings/Equities, Inc., Global Realty Development Corp., Global... concerning the securities of Global Entertainment Holdings/Equities, Inc. because it has not filed any...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... International Securities Exchange, LLC Amended and Restated Constitution January 28, 2013. Pursuant to Section... Restated Constitution \\3\\ (the ``Constitution'') to: (i) Declassify the Non- Industry Directors (including... Constitution requires, in part, that Non-Industry Directors (including the Public Directors) \\4\\ and Exchange...
Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds
Park, Woo-Sung; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-01-01
Objectives The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. Methods The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. Results With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. Conclusions The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS. PMID:21818429
Safety and security of radioactive sources in industrial radiography in Bangladesh
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mollah, A. S.; Nazrul, M. Abdullah
2013-07-01
Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less
Airport Remote Tower Sensor Systems
NASA Technical Reports Server (NTRS)
Maluf, David A.; Gawdiak, Yuri; Leidichj, Christopher; Papasin, Richard; Tran, Peter B.; Bass, Kevin
2006-01-01
Networks of video cameras, meteorological sensors, and ancillary electronic equipment are under development in collaboration among NASA Ames Research Center, the Federal Aviation Administration (FAA), and the National Oceanic Atmospheric Administration (NOAA). These networks are to be established at and near airports to provide real-time information on local weather conditions that affect aircraft approaches and landings. The prototype network is an airport-approach-zone camera system (AAZCS), which has been deployed at San Francisco International Airport (SFO) and San Carlos Airport (SQL). The AAZCS includes remotely controlled color video cameras located on top of SFO and SQL air-traffic control towers. The cameras are controlled by the NOAA Center Weather Service Unit located at the Oakland Air Route Traffic Control Center and are accessible via a secure Web site. The AAZCS cameras can be zoomed and can be panned and tilted to cover a field of view 220 wide. The NOAA observer can see the sky condition as it is changing, thereby making possible a real-time evaluation of the conditions along the approach zones of SFO and SQL. The next-generation network, denoted a remote tower sensor system (RTSS), will soon be deployed at the Half Moon Bay Airport and a version of it will eventually be deployed at Los Angeles International Airport. In addition to remote control of video cameras via secure Web links, the RTSS offers realtime weather observations, remote sensing, portability, and a capability for deployment at remote and uninhabited sites. The RTSS can be used at airports that lack control towers, as well as at major airport hubs, to provide synthetic augmentation of vision for both local and remote operations under what would otherwise be conditions of low or even zero visibility.
Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations
2014-08-26
America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal
Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.
Bernik, Igor; Prislan, Kaja
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 6 2013-04-01 2013-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 6 2014-04-01 2014-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 26 Internal Revenue 6 2012-04-01 2012-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 6 2011-04-01 2011-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
Strategy to Enhance International Supply Chain Security
2007-07-01
airports as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a... travel security issue. The assessment of a container ship’s crew or of a driver moving a truck into the secure area of a port are also supply chain...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pepper, Susan E.
2014-10-10
Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department contributes to the National Nuclear Security Administration Office of Nonproliferation and International Security Next Generation Safeguards Initiative (NGSI) through university engagement, safeguards internships, safeguards courses, professional development, recruitment, and other activities aimed at ensuring the next generation of international safeguards professionals is adequately prepared to support the U.S. safeguards mission. This report is a summary of BNL s work under the NGSI program in Fiscal Year 2014.
2001-07-01
and it (usu ally) takes the in put of ju niors to help a se nior strat e gist ar rive at his con clu sions. 3 Lieutenant General Richard Chilcoat...Major General Richard A. Chilcoat, Strategic Art: The New Discipline for 21st Century Leaders, Carlisle Barracks, PA: Strategic Studies Institute...beyond the scope of this chapter, Richard Betts’ insightful essay on the importance of strategic studies supports the notion that security studies is
The Use of Private Security by the United Kingdom and the Subsequent Impacts on Operational Planning
2014-05-22
2003 and 2008.4 The UK and US dominate the global market for private military companies.5 Therefore, scholarly research on the UK should help explain...provide a certain military skill applicable to the conduct of warfare. Deborah Avant, in her 2005 work The Market for Force : The Consequences of...International Security," International Security 26, no. 3 (Winter 2001-2002): 186. 14Deborah D. Avant, The Market for Force : The Consequences of Privatizing
2013-06-14
ever-evolving contemporary nature of external and internal threats to the safety and security of the American homeland, it becomes increasingly...Major Justin P. Hurt, 146 pages. With the ever-evolving contemporary nature of external and internal threats to the safety and security of the American...HAZMAT Hazardous Materials HRF Homeland Response Force HSPD Homeland Security Presidential Directive JFHQ Joint Force
Safety Versus Passenger Service: The Flight Attendants’ Dilemma
Damos, Diane L.; Boyett, Kimberly S.; Gibbs, Patt
2013-01-01
After 9/11, new security duties were instituted at many U.S. air carriers and existing safety and security duties received increased emphasis. Concurrently, in-flight services were changed and in many cases, cabin crews were reduced. This article examines the post-9/11 conflict between passenger service and the timely performance of safety and security duties at 1 major U.S. air carrier. In-flight data were obtained on both international and domestic flights. The data suggest that the prompt performance of the safety and security duties is adversely affected by the number of service duties occurring in the later part of both international and domestic flights. PMID:23667300
The DISAM Journal of International Security Assistance Management. Volume 23, Number 3, Summer 2001
2001-01-01
of subjects from enemy troop movements to control of an airborne armada. They enable commanders to cut through the fog of war and achieve decisive...and various engineers to begin the requirements definition and FMS acquisition process. The focus of the NAVAIDS Country Study Team is to: The DISAM...and recommendations process, and definitions are provided. The modernization recommendations of this report usually play an
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-09
... (50 U.S.C. 1701 et seq. (2000)) (``IEEPA''). Specifically, Lim conspired to illegally export wound... the Internal Security Act of 1950 (50 U.S.C. 783(b)), or section 38 of the Arms Export Control Act (22... Export Administration Act (50 U.S.C. app. Sec. Sec. 2401-2420 (2000)) (``EAA''). Since August 21, 2001...
Sustainable Development: A Strategy for Regaining Control of Northern Mali
2014-06-01
informal attempts to conduct evasive maneuvers to achieve desired end results. The Project for National Security Reform argued that at times “… end runs...recognizing the internal borders that France established in the early twentieth century . Still, Model II optimally assigns projects based on... Project Design 4. In the end , Model I allocated the projects while addressing the following supplemental research questions posed in chapters I and
Afghanistan: Post-Taliban Governance, Security, and U.S. Policy
2013-10-23
for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 23 OCT 2013 2...York closed, although Taliban representative Abdul Hakim Mujahid continued to operate informally .9 In March 2001, Administration officials received a ...Resolution 2096. Resolution 2096 reiterates the expanded UNAMA mandate, while noting that UNAMA and the international community are moving to a supporting
2011-03-09
effective oversight of federal government programs and policies. Over the years, certain material weaknesses in internal control over...ineffective process for preparing the consolidated financial statements. In addition to the material weaknesses underlying these major impediments, GAO...noted material weaknesses involving billions of dollars in improper payments, information security, and tax collection activities. With regard to the
Yemen: Background and U.S. Relations
2014-02-06
socio-economic problems. Congress and U.S. policymakers may be concerned with prospects for stabilizing Yemen and establishing strong bilateral...watchers suggest that security problems emanating from Yemen may persist in spite of increased U.S. or international efforts to combat them. Overall, the...by this Act for assistance for Yemen may be made available for the Armed Forces of Yemen if such forces are controlled by a foreign terrorist
Iraq: Post-Saddam Governance and Security
2009-02-05
defeated the Ottomans in World War I and took control of the territory in 1918 . Britain had tried to take Iraq from the Ottomans earlier in World War...World Factbook; State Department International Religions Freedom Report, September 2008; DOD Measuring Stability Report, December 2008; various press and...restrictions on the free exercise of religion (by religious minorities) to “terrorists, extremists, and criminal gangs,” while praising the Iraqi government
Iraq: Post-Saddam Governance and Security
2008-10-02
the Ottoman empire after British forces defeated the Ottomans in World War I and took control of the territory in 1918 . Britain had tried to take Iraq... Religions Freedom Report, September 2007; DOD Measuring Stability Report, September 2008. CRS-3 1 Bush, George H.W., and Brent Scowcroft. A World...politically. Similarly, the September 19, 2008 report on International Religious Freedom attributed restrictions on the free exercise of religion (by
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 3, March 2007
2007-03-01
Capability Maturity Model ® Integration (CMMI®). CMU Software Engineering Institute <www.sei.cmu.edu/cmmi>. 5. ISO /IEC 27001 :2005. Information Security...international standards bodies – International Organization for Standardi- zation ( ISO ) and International Electro- technical Commission (IEC) – are working on a...number of projects that affect soft- ware security: • The ISO Technical Management Board (TMB) performs strategic planning and coordination for ISO
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 18 2011-04-01 2011-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2013-04-01 2013-04-01 false Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2011-04-01 2009-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2012-04-01 2012-04-01 false Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2014-04-01 2013-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 26 Internal Revenue 18 2012-04-01 2012-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 18 2014-04-01 2014-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 18 2013-04-01 2013-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
Exploring the Future of Security in the Caribbean: a Regional Security Partnership?
2007-12-14
by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and
Assuring the privacy and security of transmitting sensitive electronic health information.
Peng, Charlie; Kesarinath, Gautam; Brinks, Tom; Young, James; Groves, David
2009-11-14
The interchange of electronic health records between healthcare providers and public health organizations has become an increasingly desirable tool in reducing healthcare costs, improving healthcare quality, and protecting population health. Assuring privacy and security in nationwide sharing of Electronic Health Records (EHR) in an environment such as GRID has become a top challenge and concern. The Centers for Disease Control and Prevention's (CDC) and The Science Application International Corporation (SAIC) have jointly conducted a proof of concept study to find and build a common secure and reliable messaging platform (the SRM Platform) to handle this challenge. The SRM Platform is built on the open standards of OASIS, World Wide Web Consortium (W3C) web-services standards, and Web Services Interoperability (WS-I) specifications to provide the secure transport of sensitive EHR or electronic medical records (EMR). Transmitted data may be in any digital form including text, data, and binary files, such as images. This paper identifies the business use cases, architecture, test results, and new connectivity options for disparate health networks among PHIN, NHIN, Grid, and others.
ERIC Educational Resources Information Center
Cachola, Ellen-Rae Cabebe
2014-01-01
This dissertation describes the International Women's Network Against Militarism's (IWNAM) political epistemology of security from an archival perspective, and how they create community archives to evidence this epistemology. This research examines records created by Women for Genuine Security (WGS) and Women's Voices Women Speak (WVWS), U.S. and…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-05
.... Introduction On May 21, 2012, the International Securities Exchange, LLC (``ISE'' or ``Exchange'') filed with... its Short Term Option Series Program (``STOS Program'') to permit, during the expiration week of an... open for trading Short Term Option Series at $0.50 strike price intervals for option classes that trade...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... methodology developed by NationsShares, a firm that develops proprietary derivatives-based indexes and options... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To List Options... the Exchange of options on the Nations VolDex index, a new index that measures changes in implied...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-22
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... at or under the threshold are charged the constituent's prescribed execution fee. This waiver applies... members to execute large-sized FX options orders on the Exchange in a manner that is cost effective. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Coastal Gulf and International, Inc. as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Coastal Gulf and...
Code of Federal Regulations, 2014 CFR
2014-01-01
... of significant financial stress appropriate to the security or category of securities. (5) An FDIC... significant financial stress used to calculate the FDIC-supervised institution's own internal estimates for... significant financial stress in the calculation of own internal estimates for haircuts. (7) An FDIC-supervised...
The Contribution of University Accommodation to International Student Security
ERIC Educational Resources Information Center
Paltridge, Toby; Mayson, Susan; Schapper, Jan
2010-01-01
In this paper we argue that living in university accommodation is a possible means of improving the security of international students. Our argument is supported by a qualitative case study of a single Hall of Residence on Monash University's Clayton campus. Data were collected primarily from interviews with three groups of participants--six…
26 CFR 1.1081-9 - Requirements with respect to order of Securities and Exchange Commission.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Securities and Exchange Commission must recite that the exchange, expenditure, investment, distribution, or... investment, the investment to be made, so as clearly to identify such property. (c) The exchange, acquisition... and Exchange Commission. 1.1081-9 Section 1.1081-9 Internal Revenue INTERNAL REVENUE SERVICE...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano Superlattice Technology, Inc.; Order of Suspension of... current and accurate information concerning the securities of BluePoint Linux Software Corp. because it...
Strategy for Peace. Annual U.S. Foreign Policy Conference (22nd, October 16-18, 1981).
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
Five discussion topics concerning peace were dealt with by conference participants, who included university faculty and officials from national and international agencies and organizations. The first topic, North-South relations and international security, considers U.S. security and the Third World, U.S. economic interests in the developing…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...
SEVIS: The Impact of Homeland Security on American Colleges and Universities
ERIC Educational Resources Information Center
Danley, Janet V.
2010-01-01
This chapter covers the impact of homeland security mandates on institutions and international students and scholars. The author traces the history of interest by the Immigration and Naturalization Service (INS) in developing a management system for international students and scholars that eventually resulted in the birth of Student and Exchange…
2016-06-08
Affairs June 8, 2016 Congressional Research Service 7-5700 www.crs.gov R43838 A Shift in the International Security Environment: Potential...Implications for Defense Congressional Research Service Summary World events have led some observers, starting in late 2013, to conclude that the...Defense Congressional Research Service Contents Introduction
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-09
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0066] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match 1305 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...
Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin
2018-01-01
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas. PMID:29379650
Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin
2018-01-01
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
NASA Astrophysics Data System (ADS)
Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz
2017-01-01
The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy levels are assigned in accordance with the CO-PO mapping. Finally, the course has to fulfill the International Engineering Alliance (IEA) Graduate Attributes of the Washington Accord.
Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis
NASA Astrophysics Data System (ADS)
Mesjasz, Czeslaw
The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.
International migration: security concerns and human rights standards.
Crépeau, François; Nakache, Delphine; Atak, Idil
2007-09-01
Over the last two decades, the reinforcement of security-related migration policies has resulted in the perception of the foreigner, and especially the irregular migrant, as a category outside the circle of legality. The rights of foreigners in host countries have deteriorated due to the connection made between immigration and criminality. Restrictions imposed upon irregular migrants' basic political and civil rights have been accompanied by major obstacles to their access to economic and social rights, including the right to health. The events of 9/11 further contributed to this trend, which contradicts the basic premises of the human rights paradigm. Recent policy developments and ongoing international cooperation implementing systematic interception and interdiction mechanisms have led to the securitization of migration. The preventive and deterrent measures reinforce the security paradigm. By contrast, various national and international actors have been successful in defending irregular migrants' rights. At the domestic level, the involvement of the judiciary and civil society enhances the rights-based approach to foreigners. The role of judges is vital in holding policy-makers accountable for respecting the high national standards of human rights protection. This article elaborates on the dichotomy between the state's legitimate interest to ensure national security, and its domestic and international obligations to protect human rights for all, including irregular migrants. It focuses on the changing relationship between migration and security, on the one hand, and between state and individual, on the other hand. It affirms the necessity to recognize the pre-eminence of fundamental rights upon security concerns.
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
The Role Of Moral Awareness In Computer Security
NASA Astrophysics Data System (ADS)
Stawinski, Arthur
1984-08-01
Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Iveson, Steven W.
Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards aremore » designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.« less
Husain, Muhammad J.; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira
2017-01-01
Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response. PMID:29155655
Kostova, Deliana; Husain, Muhammad J; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira
2017-12-01
Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response.
Code of Federal Regulations, 2011 CFR
2011-04-01
... who is responsible for implementation and oversight of information security programs and procedures... complaints regarding all elements of the information security program shall be directed to the Director of... UNITED STATES INTERNATIONAL TRADE COMMISSION GENERAL RULES OF GENERAL APPLICATION National Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
...] Index and other specified exchange traded products.\\5\\ \\3\\ See ISE Rule 2100(c)(13). \\4\\ See Securities... that this threshold differentiation is appropriate because lower priced securities tend to be more...
Code of Federal Regulations, 2011 CFR
2011-04-01
... than U.S. Generally Accepted Accounting Principles or International Financial Reporting Standards as... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Financial statements of... FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934, PUBLIC UTILITY...
ERIC Educational Resources Information Center
Davies, Patrick T.; Forman, Evan M.; Rasi, Jennifer A.; Stevens, Kristopher I.
2002-01-01
Evaluated new self-report measure assessing children's strategies for preserving emotional security in context of interparental conflict. Factor analyses of the Security in the Interparental Subsystem (SIS) Scale supported a 7-factor solution. The SIS demonstrated satisfactory internal consistency and test-retest reliability. Support for test…
Environmental Security: Evolution of a New Concept in Security Studies
1999-04-01
vi ENVIRONMENTAL IMPACT OF POPULATION...1970�s. Environmental security and its direct impact on national and international security has not gone unnoticed by our nation�s leaders. Former...understanding of the �where and under what circumstances� environmental degradation, scarcity, and conflict occur and how they will impact U.S. environmental
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-14
... underlying securities is not open for business. The Exchange believes that the proposed changes will allow... business however that security is being traded elsewhere. For example, if the primary market is unable to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70834; File No. SR-ISE-2013-55] Self-Regulatory...
ERIC Educational Resources Information Center
Tananuraksakul, Noparat; Hall, David
2011-01-01
This article explores non-native English-speaking students' emotional security and dignity responses to their English language proficiency in an Australian context. Confidence is a source of emotional security bolstering dignity. Without it, students lack emotional security, diminishing their dignity when communicating with culturally different…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-04
... clarify that 2102(e) applies to trading halts in new derivative securities, so as to not be confused with... derivative securities products when a temporary interruption occurs in the calculation or wide dissemination... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65425; File No. SR-ISE-2011-61] Self-Regulatory...
26 CFR 2.1-8 - Investment of funds in securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 14 2010-04-01 2010-04-01 false Investment of funds in securities. 2.1-8... (CONTINUED) MARITIME CONSTRUCTION RESERVE FUND § 2.1-8 Investment of funds in securities. (a) Obligations of... securities which are not legal for investment of trust funds. Whenever the Administration approves the...
26 CFR 2.1-8 - Investment of funds in securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 14 2011-04-01 2010-04-01 true Investment of funds in securities. 2.1-8 Section... (CONTINUED) MARITIME CONSTRUCTION RESERVE FUND § 2.1-8 Investment of funds in securities. (a) Obligations of... securities which are not legal for investment of trust funds. Whenever the Administration approves the...
Kempker, Samantha M; Schmidt, Adam T; Espinosa, Erin M
2017-07-01
Justice-involved youth have high rates of psychiatric diagnoses, and these youth are often placed out-of-home, although evidence identifies several negative implications of juvenile confinement, especially for youth with psychopathology. Furthermore, youth in the justice system may be processed differently based on gender. As males and females tend to manifest symptoms differently, the psychopathology of youth may act to moderate the relationship between gender and placement in the juvenile justice system. The present study used a large, diverse sample (n = 9 851, 19.8 % female) to examine whether youth placed in various types of out-of-home facilities differed in terms of externalizing, internalizing, substance use, or comorbid disorders, and to determine the predictive value of mental health diagnoses in placement decisions. The moderation effect of psychopathology and substance use on the relationship between gender and placement also was explored. The results indicated that each type of disorder differed across placements, with internalizing being most prevalent in non-secure, and externalizing, comorbid, and substance use being most prevalent in secure settings. Mental health diagnoses improved the prediction of placement in each out-of-home placement beyond legal and demographic factors such that externalizing and substance use disorders decreased the likelihood of placement in non-secure settings, and internalizing, externalizing, and substance use disorders increased the likelihood of placement in secure and state-secure facilities. The relationship between internalizing pathology and placement in more secure facilities was moderated by externalizing pathology. The relationship between gender and placement was significantly moderated by mental health such that females with mental health diagnoses receive less secure placements. Implications for policymakers and practitioners are discussed, as well as implications for reforming juvenile justice within a developmental approach.
2000-01-24
Security Administration ( DTSA ). d. Reporting requirements (1) General. Army organizations with security assistance responsibility for ad- ministering...by the Department of State (DOS) and the Director, Defense Technology Security Administration ( DTSA ). The term “munitions case” includes in its scope...also formulate the Army position for ARSTAF coordination before responding to Defense Technology Security Agency ( DTSA ). AR 12-1 • 24 January 2000
Joint Logistics Commanders Guide for the Management of Multinational Program,
1981-07-01
purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Along Mobile Technologies, Inc., and China Yingxia International, Inc., Order of Suspension of Trading February 2, 2012. It... concerning the securities of Along Mobile Technologies, Inc. because it has not filed any periodic reports...
ERIC Educational Resources Information Center
Newland, Lisa A.; Coyl, Diana D.; Freeman, Harry
2008-01-01
Associations between preschoolers' attachment security, fathers' involvement (i.e. parenting behaviors and consistency) and fathering context (i.e. fathers' internal working models (IWMs) and use of social support) were examined in a subsample of 102 fathers, taken from a larger sample of 235 culturally diverse US families. The authors predicted…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-26
... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To List and... ``Commission'') authorized ISE to list and trade options on the SPDR Gold Trust,\\3\\ the iShares COMEX Gold... Exchange proposes to list and trade options on the ETFS Palladium Trust and the ETFS Platinum Trust. \\3...