The effects of prompting and reinforcement on safe behavior of bicycle and motorcycle riders.
Okinaka, Takeru; Shimazaki, Tsuneo
2011-01-01
A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was effective at increasing safe behavior exhibited by bicycle and motorcycle riders. No differences were observed between vehicle type or gender with regard to engagement in safe behavior.
Stockpile stewardship past, present, and future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adams, Marvin L., E-mail: mladams@tamu.edu
2014-05-09
The U.S. National Academies released a report in 2012 on technical issues related to the Comprehensive Test Ban Treaty. One important question addressed therein is whether the U.S. could maintain a safe, secure, and reliable nuclear-weapons stockpile in the absence of nuclear-explosion testing. Here we discuss two main conclusions from the 2012 Academies report, which we paraphrase as follows: 1) Provided that sufficient resources and a national commitment to stockpile stewardship are in place, the U.S. has the technical capabilities to maintain a safe, secure, and reliable stockpile of nuclear weapons into the foreseeable future without nuclear-explosion testing. 2) Doingmore » this would require: a) a strong weapons science and engineering program that addresses gaps in understanding; b) an outstanding workforce that applies deep and broad weapons expertise to deliver solutions to stockpile problems; c) a vigorous, stable surveillance program that delivers the requisite data; d) production facilities that meet stewardship needs. We emphasize that these conclusions are independent of CTBT ratification-they apply provided only that the U.S. continues its nuclear-explosion moratorium.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-16
... international cargo shipping; Respondent Njoroge Muhia is Chief Executive Officer for African Shipping... containers and chassis to Mombasa Kenya, violated Section 10(d)(1) of the Shipping Act, 46 U.S.C. 41102(c), by ``failing to ensure that Ms. Barbara[`s] (sic) container was delivered safely, securely and on...
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.
Sackner-Bernstein, Jonathan
2017-03-01
The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.
Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford
2015-04-01
While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less
Climate change and sustainable food production.
Smith, Pete; Gregory, Peter J
2013-02-01
One of the greatest challenges we face in the twenty-first century is to sustainably feed nine to ten billion people by 2050 while at the same time reducing environmental impact (e.g. greenhouse gas (GHG) emissions, biodiversity loss, land use change and loss of ecosystem services). To this end, food security must be delivered. According to the United Nations definition, 'food security exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life'. At the same time as delivering food security, we must also reduce the environmental impact of food production. Future climate change will make an impact upon food production. On the other hand, agriculture contributes up to about 30% of the anthropogenic GHG emissions that drive climate change. The aim of this review is to outline some of the likely impacts of climate change on agriculture, the mitigation measures available within agriculture to reduce GHG emissions and outlines the very significant challenge of feeding nine to ten billion people sustainably under a future climate, with reduced emissions of GHG. Each challenge is in itself enormous, requiring solutions that co-deliver on all aspects. We conclude that the status quo is not an option, and tinkering with the current production systems is unlikely to deliver the food and ecosystems services we need in the future; radical changes in production and consumption are likely to be required over the coming decades.
Effective coordination and communication between the Department of Energy (DOE) and the Department of Defense (DoD) is necessary to ensure that the... nuclear weapons stockpile remains safe, secure, and effective without nuclear testing. The science-based Stockpile Sustainment Program (SSP) is the...method used to sustain and maintain the nuclear stockpile throughout the weapons life cycle. A comprehensive review was conducted of the joint
Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety
Sackner-Bernstein, Jonathan
2017-01-01
Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161
Remote secure observing for the Faulkes Telescopes
NASA Astrophysics Data System (ADS)
Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea
2004-09-01
Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.
Used fuel extended storage security and safeguards by design roadmap
DOE Office of Scientific and Technical Information (OSTI.GOV)
Durbin, Samuel G.; Lindgren, Eric Richard; Jones, Robert
2016-05-01
In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. Amore » set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
NASA Technical Reports Server (NTRS)
Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre
2003-01-01
This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.
Peace Operations in Mali: Theory into Practice Then Measuring Effectiveness
2017-06-09
community’s response along two broad lines of effort (LOE): Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a... Safe and Secure Environment , two objectives were measured. Objective #1 sought the Cessation of Large Scale Violence. Success was attained, as...Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a Safe and Secure Environment , two objectives were
SLIGHTLY IRRADIATED FUEL (SIF) INTERIM DISPOSITION PROJECT
DOE Office of Scientific and Technical Information (OSTI.GOV)
NORTON SH
2010-02-23
CH2M HILL Plateau Remediation Company (CH2M HILL PRC) is proud to submit the Slightly Irradiated Fuel (SIF) Interim Disposition Project for consideration by the Project Management Institute as Project of the Year for 2010. The SIF Project was a set of six interrelated sub-projects that delivered unique stand-alone outcomes, which, when integrated, provided a comprehensive and compliant system for storing high risk special nuclear materials. The scope of the six sub-projects included the design, construction, testing, and turnover of the facilities and equipment, which would provide safe, secure, and compliant Special Nuclear Material (SNM) storage capabilities for the SIF material.more » The project encompassed a broad range of activities, including the following: Five buildings/structures removed, relocated, or built; Two buildings renovated; Structural barriers, fencing, and heavy gates installed; New roadways and parking lots built; Multiple detection and assessment systems installed; New and expanded communication systems developed; Multimedia recording devices added; and A new control room to monitor all materials and systems built. Project challenges were numerous and included the following: An aggressive 17-month schedule to support the high-profile Plutonium Finishing Plant (PFP) decommissioning; Company/contractor changeovers that affected each and every project team member; Project requirements that continually evolved during design and construction due to the performance- and outcome-based nature ofthe security objectives; and Restrictions imposed on all communications due to the sensitive nature of the projects In spite of the significant challenges, the project was delivered on schedule and $2 million under budget, which became a special source of pride that bonded the team. For years, the SIF had been stored at the central Hanford PFP. Because of the weapons-grade piutonium produced and stored there, the PFP had some of the tightest security on the Hanford nuclear reservation. Workers had to pass through metal detectors when they arrived at the plant and materials leaving the plant had to be scanned for security reasons. Whereas other high-security nuclear materials were shipped from the PFP to Savannah River, S.C. as part ofa Department of Energy (DOE) program to consolidate weapons-grade plutonium, it was determined that the SIF should remain onsite pending disposition to a national repository. Nevertheless, the SIF still requires a high level of security that the PFP complex has always provided. With the 60-year PFP mission of producing and storing plutonium concluded, the environmental cleanup plans for Hanford call for the demolition of the 63-building PFP complex. Consequently, if the SIF remained at PFP it not only would have interfered with the environmental cleanup plans, but would have required $100 million in facility upgrades to meet increased national security requirements imposed after the 9/11 terrorist attacks. A new smaller and more cost-effective area was needed to store this material, which led to the SIF Project. Once the SIF project was successfully completed and the SIF was safely removed from PFP, the existing Protected Area at PFP could be removed, and demolition could proceed more quickly without being encumbered by restrictive security requirements that an active Protected Area requires. The lightened PFP security level brought by safely removing and storing the SIF would also yield lowered costs for deactivation and demolition, as well as reduce overall life-cycle costs.« less
ASIS healthcare security benchmarking study.
2001-01-01
Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.
31 CFR 375.15 - Who is responsible for delivering securities?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...
31 CFR 375.15 - Who is responsible for delivering securities?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...
31 CFR 375.15 - Who is responsible for delivering securities?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...
31 CFR 375.15 - Who is responsible for delivering securities?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...
31 CFR 375.15 - Who is responsible for delivering securities?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Who is responsible for delivering securities? 375.15 Section 375.15 Money and Finance: Treasury Regulations Relating to Money and Finance....23.) All securities you deliver must be free and clear of all liens, charges, claims, and any other...
Kobleder, Andrea; Mayer, Hanna; Senn, Beate
2017-02-01
To explore the experiences of women with vulvar neoplasia with care delivered by an Advanced Practice Nurse. Women with vulvar neoplasia suffer from a high number of symptoms and report a lack of information and support by health care professionals. Further, talking about their disease, which is still a social taboo, is difficult for them. From approaches for other patients, it can be suggested that support from an Advanced Practice Nurse can be helpful. For Advanced Practice Nurse development, implementation and evaluation, it is important to assess patients' perceptions. But so far, little is known about how patients with vulvar neoplasia experience support of an Advanced Practice Nurse. A qualitative interview study was chosen to gain understanding of the experience of women with vulvar neoplasia who received care delivered by an Advanced Practice Nurse. Narrative interviews were conducted with a purposive sample of 13 women with vulvar neoplasia after they received care from an Advanced Practice Nurse for six months. Thematic analysis was used to analyse the data from the interviews. Four main themes could be identified: a trusting relationship; accessibility; feeling safe and secure; and feeling someone is there for you. Women felt more secure and less alone in the experience of their illness through having the possibility of contacting an Advanced Practice Nurse and getting sufficient information and psychosocial support. Women with vulvar neoplasia experienced care delivered by an Advanced Practice Nurse as 'feeling someone is there for you'. Due to the localisation of the disease and the associated social taboo, psychosocial support from the Advanced Practice Nurse beyond months after surgery was very important for them. Addressing psychosocial needs in caring for women with vulvar neoplasia must be given greater attention in clinical practice. Further, continuous nursing support delivered by an Advanced Practice Nurse beyond the acute treatment phase can be recommended. © 2016 John Wiley & Sons Ltd.
17 CFR 301.300b - Form 300-B, for report of all fails to deliver.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 300-B, for report of all fails to deliver. 301.300b Section 301.300b Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) Schedule A to Part 285 FORMS, SECURITIES INVESTOR PROTECTION CORPORATION Forms for...
Georgiou, Andrew; Magrabi, Farah; Hypponen, Hannele; Wong, Zoie Shui-Yee; Nykänen, Pirkko; Scott, Philip J; Ammenwerth, Elske; Rigby, Michael
2018-04-22
The paper draws attention to: i) key considerations involving the confidentiality, privacy, and security of shared data; and ii) the requirements needed to build collaborative arrangements encompassing all stakeholders with the goal of ensuring safe, secure, and quality use of shared data. A narrative review of existing research and policy approaches along with expert perspectives drawn from the International Medical Informatics Association (IMIA) Working Group on Technology Assessment and Quality Development in Health Care and the European Federation for Medical Informatics (EFMI) Working Group for Assessment of Health Information Systems. The technological ability to merge, link, re-use, and exchange data has outpaced the establishment of policies, procedures, and processes to monitor the ethics and legality of shared use of data. Questions remain about how to guarantee the security of shared data, and how to establish and maintain public trust across large-scale shared data enterprises. This paper identifies the importance of data governance frameworks (incorporating engagement with all stakeholders) to underpin the management of the ethics and legality of shared data use. The paper also provides some key considerations for the establishment of national approaches and measures to monitor compliance with best practice. Data sharing endeavours can help to underpin new collaborative models of health care which provide shared information, engagement, and accountability amongst all stakeholders. We believe that commitment to rigorous evaluation and stakeholder engagement will be critical to delivering health data benefits and the establishment of collaborative models of health care into the future. Georg Thieme Verlag KG Stuttgart.
Strategies for Countering Terrorist Safe Havens
2014-02-20
within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to...leadership targeting within safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case ...surrogate forces and pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case
ERIC Educational Resources Information Center
St. Lifer, Evan
1994-01-01
Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…
Detection and Prevention of Insider Threats in Database Driven Web Services
NASA Astrophysics Data System (ADS)
Chumash, Tzvi; Yao, Danfeng
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider both insider and outsider attacks in the third-party web hosting scenarios. We present SafeWS, a modular solution that is inserted between server side scripts and databases in order to prevent and detect website hijacking and unauthorized access to stored data. To achieve the required security, SafeWS utilizes a combination of lightweight cryptographic integrity and encryption tools, software engineering techniques, and security data management principles. We also describe our implementation of SafeWS and its evaluation. The performance analysis of our prototype shows the overhead introduced by security verification is small. SafeWS will allow business owners to significantly reduce the security risks and vulnerabilities of outsourcing their sensitive customer data to third-party providers.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-07
... steel, fire and water resistant storage chests, gun safes, security safes, portable security safes, cash..., touchpads, plastic gun racks, keypad assemblies, panel lock assemblies, door backs, plastic trays, drawers..., wood gun shelf racks, cable assemblies, communication cables, gasket kits, door springs, metal handles...
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)
2003-01-01
The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.
NASA Astrophysics Data System (ADS)
Scorer, A. G.
1998-09-01
This paper covers the wide area and short range locational technologies that are available for vehicle tracking in particular and mobile user security in general. It also summarises the radio communications services that can deliver information to the user. It considers the use that can be made of these technologies, when combined with procedures for delivering a response, in the security field, notably in relation to personal security, high-value load protection and the after-theft tracking markets.
The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm
2017-03-01
and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201
17 CFR 301.300b - Form 300-B, for report of all fails to deliver.
Code of Federal Regulations, 2012 CFR
2012-04-01
... fails to deliver. 301.300b Section 301.300b Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Closeout Or Completion of Open Contractual Commitments § 301.300b Form 300-B, for report of all fails to... form shall be used to report all the fails to deliver, as defined by § 300.300(b) of this chapter, that...
17 CFR 301.300b - Form 300-B, for report of all fails to deliver.
Code of Federal Regulations, 2011 CFR
2011-04-01
... fails to deliver. 301.300b Section 301.300b Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Closeout Or Completion of Open Contractual Commitments § 301.300b Form 300-B, for report of all fails to... form shall be used to report all the fails to deliver, as defined by § 300.300(b) of this chapter, that...
17 CFR 301.300b - Form 300-B, for report of all fails to deliver.
Code of Federal Regulations, 2014 CFR
2014-04-01
... fails to deliver. 301.300b Section 301.300b Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Closeout Or Completion of Open Contractual Commitments § 301.300b Form 300-B, for report of all fails to... form shall be used to report all the fails to deliver, as defined by § 300.300(b) of this chapter, that...
17 CFR 301.300b - Form 300-B, for report of all fails to deliver.
Code of Federal Regulations, 2013 CFR
2013-04-01
... fails to deliver. 301.300b Section 301.300b Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Closeout Or Completion of Open Contractual Commitments § 301.300b Form 300-B, for report of all fails to... form shall be used to report all the fails to deliver, as defined by § 300.300(b) of this chapter, that...
C-SAFE: A Computer-Delivered Sexual Health Promotion Program for Latinas.
Klein, Charles H; Kuhn, Tamara; Altamirano, Midori; Lomonaco, Carmela
2017-07-01
This article describes the development and evaluation of C-SAFE (Sexual Awareness for Everyone), a computer-delivered sexual health promotion program for Latinas. We first describe the process of adapting an evidence-based, group-level intervention into an individually administered computer-delivered program. We then present the methods and results of a randomized control trial with 321 Latinas in California and Florida to test C-SAFE's preliminary efficacy in reducing sexual health risk. We found no statistically significant differences between the two conditions at a six-month follow-up in terms of sexual behaviors or attitudes toward sexually transmitted infections and condoms, although C-SAFE women reported fewer days in the past month when their mental health was not good (p = .02). C-SAFE condition women also reported more satisfaction than control condition women in their assessment of information presentation (on a scale of 1 = poor and 5 = excellent; C-SAFE = 4.45 vs. control = 4.25, p = .053) and having learned something new (C-SAFE = 95.1% vs. control = 79.3%, χ 2 < 0.001), with utility of content for Latinas approaching significance (C-SAFE = 4.50 vs. control = 4.31, p = .058). In conclusion we discuss the importance of teachable moments, matching of delivery modalities to implementation contexts, and possible directions for evidence-based sexual health promotion programs given the current sexual health landscape.
Strategies for Countering Terrorist Safe Havens
2013-12-01
tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine these strategies...safe havens, tactical containment, pseudo operations, and surrogate security forces. The thesis draws from four historical case studies to examine...pseudo operations—provide viable potential options for USSOF to counter the complex problem of safe havens. Overall, the case studies will demonstrate
Williams, J.V.
1984-04-26
Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.
stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure
Safe teleradiology: information assurance as project planning methodology
NASA Astrophysics Data System (ADS)
Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2003-05-01
This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the general conditions as well as establishes specific policies and procedures for reliable performance of health information assurance.
(Congressional Interest) Network Information and Space Security Center
2011-09-30
Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of
Eye safe high power laser diode in the 1410-1550nm range
NASA Astrophysics Data System (ADS)
Boucart, Julien; de Largy, Brian; Kearley, Mark; Lichtenstein, Norbert
2010-02-01
The demand for high power lasers emitting in the 14xx-15xxnm range is growing for applications in fields such as medical or homeland security. We demonstrate high power laser diodes with emission at 1430, 1470 and 1560 nm. Single multimode emitters at 1470nm emit about 3.5W in CW operation. Power conversion efficiency can reach values as high as 38.5%. With this base material, single and multi-emitter fiber coupled modules are built. Additionally, bars on passive and microchannel coolers are fabricated that deliver 25W and 38W respectively in CW mode, while obtaining more than 80 W in pulsed mode. All reliability tests show an outstanding stability of the material with no signs of wearout after 3750 hrs under strong acceleration conditions.
Ch. 7: Food Safety, Nutrition, and Distribution
USDA-ARS?s Scientific Manuscript database
A safe and nutritious food supply is a vital component of food security. Food security, in a public health context, can be summarized as permanent access to a sufficient, safe, and nutritious food supply needed to maintain an active and healthy lifestyle. The impacts of climate change on food produc...
78 FR 27392 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... Office (AMSO) provides a safe, secure, healthy, and functional workplace environment for CDC staff by... provides the tools needed for workers to be safe, work in a healthy environment, and ensures environmental... Office of Security and Emergency Preparedness (CAJJ); Office of Safety, Health and Environment (CAJP...
ERIC Educational Resources Information Center
De Patta, Joe
2003-01-01
Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…
[Anti-counterfeit activities of pharmaceutical companies in Japan: for patient safety].
Shofuda, Ken-ichi; Aragane, Katsumi; Igari, Yasutaka; Matsumoto, Kinya; Ito, Kazuya
2014-01-01
Global spread of counterfeit medicines is an imminent threat for the patients' safety. Although major targets of counterfeits are still erectile dysfunction (ED) drugs in the industrialized countries, including Japan, anti-cancer agents and some medicines for metabolic syndromes are also being counterfeited and circulated to the market mainly through the Internet. Due to the global expansion of the business, pharmaceutical companies based in Japan are suffering from the damage of counterfeits, illegal sales including diversion, and thefts, which have never been experienced in the conventional domestic market. We, pharmaceutical companies, must be responsible for the prevention of the prevalence because our mission is to deliver effective and safe medicine to patients. For this end, we are taking necessary actions including, 1. Forestalling counterfeit, falsification and illicit trade: Measures to prevent counterfeiting are taken by introducing anti-counterfeit technologies to the packaging and tablets on a risk basis. It is also important to establish supply chain security on a global scale. 2. Finding out counterfeits and cooperating crackdown: We are conducting market and internet surveillances when high risk products are sold in high risk markets. The outcome of the criminal investigation is reported to authorities and police if necessary. 3. Conducting educational campaign to medical staff or patients: For example, four companies which manufacture and sell ED drug in Japan are collaboratively continuing activities to raise the awareness of the danger of Internet purchase. To deliver effective and safe medicines stably and globally, pharmaceutical companies extend comprehensive measures against counterfeit and illicit trading.
Sandia National Laboratories: About Sandia: Leadership
Working With Sandia Working With Sandia Prospective Suppliers What Sandia Looks For In Our Suppliers What provides leadership and management direction for the safe, secure execution of all Sandia missions. View implement the Labs Director's strategic vision for safe, secure operations at Sandia. View full biography
Code of Federal Regulations, 2010 CFR
2010-04-01
... interdealer broker means an entity engaged exclusively in business as a broker that effects, on an initially... business day and offset by government securities failed to deliver of the same issue and quantity. In no... same government securities failed-to-deliver contract for more than one business day. A government...
Ramirez, Marizen; Yang, Jingzhen; Young, Tracy; Roth, Lisa; Garinger, Anne; Snetselaar, Linda; Peek-Asa, Corinne
2013-08-01
Parents play a fundamental role in teaching their children safe driving skills to reduce risk of motor vehicle crashes, the leading cause of death for teens. Steering Teens Safe is a new parent-based intervention that equips parents with communication skills to talk about, demonstrate, and practice safe driving behaviors and skills with their teens. This implementation evaluation focuses on a sample of 83 parents who delivered Steering Teens Safe to their teens. One-, 2- and 3-month follow-up assessments were conducted with intervention parents to evaluate the self-reported quantity and quality of talking about, demonstrating, and practicing safe driving goals with teens; perceived success and benefit of the program; and barriers to implementation. Over 3 months of follow-up, parents discussed driving goals with their teens for a median of 101.5 minutes. The most frequently addressed topics were general safety principles, including distracted driving, driving in bad weather, wearing a seat belt, and being a safe passenger. Parents spent a median of 30 minutes practicing safe driving skills such as changing lanes. Sixty-seven percent of parents talked to their children about rural road safety, but just 36% demonstrated and half practiced these skills with their teens. Barriers to implementation include time and opportunity barriers and resistant attitudes of their teens. However, barriers neither affected frequency of engagement nor parents' perceived benefit and comfort in delivering the program. Parents with time/opportunity barriers also had higher practice and demonstration times than parents without these barriers. Findings indicate high acceptability among parent implementers and promise for real-world delivery. Future studies are needed to assess intervention impact.
Safe and Secure Schools Assessment. Public School Information. Legislative Report, 2008
ERIC Educational Resources Information Center
Idaho State Department of Education, 2008
2008-01-01
As a result of high profile shootings and critical incidents in schools on a national level, combined with the lack of a cohesive, standardized approach to safety and security in Idaho Schools, Superintendent Tom Luna requested an appropriation to address this issue and the Legislature allocated 5150.000 in FY 2008 for the Safe and Secure…
Early Arrival or Trespassing? Leadership, School Security, and the Right to the School
ERIC Educational Resources Information Center
Irby, Decoteau J.; Thomas, Christopher
2013-01-01
School leaders are under constant pressure to ensure that schools are safe and to demonstrate that student safety and discipline are priorities. In many districts, schools rely on local law enforcement, school police, or security personnel to assist with promoting and maintaining safe schools. To encourage school leaders to think critically about…
White, Peta E; Otago, Leonie; Saunders, Natalie; Romiti, Maria; Donaldson, Alex; Ullah, Shahid; Finch, Caroline F
2014-03-01
Coaches play a major role in encouraging and ensuring that participants of their teams adopt appropriate safety practices. However, the extent to which the coaches undertake this role will depend upon their attitudes about injury prevention, their perceptions of what the other coaches usually do and their own beliefs about how much control they have in delivering such programmes. Fifty-one junior netball coaches were surveyed about incorporating the teaching of correct (safe) landing technique during their delivery of training sessions to junior players. Overall, >94% of coaches had strongly positive attitudes towards teaching correct landing technique and >80% had strongly positive perceptions of their own control over delivering such programmes. Coaches' ratings of social norms relating to what others think about teaching safe landing were more positive (>94%) than those relating to what others actually do (63-74%). In conclusion, the junior coaches were generally receptive towards delivering safe landing training programmes in the training sessions they led. Future coach education could include role modelling by prominent coaches so that more community-level coaches are aware that this is a behaviour that many coaches can, and do, engage in.
ERIC Educational Resources Information Center
Ramirez, Marizen; Yang, Jingzhen; Young, Tracy; Roth, Lisa; Garinger, Anne; Snetselaar, Linda; Peek-Asa, Corinne
2013-01-01
Parents play a fundamental role in teaching their children safe driving skills to reduce risk of motor vehicle crashes, the leading cause of death for teens. "Steering Teens Safe" is a new parent-based intervention that equips parents with communication skills to talk about, demonstrate, and practice safe driving behaviors and skills…
Liu, Xudong; Guo, Qing; Zhang, Yuchao; Li, Jinquan; Li, Rui; Wu, Yang; Ma, Ping; Yang, Xu
2016-01-01
Given the extensive application of carbon nanotubes (CNTs) in biomedical fields, there is increasing concern regarding unintentional health impacts. Research into safe usage is therefore increasingly necessary. This study investigated the responses of the mouse brain to single-walled CNTs (SWCNTs) delivered via intraperitoneal (IP) injection and compared these results with the previous study where SWCNTs were delivered via intravenous (IV) injection so as to explore which administration route is potentially better for SWCNTs application. This study suggests SWCNTs delivered via IP injection can have negative effects on the mouse brain through oxidative stress and inflammation at high concentration exposure, but these responses were not consistent and showed no dose-dependent effect. In a previous study, the results showed that IV-delivered SWCNTs induced a more consistent and dose-dependent effect. The comparison of the 2 studies suggested that using SWCNTs at a safe dosage delivered via IV injection may be a better administration route for SWCNTs in biomedical applications.
DOT National Transportation Integrated Search
2001-09-20
A safe and secure civil aviation system is a critical component of the nation's overall security, physical infrastructure, and economic foundation. Billions of dollars and a myriad of programs and policies have been devoted to achieving such a system...
ERIC Educational Resources Information Center
Tanner-Smith, Emily E.; Fisher, Benjamin W.
2015-01-01
Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…
Arkansas People Participating in Lead Education (APPLE): results of a lead-safe training program.
Ferguson, Alesia; Bursac, Zoran; Kern, David F
2011-06-01
Lead is still seen as one of the most harmful environmental toxins for young children, with the predominant source being deteriorating lead-based paint. Those at continued risk include those living in homes built before 1978, renovators and remodelers, and especially those with limited access to proper healthcare and diets. Proper training on lead-safe work practices focused on preventing and reducing the spread of lead dust can help reduce lead exposure. Presented in this paper are experiences in delivering lead-safe work practices training in six Arkansas cities, and results from pre- and post- surveys delivered before and immediately after the training. Pre- and post-surveys assess strong and weak areas of training. Participants demonstrated positive shifts in attitude and behavior towards lead-safe work practices following training. However, our research found that more emphasis should be focused on clarifying current lead exposure sources and routes for children.
Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.
Keys, Yolanda; Stichler, Jaynelle F
Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-03
...] Draft Guidance for Industry and Food and Drug Administration Staff; Glass Syringes for Delivering Drug... and FDA staff entitled ``Glass Syringes for Delivering Drug and Biological Products: Technical... supplemental data are necessary for FDA to ensure the safe and effective use of glass syringes that comply with...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
33 CFR 62.27 - Safe water marks.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-30
... Parts 30 and 3400 SAFE Mortgage Licensing Act: Minimum Licensing Standards and Oversight... No. FR-5271-F-03] RIN 2502-A170 SAFE Mortgage Licensing Act: Minimum Licensing Standards and... pursuant to the Secure and Fair Enforcement Mortgage Licensing Act of 2008 (SAFE Act or Act), to ensure...
12 CFR 1.5 - Safe and sound banking practices; credit information required.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Safe and sound banking practices; credit... TREASURY INVESTMENT SECURITIES § 1.5 Safe and sound banking practices; credit information required. (a) A national bank shall adhere to safe and sound banking practices and the specific requirements of this part...
Systems and methods for harvesting and storing materials produced in a nuclear reactor
Heinold, Mark R.; Dayal, Yogeshwar; Brittingham, Martin W.
2016-04-05
Systems produce desired isotopes through irradiation in nuclear reactor instrumentation tubes and deposit the same in a robust facility for immediate shipping, handling, and/or consumption. Irradiation targets are inserted and removed through inaccessible areas without plant shutdown and placed in the harvesting facility, such as a plurality of sealable and shipping-safe casks and/or canisters. Systems may connect various structures in a sealed manner to avoid release of dangerous or unwanted matter throughout the nuclear plant, and/or systems may also automatically decontaminate materials to be released. Useable casks or canisters can include plural barriers for containment that are temporarily and selectively removable with specially-configured paths inserted therein. Penetrations in the facilities may limit waste or pneumatic gas escape and allow the same to be removed from the systems without over-pressurization or leakage. Methods include processing irradiation targets through such systems and securely delivering them in such harvesting facilities.
Report: Information Security Series: Security Practices Safe Drinking Water Information System
Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.
49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Training and knowledge for individuals with... SECURITY INDIRECT AIR CARRIER SECURITY § 1548.11 Training and knowledge for individuals with security... accept, handle, transport, or deliver cargo have knowledge of the— (1) Applicable provisions of this part...
Using the Method of Water Poverty Index (WPI) to Evaluate the Region Water Security
NASA Astrophysics Data System (ADS)
Fu, Q.; Kachanoski, G.
2008-12-01
Water security is a widely concerned issue in the world nowadays. A new method, water poverty index (WPI), has been used to evaluate the regional water security. Twelve state farms in Heilongjiang Province, Northeastern China were selected to evaluate water security status based on the data of 2006 by using WPI and mean deviation grading method. The method of WPI includes five key indexes, such as resources(R), access (A), capacity(C), utilization (U) and environment (E). Each key index includes several sub-indexes. According to the results of WPI, the grade of each farm has been calculated by using the method of mean deviation grading. Thus, the radar images can be protracted of each farm. From the radar images, the conclusions can be drawn that the WPI values of Farms 853 and Hongqiling were in very safe status, while that of Farm Raohe was in safe status, those of Farms Youyi, 597, 852, 291 and Jiangchuan were in moderate safe status, that of Farm Beixing was in low safe status and those of Farms Shuangyashan, Shuguang and Baoshan were in unsafe status. The results from this study can provide basic information for decision making on rational use of water resources and regulations for regional water safety guarantee system.
48 CFR 3046.790-4 - Waiver (USCG).
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY ACQUISITION REGULATION (HSAR) CONTRACT MANAGEMENT QUALITY ASSURANCE Warranties 3046.790-4 Waiver... number of units delivered and anticipated to be delivered during the life of the program); (2) The...
48 CFR 3046.790-4 - Waiver (USCG).
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY ACQUISITION REGULATION (HSAR) CONTRACT MANAGEMENT QUALITY ASSURANCE Warranties 3046.790-4 Waiver... number of units delivered and anticipated to be delivered during the life of the program); (2) The...
33 CFR 62.27 - Safe water marks.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Safe water marks. 62.27 Section 62.27 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.27 Safe water marks. Safe water marks indicate that there is...
Content Sharing Based on Personal Information in Virtually Secured Space
NASA Astrophysics Data System (ADS)
Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.
User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.
Core-shell designed scaffolds for drug delivery and tissue engineering.
Perez, Roman A; Kim, Hae-Won
2015-07-01
Scaffolds that secure and deliver therapeutic ingredients like signaling molecules and stem cells hold great promise for drug delivery and tissue engineering. Employing a core-shell design for scaffolds provides a promising solution. Some unique methods, such as co-concentric nozzle extrusion, microfluidics generation, and chemical confinement reactions, have been successful in producing core-shelled nano/microfibers and nano/microspheres. Signaling molecules and drugs, spatially allocated to the core and/or shell part, can be delivered in a controllable and sequential manner for optimal therapeutic effects. Stem cells can be loaded within the core part on-demand, safely protected from the environments, which ultimately affords ex vivo culture and in vivo tissue engineering. The encapsulated cells experience three-dimensional tissue-mimic microenvironments in which therapeutic molecules are secreted to the surrounding tissues through the semi-permeable shell. Tuning the material properties of the core and shell, changing the geometrical parameters, and shaping them into proper forms significantly influence the release behaviors of biomolecules and the fate of the cells. This topical issue highlights the immense usefulness of core-shell designs for the therapeutic actions of scaffolds in the delivery of signaling molecules and stem cells for tissue regeneration and disease treatment. Copyright © 2015 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.
Congressional Oversight of Homeland Security: Help or Hinderance?
2012-12-01
http://thinkprogress.org/security/2009/01/21/35052/congress- f22 -fail/?mobile=nc . 246 Ferran, “Final F-22 Fighter Delivered, McCain Says $79B Jets...Program, Claims It’s ‘Too Big To Fail’.” Think Progress Security. Jan 21, 2009. http://thinkprogress.org/security/2009/01/21/35052/congress- f22 -fail
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-22
... institutions that sponsor chemical laboratories accountable for providing safe working environments. Beyond... current laboratory practices, security, and emergency response, as well as promoting safe handling of.... Safety and training programs have been implemented to promote the safe handling of chemicals from...
Safe and Secure Services Based on NGN
NASA Astrophysics Data System (ADS)
Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito
Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.
Progress toward poliomyelitis eradication - Afghanistan and Pakistan, 2009.
2010-03-12
Afghanistan, Pakistan, India, and Nigeria are the four remaining countries where indigenous wild poliovirus (WPV) transmission has never been interrupted. This report updates previous reports and describes polio eradication activities in Afghanistan and Pakistan during January-December 2009 and proposed activities in 2010 to address challenges. During 2009, both countries continued to conduct coordinated supplemental immunization activities (SIAs) and used multiple strategies to reach previously unreached children. These strategies included 1) use of short interval additional dose (SIAD) SIAs to administer a dose of oral poliovirus vaccine (OPV) within 1-2 weeks after a prior dose during negotiated periods of security; 2) systematic engagement of local leaders; 3) negotiations with conflict parties; and 4) increased engagement of nongovernmental organizations delivering basic health services. However, security problems continued to limit access by vaccination teams to large numbers of children. In Afghanistan, poliovirus transmission during 2009 predominantly occurred in 12 high-risk districts in the conflict-affected South Region; 38 WPV cases were confirmed in 2009, compared with 31 in 2008. In Pakistan, 89 WPV cases were confirmed in 2009, compared with 118 in 2008, but transmission persisted both in security-compromised areas and in accessible areas, where managerial and operational problems continued to affect immunization coverage. Continued efforts to enhance safe access of vaccination teams in insecure areas will be required for further progress toward interruption of WPV transmission in Afghanistan and Pakistan. In addition, substantial improvements in subnational accountability and oversight are needed to improve immunization activities in Pakistan.
48 CFR 3046.793 - Waiver and notification procedures (USCG).
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CONTRACT MANAGEMENT QUALITY ASSURANCE Warranties... anticipated to be delivered during the life of the program); (2) The specific waiver requested, the duration...
48 CFR 3046.793 - Waiver and notification procedures (USCG).
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CONTRACT MANAGEMENT QUALITY ASSURANCE Warranties... anticipated to be delivered during the life of the program); (2) The specific waiver requested, the duration...
An Examination of Issues Surrounding Information Security in California Colleges
ERIC Educational Resources Information Center
Butler, Robert D.
2013-01-01
Technological advances have provided increasing opportunities in higher education for delivering instruction and other services. However, exposure to information security attacks has been increasing as more organizations conduct their businesses online. Higher education institutions have one of the highest frequencies of security breaches as…
Integrity and security in an Ada runtime environment
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.
17 CFR 160.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Delivering privacy and opt out... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out notices...
Weinhardt, Lance S; Galvao, Loren W; Mwenyekonde, Thokozani; Grande, Katarina M; Stevens, Patricia; Yan, Alice F; Mkandawire-Valhmu, Lucy; Masanjala, Winford; Kibicho, Jennifer; Ngui, Emmanuel; Emer, Lindsay; Watkins, Susan C
2014-01-01
Poverty and lack of a predictable, stable source of food are two fundamental determinants of ill health, including HIV/AIDS. Conversely, episodes of poor health and death from HIV can disrupt the ability to maintain economic stability in affected households, especially those that rely on subsistence farming. However, little empirical research has examined if, and how, improvements in people's economic status and food security translate into changes in HIV vulnerability. In this paper, we describe in detail the methods and protocol of an academic-NGO collaboration on a quasi-experimental, longitudinal study of the mechanisms and magnitude of the impact of a multilevel economic and food security program (Support to Able-Bodied Vulnerable Groups to Achieve Food Security; SAFE), as implemented by CARE. Primary outcomes include HIV vulnerability (i.e., HIV risk behaviors, HIV infection), economic status (i.e., income, household assets) and food security (including anthropometric measures). We recruited participants from two types of areas of rural central Malawi: traditional authorities (TA) selected by CARE to receive the SAFE program (intervention group) and TAs receiving other unrelated CARE programming (controls). In the intervention TAs, we recruited 598 program participants (398 women, 200 men) and interviewed them at baseline and 18- and 36-month follow-ups; we interviewed 301 control households. In addition, we conducted random surveys (n = 1002) in the intervention and control areas with a 36-month assessment interval, prior to and after implementation of SAFE. Thus, we are examining intervention outcomes both in direct SAFE program participants and their larger communities. We are using multilevel modeling to examine mediators and moderators of the effects of SAFE on HIV outcomes at the individual and community levels and determine the ways in which changes in HIV outcomes feed back into economic outcomes and food security at later interviews. Finally, we are conducting a qualitative end-of-program evaluation consisting of in-depth interviews with 90 SAFE participants. In addition to examining pathways linking structural factors to HIV vulnerability, this research will yield important information for understanding the impact of a multilevel environmental/structural intervention on HIV, with the potential for other sustainable long-term public health benefits.
US Capitol Security - Our Nation's Capitol - A Safe Place for All?
DOT National Transportation Integrated Search
2000-08-01
This article describes the Volpe Centrer's role in developing a new security system for the US Capitol. The US Capitol Police turned to the Center because of our proven capabilities as security experts. We brought to the project: our knowledge of sec...
Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library
ERIC Educational Resources Information Center
McMullen, Karen D.; Kane, Laura Townsend
2008-01-01
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
U.S. Maritime Security: Sustainability Challenges
2011-09-01
Security Council ICE Immigration and Customs Enforcement IOC Interagency Operation Center JHOC Joint Harbor Operation Center JIATF-S Joint...maritime threats into nation threats, transnational criminal and piracy threats, environmental destruction, and illegal seaborne immigration (U.S...safe and secure borders, welcome lawful immigrants and visitors and promote the free-flow of commerce (U.S. Department of Homeland Security, 2011
31 CFR 535.221 - Compliance with directive provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... paragraph. (2) Definitive securities which are in bearer or registered form shall be hand delivered or... prior written notice of such delivery, specifically identifying the sending person, the face or par amount and type of security, and whether the security is in bearer, registered or book-entry form. (Secs...
Cutrona, Carolyn E; Russell, Daniel W
2017-02-01
Adult attachment theory provides guidance for providing optimal social support in intimate relationships. According to attachment theory, facilitating autonomy (secure base support) sometimes is more important than providing nurturance (safe haven support). In addition, it is important that couples celebrate one another's triumphs and successes (another form of secure base support). A key construct that explains the development of attachment is responsiveness to the individual's needs. Support that is delivered in a responsive manner (i.e., that leads the individual to feel understood, validated, and cared for) is more likely to enhance the relationship and less likely to damage self-esteem than assistance that is not responsive. A responsive exchange is more likely if emotion dysregulation can be prevented. Attachment theory offers explanations for why people vary in their effectiveness at emotion regulation. Appropriate emotion regulation is more likely if disclosures of current difficulties can be made in a way that is not defensive or accusatory, an ability that varies as a function of attachment orientation. Attachment theory also offers guidance regarding the optimal forms of social support for specific individuals. All these insights from adult attachment theory can be integrated into interventions to help couples become more effective support providers. Copyright © 2016 Elsevier Ltd. All rights reserved.
How To Keep Your Schools Safe and Secure.
ERIC Educational Resources Information Center
Gilbert, Christopher B.
1996-01-01
Discusses unforeseen costs (including potential litigation expenses), benefits, and consequences of adopting security measures (such as metal detectors, drug dogs, security cameras, campus police, dress codes, crime watch programs, and communication devices) to counter on-campus violence and gang activity. High-tech gadgetry alone is insufficient.…
Changing Homeland Security: The Year in Review - 2008
2009-01-01
new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar
Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.
Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y
2010-05-01
A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.
31 CFR 363.139 - May I transfer or deliver my zero-percent certificate of indebtedness?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false May I transfer or deliver my zero... DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Zero-Percent Certificate of Indebtedness General § 363.139 May I transfer or deliver my zero-percent certificate of indebtedness? A zero-percent...
31 CFR 363.139 - May I transfer or deliver my zero-percent certificate of indebtedness?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false May I transfer or deliver my zero... SERVICE REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Zero-Percent Certificate of Indebtedness General § 363.139 May I transfer or deliver my zero-percent certificate of indebtedness? A zero-percent...
31 CFR 363.139 - May I transfer or deliver my zero-percent certificate of indebtedness?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false May I transfer or deliver my zero... DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Zero-Percent Certificate of Indebtedness General § 363.139 May I transfer or deliver my zero-percent certificate of indebtedness? A zero-percent...
31 CFR 363.139 - May I transfer or deliver my zero-percent certificate of indebtedness?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false May I transfer or deliver my zero... DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Zero-Percent Certificate of Indebtedness General § 363.139 May I transfer or deliver my zero-percent certificate of indebtedness? A zero-percent...
17 CFR 160.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Delivering privacy and opt out... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any...
17 CFR 160.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Delivering privacy and opt out... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any...
17 CFR 160.9 - Delivering privacy and opt out notices.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Delivering privacy and opt out... (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.9 Delivering privacy and opt out notices. (a) How to provide notices. You must...
Tiffin, Norman H; Short, Kathy A; Jones, Samuel W; Cairns, Bruce A
2011-01-01
The VDR-4® high-frequency percussive ventilator (HFPV) has been shown to be beneficial in the management of inhalation injury by improving secretion clearance while maintaining oxygenation and ventilation. Delivery of gas flow during HFPV could lack adequate humidification delivered to the patient because a major portion of the delivered gas flow would bypass the humidifier when using the original VDR-4® ventilator circuit. The authors tested a novel inline vaporizing humidifier and two gas-water interface humidifiers during HFPV using the new VDR-4® Fail-safe Breathing Circuit Hub® to determine whether delivered humidification could be improved. This new humidification system, the Hydrate Omni™, delivers water vapor into the gas flow of the ventilator circuit rather than water droplets as delivered by the gas-water interface humidifiers. Measurements of absolute humidity and gas temperature were made on the three different humidification systems using a test lung model under standard ambient conditions. The authors found that when using the novel inline vaporizer, it provided better humidification when compared with the standard gas-water interface humidifier during HFPV using the new VDR-4® breathing circuit.
Information security : is your information safe?
DOT National Transportation Integrated Search
1999-01-01
This article characterizes the problem of cyber-terrorism, outlines the Federal government's response to several security-related concerns, and describes the Volpe Center's critical support to this response. The possibility of catastrophic terrorist ...
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
Student Perceptions of High-Security School Environments
ERIC Educational Resources Information Center
Bracy, Nicole L.
2011-01-01
Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…
77 FR 25721 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-01
... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...
Safe Schools Survey: Post-Secondary Survey Results.
ERIC Educational Resources Information Center
Mowery, Andrea
This report provides the results of a survey of safety and security at colleges and universities in Minnesota, along with policy recommendations to improve safety and security at Minnesota post-secondary institutions. It is based on campus security reports voluntarily submitted by 60 of the 110 Minnesota post-secondary institutions, personal…
How to Be Safe and Secure against School Vandalism.
ERIC Educational Resources Information Center
Stover, Del
1990-01-01
During 1990-91, vandals will cost the public schools $250 million. To battle vandalism, school executives are relying on numerous security techniques that police use to foil burglaries, including locks, alarms, electronic security systems, and antivandalism programs. Tips are provided for enlisting others' aid and checking a school's security…
Training to Increase Safe Tray Carrying among Cocktail Servers
ERIC Educational Resources Information Center
Scherrer, Megan D.; Wilder, David A.
2008-01-01
We evaluated the effects of training on proper carrying techniques among 3 cocktail servers to increase safe tray carrying on the job and reduce participants' risk of developing musculoskeletal disorders. As participants delivered drinks to their tables, their finger, arm, and neck positions were observed and recorded. Each participant received…
Designing, Implementing and Evaluating Preclinical Simulation Lab for Maternity Nursing Course
ERIC Educational Resources Information Center
ALFozan, Haya; El Sayed, Yousria; Habib, Farida
2015-01-01
Background: The opportunity for students to deliver care safely in today's, complex health care environment is limited. Simulation allows students to practice skills in a safe environment. Purpose: to assess the students' perception, satisfaction, and learning outcomes after a simulation based maternity course. Method: a quasi experimental design…
26 CFR 1.408-2 - Individual retirement accounts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... formation of protective committees; (H) To buy, sell, receive, or deliver securities on specific directions... Employee Retirement Income Security Act of 1974, 29 U.S.C. 1023(a)(3)(D), who is independent of the...
17 CFR 240.14c-3 - Annual report to be furnished security holders.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) A registrant will be considered to have delivered a Notice of Internet Availability of Proxy... Notice of Internet Availability of Proxy Materials, annual report to security holders or information...
Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku
2013-06-01
Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.
Hybrid architecture for building secure sensor networks
NASA Astrophysics Data System (ADS)
Owens, Ken R., Jr.; Watkins, Steve E.
2012-04-01
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...
77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-28
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...
Practical School Security: Basic Guidelines for Safe and Secure Schools.
ERIC Educational Resources Information Center
Trump, Kenneth S.
This book is written primarily for elementary and secondary school administrators and teachers, but college faculty involved in providing teacher or administrator education would also benefit from the practical approach to issues of school security. Chapters 1 through 3 establish a framework for dealing with the myths and realities of school…
The Handbook for Campus Safety and Security Reporting. 2016 Edition
ERIC Educational Resources Information Center
US Department of Education, 2016
2016-01-01
Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…
Secure, safe, and sensitive solutions.
Hughan, Tina
2012-04-01
Tabloid sensationalism aside, the increase in attacks on health service workers has led to many hospitals and healthcare facilities re-assessing their security systems. Here, Tina Hughan, head of marketing for specialist in door opening systems, Assa Abloy, gives her view on how security providers can help healthcare estates and facilities teams to cope with this disturbing trend.
Gleeson, John F; Lederman, Reeva; Wadley, Greg; Bendall, Sarah; McGorry, Patrick D; Alvarez-Jimenez, Mario
2014-04-01
Internet-based treatments for early psychosis offer considerable promise, but safety and security need to be established. This study pilot tested Horyzons, a novel online treatment application that integrates purpose-built moderated social networking with psychoeducation for recovery from early psychosis. Safety, privacy, and security were evaluated during a one-month single-group trial with 20 young consumers recovering from early psychosis who were recruited in Melbourne, Australia. Known clinical risk factors informed the safety protocol. Safety, privacy, and security were evaluated with respect to relapse and self-harm, users' perceptions of safety and privacy, and activity using Horyzons. No clinical or security problems with use of Horyzons were noted. Participants described feeling safe and trusting Horyzons. Private moderated online social networking combined with psychoeducation was a safe and secure therapeutic environment for consumers recovering from a first episode of psychosis. Testing the intervention in a randomized controlled trial is warranted.
Using Interactive Multimedia to Teach Pedestrian Safety: An Exploratory Study
ERIC Educational Resources Information Center
Glang, Ann; Noell, John; Ary, Dennis; Swartz, Lynne
2005-01-01
Objectives: To evaluate an interactive multimedia (IMM) program that teaches young children safe pedestrian skills. Methods: The program uses IMM (animation and video) to teach children critical skills for crossing streets safely. A computer-delivered video assessment and a real-life street simulation were used to measure the effectiveness of the…
75 FR 47818 - Agency Forms Undergoing Paperwork Reduction Act Review
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-09
... violence in one rural North Carolina school district, but appropriateness of the program with urban, high...). Background and Brief Description Safe Dates, a dating violence prevention curriculum for 8th and 9th grade... schools who delivered the Safe Dates program and students at one school who received the program...
76 FR 81904 - Solicitation of New Safe Harbors and Special Fraud Alerts
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... Special Fraud Alerts. DATES: To assure consideration, public comments must be delivered to the address... and Special Fraud Alerts. Please assist us by referencing the file code OIG-120-N. Inspection of...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-05-01
The Department of Energy's Oak Ridge National Laboratory (ORNL) conducts cutting edge scientific research. ORNL utilizes removable electronic media, such as computer hard drives, compact disks, data tapes, etc., to store vast amounts of classified information. Incidents involving breakdowns in controls over classified removable electronic media have been a continuous challenge for the Department. The loss of even one piece of such media can have serious national security implications. In 2004, the Department had a complex-wide 'stand-down' of all activities using classified removable electronic media, and such media containing Secret/Restricted Data or higher classified data was designated 'Accountable Classified Removablemore » Electronic Media' (ACREM). As part of the stand-down, sites were required to conduct a 100 percent physical inventory of all ACREM; enter it all into accountability; and conduct security procedure reviews and training. Further, the Department implemented a series of controls, including conducting periodic inventories, utilizing tamper proof devices on ACREM safes, and appointing trained custodians to be responsible for the material. After performance testing and validation that the required accountability systems were in place, ACREM operations at ORNL were approved for restart on August 10, 2004. We conducted a review at ORNL and associated facilities to determine whether ACREM is managed, protected, and controlled consistent with applicable requirements. We found that: (1) Eight pieces of Secret/Restricted Data media had not been identified as ACREM and placed into a system of accountability. Consequently, the items were not subject to all required protections and controls, such as periodic accountability inventories, oversight by a trained custodian, or storage in a designated ACREM safe. (However, the items were secured in safes approved for classified material.) (2) Other required ACREM protections and controls were not implemented as follows: a tamper indicating device was not being used on an ACREM safe; records documenting when a certain safe was opened did not support that a purported inventory had been conducted; and a safe inventory had not been completed in a timely manner. (3) A Personal Digital Assistant and a thumb drive, both capable of recording or transmitting data, were stored in a security area without an analysis to identify vulnerabilities and compensatory measures having been conducted, as required. We also found that an ORNL Cooperative Research and Development Agreement partner had not disabled classified computer ports at the partner's site that were capable of writing classified information to external or removable media, as required. We made several recommendations designed to enhance the security of ACREM, security areas, and computers.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-01
... over the Internet); Securities Exchange Act Release No. 63197 (October 27, 2010), 75 FR 67791 (November... $200 to $600 per Internet port that is used to deliver market data); Securities Exchange Act Release No... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64964; File No. SR-EDGA-2011-22] Self...
Development of a Health System-Based Nurse-Delivered Aromatherapy Program.
Joswiak, Denise; Kinney, Mary Ellen; Johnson, Jill R; Kolste, Alison K; Griffin, Kristen H; Rivard, Rachael L; Dusek, Jeffery A
2016-04-01
Healthcare systems are increasingly looking to integrate aromatherapy (essential oils) as a safe, low-cost, and nonpharmacologic option for patient care to reduce pain, nausea, and anxiety and to improve sleep. This article describes the development and implementation of a healthcare system-wide program of nurse-delivered essential oil therapeutic interventions to inpatients throughout an acute care setting. In addition, we provide lessons learned for nursing administrators interested in developing similar nurse-delivered aromatherapy programs.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Trivelpiece, A.W.
In January 1996, when the management and operation (M and O) contract for the Oak Ridge National Laboratory (ORNL) was awarded to Lockheed Martin Energy Research Corporation, they were presented with the opportunity to develop and implement a management structure tailored to the Laboratory's needs and functions. In response, they launched a Laboratory-wide reengineering effort and undertook other work with the goal of fostering excellence, relevance, and stewardship in all aspects of the Laboratory's operations. This effort is paying off in improvements in their ability to meet the expectations established for ORNL as a Department of Energy laboratory overseen bymore » the Office of Science: delivering advances in science and technology, securing new capabilities, improving the ability to operate safely and efficiently at reasonable cost, and being a good neighbor. The development of critical outcomes and objectives, now under way in partnership with the Department's Oak Ridge Operations Office, is aimed at providing a performance-based means of determining how ORNL measures up to these expectations.« less
2011-06-01
CAPE CANAVERAL, Fla. -- Employees admire space shuttle Endeavour as the landing convoy makes the vehicle safe and secure for towing to its processing hangar at NASA's Kennedy Space Center in Florida. Endeavour's final return from space completed the 16-day, 6.5-million-mile STS-134 mission. Main gear touchdown on the Shuttle Landing Facility's Runway 15 was at 2:34:51 a.m. EDT, followed by nose gear touchdown at 2:35:04 a.m., and wheelstop at 2:35:36 a.m. STS-134 delivered the Alpha Magnetic Spectrometer-2 (AMS) and the Express Logistics Carrier-3 (ELC-3) to the International Space Station. AMS will help researchers understand the origin of the universe and search for evidence of dark matter, strange matter and antimatter from the station. ELC-3 carried spare parts that will sustain station operations once the shuttles are retired from service. STS-134 was the 25th and final flight for Endeavour, which spent 299 days in space, orbited Earth 4,671 times and traveled 122,883,151 miles. Photo credit: NASA/Kim Shiflett
Cyber security best practices for the nuclear industry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badr, I.
2012-07-01
When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)
Ensuring the security and availability of a hospital wireless LAN system.
Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku
2013-01-01
Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.
Caruso, Ronald D
2004-01-01
Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004
Safe and Secure Virtualization: Answers for IMA next Generation and Beyond
NASA Astrophysics Data System (ADS)
Almeida, Jose; Vatrinet, Francis
2010-08-01
This paper presents some of the challenges the aerospace industry is facing for the future and explains why and how a safe and secured virtualization technology can help solving these challenges Efforts around the next generation of IMA have already started, like the European FP7 funded project SCARLETT or the IDEE5 project and many avionics players and working groupware focused on how the new technologies like SMP capabilities introduced in latest CPU architectures, can help increasing system performances in future avionics system. We present PikeOS, a separation micro-kernel, which applies the state-of-the-art techniques and widely recognized standards such as ARINC 653 and MILS in order to guarantee safety and security properties, and still improve overall performance.
ERIC Educational Resources Information Center
Florida State Dept. of Education, Tallahassee.
During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…
To advance the science and engineering of decontaminating pipe systems and safely disposing of high-volumes of contaminated water, Agency homeland security researchers are developing a Water Security Test Bed (WSTB).
Developing useful transit-related crime and incident data
DOT National Transportation Integrated Search
2000-04-01
Transit agencies have an obligation to provide a reasonably safe and secure system for their patrons and employees. Transit management must make decisions regarding the best use of police, security personnel, and other resources to reduce crime and i...
MEETING THE REQUIREMENTS OF THE U.S. SAFE DRINKING WATER ACT: THE ROLE OF TECHNOLOGY
The passage of the U.S. Safe Drinking Water Act (SDWA) in 1974 has had a major impact on the way water is treated and delivered in the United States. The Act established national drinking water regulations for more than 170,000 public drinking water systems serving over 250 mill...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-13
... must provide fail-safe operations during coupled maneuvers. The demonstration of fail-safe operations... receive your comments by February 11, 2011. ADDRESSES: You must mail or deliver two copies of your... your comments: Docket No. SW023. You can inspect comments in the Docket on weekdays, except Federal...
Hansky, Bert; Vogt, Juergen; Gueldner, Holger; Schulte-Eistrup, Sebastian; Lamp, Barbara; Heintze, Johannes; Horstkotte, Dieter; Koerfer, Reiner
2007-01-01
Securing transvenous left ventricular (LV) pacing leads without an active fixation mechanism in proximal coronary vein (CV) segments is usually challenging and frequently impossible. We investigated how active fixation leads can be safely implanted in this location, how to avoid perforating the free wall of the CV, and how to recognize and respond to perforations. In five patients with no alternative to LV pacing from proximal CV segments, 4 Fr SelectSecure (Medtronic, Minneapolis, MN, USA) leads, which have a fixed helix, were implanted through a modified 6 Fr guide catheter with a pre-shaped tip (Launcher, Medtronic). Active fixation leads were successfully implanted in proximal CVs in five patients. There were no complications. Acute and chronic pacing thresholds were comparable to those of conventional CV leads. The pre-shaped guide catheter tip remains in close proximity to the myocardial aspect of the CV, directing the lead helix toward a safe implantation site. If only proximal CV pacing sites are available, 4 Fr SelectSecure leads can be safely implanted through a modified Launcher guide catheter, avoiding more invasive implantation techniques. Other than venous stenting or implantation of leads with retractable tines, SelectSecure leads are expected to remain extractable.
Code of Federal Regulations, 2010 CFR
2010-01-01
... purchase securities for the account of, any customer (including another depository institution), involving... debit to an account of the customer before the securities are delivered. A deposit arises thereafter, if... comparable maturity to that purchased by the customer; (v) Any liability of a depository institution's...
Sandia National Laboratories: National Security Missions: Defense Systems
Technology Partnerships Business, Industry, & Non-Profits Government Universities Center for Development Agreement (CRADA) Strategic Partnership Projects, Non-Federal Entity (SPP/NFE) Agreements New leadership for the national security community by delivering cutting-edge experimental and operational sensor
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Limitations and... daily basis does not in itself constitute the establishment of a watch. The minimum safe manning levels specified in a vessel's COI or other safe manning document take into consideration routine maintenance...
Safe and Secure Federal Websites Act of 2014
Rep. Bentivolio, Kerry L. [R-MI-11
2013-12-03
Senate - 07/29/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Infectious disease protection for healthcare security officers.
D'Angelo, Michael S; Arias, Jean
2015-01-01
Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.
Improved security monitoring method for network bordary
NASA Astrophysics Data System (ADS)
Gao, Liting; Wang, Lixia; Wang, Zhenyan; Qi, Aihua
2013-03-01
This paper proposes a network bordary security monitoring system based on PKI. The design uses multiple safe technologies, analysis deeply the association between network data flow and system log, it can detect the intrusion activities and position invasion source accurately in time. The experiment result shows that it can reduce the rate of false alarm or missing alarm of the security incident effectively.
ERIC Educational Resources Information Center
Kennedy, Mike
1999-01-01
Describes how colleges and universities are using technology, as well as traditional methods, to keep campuses safe and reduce crime. Topics include using free pizza in a successful contest to teach students about campus safety, installing security cameras, using access-control cards, providing adequate lighting, and creating a bicycle patrol…
Systematic review of evidence on the effectiveness of safe child faeces disposal interventions.
Morita, Tomohiko; Godfrey, Samuel; George, Christine Marie
2016-11-01
To review and synthesise the available evidence on the effectiveness of interventions targeting unsafe child faeces disposal in reducing this behaviour and improving child health in low- and middle-income countries. PubMed and EMBASE were systematically searched. Studies meeting the inclusion criteria were reviewed and key information on study methodologies and outcomes were extracted. A total of 1048 articles were screened, and eight studies representing five countries were included for the review. Three were randomised controlled trials, and five were prospective cohort studies. There was wide variability across studies in the definition of 'safe disposal' of child faeces. Six studies reported the change in child faeces disposal practices associated with safe child faeces disposal interventions. However, only one study found a significant improvement in this behaviour. Two of the six studies that evaluated the health impact of delivered interventions found significant reductions in childhood diarrhoea associated with safe faeces disposal practices, and one study reported a positive effect on child growth and ascariasis. Only one study was identified that delivered a single intervention solely focused on safe child faeces disposal. Unfortunately, this study did not investigate the impact of this intervention on child health. There are major methodological limitations in studies that assessed the impact of safe child faeces disposal interventions. The health impact of these interventions is inconclusive because the quality of the current evidence is poor. Randomised controlled trials are urgently needed to assess the impact of safe faeces disposal interventions on child health. © 2016 John Wiley & Sons Ltd.
Keys to a Safe, Secure School.
ERIC Educational Resources Information Center
Kennedy, Mike
2002-01-01
Outlines 10 steps that school administrators can take to make their schools safer and more secure for students and staff. These steps encompass crime prevention through environmental design, crisis planning, entrances, lighting, police presence, prevention programs, rapport with students, smaller schools, technology implementation, and staff…
ERIC Educational Resources Information Center
Flanigan, Robin L.
2000-01-01
Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)
ERIC Educational Resources Information Center
McKee, Bronagh E.; Mason, Sarah
2015-01-01
Prevention programmes underpin every child's right to "feel" safe and to "be" safe from all forms of harm. Delivered in schools across the globe, they aim to equip children with knowledge about safety and the skills to seek help early. By drawing upon international prevalence and impact research, as well as the legal, policy…
The passage of the U.S. Safe Drinking Water Act (SDWA) in 1974 has had a major impact on the way water is treated and delivered in the U.S. The Act established national drinking water regulations for more than 170,000 public drinking water systems serving over 250 million people ...
Determination of influence factors and accident rates for the Armored Tractor/Safe Secure Trailer
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.S.; Clauss, D.B.; Blower, D.F.
1994-04-01
Operating environments, such as road type, road location, and time of day, play an important role in the observed accident rates of heavy trucks used in general commerce. These same factors influence the accident rate of the Armored Tractor/Safe Secure Trailer (AT/SST) used by the Department of Energy to transport hazardous cargos within the continental United States. This report discusses the development of accident rate influence factors. These factors, based on heavy trucks used in general commerce, are used to modify the observed overall AT/SST accident rate to account for the different operating environments.
Clients' safe food-handling knowledge and risk behavior in a home-delivered meal program.
Almanza, Barbara A; Namkung, Young; Ismail, Joseph A; Nelson, Douglas C
2007-05-01
To determine typical handling practices of home-delivered meals, and provide appropriate handling instructions to reduce the risk of foodborne illness by improving consumer handling of home-delivered meals. Once permission was given by the home-delivered meal site directors, clients were provided a voluntary survey and requested by the delivery drivers to complete the self-administered questionnaire. The completed questionnaire was collected by the driver the following day. Because of the special needs of the home-delivered meal populations, the questionnaire was made as easy and convenient to answer as possible. Two hundred fifty-eight male clients (31%) and 575 female clients (69%) whose mean age was 79 years participated in the study. The respondents' safe food-handling practices, food safety knowledge, and demographic information were assessed. Average time for delivery and consumption of meals were also measured. Descriptive statistics (frequency and chi(2) test) of the participants' handling of home-delivered meals, their general food safety knowledge, and demographic information were reported. Delivery time and consumption time were calculated for each subject. Five hundred thirty-six of 869 clients (63%) reported that they ate their meals as soon as they were delivered. Of those clients who did not eat their meals immediately, 234 (82%) stored the cold food in the refrigerator and 142 (58%) stored the hot food in the freezer. More than one-third of the clients (n=277, 35%) reported that they had leftovers and only 34 (15%) ate the leftovers within 2 hours. Significant differences among groups on the basis of a derived food safety knowledge score were observed in terms of whether or not they ate their meal immediately (P
2005-05-01
AD_ Award Number: DAMD17-03-1-0353 TITLE: Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable Fibers...30 Apr 2005 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Monitoring of Breast Tumor Response to Local Chemotherapeutic Agent Delivered by Biodegradable ... biodegradable fiber 16. SECURITY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF RESPONSIBLE PERSON OF ABSTRACT OF PAGES a. REPORT b. ABSTRACT c
Safely Enabling UAS Operations in Low-Altitude Airspace
NASA Technical Reports Server (NTRS)
Kopardekar, Parimal H.
2016-01-01
Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.
Crisis Prevention and Response: Is Your School Prepared?
ERIC Educational Resources Information Center
Paine, Cathy; Sprague, Jeffrey
1999-01-01
This bulletin outlines the major components of a crisis-preparedness and response plan for schools. It lists the critical components of a safe-school plan, such as community coordination, curriculum, proactive student discipline policies and procedures, safe physical environment, school security, staff and student training, evaluation and…
ERIC Educational Resources Information Center
National Educational Service, Bloomington, IN.
This workshop and planning guide is designed to help stakeholders create safe schools for students. The guide is intended to be used with three 20-minute videotape programs that feature an inside look at two schools that actively involved their communities in improving school safety. The three videos--"Building the Team,""The Safe School…
Research and realization of info-net security controlling system
NASA Astrophysics Data System (ADS)
Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-03-01
The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.
Rep. Barrow, John [D-GA-12
2013-06-28
House - 07/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Implementing AORN recommended practices for a safe environment of care, part II.
Kennedy, Lynne
2014-09-01
Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.
Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A
2014-08-01
With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.
Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.
2014-01-01
With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148
ERIC Educational Resources Information Center
Brown, Ben
2005-01-01
This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…
(Congressional Interest) Institute for Science, Space and Security (ISSS)
2012-03-19
Studies program between UCCS and University of Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb ...security and assist the University of Zagreb in establishing a regional (Eastern Europe) Center of Excellence in Homeland Security. In the long-term...UCCS will assist the University of Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees
ERIC Educational Resources Information Center
Kennedy, Mike
2006-01-01
Education administrators have many tools available to them as they strive to establish a safe climate for learning, but no one strategy or piece of equipment is a magic solution that keeps potential trouble beyond the campus boundaries. Creating and maintaining a safe and secure school environment requires a balance of many strategies: (1)…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chochoms, Michael
2017-02-23
This course presents information for working safely with portable ladders: specifically, stepladders, extensions ladders, and their derivations. Additionally, this course provides limited information on the safe use of stepstools and fixed ladders. The skills, techniques, and good practices needed for selecting, inspecting, setting up and securing, and using ladders are presented in this course.
SAFETY GUIDES FOR YOU--IN THE PRIMARY GRADES.
ERIC Educational Resources Information Center
WALKER, LUVERNE CRABTREE
THIS SAFETY INSTRUCTIONAL GUIDE FOR PRIMARY-GRADE TEACHERS PRESENTS NINE DIFFERENT SAFETY UNITS, INCLUDING TRAFFIC SAFETY, PLAYTIME SAFETY, SAFE EATING AND DRINKING HABITS, SAFE CLOTHING, HOME SAFETY, ANIMAL SAFETY, CIVIL DEFENSE SECURITY, AND TESTING SAFETY PRACTICES. EACH UNIT STRESSES THE REASONS FOR ACCENTING SAFETY, WHAT TO KNOW AND DO, AND…
ERIC Educational Resources Information Center
Kennedy, Mike
2008-01-01
After violent episodes too numerous to list and too terrible to forget, schools and universities have been focused for several years on enhancing security in their facilities. Doors are among the most critical points of concern for school personnel responsible for keeping buildings safe. Education institutions want doors that let the right people…
75 FR 71519 - National Family Week, 2010
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
..., which aims to protect working families' economic security and raise their standard of living. And the... brave service members and their families who keep our loved ones safe here at home and abroad. This... dreams. As we confront our challenges as a Nation, let us support our families in creating safe...
76 FR 44880 - Security Zone; Escorted Vessels in Captain of the Port Ohio Valley Zone
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-27
.... Minimum safe speed means the speed at which a vessel proceeds when it is fully off plane, completely... minimum safe speed if it is: (1) On a plane; (2) In the process of coming up onto or coming off a plane...
A Study of Security Awareness Information Delivery within the Defense Intelligence Community
ERIC Educational Resources Information Center
Krasley, Paul F.
2011-01-01
Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…
Code of Federal Regulations, 2013 CFR
2013-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM § 299.5 Procedures. (a) Requests for copies of records of the NSA/CSS shall be delivered to the Director... Director of Policy, if so designated, shall endeavor to respond to a direct request to NSA/CSS within 20...
Code of Federal Regulations, 2012 CFR
2012-07-01
... PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE (NSA/CSS) FREEDOM OF INFORMATION ACT PROGRAM § 299.5 Procedures. (a) Requests for copies of records of the NSA/CSS shall be delivered to the Director... Director of Policy, if so designated, shall endeavor to respond to a direct request to NSA/CSS within 20...
17 CFR Appendix B to Part 420 - Sample Large Position Report
Code of Federal Regulations, 2014 CFR
2014-04-01
... Memorandum 1 $ Memorandum 2: Report the gross par amount of fails to deliver. Included in the calculation of... millions at par value as of trade date] Security Being Reported Date For Which Information is Being... Principal Components of the Specific Security $________ Total Net Trading Position $ 2. Gross Financing...
Countering Russian Active Measures
2018-04-16
28 Economic Capture ......................................................................................................... 30...Vladimir Putin delivered a speech at the 43rd Munich Conference on Security Policy, where he accused the US of imposing its economic , political...National-Security- Strategy-31Dec2015.pdf, accessed 1 September 2017. 2 Russian leaders have viewed the economic expansion of the EU with similar
Security of Data, Stored in Information Systems of Bulgarian Municipal Administrations
NASA Astrophysics Data System (ADS)
Kapralyakov, Petko
2011-12-01
Massive influx of information technology in municipal administrations increases their efficiency in delivering public services but increased the risk of theft of confidential information electronically. The report proposed an approach for improving information security for small municipal governments in Bulgaria through enhanced intrusion detection and prevention system.
Code of Federal Regulations, 2010 CFR
2010-10-01
... section. (e) Filing. You must file the Mortgage with the United States Coast Guard's National Vessel... Shipyard Project, a security interest may be perfected by a filing under the Uniform Commercial Code. (b... Mortgage, you must deliver to us the Mortgage and evidence of the filing of the security interest. (f...
17 CFR 232.304 - Graphic, image, audio and video material.
Code of Federal Regulations, 2011 CFR
2011-04-01
... video material. 232.304 Section 232.304 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Submissions § 232.304 Graphic, image, audio and video material. (a) If a filer includes graphic, image, audio or video material in a document delivered to investors and others that is not reproduced in an...
17 CFR 232.304 - Graphic, image, audio and video material.
Code of Federal Regulations, 2012 CFR
2012-04-01
... video material. 232.304 Section 232.304 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Submissions § 232.304 Graphic, image, audio and video material. (a) If a filer includes graphic, image, audio or video material in a document delivered to investors and others that is not reproduced in an...
17 CFR 232.304 - Graphic, image, audio and video material.
Code of Federal Regulations, 2013 CFR
2013-04-01
... video material. 232.304 Section 232.304 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Submissions § 232.304 Graphic, image, audio and video material. (a) If a filer includes graphic, image, audio or video material in a document delivered to investors and others that is not reproduced in an...
17 CFR 232.304 - Graphic, image, audio and video material.
Code of Federal Regulations, 2010 CFR
2010-04-01
... video material. 232.304 Section 232.304 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Submissions § 232.304 Graphic, image, audio and video material. (a) If a filer includes graphic, image, audio or video material in a document delivered to investors and others that is not reproduced in an...
17 CFR 232.304 - Graphic, image, audio and video material.
Code of Federal Regulations, 2014 CFR
2014-04-01
... video material. 232.304 Section 232.304 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Submissions § 232.304 Graphic, image, audio and video material. (a) If a filer includes graphic, image, audio or video material in a document delivered to investors and others that is not reproduced in an...
Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kovacic, Donald N
2015-01-01
This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture
77 FR 66351 - Establishing the White House Homeland Security Partnership Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... resources more efficiently, build on one another's expertise, drive innovation, engage in collective action... utilizing diverse perspectives, skills, tools, and resources. The National Security Strategy emphasizes the importance of partnerships, underscoring that to keep our Nation safe ``we must tap the ingenuity outside...
77 FR 73464 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-10
..., grantees, volunteers, interns, and others performing or working on a contract, service, grant, cooperative... tape records are stored in locked file rooms, locked file cabinets, or locked safes. RETRIEVABILITY... safeguarded in a secured environment. Buildings where records are stored have security cameras and 24-hour...
3 CFR - Blue Ribbon Commission on America's Nuclear Future
Code of Federal Regulations, 2011 CFR
2011-01-01
... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...
Gregg, Emma
2017-04-12
Aim The aim of this literature review was to explore the development of the role of specialist ophthalmic nurses in delivering ranibizumab intravitreal injections to patients with wet age-related macular degeneration (AMD), and to evaluate their contribution to reducing capacity pressures in medical retina services, while maintaining safe and effective standards of care. Method A systematic literature search was undertaken to identify relevant articles published between January 2000 and June 2015. A search of electronic databases was undertaken, and selected relevant journals were searched manually. A free text and subject heading search strategy was conducted, in which the abstracts of publications identified for review were assessed for relevance. Inclusion criteria were: nurses delivering ranibizumab intravitreal treatment; studies performed in the UK and other countries; and patients with AMD, diabetic macular oedema or central retinal vein occlusion receiving nurse-led ranibizumab (Lucentis) intravitreal treatment. Findings Five studies were identified from the literature search, which audited a total of 31,303 injections delivered by nurse practitioners between January 2007 and November 2013. The visual outcomes and the rate of complications from intravitreal injections delivered by trained ophthalmic nurse practitioners were comparable to intravitreal injections delivered by ophthalmologists. Four of the five studies reported increased patient satisfaction, patients consenting to nurse-delivered intravitreal injections, favourable pain experience, and absence of complaints. Conclusion Practice innovation is an example of a quality, innovation, productivity and prevention process. Role expansion, in which specialist ophthalmic nurses deliver intravitreal injections, has been shown to be economical, safe and effective. It enables timely delivery of the service, thereby preventing irreversible blindness for individuals with wet AMD.
Developing Ministerial Collaborative Planning Capacity
2012-03-14
1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and
Safe at Any Speed: Securing Your Wi-Fi Network Is Easier and More Important than You Might Think
ERIC Educational Resources Information Center
Branzburg, Jeffrey
2007-01-01
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Periodic-Zone Model Predictive Control for Diurnal Closed-Loop Operation of an Artificial Pancreas
Gondhalekar, Ravi; Dassau, Eyal; Zisser, Howard C.; Doyle, Francis J.
2013-01-01
Background The objective of this research is an artificial pancreas (AP) that performs automatic regulation of blood glucose levels in people with type 1 diabetes mellitus. This article describes a control strategy that performs algorithmic insulin dosing for maintaining safe blood glucose levels over prolonged, overnight periods of time and furthermore was designed with outpatient, multiday deployment in mind. Of particular concern is the prevention of nocturnal hypoglycemia, because during sleep, subjects cannot monitor themselves and may not respond to alarms. An AP intended for prolonged and unsupervised outpatient deployment must strategically reduce the risk of hypoglycemia during times of sleep, without requiring user interaction. Methods A diurnal insulin delivery strategy based on predictive control methods is proposed. The so-called “periodic-zone model predictive control” (PZMPC) strategy employs periodically time-dependent blood glucose output target zones and furthermore enforces periodically time-dependent insulin input constraints to modulate its behavior based on the time of day. Results The proposed strategy was evaluated through an extensive simulation-based study and a preliminary clinical trial. Results indicate that the proposed method delivers insulin more conservatively during nighttime than during daytime while maintaining safe blood glucose levels at all times. In clinical trials, the proposed strategy delivered 77% of the amount of insulin delivered by a time-invariant control strategy; specifically, it delivered on average 1.23 U below, compared with 0.31 U above, the nominal basal rate overnight while maintaining comparable, and safe, blood glucose values. Conclusions The proposed PZMPC algorithm strategically prevents nocturnal hypoglycemia and is considered a significant step toward deploying APs into outpatient environments for extended periods of time in full closed-loop operation. PMID:24351171
Clapham, Kathleen; Bennett-Brook, Keziah; Hunter, Kate
2018-05-09
Aboriginal Australian children experience higher rates of injury than other Australian children. However few culturally acceptable programs have been developed or evaluated. The Illawarra Aboriginal Medical Service (IAMS) developed the Safe Homes Safe Kids program as an injury prevention program targeting disadvantaged Aboriginal families with children aged 0-5 in an urban region of NSW. Delivered by Aboriginal Family Workers the program aims to reduce childhood injury by raising awareness of safety in the home. A program evaluation was conducted to determine the effectiveness of the home visiting model as an injury prevention program. This paper reports on the qualitative interviews which explored the ways in which clients, IAMS staff, and external service providers experienced the program and assessed its delivery by the Aboriginal Family Workers. A qualitative program evaluation was conducted between January 2014 and June 2015. We report here on the semi-structured interviews undertaken with 34 individuals. The results show increased client engagement in the program; improved child safety knowledge and skills; increased access to services; improved attitudes to home and community safety; and changes in the home safety environment. Safe Homes Safe Kids provides a culturally appropriate child safety program delivered by Aboriginal Family Workers to vulnerable families. Clients, IAMS staff, and external service were satisfied with the family workers' delivery of the program and the holistic model of service provision. SO WHAT?: This promising program could be replicated in other Aboriginal health services to address unintentional injury to vulnerable Aboriginal children. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
3 CFR 8460 - Proclamation 8460 of December 2, 2009. Critical Infrastructure Protection Month, 2009
Code of Federal Regulations, 2010 CFR
2010-01-01
... the United States of America A Proclamation Critical infrastructure protection is an essential element... have a debilitating effect on security, national economic security, public health or safety. From water... country's essential resources are safe and capable of recovering from disruptive incidents. The Department...
ERIC Educational Resources Information Center
Kennedy, Mike
2010-01-01
The education headlines have been filled with grim news about facility closings, teacher layoffs and program cutbacks. When the economic climate is gloomy, few areas of schools and universities are spared. In areas outside the classroom, such as safety and security, the cuts may be larger and come more quickly. When money is scarce, education…
Bench vise adapter grips tubing securely and safely
NASA Technical Reports Server (NTRS)
Howland, B. T.; Jones, A. S., Jr.
1966-01-01
Plastic self-compressing adapter with grooves, attached to the jaws of a bench vise, secures thin-wall tubing vertically or horizontally during cutting and flaring operations without marring or damaging it. Magnets incorporated in both sections of the adapter prevent detachment from the jaws when the vise is opened.
The Handbook for Campus Crime Reporting
ERIC Educational Resources Information Center
Ward, Diane; Lee, Janice
2005-01-01
Campus security and safety are important issues in postsecondary education today. Providing students nationwide with a safe environment in which to learn and keeping students, parents and employees well informed about campus security are goals that have been voiced by many groups. These goals were advanced by the Crime Awareness and Campus…
Safe and Secure America Act of 2009
Rep. Smith, Lamar [R-TX-21
2009-03-12
House - 04/27/2009 Referred to the Subcommittee on Crime, Terrorism, and Homeland Security. (All Actions) Notes: For further action, see H.R.3961, which became Public Law 111-141 on 2/27/2010. Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Custodians/Security Program Evaluation.
ERIC Educational Resources Information Center
Ennis, Bob
The Custodians/Security Department is a support service of the Des Moines (Iowa) Independent Community School District. Responsibilities of the department do not stop with the care of the facility, but extend to providing a clean, safe environment for all who use school facilities. Program evaluation in the 1993-94 school year reveals a total…
Making Schools Safe: The Role of the Modern Business Officer.
ERIC Educational Resources Information Center
Stephens, Ronald D.
1990-01-01
School business officials are held responsible for school safety. After conducting a school security audit, the following strategies are recommended: establishing a local school security task force; forming a comprehensive crisis management plan; establishing a school communication network; and providing school staff with inservice training on…
7 CFR 3560.103 - Maintaining housing projects.
Code of Federal Regulations, 2011 CFR
2011-01-01
... common areas, must be free of trash, litter, and debris. Public walkways, walls of buildings and common... lighting and functional interior lighting in common areas which permits safe access and security. (ix... coverings that are intact, securely attached, and in good condition. Brick veneers must be free of missing...
24 CFR 3400.305 - Data security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 5 2012-04-01 2012-04-01 false Data security. 3400.305 Section... DEVELOPMENT SAFE MORTGAGE LICENSING ACT Minimum Requirements for Administration of the NMLSR § 3400.305 Data... registrants whose data may have been compromised, and the employer of the loan originator or registrant, if...
76 FR 4123 - Homeland Security Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-24
.... The closed portions of the meeting will address threats to our homeland security, results of a cyber... designed to keep our country safe. A briefing on the Cyber Storm III Exercise will include lessons learned and vulnerabilities of cyber assets, as well as potential methods to improve a Federal response to a...
ERIC Educational Resources Information Center
Jokela, Paivi; Karlsudd, Peter
2007-01-01
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
NASA Astrophysics Data System (ADS)
Lu, Yichen; Friedman, Rachel; Kushner, Nicholas; Doling, Amy; Thomas, Lawrence; Touzjian, Neal; Starnbach, Michael; Lieberman, Judy
2000-07-01
Bacillus anthrax lethal toxin can be engineered to deliver foreign proteins to the cytosol for antigen presentation to CD8 T cells. Vaccination with modified toxins carrying 8-9 amino acid peptide epitopes induces protective immunity in mice. To evaluate whether large protein antigens can be used with this system, recombinant constructs encoding several HIV antigens up to 500 amino acids were produced. These candidate HIV vaccines are safe in animals and induce CD8 T cells in mice. Constructs encoding gag p24 and nef stimulate gag-specific CD4 proliferation and a secondary cytotoxic T lymphocyte response in HIV-infected donor peripheral blood mononuclear cells in vitro. These results lay the foundation for future clinical vaccine studies.
Nanoassemblies from homostructured polypeptides as efficient nanoplatforms for oral drug delivery.
Jia, Yi; Tang, Yuan; He, Hongmei; Li, Shuhui; Che, Ling; Zhou, Xing; Dou, Yin; Zhang, Jianxiang; Li, Xiaohui
2013-04-01
The assembly of homostructured polypeptides bearing various side groups into well-defined nanostructures was presented, with their size and topology mainly dominated by the chemical structure and molecular weight of peptides. Pharmacokinetic and pharmacodynamic studies based on rat models suggested these newly constructed nanoassemblies with low cytotoxicity may function as novel nanoplatforms to efficiently and safely deliver therapeutics to achieve better efficacy but lower side effects. Other applications in biomedical fields, such as biotechnology, medical imaging, and tissue engineering, may also be expected. This research team investigated the assembly of homostructured polypeptides bearing various side groups into well-defined nanostructures, and demonstrated low cytotoxicity in rat disease models, suggesting that these novel nanoplatforms may safely and efficiently deliver therapeutics with low side effects. Copyright © 2013 Elsevier Inc. All rights reserved.
Westbury, Becky
2015-06-01
In Ten tips for normal birth, the Royal College of Midwives (RCM) (2014) advocates the building of nests; creating an environment that helps women to feel safe and secure during birth, as this can improve women's experiences and likelihood of normal birth. Furthermore, a private, undisturbed and dark environment, where women feel calm and safe can promote the release of oxytocin, the hormone responsible for uterine contractions and thought to promote the release of the pain relieving hormones endorphins (Uvnas Moberg 2003). When this is not achieved, women can experience fear-tension-pain syndrome, impeding labour progress and causing increased levels of pain (Dick-Read 2013). In addition, birth space has the potential to encourage the promotion of normality through providing space to mobilise, and alternative furniture to enable upright birth positions. Midwives should help women to create a birth space in which they feel safe, calm and secure, to promote normality and increase the incidence of normal birth (RCM 2014).
Foundational Security Principles for Medical Application Platforms* (Extended Abstract)
Vasserman, Eugene Y.; Hatcliff, John
2014-01-01
We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096
NASA Technical Reports Server (NTRS)
Jung, Jaewoo; Kopardekar, Parimal H.
2016-01-01
Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.
NASA Technical Reports Server (NTRS)
Kopardekar, Parimal H.; Cavolowsky, John
2015-01-01
Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.
ERIC Educational Resources Information Center
Murphy, Nora Sharkey
2000-01-01
States that schools should be a safe haven for children and urges society to return schools to the safe, secure places they once were. Discusses the need to keep media far away from children in the event of a campus emergency and perform full background checks on all potential school employees. Reports that Catholic schools are providing…
Disabled Children: The Right to Feel Safe
ERIC Educational Resources Information Center
Mepham, Sarah
2010-01-01
This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…
Supporting Safe, Secure and Caring Schools in Alberta.
ERIC Educational Resources Information Center
McMullen, Dean
Alberta Learning expects all schools to have a safe and caring teaching and learning environment to ensure students have the opportunity to meet the standards of education set by the Minister of Learning. The primary objectives of this manual are to facilitate action that is legally, professionally, and educationally sound; identify and support…
ERIC Educational Resources Information Center
Brunner, Judy; Lewis, Dennis
2005-01-01
An environment of safety in the school seldom comes down to any one particular component or plan; it is a combination of strategies and ideas that makes a school safe and secure for everyone. In this article, the authors provide practical information to educators who are already working to capacity in terms of time allocation and monetary…
Code of Federal Regulations, 2010 CFR
2010-10-01
... hazardous materials are only safe for transportation when they are securely sealed in a proper package...) that a container or package for transportation of a hazardous material is safe, certified, or in.... —Listing an unauthorized, incorrect, non-working, or unmonitored (24 hrs. a day) emergency response...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... Assets Transferred by an Insured Depository Institution in Connection With a Securitization or... limited time the safe harbor provision for securitizations that would be affected by recent changes to... securitizations for which financial assets were transferred or, for revolving trusts, for which securities were...
Sujansky, Walter; Wilson, Tom
2015-04-01
This report describes a grant-funded project to explore the use of DIRECT secure messaging for the electronic delivery of laboratory test results to outpatient physicians and electronic health record systems. The project seeks to leverage the inherent attributes of DIRECT secure messaging and electronic provider directories to overcome certain barriers to the delivery of lab test results in the outpatient setting. The described system enables laboratories that generate test results as HL7 messages to deliver these results as structured or unstructured documents attached to DIRECT secure messages. The system automatically analyzes generated HL7 messages and consults an electronic provider directory to determine the appropriate DIRECT address and delivery format for each indicated recipient. The system also enables lab results delivered to providers as structured attachments to be consumed by HL7 interface engines and incorporated into electronic health record systems. Lab results delivered as unstructured attachments may be printed or incorporated into patient records as PDF files. The system receives and logs acknowledgement messages to document the status of each transmitted lab result, and a graphical interface allows searching and review of this logged information. The described system is a fully implemented prototype that has been tested in a laboratory setting. Although this approach is promising, further work is required to pilot test the system in production settings with clinical laboratories and outpatient provider organizations. Copyright © 2015 Elsevier Inc. All rights reserved.
17 CFR Appendix B to Part 420 - Sample Large Position Report
Code of Federal Regulations, 2013 CFR
2013-04-01
... $ Memorandum 2: Report the gross par amount of fails to deliver. Included in the calculation of line item 3... millions at par value as of trade date] Security Being Reported Date For Which Information is Being... Principal Components of the Specific Security $ Total Net Trading Position $ 2. Gross Financing Position...
17 CFR Appendix B to Part 420 - Sample Large Position Report
Code of Federal Regulations, 2012 CFR
2012-04-01
... $ Memorandum 2: Report the gross par amount of fails to deliver. Included in the calculation of line item 3... millions at par value as of trade date] Security Being Reported Date For Which Information is Being... Principal Components of the Specific Security $ Total Net Trading Position $ 2. Gross Financing Position...
17 CFR Appendix B to Part 420 - Sample Large Position Report
Code of Federal Regulations, 2011 CFR
2011-04-01
... $ Memorandum 2: Report the gross par amount of fails to deliver. Included in the calculation of line item 3... millions at par value as of trade date] Security Being Reported Date For Which Information is Being... Principal Components of the Specific Security $ Total Net Trading Position $ 2. Gross Financing Position...
2011-07-21
CAPE CANAVERAL, Fla. -- Workers measured and marked in bright green the letters "NLG" at the spot where space shuttle Atlantis' nose landing gear came to a stop after the vehicle's final return from space. Securing the space shuttle fleet's place in history on the STS-135 mission, Atlantis safely and successfully rounded out NASA's Space Shuttle Program on the Shuttle Landing Facility's Runway 15 at Kennedy Space Center in Florida. Main gear touchdown was at 5:57:00 a.m. EDT, followed by nose gear touchdown at 5:57:20 a.m., and wheelstop at 5:57:54 a.m. On the 37th shuttle mission to the International Space Station, STS-135 delivered more than 9,400 pounds of spare parts, equipment and supplies in the Raffaello multi-purpose logistics module that will sustain station operations for the next year. STS-135 was the 33rd and final flight for Atlantis, which has spent 307 days in space, orbited Earth 4,848 times and traveled 125,935,769 miles. For more information visit, www.nasa.gov/mission_pages/shuttle/shuttlemissions/sts135/index.html. Photo credit: NASA/Kim Shiflett
Detection, Localization, and Tracking of Unauthorized UAS and Jammers
NASA Technical Reports Server (NTRS)
Guvenc, Ismail; Ozdemir, Ozgur; Yapici, Yavuz; Mehrpouyan, Hani; Matolak, David
2017-01-01
Small unmanned aircraft systems (UASs) are expected to take major roles in future smart cities, for example, by delivering goods and merchandise, potentially serving as mobile hot spots for broadband wireless access, and maintaining surveillance and security. Although they can be used for the betterment of the society, they can also be used by malicious entities to conduct physical and cyber attacks to infrastructure, private/public property, and people. Even for legitimate use-cases of small UASs, air traffic management (ATM) for UASs becomes of critical importance for maintaining safe and collusion-free operation. Therefore, various ways to detect, track, and interdict potentially unauthorized drones carries critical importance for surveillance and ATM applications. In this paper, we will review techniques that rely on ambient radio frequency signals (emitted from UASs), radars, acoustic sensors, and computer vision techniques for detection of malicious UASs. We will present some early experimental and simulation results on radar-based range estimation of UASs, and receding horizon tracking of UASs. Subsequently, we will overview common techniques that are considered for interdiction of UASs.
2011-06-01
CAPE CANAVERAL, Fla. -- The landing convoy that will make space shuttle Endeavour safe and secure for towing to its processing hangar begins to pull up around the vehicle following wheelstop on the Shuttle Landing Facility's Runway 15 at NASA's Kennedy Space Center in Florida. Endeavour's final return from space completed the 16-day, 6.5-million-mile STS-134 mission. Main gear touchdown was at 2:34:51 a.m. EDT, followed by nose gear touchdown at 2:35:04 a.m., and wheelstop at 2:35:36 a.m. STS-134 delivered the Alpha Magnetic Spectrometer-2 (AMS) and the Express Logistics Carrier-3 (ELC-3) to the International Space Station. AMS will help researchers understand the origin of the universe and search for evidence of dark matter, strange matter and antimatter from the station. ELC-3 carried spare parts that will sustain station operations once the shuttles are retired from service. STS-134 was the 25th and final flight for Endeavour, which spent 299 days in space, orbited Earth 4,671 times and traveled 122,883,151 miles. Photo credit: NASA/Kim Shiflett
2011-06-01
CAPE CANAVERAL, Fla. -- The landing convoy that will make space shuttle Endeavour safe and secure for towing to its processing hangar begins to pull up around the vehicle following wheelstop on the Shuttle Landing Facility's Runway 15 at NASA's Kennedy Space Center in Florida. Endeavour's final return from space completed the 16-day, 6.5-million-mile STS-134 mission. Main gear touchdown was at 2:34:51 a.m. EDT, followed by nose gear touchdown at 2:35:04 a.m., and wheelstop at 2:35:36 a.m. STS-134 delivered the Alpha Magnetic Spectrometer-2 (AMS) and the Express Logistics Carrier-3 (ELC-3) to the International Space Station. AMS will help researchers understand the origin of the universe and search for evidence of dark matter, strange matter and antimatter from the station. ELC-3 carried spare parts that will sustain station operations once the shuttles are retired from service. STS-134 was the 25th and final flight for Endeavour, which spent 299 days in space, orbited Earth 4,671 times and traveled 122,883,151 miles. Photo credit: NASA/Kim Shiflett
2011-06-01
CAPE CANAVERAL, Fla. -- The landing convoy that will make space shuttle Endeavour safe and secure for towing to its processing hangar begins to pull up around the vehicle following wheelstop on the Shuttle Landing Facility's Runway 15 at NASA's Kennedy Space Center in Florida. Endeavour's final return from space completed the 16-day, 6.5-million-mile STS-134 mission. Main gear touchdown was at 2:34:51 a.m. EDT, followed by nose gear touchdown at 2:35:04 a.m., and wheelstop at 2:35:36 a.m. STS-134 delivered the Alpha Magnetic Spectrometer-2 (AMS) and the Express Logistics Carrier-3 (ELC-3) to the International Space Station. AMS will help researchers understand the origin of the universe and search for evidence of dark matter, strange matter and antimatter from the station. ELC-3 carried spare parts that will sustain station operations once the shuttles are retired from service. STS-134 was the 25th and final flight for Endeavour, which spent 299 days in space, orbited Earth 4,671 times and traveled 122,883,151 miles. Photo credit: NASA/Kim Shiflett
2011-07-21
CAPE CANAVERAL, Fla. -- Workers measured and marked in bright red the letters "MLG" at the spot where space shuttle Atlantis' main landing gear came to a stop after the vehicle's final return from space. Securing the space shuttle fleet's place in history on the STS-135 mission, Atlantis safely and successfully rounded out NASA's Space Shuttle Program on the Shuttle Landing Facility's Runway 15 at Kennedy Space Center in Florida. Main gear touchdown was at 5:57:00 a.m. EDT, followed by nose gear touchdown at 5:57:20 a.m., and wheelstop at 5:57:54 a.m. On the 37th shuttle mission to the International Space Station, STS-135 delivered more than 9,400 pounds of spare parts, equipment and supplies in the Raffaello multi-purpose logistics module that will sustain station operations for the next year. STS-135 was the 33rd and final flight for Atlantis, which has spent 307 days in space, orbited Earth 4,848 times and traveled 125,935,769 miles. For more information visit, www.nasa.gov/mission_pages/shuttle/shuttlemissions/sts135/index.html. Photo credit: NASA/Kim Shiflett
Mitigating Cyber Security Risk in Satellite Ground Systems
2015-04-01
because cyber security in government remains shrouded in secrecy. However, using the Defense Operational Test and Evaluation Office’s (DOT& E ) FY14...report on cybersecurity one grasps the seriousness of the problem. DOT& E reported only 85% of networks in DoD were compliant with the cyber...security regulations discussed later in this paper. Not until compliance is near 100% could DOT& E conceive with confidence that DoD networks were safe
Safer environment makes sense for all.
Frith, Sue
2011-06-01
Sue Frith, deputy head of the NHS Security Management Service (NHS SMS), explains the organisation's important role in advising, and supporting, security staff at NHS hospitals in dealing with incidents ranging from verbal abuse to serious violence and aggression. Arguing that security in the NHS is "everyone's business", she explains both a range of processes and initiatives,already in place to safeguard people and assets, and discusses recent developments, such as a new incident reporting website, designed to help keep patients, staff, visitors, and property, at healthcare facilities safe and secure.
Mobile Technology: The Foundation for an Engaged and Secure Campus Community
ERIC Educational Resources Information Center
Chapel, Edward
2008-01-01
Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…
ERIC Educational Resources Information Center
McLester, Susan
2011-01-01
In the spring of 1999, 12 students and a teacher were killed by two gun-toting teenage boys at Columbine High School in Littleton, Colorado, making school safety and security an overnight priority in communities across the nation. Many schools are starting to borrow security methods and technology from the business world such as video intercoms,…
ERIC Educational Resources Information Center
Cavanagh, Sean
2004-01-01
Since the Sept. 11, 2001, terrorist attacks, student interest in school programs dealing with careers in law, public safety, and national security is on the rise. This article describes students' experiences at the Academy for Law and Public Safety at Butler High School in Butler, New Jersey. This vocational academy is one of a number of career…
ERIC Educational Resources Information Center
Schneider, Tod; Walker, Hill; Sprague, Jeffrey
This document seeks to synthesize, integrate, and make available to school personnel solid information regarding Crime Prevention through Environmental Design (CPTED). Chapter 1, "The Changed Landscape of School Safety and Security," examines characteristics of safe and unsafe schools, causes of vulnerability, and the role of design and technology…
78 FR 77608 - Requirements for Contacts with Federal Credit Unions
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... an FCU official, NCUA has no way of ensuring the environment is safe for its employees or conducive to working efficiently and securely. NCUA staff who have conducted on-site contacts in homes have... other FCU contacts occur in a professional and safe setting. \\5\\ Id. 1766(j)(1). \\6\\ Id. 1789(a)(4). 3...
Home-SAFE: A New Approach in Day Care for the Young Child.
ERIC Educational Resources Information Center
Kornfeld, Maurine
The Los Angeles Section, National Council of Jewish Women, has developed an innovative pilot program in day care geared to the changing life style of child rearing by single parents. Home-SAFE provides children a warm, secure environment in supervised, subsidized, licensed day care homes, and includes enrichment activities by trained volunteers;…
Experimental Physical Sciences Vitae 2017
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kippen, Karen Elizabeth; Del Mauro, Diana; Patterson, Eileen Frances
Frequently our most basic research experiments stimulate solutions for some of the most intractable national security problems, such as nuclear weapons stewardship, homeland security, intelligence and information analysis, and nuclear and alternative energy. This publication highlights our talented and creative staff who deliver solutions to these complex scientific and technological challenges by conducting cutting-edge multidisciplinary physical science research.
NASA Astrophysics Data System (ADS)
Salmon, Neil A.
2017-10-01
Aperture synthesis for passive millimetre wave imaging provides a means to screen people for concealed threats in the extreme near-field configuration of a portal, a regime where the imager to subject distance is of the order of both the required depth-of-field and the field-of-view. Due to optical aberrations, focal plane array imagers cannot deliver the large depth-of-fields and field-of-views required in this regime. Active sensors on the other hand can deliver these but face challenges of illumination, speckle and multi-path issues when imaging canyon regions of the body. Fortunately an aperture synthesis passive millimetre wave imaging system can deliver large depth-of-fields and field-of-views, whilst having no speckle effects, as the radiometric emission from the human body is spatially incoherent. Furthermore, as in portal security screening scenarios the aperture synthesis imaging technique delivers a half-wavelength spatial resolution, it can effectively screen the whole of the human body. Some recent measurements are presented that demonstrate the three-dimensional imaging capability of extended sources using a 22 GHz aperture synthesis system. A comparison is made between imagery generated via the analytic Fourier transform and a gridding fast Fourier transform method. The analytic Fourier transform enables aliasing in the imagery to be more clearly identified. Some initial results are also presented of how the Gerchberg technique, an image enhancement algorithm used in radio astronomy, is adapted for three-dimensional imaging in security screening. This technique is shown to be able to improve the quality of imagery, without adding extra receivers to the imager. The requirements of a walk through security screening system for use at entrances to airport departure lounges are discussed, concluding that these can be met by an aperture synthesis imager.
Hunt, G J; Tabachnick, W J
1996-05-01
Equipment and procedures are described for biosafety level 3 (BL-3) containment work with small, zoophilic arthropods. BL-3 classified pathogens always must be manipulated in biological safety cabinets. Procedures, including physical barriers and handling methods, that prevent the escape of potentially virus-infected insects are discussed, and the use of a monitoring system for insect security is explained. The inability to recover escaped minute, flying insects poses a major difference from similar work with larger insects, such as mosquitoes. Methods were developed for the safe and secure handling of Culicoides variipennis sonorensis Wirth & Jones infected with exotic bluetongue viruses during BL-3 containment.
2012-01-01
Martin B. Zimmerman, “Market Incentives for Safe Commercial Airline Operation,” American Economic Review, Vol. 78, No. 5, 1988, pp. 913–935. Bosch...Modeling,” in Stuart Johnson, Martin C. Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif...677–725. Persico, Nicola, and Petra E. Todd, “Passenger Profiling, Imperfect Screening, and Airport Security,” American Economic Review, Vol. 95
Wright, Lauri; Vance, Lauren; Sudduth, Christina; Epps, James B
2015-01-01
Maintaining independence and continuing to live at home is one solution to manage the rising health care costs of aging populations in the United States; furthermore, seniors are at risk of malnutrition and food insecurity. Home-delivered meal programs are a tool to address food, nutrition, and well-being concerns of this population. Few studies have identified outcomes from these programs; this pilot study reviews the nutritional status, dietary intake, well-being, loneliness, and food security levels of seniors participating in a Meals on Wheels delivery service. Clients, new to the meal program, participated in pre- and postphone interviews, and 51 seniors completed the study. The survey was composed of five scales or questionnaires, and statistical analyses were conducted using SPSS. Improvements across all five measures were statistically significant after participating two months in the home-delivered meal program. Implications for further research, practice, and the Older Americans Act are discussed.
Mehta, N; Williams, R J; Smith, M E; Hall, A; Hardman, J C; Cheung, L; Ellis, M P; Fussey, J M; Lakhani, R; McLaren, O; Nankivell, P C; Sharma, N; Yeung, W; Carrie, S; Hopkins, C
2017-06-01
To investigate the feasibility of a national audit of epistaxis management led and delivered by a multi-region trainee collaborative using a web-based interface to capture patient data. Six trainee collaboratives across England nominated one site each and worked together to carry out this pilot. An encrypted data capture tool was adapted and installed within the infrastructure of a university secure server. Site-lead feedback was assessed through questionnaires. Sixty-three patients with epistaxis were admitted over a two-week period. Site leads reported an average of 5 minutes to complete questionnaires and described the tool as easy to use. Data quality was high, with little missing data. Site-lead feedback showed high satisfaction ratings for the project (mean, 4.83 out of 5). This pilot showed that trainee collaboratives can work together to deliver an audit using an encrypted data capture tool cost-effectively, whilst maintaining the highest levels of data quality.
Cutrona, Sarah L; Fouayzi, Hassan; Burns, Laura; Sadasivam, Rajani S; Mazor, Kathleen M; Gurwitz, Jerry H; Garber, Lawrence; Sundaresan, Devi; Houston, Thomas K; Field, Terry S
2017-11-01
Time-sensitive alerts are among the many types of clinical notifications delivered to physicians' secure InBaskets within commercial electronic health records (EHRs). A delayed alert review can impact patient safety and compromise care. To characterize factors associated with opening of non-interruptive time-sensitive alerts delivered into primary care provider (PCP) InBaskets. We analyzed data for 799 automated alerts. Alerts highlighted actionable medication concerns for older patients post-hospital discharge (2010-2011). These were study-generated alerts sent 3 days post-discharge to InBaskets for 75 PCPs across a multisite healthcare system, and represent a subset of all urgent InBasket notifications. Using EHR access and audit logs to track alert opening, we performed bivariate and multivariate analyses calculating associations between patient characteristics, provider characteristics, contextual factors at the time of alert delivery (number of InBasket notifications, weekday), and alert opening within 24 h. At the time of alert delivery, the PCPs had a median of 69 InBasket notifications and had received a median of 379.8 notifications (IQR 295.0, 492.0) over the prior 7 days. Of the 799 alerts, 47.1% were opened within 24 h. Patients with longer hospital stays (>4 days) were marginally more likely to have alerts opened (OR 1.48 [95% CI 1.00-2.19]). Alerts delivered to PCPs whose InBaskets had a higher number of notifications at the time of alert delivery were significantly less likely to be opened within 24 h (top quartile >157 notifications: OR 0.34 [95% CI 0.18-0.61]; reference bottom quartile ≤42). Alerts delivered on Saturdays were also less likely to be opened within 24 h (OR 0.18 [CI 0.08-0.39]). The number of total InBasket notifications and weekend delivery may impact the opening of time-sensitive EHR alerts. Further study is needed to support safe and effective approaches to care team management of InBasket notifications.
NASA Technical Reports Server (NTRS)
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
1995-01-01
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
76 FR 802 - Florida Power and Light Company, Turkey Point, Units 3 and 4; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-06
..., health physics, chemistry, and security, to maintain the safe and secure operation of the facility. The... exemption is authorized by law. No Undue Risk to Public Health and Safety The underlying purposes of 10 CFR... previously evaluated. Therefore, there is no undue risk to public health and safety. Consistent With Common...
Security Is Not an Option--Learning in a Safe Environment. FEDA Paper.
ERIC Educational Resources Information Center
Coe, Beatrice
1997-01-01
A study examined what further education colleges in Britain were doing about security and what they planned for the future. A literature search found that a PEST (Political/legal, Economic, Sociocultural, and Technological) analysis was one way to examine the differential impact of external influences. A PEST analysis offered a strategy for…
75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
... FR 3316). Public Meeting We do not now plan to hold a public meeting. But you may submit a request... reason: Vessel traffic can pass safely around the security zone. If you think that your business... do not individually or cumulatively have a significant effect on the human environment. A preliminary...
Maximum Security. The Culture of Violence in Inner-City Schools.
ERIC Educational Resources Information Center
Devine, John
In an ethnographic reflection on 10 years experience working in the high schools of inner-city New York, issues of school safety, discipline, and violence are explored. The central proposition is that the mentality that relies on paramilitary security measures and technological devices, such as metal detectors, to achieve safe schools is only an…
49 CFR 214.507 - Required safety equipment for new on-track roadway maintenance machines.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) A seat for each operator, except as provided in paragraph (b) of this section; (2) A safe and secure position with handholds, handrails, or a secure seat for each roadway worker transported on the machine... windshield wipers are incompatible with the windshield material; (5) A machine braking system capable of...
49 CFR 214.507 - Required safety equipment for new on-track roadway maintenance machines.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) A seat for each operator, except as provided in paragraph (b) of this section; (2) A safe and secure position with handholds, handrails, or a secure seat for each roadway worker transported on the machine... windshield wipers are incompatible with the windshield material; (5) A machine braking system capable of...
49 CFR 214.507 - Required safety equipment for new on-track roadway maintenance machines.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) A seat for each operator, except as provided in paragraph (b) of this section; (2) A safe and secure position with handholds, handrails, or a secure seat for each roadway worker transported on the machine... windshield wipers are incompatible with the windshield material; (5) A machine braking system capable of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-11
... intermodal container loaded with eyes crosswise, grouped in rows, in which the coils are loaded to contact... cargo securement regulations for the transportation of groups of metal coils with eyes crosswise, as... cargo securement regulations (then at 49 CFR 393.100(c)) for the transportation of groups of metal coils...
360 PORT MDA - A Strategy to Improve Port Security
2006-09-01
Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than
Code of Federal Regulations, 2011 CFR
2011-04-01
... and forward-looking information. 230.168 Section 230.168 Commodity and Securities Exchanges SECURITIES... factual business information and forward-looking information. Preliminary Notes to § 230.168. 1. This... provides a non-exclusive safe harbor for factual business information and forward-looking information...
Goldberg, J; Freund, E; Beckers, B; Hinzmann, R
2001-02-01
Asthma can be effectively treated by the use of bronchodilator therapies administered by inhalation. The objective of this study was to describe the dose-response relationship of combined doses of fenoterol hydrobromide (F) and ipratropium bromide (I) (F/I) delivered via Respimat, a soft mist inhaler, and to establish the Respimat dose which is as efficacious and as safe as the standard marketed dose of F/I (100/40 microg) which is delivered via a conventional metered dose inhaler (MDI). In a double-blind (within device) cross-over study with a balanced incomplete block design, 62 patients with stable bronchial asthma (mean forced expiratory volume in one second (FEV1) 63% predicted) were randomized at five study centres to receive five out of eight possible treatments: placebo, F/I 12.5/5, 25/10, 50/20, 100/40 or 200/80 microg delivered via Respimat; F/I 50/20 or 100/40 microg delivered via MDI. Pulmonary function results were based on the per-protocol dataset, comprising 47 patients. All F/I doses produced greater increases in FEV1 than placebo. A log-linear dose-response was obtained for the average increase in FEV1 up to 6 h (AUC0-6 h) and peak FEV1 across the dose range administered by Respimat. Statistically, therapeutic equivalence was not demonstrated between any F/I dose administered by Respimat compared with the MDI. However 12.5/5 and 25/10 microg F/I administered via Respimat were closest (slightly superior) to the F/I dose of 100/40 microg delivered via MDI. Pharmacokinetic data from 34 patients indicated a two-fold greater systemic availability of both drugs following inhalation by Respimat compared to MDI. In general, the active treatments were well tolerated and safe with regard to vital signs, electrocardiography, laboratory parameters and adverse events. In conclusion, combined administration of fenoterol hydrobromide and ipratropium bromide via Respimat, is as effective and as safe as higher doses given via a metered dose inhaler.
Enterprise systems security management: a framework for breakthrough protection
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2010-04-01
Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.
Code of Federal Regulations, 2011 CFR
2011-04-01
... evidence that a distribution and an acquisition are not part of a plan. (2) Certain post-distribution...-percent test of paragraph (a)(2) of this section. (d) Safe harbors—(1) Safe Harbor I. A distribution and... corporation that the acquired corporation (Distributing or Controlled) controls within the meaning of section...
ERIC Educational Resources Information Center
Teague, James Brian
2013-01-01
In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…
Nicholls, Jacqueline; Dobbs, Christine; Sethi, Nayha; Cunningham, James; Ainsworth, John; Heaven, Martin; Peacock, Trevor; Peacock, Anthony; Jones, Kerina; Laurie, Graeme; Kalra, Dipak
2016-01-01
In parallel with the advances in big data-driven clinical research, the data safe haven concept has evolved over the last decade. It has led to the development of a framework to support the secure handling of health care information used for clinical research that balances compliance with legal and regulatory controls and ethical requirements while engaging with the public as a partner in its governance. We describe the evolution of 4 separately developed clinical research platforms into services throughout the United Kingdom-wide Farr Institute and their common deployment features in practice. The Farr Institute is a case study from which we propose a common definition of data safe havens as trusted platforms for clinical academic research. We use this common definition to discuss the challenges and dilemmas faced by the clinical academic research community, to help promote a consistent understanding of them and how they might best be handled in practice. We conclude by questioning whether the common definition represents a safe and trustworthy model for conducting clinical research that can stand the test of time and ongoing technical advances while paying heed to evolving public and professional concerns. PMID:27329087
[Food poisoning--importance of international perspective].
Nishibuchi, Mitsuaki
2012-08-01
It is important to obtain the information on food security in the countries other than Japan since more than 60 % of the food consumed come from these countries. Food security is now considered as a global issue. A global trend persuading us to provide safe food to humans is based on the concept of human security development associated with a sense of human mission to sustain one's life. Another global tendency pushing us to secure safety and hygiene of food is driven by the economic pressure coming from the rules in international trade established by Codex Committee under FAO/WHO. In contrast to these trends under globalization requesting safe and hygienic food, food habits based on tradition or religion are maintained locally in various parts of the world. These local habits include eating raw or improperly cooked foods, which may become a risk of being exposed to food poisoning pathogens. This issue may be adequately solved by a risk assessment approach based on the concept of appropriate level of protection (ALOP). Like or not, people in some local areas live in the unhygienic environment where they are unintentionally and frequently exposed to enteric pathogens or immunologically cross-reacting microorganisms through which they may acquire specific immunity to the pathogens and escape from infection by the pathogens. There are therefore many areas in the world where people understand the necessity to provide safe food at the international level (globalization) but actually consume food in varying hygienic conditions from area to area due in part to traditional food habits or living environments (localization); we call this situation as glocalization (global+local).
A Safe Bacterial Microsyringe for In Vivo Antigen Delivery and Immunotherapy
Le Gouëllec, Audrey; Chauchet, Xavier; Laurin, David; Aspord, Caroline; Verove, Julien; Wang, Yan; Genestet, Charlotte; Trocme, Candice; Ahmadi, Mitra; Martin, Sandrine; Broisat, Alexis; Cretin, François; Ghezzi, Catherine; Polack, Benoit; Plumas, Joël; Toussaint, Bertrand
2013-01-01
The industrial development of active immunotherapy based on live-attenuated bacterial vectors has matured. We developed a microsyringe for antigen delivery based on the type III secretion system (T3SS) of P. aeruginosa. We applied the “killed but metabolically active” (KBMA) attenuation strategy to make this bacterial vector suitable for human use. We demonstrate that attenuated P. aeruginosa has the potential to deliver antigens to human antigen-presenting cells in vitro via T3SS with considerable attenuated cytotoxicity as compared with the wild-type vector. In a mouse model of cancer, we demonstrate that this KBMA strain, which cannot replicate in its host, efficiently disseminates into lymphoid organs and delivers its heterologous antigen. The attenuated strain effectively induces a cellular immune response to the cancerous cells while lowering the systemic inflammatory response. Hence, a KBMA P. aeruginosa microsyringe is an efficient and safe tool for in vivo antigen delivery. PMID:23531551
Quasistatic Cavity Resonance for Ubiquitous Wireless Power Transfer.
Chabalko, Matthew J; Shahmohammadi, Mohsen; Sample, Alanson P
2017-01-01
Wireless power delivery has the potential to seamlessly power our electrical devices as easily as data is transmitted through the air. However, existing solutions are limited to near contact distances and do not provide the geometric freedom to enable automatic and un-aided charging. We introduce quasistatic cavity resonance (QSCR), which can enable purpose-built structures, such as cabinets, rooms, and warehouses, to generate quasistatic magnetic fields that safely deliver kilowatts of power to mobile receivers contained nearly anywhere within. A theoretical model of a quasistatic cavity resonator is derived, and field distributions along with power transfer efficiency are validated against measured results. An experimental demonstration shows that a 54 m3 QSCR room can deliver power to small coil receivers in nearly any position with 40% to 95% efficiency. Finally, a detailed safety analysis shows that up to 1900 watts can be transmitted to a coil receiver enabling safe and ubiquitous wireless power.
Quasistatic Cavity Resonance for Ubiquitous Wireless Power Transfer
Shahmohammadi, Mohsen; Sample, Alanson P.
2017-01-01
Wireless power delivery has the potential to seamlessly power our electrical devices as easily as data is transmitted through the air. However, existing solutions are limited to near contact distances and do not provide the geometric freedom to enable automatic and un-aided charging. We introduce quasistatic cavity resonance (QSCR), which can enable purpose-built structures, such as cabinets, rooms, and warehouses, to generate quasistatic magnetic fields that safely deliver kilowatts of power to mobile receivers contained nearly anywhere within. A theoretical model of a quasistatic cavity resonator is derived, and field distributions along with power transfer efficiency are validated against measured results. An experimental demonstration shows that a 54 m3 QSCR room can deliver power to small coil receivers in nearly any position with 40% to 95% efficiency. Finally, a detailed safety analysis shows that up to 1900 watts can be transmitted to a coil receiver enabling safe and ubiquitous wireless power. PMID:28199321
Security Measures to Protect Mobile Agents
NASA Astrophysics Data System (ADS)
Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh
2010-11-01
The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.
Strategic Research Action Plans 2016-2019
EPA's six research priorities: Air, Climate, Energy; Chemical Safety for Sustainability, Homeland Security, Human Health Risk Assessment, Sustainable and Healthy Communities, Safe and Sustainable Water Resources.
NASA Astrophysics Data System (ADS)
Kiktenko, E. O.; Pozhar, N. O.; Anufriev, M. N.; Trushechkin, A. S.; Yunusov, R. R.; Kurochkin, Y. V.; Lvovsky, A. I.; Fedorov, A. K.
2018-07-01
Blockchain is a distributed database which is cryptographically protected against malicious modifications. While promising for a wide range of applications, current blockchain platforms rely on digital signatures, which are vulnerable to attacks by means of quantum computers. The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so parties with access to quantum computation would have unfair advantage in procuring mining rewards. Here we propose a possible solution to the quantum era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information-theoretically secure authentication. These results address important questions about realizability and scalability of quantum-safe blockchains for commercial and governmental applications.
Solidify, An LLVM pass to compile LLVM IR into Solidity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kothapalli, Abhiram
The software currently compiles LLVM IR into Solidity (Ethereum’s dominant programming language) using LLVM’s pass library. Specifically, his compiler allows us to convert an arbitrary DSL into Solidity. We focus specifically on converting Domain Specific Languages into Solidity due to their ease of use, and provable properties. By creating a toolchain to compile lightweight domain-specific languages into Ethereum's dominant language, Solidity, we allow non-specialists to effectively develop safe and useful smart contracts. For example lawyers from a certain firm can have a proprietary DSL that codifies basic laws safely converted to Solidity to be securely executed on the blockchain. Inmore » another example, a simple provenance tracking language can be compiled and securely executed on the blockchain.« less
Jangland, Eva; Nyberg, Berit; Yngman-Uhlin, Pia
2017-06-01
Surgical care plays an important role in the acute hospital's delivery of safe, high-quality patient care. Although demands for effectiveness are high in surgical wards quality of care and patient safety must also be secured. It is therefore necessary to identify the challenges and barriers linked to quality of care and patient safety with a focus on this specific setting. To explore situations and processes that support or hinder good safe patient care on the surgical ward. This qualitative study was based on a strategic sample of 10 department and ward leaders in three hospitals and six surgical wards in Sweden. Repeated reflective interviews were analysed using systematic text condensation. Four themes described the leaders' view of a complex healthcare setting that demands effectiveness and efficiency in moving patients quickly through the healthcare system. Quality of care and patient safety were often hampered factors such as a shift of care level, with critically ill patients cared for without reorganisation of nurses' competencies on the surgical ward. There is a gap between what is described in written documents and what is or can be performed in clinical practice to achieve good care and safe care on the surgical ward. A shift in levels of care on the surgical ward without reallocation of the necessary competencies at the patient's bedside show consequences for quality of care and patient safety. This means that surgical wards should consider reviewing their organisation and implementing more advanced nursing roles in direct patient care on all shifts. The ethical issues and the moral stress on nurses who lack the resources and competence to deliver good care according to professional values need to be made more explicit as a part of the patient safety agenda in the surgical ward. © 2016 Nordic College of Caring Science.
Rapid Growth in Surgeons’ Use of Secure Messaging in a Patient Portal
Shenson, Jared A.; Cronin, Robert M.; Davis, Sharon E.; Chen, Qingxia; Jackson, Gretchen Purcell
2016-01-01
Background Use of secure messaging through patient portals has risen substantially in recent years due to provider incentives and consumer demand. Secure messaging may increase patient satisfaction and improve outcomes, but also adds to physician workload. Most prior studies of secure messaging focused on primary care and medical specialties. We examined surgeons’ use of secure messaging and the contribution of messaging to outpatient interactions in a broadly-deployed patient portal. Methods We determined the number of clinic visits and secure messages for surgical providers in the first three years (2008–10) after patient portal deployment at an academic medical center. We calculated the proportion of outpatient interaction conducted through messaging for each specialty. Logistic regression models compared the likelihood of message-based versus clinic outpatient interaction across surgical specialties. Results Over the study period, surgical providers delivered care in 648,200 clinic visits and received 83,912 messages, with more than 200% growth in monthly message volume. Surgical specialties receiving the most messages were orthopedics/podiatry (25.1%), otolaryngology (20.1%), urology (10.8%), and general surgery (9.6%); vascular surgery (0.8%) and pediatric general surgery (0.2%) received the fewest. The proportion of outpatient interactions conducted through secure messaging increased significantly from 5.4% in 2008 to 15.3% in 2010 (p<0.001) with all specialties experiencing growth. Heart/lung transplantation (74.9%), liver/kidney/pancreas transplantation (69.5%), and general surgery (48.7%) had the highest proportion of message-based outpatient interaction by the end of the study. Conclusions This study demonstrates rapid adoption of online secure messaging across surgical specialties with significant growth in its use for outpatient interaction. Some specialties, particularly those with long-term follow-up, interacted with patients more through secure messaging than in person. As surgeons devote more time to secure messaging, additional research will be needed to understand the care delivered through online interactions and to develop models for reimbursement. PMID:26123340
Non-physician delivered intravitreal injection service is feasible and safe - a systematic review.
Rasul, Asrin; Subhi, Yousif; Sørensen, Torben Lykke; Munch, Inger Christine
2016-05-01
Non-physicians such as nurses are trained to give injections into the vitreous body of the eye to meet the increasing demand for intravitreal therapy with vascular endothelial growth factor inhibitors against common eye diseases, e.g. age-related macular degeneration and diabetic retinopathy. We systematically reviewed the existing literature to provide an overview of the experiences in this transformational process. We searched for literature on 22 September 2015 using PubMed, Embase, the Cochrane Library, CINAHL and the Web of Science. Eligible studies had to address any outcome based on non-physician delivered intravitreal therapy regardless of the study design. Being non-physician was defined as the injecting personnel not being a physician, but no further restrictions were made. Five studies were included with a total of 31,303 injections having been performed by 16 nurses. The studies found that having nurses perform the intravitreal injections produced to a short-term capacity improvement and liberated physicians for other clinical work. Training was provided through courses and direct supervision. The rates of endophthalmitis were 0-0.40‰, which is comparable to reported rates when the intravitreal therapy is given by physicians. Non-physician delivered intravitreal therapy seems feasible and safe.
Developing a Defense Sector Assessment Rating Tool
2010-01-01
JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Cathryn Quantic Thurston, and Gregory F. Treverton (MG-863-OSD). • Making Liberia Safe: Transformation of the National Security Sector, by David C...Cathryn Quantic Thurston, and Gregory F. Treverton, A Framework to Assess Programs for Building Partnerships, Santa Monica, Calif.: RAND Corporation
ERIC Educational Resources Information Center
Florida State Legislature, Tallahassee. Office of Program Policy Analysis and Government Accountability.
The 2001 Florida Legislature passed Ch. 2001-125, Laws of Florida, Section 40, which is often referred to as the Safe Passage Act. It requires all school districts to conduct a self-assessment of their school safety and security using best practices developed by the Office of Program Policy Analysis and Government Accountability (OPPAGA). It also…
USDA-ARS?s Scientific Manuscript database
The impetus behind the global food security challenge is direct, with the necessity to feed over 9 billion people by 2050. Developing a food-secure world, where people have access to a safe and sustainable food supply is the principal goal of this challenge. To achieve this end, beef production ent...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-14
... vehicle, in a sided vehicle, or in an intermodal container loaded with eyes crosswise, grouped in rows, in... pre-January 1, 2004 cargo securement regulations for the transportation of groups of metal coils with... the pre-January 1, 2004 cargo securement regulations (then at 49 CFR 393.100(c)) for the...
LIFE: a sustainable solution for developing safe, clean fusion power.
Reyes, Susana; Dunne, Mike; Kramer, Kevin; Anklam, Tom; Havstad, Mark; Mazuecos, Antonio Lafuente; Miles, Robin; Martinez-Frias, Joel; Deri, Bob
2013-06-01
The National Ignition Facility (NIF) at the Lawrence Livermore National Laboratory (LLNL) in California is currently in operation with the goal to demonstrate fusion energy gain for the first time in the laboratory-also referred to as "ignition." Based on these demonstration experiments, the Laser Inertial Fusion Energy (LIFE) power plant is being designed at LLNL in partnership with other institutions with the goal to deliver baseload electricity from safe, secure, sustainable fusion power in a time scale that is consistent with the energy market needs. For this purpose, the LIFE design takes advantage of recent advances in diode-pumped, solid-state laser technology and adopts the paradigm of Line Replaceable Units used on the NIF to provide high levels of availability and maintainability and mitigate the need for advanced materials development. The LIFE market entry plant will demonstrate the feasibility of a closed fusion fuel cycle, including tritium breeding, extraction, processing, refueling, accountability, and safety, in a steady-state power-producing device. While many fusion plant designs require large quantities of tritium for startup and operations, a range of design choices made for the LIFE fuel cycle act to reduce the in-process tritium inventory. This paper presents an overview of the delivery plan and the preconceptual design of the LIFE facility with emphasis on the key safety design principles being adopted. In order to illustrate the favorable safety characteristics of the LIFE design, some initial accident analysis results are presented that indicate potential for a more attractive licensing regime than that of current fission reactors.
Protecting computer-based medical devices: defending against viruses and other threats.
2005-07-01
The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.
Get Research Publications and News by Email
EPA's six research priorities: Air, Climate, Energy; Chemical Safety for Sustainability, Homeland Security, Human Health Risk Assessment, Sustainable and Healthy Communities, Safe and Sustainable Water Resources.
Rogers, Cindy J
2005-01-01
The modern formulation of dihydroxyacetone (DHA), the only sunless tanning solution approved by the Food and Drug Administration (FDA), is combined with bronzers and moisturizers to deliver a cosmetically acceptable skin color and a natural-looking tan without ultraviolet (UV) exposure. Spray-on tanning products, which deliver this formulation evenly to achieve a full body tan, may be applied in a tanning booth, airbrushed on by a technician, or sprayed on at home, and they appear to offer a generally safe alternative for patients who seek a suntanned appearance.
ERIC Educational Resources Information Center
Gross, Zehavit; Rutland, Suzanne D.
2016-01-01
This study seeks to analyse the components that contribute to Special Religious Education (SRE) classes in government schools in Australia being considered as a "safe place" and the ways in which they facilitate an understanding of the students' own religious and cultural identity. Our research focuses on one of the small faiths,…
A study of the security technology and a new security model for WiFi network
NASA Astrophysics Data System (ADS)
Huang, Jing
2013-07-01
The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.
NASA Astrophysics Data System (ADS)
Farroha, Bassam; Farroha, Deborah
2012-05-01
Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.
Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan
2015-08-01
Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.
Secure Embedded System Design Methodologies for Military Cryptographic Systems
2016-03-31
Fault- Tree Analysis (FTA); Built-In Self-Test (BIST) Introduction Secure access-control systems restrict operations to authorized users via methods...failures in the individual software/processor elements, the question of exactly how unlikely is difficult to answer. Fault- Tree Analysis (FTA) has a...Collins of Sandia National Laboratories for years of sharing his extensive knowledge of Fail-Safe Design Assurance and Fault- Tree Analysis
ERIC Educational Resources Information Center
Bryan, Hazel
2017-01-01
The "Revised Prevent Duty Guidance for England and Wales" presents statutory guidance under section 29 of the Counter-Terrorism and Security Act 2015. This guidance states that "Schools should be safe spaces in which children and young people can understand and discuss sensitive topics, including terrorism and the extremist ideas…
Secure Container For Discarded Hypodermic Needles
NASA Technical Reports Server (NTRS)
Lee, Angelene M.
1992-01-01
Container designed for safe retention of discarded blood-collecting hypodermic needles and similar sharp objects used in life-science experiments aboard spacecraft. Needles inserted through self-closing lid and retained magnetically. They are inserted, sharp end first, through spring-loaded flap. Long needles and needles on syringes cannot turn around in container. Can be emptied, cleaned, and reused. Used on Earth to provide unusually secure containment of sharp objects.
Extending the Thin Blue Line: Constabulary Police Development in Phase Zero Operations
2015-05-16
procure intelligence and support from local nationals. This participatory community approach to policing promotes a lasting sense of security and safety...conflict by posturing the Germans to establish law and order and internal and border security.92 The participatory police partnership also resulted in...host nation police forces supported the expansion of democracy and promoted safe overseas economic transactions. Consequently, government officials
ERIC Educational Resources Information Center
Vigue, Beverly
2006-01-01
The goal of an effective security program is to prevent vandalism, reduce the risk of personal violence, prevent direct or collateral damage to assets and facilities, preserve a safe and secure environment while limiting liability, and lower repair and maintenance costs. With the proper equipment it is possible to achieve all these things. A door…
The US Army and Future Security Force Assistance Operations
2013-04-01
havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the future...safe havens. It addresses the recent evolution of SFA doctrine, guidance and authorities, and the role of interagency cooperation related to the...organizations at all levels. 5 SFA extends well beyond military-to-military training and conceptually addresses security as a system of
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chinn, D J
This month's issue has the following articles: (1) Homeland Security Begins Abroad--Commentary by John C. Doesburg; (2) Out of Harm's Way--New physical protection and accountability systems, together with a focus on security, safeguard nuclear materials in the Russian Federation; (3) A Calculated Journey to the Center of the Earth--Determining the permeability of partially melted metals in a mineral matrix unlocks secrets about the formation of Earth's core; (4) Wireless That Works--Communication technologies using ultrawideband radar are improving national security; and (5) Power to the People--Edward Teller envisioned safe and plentiful nuclear power for peaceful applications.
Safe: a status update on information security and the hospital community.
Fundner, Rita
2003-01-01
IT Security and Privacy are becoming increasingly visible "hot topics" across the full spectrum of industry and service sectors. Legislation and global "best practices" are working hard to defend organizations and individuals against escalating, rapidly evolving cyber-threats. Predictably, the threat landscape is having an impact on all levels to varying degrees: governmental, organizational and individual. This article introduces the basic context for information security and offers insight into how a number of hospitals are addressing the situation, what barriers they currently face and what opportunities they see unfolding.
Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy
NASA Astrophysics Data System (ADS)
Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan
2016-11-01
Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.
Report: EPA Lacks Internal Controls to Prevent Misuse of Emergency Drinking Water Facilities
Report #11-P-0001, October 12, 2010. EPA cannot accurately assess the risk of public water systems delivering contaminated drinking water from emergency facilities because of limitations in Safe Drinking Water Information System (SDWIS) data management.
Innovate to Deliver Act of 2013
Rep. Cummings, Elijah E. [D-MD-7
2013-07-16
House - 09/13/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Stockman, Steve [R-TX-36
2013-09-26
House - 01/09/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
ERIC Educational Resources Information Center
Caron, Jean; Julien, Marie; Huang, Jean Hua
2008-01-01
This study presents the changes in the overall and firearm suicide rates for Quebec (Canada) before and after Bill C-17, which was implemented to secure safe storage of firearms. It covers 20,009 suicide cases reported to the coroner's office. Interrupted time series analysis is used to compare suicide rates in the two periods. Firearm suicide…
Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven
2011-06-03
havens—such as activities funded through State’s Peacekeeping Operations and State-funded DHS training to combat money laundering and bulk cash...Management, Committee on Homeland Security House of Representatives COMBATING TERRORISM U.S. Government Strategies and Efforts to Deny Terrorists... Combating Terrorism: U.S. Government Strategies and Efforts to Deny Terrorists Safe Haven 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT
Compact, diode-pumped, solid-state lasers for next generation defence and security sensors
NASA Astrophysics Data System (ADS)
Silver, M.; Lee, S. T.; Borthwick, A.; McRae, I.; Jackson, D.; Alexander, W.
2015-06-01
Low-cost semiconductor laser diode pump sources have made a dramatic impact in sectors such as advanced manufacturing. They are now disrupting other sectors, such as defence and security (D&S), where Thales UK is a manufacturer of sensor systems for application on land, sea, air and man portable. In this talk, we will first give an overview of the market trends and challenges in the D&S sector. Then we will illustrate how low cost pump diodes are enabling new directions in D&S sensors, by describing two diode pumped, solid- state laser products currently under development at Thales UK. The first is a new generation of Laser Target Designators (LTD) that are used to identify targets for the secure guiding of munitions. Current systems are bulky, expensive and require large battery packs to operate. The advent of low cost diode technology, merged with our novel solid-state laser design, has created a designator that will be the smallest, lowest cost, STANAG compatible laser designator on the market. The LTD delivers greater that 50mJ per pulse up to 20Hz, and has compact dimensions of 125×70×55mm. Secondly, we describe an ultra-compact, eye-safe, solid-state laser rangefinder (LRF) with reduced size, weight and power consumption compared to existing products. The LRF measures 100×55×34mm, weighs 200g, and can range to greater than 10km with a single laser shot and at a reprate of 1Hz. This also leverages off advances in laser pump diodes, but also utilises low cost, high reliability, packaging technology commonly found in the telecoms sector. As is common in the D&S sector, the products are designed to work in extreme environments, such as wide temperature range (-40 to +71°C) and high levels of shock and vibration. These disruptive products enable next- generation laser sensors such as rangefinders, target designators and active illuminated imagers.
Security Issues and Resulting Security Policies for Mobile Devices
2013-03-01
protecting it. The Army has requested that the capabilities of these devices be delivered rapidly to the battlefield. Programs like Joint Battle...Explosives (ATF) has already deployed 50 iPads, with interest in deploying 50 additional devices. Despite the desire to rapidly deploy these devices, little...come in many different forms, such as personal data assistants, smart phones, and tablets . Today, the most popular mobile devices are characterized by
Implementing the global health security agenda: lessons from global health and security programs.
Paranjape, Suman M; Franz, David R
2015-01-01
The Global Health Security Agenda (GHSA) describes a vision for a world that is safe and secure from infectious disease threats; it underscores the importance of developing the international capacity to prevent, detect, and respond to pandemic agents. In February 2014, the United States committed to support the GHSA by expanding and intensifying ongoing efforts across the US government. Implementing these goals will require interagency coordination and harmonization of diverse health security elements. Lessons learned from the Global Health Initiative (GHI), the President's Emergency Program for AIDS Relief (PEPFAR), and the Cooperative Threat Reduction (CTR) program underscore that centralized political, technical, and fiscal authority will be key to developing robust, sustainable, and integrated global health security efforts across the US government. In this article, we review the strengths and challenges of GHI, PEPFAR, and CTR and develop recommendations for implementing a unified US global health security program.
One Health in food safety and security education: Subject matter outline for a curricular framework.
Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I
2017-06-01
Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.
Okeke, Sunday O.
2017-01-01
Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444
Safe and Secure Border Infrastructure Act
Rep. Peters, Scott H. [D-CA-52
2013-09-25
House - 09/26/2013 Referred to the Subcommittee on Railroads, Pipelines, and Hazardous Materials. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...
48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...
48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...
48 CFR 52.250-5 - SAFETY Act-Equitable Adjustment.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., engineering services, software development services, software integration services, threat assessments... security, i.e., it will perform as intended, conforms to the seller's specifications, and is safe for use...
Rep. Stockman, Steve [R-TX-36
2013-01-03
House - 01/25/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
... other medical problems does not itself lead to dependence. Store narcotics safely and securely in your home. ... help with constipation, drink more fluids, get more exercise, eat foods with extra fiber, and use stool ...
Biggs, Adam T; Mitroff, Stephen R
2015-11-01
Professional visual searches, such as those conducted by airport security personnel, often demand highly accurate performance. As many factors can hinder accuracy, it is critical to understand the potential influences. Here, we examined how explicit decision-making criteria might affect multiple-target search performance. Non-professional searchers (college undergraduates) and professional searchers (airport security officers) classified trials as 'safe' or 'dangerous', in one of two conditions. Those in the 'one = dangerous' condition classified trials as dangerous if they found one or two targets, and those in the 'one = safe' condition only classified trials as dangerous if they found two targets. The data suggest an important role of context that may be mediated by experience; non-professional searchers were more likely to miss a second target in the one = dangerous condition (i.e., when finding a second found target did not change the classification), whereas professional searchers were more likely to miss a second in the one = safe condition. © 2014 The British Psychological Society.
Popular opinion on tax cuts and Social Security.
Teixeira, R
2000-01-01
A review of recent opinion polls reveals the U.S. public's views on budget priorities and Social Security. The public wants more spending on Social Security, Medicare, and other domestic programs, chiefly education and health care, and prefers these spending priorities--by up to a 70 percent majority--to paying down the national debt and cutting taxes. The public supports the Social Security system but doubts it can continue to deliver the goods. To remedy this problem, it is willing not only to use part of the surplus but to raise the cap on payroll taxes. The public does not support benefit cuts or an increase in the retirement age. And the public remains unsure to hostile about the role of the stock market, whether in individual accounts or in the Social Security trust fund.
Code of Federal Regulations, 2013 CFR
2013-10-01
... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...
Code of Federal Regulations, 2012 CFR
2012-10-01
... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...
Code of Federal Regulations, 2014 CFR
2014-10-01
... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...
Code of Federal Regulations, 2011 CFR
2011-10-01
... ownership of assets which are free and clear of liens or security interests, or assets in which the debtor... check, money order, or credit card payable to the Surface Transportation Board and mailed or delivered...
Rep. Nadler, Jerrold [D-NY-10
2013-02-12
House - 04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Aaron R. Turner
2017-12-09
An innovation that offers a low-cost, plug-n-play option that enables virtually any wireless telecommunications device to safely store sensitive personal information and perform secure transactions. INL researchers include Steven McCown, Aaron Turner, Kur
... the throat above the windpipe and restrict breathing. Battery-operated toys should have battery cases that secure with screws so that kids cannot pry them open. Batteries and battery fluid pose serious risks, including choking, ...
Sen. Collins, Susan M. [R-ME
2010-07-27
Senate - 07/27/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Sen. Collins, Susan M. [R-ME
2011-04-14
Senate - 04/14/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
DOT National Transportation Integrated Search
1992-08-26
Consistent with the Federal Aviation Administration's mission to foster a safe, : secure, and efficient aviation system is the need for an effective and efficient : process for communitcating policy and procedures. The FAA Directives System : provide...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aaron R. Turner
An innovation that offers a low-cost, plug-n-play option that enables virtually any wireless telecommunications device to safely store sensitive personal information and perform secure transactions. INL researchers include Steven McCown, Aaron Turner, Kur
The vulnerable do-gooders: security strategies of German aid agencies.
Schneiker, Andrea
2013-04-01
Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
A Fundamental Key to Next-Generation Directed-Energy Systems
2012-01-01
and be inherently safe to operate. By design, they must minimize or eliminate the risk of hostile attack or collateral damage especially during...bile Construction Battalion (NMCB) 7’s convoy security element are secured following an escort mission from a forward operating base. The Cougar -type...profile, small, lightweight DE systems means: • Less vulnerability to attack • Greater mobility and maneuverability • Simplified logistics with
Port Security in the Persian Gulf
2008-06-01
drafters of ISPS for secure, standardized documents to be issued to the world’s merchant seamen, another arm of the UN, the International Labour ...Revised), 2003," International Labour Organization, http://www.ilo.org/ilolex/cgi-lex/convde.pl?C185 (accessed March 11, 2008). 5 The convention has...identity documents for a particularly impoverished portion of their workforce . 2. MTSA (2002) and SAFE-Port (2006) The two primary pieces of
Chen, Han-Shen
2017-01-30
In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015-2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.
Partridge, Bradley; Affleck, Julia
2017-08-01
Emergency Department (ED) workers are prone to occupational violence, however the extent and impact of this may not be evenly felt across all roles in the ED. Explore: 1) the rate of verbal abuse and physical assaults experienced by ED staff, 2) perceptions of safety, 3) attitudes towards security officers, and 4) formal reporting of incidents. 330 ED workers were surveyed at four public hospitals in one metropolitan health service district in Queensland, Australia, including 179 nurses, 83 medical staff, 44 administration staff, 14 allied health, and 9 operational. Nurses were more likely to have been physically assaulted in the last six months and were less likely to feel safe. Most ED staff across all roles experienced verbal abuse. Nurses were better than medical staff at reporting instances of occupational violence although overall reporting across all roles was low. Staff who thought that security officers respond to incidents quickly and are a visible presence in the ED were more likely to feel safe in the ED. Workers in the ED, particularly nurses, experience high rates of verbal abuse and physical aggression and there may be a case for having designated security guards in the ED. Copyright © 2017 College of Emergency Nursing Australasia. Published by Elsevier Ltd. All rights reserved.
Chen, Han-Shen
2017-01-01
In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level. PMID:28146086
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott F
Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less
Using smartphone technology to deliver a virtual pedestrian environment: usability and validation.
Schwebel, David C; Severson, Joan; He, Yefei
2017-09-01
Various programs effectively teach children to cross streets more safely, but all are labor- and cost-intensive. Recent developments in mobile phone technology offer opportunity to deliver virtual reality pedestrian environments to mobile smartphone platforms. Such an environment may offer a cost- and labor-effective strategy to teach children to cross streets safely. This study evaluated usability, feasibility, and validity of a smartphone-based virtual pedestrian environment. A total of 68 adults completed 12 virtual crossings within each of two virtual pedestrian environments, one delivered by smartphone and the other a semi-immersive kiosk virtual environment. Participants completed self-report measures of perceived realism and simulator sickness experienced in each virtual environment, plus self-reported demographic and personality characteristics. All participants followed system instructions and used the smartphone-based virtual environment without difficulty. No significant simulator sickness was reported or observed. Users rated the smartphone virtual environment as highly realistic. Convergent validity was detected, with many aspects of pedestrian behavior in the smartphone-based virtual environment matching behavior in the kiosk virtual environment. Anticipated correlations between personality and kiosk virtual reality pedestrian behavior emerged for the smartphone-based system. A smartphone-based virtual environment can be usable and valid. Future research should develop and evaluate such a training system.
Assurance: the power behind PCASSO security.
Baker, D. B.; Masys, D. R.; Jones, R. L.; Barnhart, R. M.
1999-01-01
The need for security protection in Internet-based healthcare applications is generally acknowledged. Most healthcare applications that use the Internet have at least implemented some kind of encryption. Most applications also enforce user authentication and access control policies, and many audit user actions. However, most fall short on providing strong assurances that the security mechanisms are behaving as expected and that they cannot be subverted. While no system can claim to be totally "bulletproof," PCASSO provides assurance of correct operation through formal, disciplined design and development methodologies, as well as through functional and penetration testing. Through its security mechanisms, backed by strong system assurances, PCASSO is demonstrating "safe" use of public data networks for health care. PMID:10566443
Energy efficiency in urban management: Russian and world experience
NASA Astrophysics Data System (ADS)
Pryadko, Igor
2017-10-01
The article discusses the role of energetics in creating a comfortable and safe environment of modern megacities, and the problem is considered in the socio-economic aspect. The object is the energy security of the city, and the subject is the influence of urban society on the formation of energy security. In particular, the problems are raised: ecological problems of urban energy supply, the condition of surface layer of the atmosphere near electric power lines. The author assesses the actions, implemented by the urban authorities in Mytischi, in the southwestern areas of New Moscow. The author assesses these sample areas on the basis of Ch. Landry’s concept of self-training, designated for municipal authorities and urban communities, and offers several successfully implemented self-study cases and in the light of modern methods of ensuring energy security. The forecasts of creation of energy-safe space, made by modern sociologist-urbanist Leo Hollis, are taken into account. The author also considers some of the economic aspects of biosphere safety. In particular, he insists that biosphere safety, convenience, and comfort have developed into competitive advantages in the housing market.
Ultra Safe And Secure Blasting System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hart, M M
2009-07-27
The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tappingmore » into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.« less
Oliver, Gemma
2016-10-27
Outpatient parenteral antibiotic therapy (OPAT) is a growing area of practice that has numerous benefits for both patients and the healthcare system. In order for OPAT services to be successful, strategies need to be in place to maximise efficiency while providing safe, high-quality care. The use of elastomeric pumps to deliver intravenous (IV) antibiotics can have many benefits for OPAT services; they are cost-effective, easy to use and allow the patient to be fully ambulant. However, plans need to be put in place to make sure their use is safe and effective. This article discusses the use of elastomeric pumps by a UK-based OPAT team and the governance processes the team put in place to optimise patient safety when using elastomeric pumps to deliver IV antibiotics. Furthermore, with experience of using elastomeric pumps for more than 4 years the OPAT team was asked to evaluate an elastomeric pump new to the UK market: the Accufuser pump (Vygon (UK) Limited). By collecting data on its use it was found to be safe and easy to use. The team felt that the Accufuser pump ran to time in 96% of completed evaluations and considered it to be clinically acceptable in all responses.
Shi, Lei; Yu, Bin; Cai, Chun-Hui; Huang, Jian-Dong
2016-12-01
Despite of a growing number of bacterial species that apparently exhibit intrinsic tumor-targeting properties, no bacterium is able to inhibit tumor growth completely in the immunocompetent hosts, due to its poor dissemination inside the tumors. Oxygen and inflammatory reaction form two barriers and restrain the spread of the bacteria inside the tumors. Here, we engineered a Salmonella typhimurium strain named ST8 which is safe and has limited ability to spread beyond the anaerobic regions of tumors. When injected systemically to tumor-bearing immunocompetent mice, ST8 accumulated in tumors at levels at least 100-fold greater than parental obligate anaerobic strain ST4. ST8/pSEndo harboring therapeutic plasmids encoding Endostatin fused with a secreted protein SopA could target vasculature at the tumor periphery, can stably maintain and safely deliver a therapeutic vector, release angiogenic inhibitors through a type III secretion system (T3SS) to interfere with the pro-angiogenic action of growth factors in tumors. Mice with murine CT26 colon cancer that had been injected with ST8/pSEndo showed efficient tumor suppression by inducing more severe necrosis and inhibiting blooding vessel density within tumors. Our findings provide a therapeutic platform for indirectly acting therapeutic strategies such as anti-angiogenesis and immune therapy.
2013-06-01
Executive Branch report on research , development, and acquisition (RDA) programs to Combat Weapons of Mass Destruction (WMD). Other interagency committees...characterize, secure, disable , and/or destroy a state or non-state actor’s WMD programs and related capabilities in hostile or uncertain environments. Threat...special operations, and security operations to defend against conventionally and unconventionally delivered WMD. WMD Consequence Management. Actions
Afghanistan: Post-Taliban Governance, Security, and U.S. Policy
2016-11-08
Ogap Tsuka) delivered components of the third turbine to the dam, hoping to install it by 2010, but technical and security problems delayed the...that difficulty. The problem was further alleviated with better pay and other reforms, and the force composition is now roughly in line with that of...utilized extensively to reverse Taliban gains, and its roles as an elite force might be eroding. There problem of absenteeism within the ANA is in
A review of 'The Health Security Act of 1993'.
Peterson, D M; Brownawell, H J
1994-01-01
The Health Security Act of 1993, which is now before Congress, holds the potential to effect major changes in the way health care is delivered in this country and in how that delivery is financed. This article reviews the principal provisions proposed to be contained in the act (as presented in the preliminary summary released in September 1993) and offers suggestions regarding the issues that hospital financial managers should begin addressing now.
Efficient proof of ownership for cloud storage systems
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file. In order to solve the above security problems and the different security requirements of the files in the cloud storage system, an efficient and information-theoretical secure proof of ownership sceme is proposed to support the file rating. Through the K-means algorithm to implement file rating, and use random seed technology and pre-calculation method to achieve safe and efficient proof of ownership scheme. Finally, the scheme is information-theoretical secure, and achieve better performance in the most sensitive areas of client-side I/O and computation.
Developing a Virtual Engineering Management Community
ERIC Educational Resources Information Center
Hewitt, Bill; Kidd, Moray; Smith, Robin; Wearne, Stephen
2016-01-01
The paper reviews the lessons of planning and running an "Engineering Management" practitioner development programme in a partnership between BP and the University of Manchester. This distance-learning programme is for professional engineers in mid-career experienced in the engineering and support activities for delivering safe,…
NASA Technical Reports Server (NTRS)
Fork, Richard L.
2001-01-01
The objective was to assess the feasibility of safely collecting solar power at geostationary orbit and delivering it to earth. A strategy which could harness a small fraction of the millions of gigawatts of sunlight passing near earth could adequately supply the power needs of earth and those of space exploration far into the future. Light collected and enhanced both spatially and temporally in space and beamed to earth provides probably the only practical means of safe and efficient delivery of this space solar power to earth. In particular, we analyzed the feasibility of delivering power to sites on earth at a comparable intensity, after conversion to a usable form, to existing power needs. Two major obstacles in the delivery of space solar power to earth are safety and the development of a source suitable for space. We focused our approach on: (1) identifying system requirements and designing a strategy satisfying current eye and skin safety requirements; and (2) identifying a concept for a potential space-based source for producing the enhanced light.
A Novel Data System for Verification of Internal Parameters of Motor Design
NASA Technical Reports Server (NTRS)
Smith, Doug; Saint Jean, Paul; Everton, Randy; Uresk, Bonnie
2003-01-01
Three major obstacles have limited the amount of information that can be obtained from inside an operating solid rocket motor. The first is a safety issue due to the presence of live propellant interacting with classical, electrical instrumentation. The second is a pressure vessel feed through risk arising from bringing a large number of wires through the rocket motor wall safely. The third is an attachment/protection issue associated with connecting gages to live propellant. Thiokol has developed a highly miniaturized, networked, electrically isolated data system that has safely delivered information from classical, electrical instrumentation (even on the burning propellant surface) to the outside world. This system requires only four wires to deliver 80 channels of data at 2300 samples/second/channel. The feed through leak path risk is massively reduced from the current situation where each gage requires at least three pressure vessel wire penetrations. The external electrical isolation of the system is better than that of the propellant itself. This paper describes the new system.
Johnson, Earl E
2017-11-01
To determine safe output sound pressure levels (SPL) for sound amplification devices to preserve hearing sensitivity after usage. A mathematical model consisting of the Modified Power Law (MPL) (Humes & Jesteadt, 1991 ) combined with equations for predicting temporary threshold shift (TTS) and subsequent permanent threshold shift (PTS) (Macrae, 1994b ) was used to determine safe output SPL. The study involves no new human subject measurements of loudness tolerance or threshold shifts. PTS was determined by the MPL model for 234 audiograms and the SPL output recommended by four different validated prescription recommendations for hearing aids. PTS can, on rare occasion, occur as a result of SPL delivered by hearing aids at modern day prescription recommendations. The trading relationship of safe output SPL, decibel hearing level (dB HL) threshold, and PTS was captured with algebraic expressions. Better hearing thresholds lowered the safe output SPL and higher thresholds raised the safe output SPL. Safe output SPL can consider the magnitude of unaided hearing loss. For devices not set to prescriptive levels, limiting the output SPL below the safe levels identified should protect against threshold worsening as a result of long-term usage.
Gun Violence Prevention and Safe Communities Act of 2013
Rep. Davis, Danny K. [D-IL-7
2013-08-02
House - 10/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Summer Safety Tips - Staying Safe Outdoors
... this site from a secured browser on the server. Please enable scripts and reload this page. Turn ... Families should attend community fireworks displays run by professionals rather than using fireworks at home. The AAP ...
Safe Building Code Incentive Act of 2013
Sen. Menendez, Robert [D-NJ
2013-05-08
Senate - 05/08/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Safe Building Code Incentive Act of 2012
Sen. Menendez, Robert [D-NJ
2012-12-19
Senate - 12/19/2012 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Safe Building Code Incentive Act of 2013
Sen. Menendez, Robert [D-NJ
2013-05-09
Senate - 05/09/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Fire Safe Communities Act of 2009
Sen. Feinstein, Dianne [D-CA
2009-04-01
Senate - 04/01/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Security and Financial Empowerment (SAFE) Act
Sen. Murray, Patty [D-WA
2009-10-01
Senate - 10/01/2009 Read twice and referred to the Committee on Health, Education, Labor, and Pensions. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
NASA Technical Reports Server (NTRS)
2013-01-01
Topics covered include: Water Treatment Technologies Inspire Healthy Beverages; Dietary Formulas Fortify Antioxidant Supplements; Rovers Pave the Way for Hospital Robots; Dry Electrodes Facilitate Remote Health Monitoring; Telescope Innovations Improve Speed, Accuracy of Eye Surgery; Superconductors Enable Lower Cost MRI Systems; Anti-Icing Formulas Prevent Train Delays; Shuttle Repair Tools Automate Vehicle Maintenance; Pressure-Sensitive Paints Advance Rotorcraft Design Testing; Speech Recognition Interfaces Improve Flight Safety; Polymers Advance Heat Management Materials for Vehicles; Wireless Sensors Pinpoint Rotorcraft Troubles; Ultrasonic Detectors Safely Identify Dangerous, Costly Leaks; Detectors Ensure Function, Safety of Aircraft Wiring; Emergency Systems Save Tens of Thousands of Lives; Oxygen Assessments Ensure Safer Medical Devices; Collaborative Platforms Aid Emergency Decision Making; Space-Inspired Trailers Encourage Exploration on Earth; Ultra-Thin Coatings Beautify Art; Spacesuit Materials Add Comfort to Undergarments; Gigapixel Images Connect Sports Teams with Fans; Satellite Maps Deliver More Realistic Gaming; Elemental Scanning Devices Authenticate Works of Art; Microradiometers Reveal Ocean Health, Climate Change; Sensors Enable Plants to Text Message Farmers; Efficient Cells Cut the Cost of Solar Power; Shuttle Topography Data Inform Solar Power Analysis; Photocatalytic Solutions Create Self-Cleaning Surfaces; Concentrators Enhance Solar Power Systems; Innovative Coatings Potentially Lower Facility Maintenance Costs; Simulation Packages Expand Aircraft Design Options; Web Solutions Inspire Cloud Computing Software; Behavior Prediction Tools Strengthen Nanoelectronics; Power Converters Secure Electronics in Harsh Environments; Diagnostics Tools Identify Faults Prior to Failure; Archiving Innovations Preserve Essential Historical Records; Meter Designs Reduce Operation Costs for Industry; Commercial Platforms Allow Affordable Space Research; Fiber Optics Deliver Real-Time Structural Monitoring; Camera Systems Rapidly Scan Large Structures; Terahertz Lasers Reveal Information for 3D Images; Thin Films Protect Electronics from Heat and Radiation; Interferometers Sharpen Measurements for Better Telescopes; and Vision Systems Illuminate Industrial Processes.
Safe and Secure Partitioning with Pikeos: Towards Integrated Modular Avionics in Space
NASA Astrophysics Data System (ADS)
Almeida, J.; Prochazka, M.
2009-05-01
This paper presents our approach to logical partitioning of spacecraft onboard software. We present PikeOS, a separation micro-kernel which applies the state-of-the- art techniques and widely recognised standards such as ARINC 653 and MILS in order to guarantee safety and security properties of partitions executing software with different criticality and confidentiality. We provide an overview of our approach, also used in the Securely Partitioning Spacecraft Computing Resources project, an ESA TRP contract, which shifts spacecraft onboard software development towards the Integrated Modular Avionics concept with relevance for dual-use military and civil missions.
[Application of password manager software in health care].
Ködmön, József
2016-12-01
When using multiple IT systems, handling of passwords in a secure manner means a potential source of problem. The most frequent issues are choosing the appropriate length and complexity, and then remembering the strong passwords. Password manager software provides a good solution for this problem, while greatly increasing the security of sensitive medical data. This article introduces a password manager software and provides basic information of the application. It also discusses how to select a really secure password manager software and suggests a practical application to efficient, safe and comfortable use for health care. Orv. Hetil., 2016, 157(52), 2066-2073.
NASA Astrophysics Data System (ADS)
Karame, P., Sr.
2016-12-01
"GIS-Biostatistics-Meteo for Health (GBMH), A consolidated approach"The environmental vulnerability rate due to human-induced threats and climate change has exceeded the capacity of ecosystems and species to adapt naturally. Drastic changes in seasonal and weather patterns have led to a severely intriguing imbalance ecosystem equilibrium, associated to habitat degradation, environmental pollution, shortage of ecosystem services production and shift in species distribution, food insecurity, invasive species and complex species associations. The consequences are particularly disturbing regarding health and wellbeing of human populations. Especially to Sub-Saharan Africa, informed evidence-based statistics are inappropriately if not at all used for developing and implementing coping measures. This makes a regrettable scenario for Rwanda, a research-driven economic transformation country in which mostly expensive long-term interventions remain meaningless and unknowingly approved effective. More important, no single sector can ultimately afford the most informative approaches providing evidence and guiding policy and decisions, due to limited resources. Rwanda dedicates substantial investment to sustain a conducive, robust and flourishing environment promoting research priorities most likely to deliver improved health outcomes. In this framework, the above mentioned approach supports cross-sectoral analyses to evaluate health care quality improvements through impact assessments, policy analysis and forecasting. This approach "Consolidating GIS, Biostatistics, meteo, mobile and e-health approaches (GBMH)" tailors disaster, disease control and prevention, farming options, effective planning, interventions and communication for safe health in sound environment. Under GBMH models, Integrated Time Series analysis completed in R Studio on health interventions from HMIS and DHS and DHSS systems (on environment and disaster management, farming practices and health sector indicators) is likely to provide missing links between science, policy, interventions and practical improvement for safe environment, food security and safer health in Rwanda.
NASA Astrophysics Data System (ADS)
Karame, P., Sr.; Dushimiyimana, V.
2016-12-01
" Championing GIS-Biostatistics-Meteo for Health (GBMH), A consolidated approach"The environmental vulnerability rate due to human-induced threats and climate change has exceeded the capacity of ecosystems and species to adapt naturally. Drastic changes in seasonal and weather patterns have led to a severely intriguing imbalance ecosystem equilibrium, associated to habitat degradation, environmental pollution, shortage of ecosystem services production and shift in species distribution, food insecurity, invasive species and complex species associations. The consequences are particularly disturbing regarding health and wellbeing of human populations. Especially to Sub-Saharan Africa, informed evidence-based statistics are inappropriately if not at all used for developing and implementing coping measures. This makes a regrettable scenario for Rwanda, a research-driven economic transformation country in which mostly expensive long-term interventions remain meaningless and unknowingly approved effective. More important, no single sector can ultimately afford the most informative approaches providing evidence and guiding policy and decisions, due to limited resources. Rwanda dedicates substantial investment to sustain a conducive, robust and flourishing environment promoting research priorities most likely to deliver improved health outcomes. In this framework, the above mentioned approach supports cross-sectoral analyses to evaluate health care quality improvements through impact assessments, policy analysis and forecasting. This approach "Consolidating GIS, Biostatistics, meteo, mobile and e-health approaches (GBMH)" tailors disaster, disease control and prevention, farming options, effective planning, interventions and communication for safe health in sound environment. Under GBMH models, Integrated Time Series analysis completed in R Studio on health interventions from HMIS and DHS and DHSS systems (on environment and disaster management, farming practices and health sector indicators) is likely to provide missing links between science, policy, interventions and practical improvement for safe environment, food security and safer health in Rwanda.
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.
Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure
2006-05-04
policy violation with respect to: Security Safety Financial Posture Infrastructure The IATF identifies five levels: V1: Negligible effect V2: Minimal...MLS) Infrastructure Step 2: Determine Threat Levels Best practices also in the IATF Threats are ranked by assessing: Capability Resources Motivation...Risk Willingness The IATF identifies seven levels: T1: Inadvertent or accidental events Tripping over a power cord T2: Minimal resources – willing to
1984-08-01
be a safe level. Men exposed to dibromo- chloropropane for less than 3 months have normal sperm density in ejaculates. Those men exposed between 1 ...FERTILIZATION FURTHER EVALUATION I ~ II SPERMATOGENIC EVALUATION SEMEN BIOCHEMISTRY* MEASURE UNSCHEDULED I DNA SYNTHESIS 1 ) SPERM COUNT 2) SPERM... 1 JiAN 73 IOWBSSOLETE. SECURITY CLASSIFICATION OF THIS PAGE SECURITY CLASSIFICATION OF THIS PAGE 18. Subject Terms Occupational Health
NASA Technical Reports Server (NTRS)
2002-01-01
When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.
Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions
NASA Astrophysics Data System (ADS)
Uher, J.; Harper, J.; Mennecke, R. G.; Patton, P.; Farroha, B.
2016-05-01
The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.
NASA Technical Reports Server (NTRS)
Marshall, William M.; Borowski, Stanley K.; Bulman, Mel; Joyner, Russell; Martin, Charles R.
2015-01-01
Nuclear thermal propulsion (NTP) has been recognized as an enabling technology for missions to Mars and beyond. However, one of the key challenges of developing a nuclear thermal rocket is conducting verification and development tests on the ground. A number of ground test options are presented, with the Sub-surface Active Filtration of Exhaust (SAFE) method identified as a preferred path forward for the NTP program. The SAFE concept utilizes the natural soil characteristics present at the Nevada National Security Site to provide a natural filter for nuclear rocket exhaust during ground testing. A validation method of the SAFE concept is presented, utilizing a non-nuclear sub-scale hydrogen/oxygen rocket seeded with detectible radioisotopes. Additionally, some alternative ground test concepts, based upon the SAFE concept, are presented. Finally, an overview of the ongoing discussions of developing a ground test campaign are presented.
Schooling and Settlement: Refugee Education in Australia
ERIC Educational Resources Information Center
Matthews, Julie
2008-01-01
Schools are a stabilising feature in the unsettled lives of refugee students. They provide safe spaces for new encounters, interactions and learning opportunities. They also deliver literacy, the key to educational success, post-school options, life choices, social participation and settlement. Currently Australian schools are poorly funded and…
Safe and secure. How to create an effective OSHA compliance program in your practice.
Anderson, Douglas G
2007-08-01
Medical group practice administrators have a responsibility to provide a safe working environment for their employees and patients. You must create an effective Occupational Safety and Health Administration (OSHA) compliance program in your organization. The complexity and diversity of OSHA standards are significant, and developing an effective program requires more than a cut-and-paste approach. This article describes the scope of the task, the steps to take and tools you can use.
The Evolution of Israeli Civil-Military Relations: Domestic Enablers and the Quest for Peace
2009-12-01
Israeli society, its sense of security, and its view of military institutions. It is safe to assume, however, the changing social attitudes will...It is safe to assume, however, the changing social attitudes will continue to shape the state’s often obscure civil-military dynamic, which will...2 (2005): 231. “For Israelis, armed conflict became the ultimate method of resolving the issue of their state’s disputed existence.” 5 Charles D
The anchoring function: parental authority and the parent-child bond.
Omer, Haim; Steinmetz, Sarit G; Carthy, Tal; von Schlippe, Arist
2013-06-01
Descriptions of parental authority and of the formation of a secure parent-child bond have remained unconnected in conceptualizations about parenting and child development. The parental anchoring function is here presented as an integrative metaphor for the two fields. Parents who fulfill an anchoring function offer a secure relational frame for the child, while also manifesting a stabilizing and legitimate kind of authority. The anchoring function enriches the two fields by: (1) adding a dimension of authority to the acknowledged functions of the safe haven and the secure base that are seen as core to a secure parent-child bond, and (2) adding considerations about the parent-child bond to Baumrind's classical description of authoritative parenting. © FPI, Inc.
NASA Astrophysics Data System (ADS)
Giménez, Rafael Barrionuevo
2016-06-01
TSM is escape pipe in case of collapse of terrain. The TSM is a passive security tool placed underground to connect the work area with secure area (mining gallery mainly). TSM is light and hand able pipe made with aramid (Kevlar), carbon fibre, or other kind of new material. The TSM will be placed as a pipe line network with many in/out entrances/exits to rich and connect problem work areas with another parts in a safe mode. Different levels of instrumentation could be added inside such as micro-led escape way suggested, temperature, humidity, level of oxygen, etc.). The open hardware and software like Arduino will be the heart of control and automation system.
Analysis on the University’s Network Security Level System in the Big Data Era
NASA Astrophysics Data System (ADS)
Li, Tianli
2017-12-01
The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.
An Automated Sample Divider for Farmers Stock Peanuts
USDA-ARS?s Scientific Manuscript database
In-shell peanuts are harvested, loaded into drying trailers, and delivered to a central facility where they are dried to a moisture content safe for long term storage, sampled, graded, then unloaded into bulk storage. Drying trailers have capacities ranging from five to twenty-five tons of dry farme...
An automated sample divider for farmers stock peanuts
USDA-ARS?s Scientific Manuscript database
In-shell peanuts are harvested, loaded into drying trailers, and delivered to a central facility where they are dried to a moisture content safe for long term storage, sampled, graded, then unloaded into bulk storage. Drying trailers have capacities ranging from five to twenty-five tons of dry farme...
Playing It Safe: Identity Management and Single Sign-On
ERIC Educational Resources Information Center
Alawneh, John
2012-01-01
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Nurses lead the way with webcam consultations.
Pearce, Lynne
2017-09-06
More than a decade ago, Airedale NHS Foundation Trust in West Yorkshire began using a video link to deliver consultations to prisoners at a high-security jail. It meant prisoners no longer had to be escorted to the outpatient department.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-15
..., cell phones and electronic highway signs. CAP will also allow an alert initiator to send alerts... CAP-formatted alerts delivered via any new delivery systems, whether wireline, internet, satellite, or...
12 CFR 220.123 - Partial delayed issue contracts covering nonconvertible bonds.
Code of Federal Regulations, 2010 CFR
2010-01-01
... certificate can be delivered by the transfer agent. The Board held that mutual fund shares must be regarded as.... (ibid.) The issuance of debt securities subject to delayed issue contracts, by contrast with that of...
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo
As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging doesmore » not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4« less
Pragmatism of the North Atlantic Treaty Organization’s and European Union’s Strategic Partnership
2015-04-13
area deployment, on 8 April 2009, the SS MAERSK ALABAMA incident occurred. Made famous by the Hollywood film , Captain Phillips, Somali pirates...community for their safe passage , and regional capacity building within means and capabilities.9 Current approval for NATO’s...Defense and Security Strategy, when he states, “The French continue to advocate the adoption of a Livre blanc européen on defense and security, which was
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-03
...The Coast Guard proposes to adopt a temporary special local regulation and temporary security zones, during, and after the War of 1812 Bicentennial Commemoration events in the Port of Boston, Massachusetts, to be held between June 28, 2012 and July 6, 2012. These regulations are necessary to promote the safe navigation of vessels and the safety of life and property during the heavy volume of vessel traffic expected during this event.
Integrating Security in Real-Time Embedded Systems
2017-04-26
b) detect any intrusions/a ttacks once tl1ey occur and (c) keep the overall system safe in the event of an attack. 4. Analysis and evaluation of...beyond), we expanded our work in both security integration and attack mechanisms, and worked on demonstrations and evaluations in hardware. Year I...scheduling for each busy interval w ith the calculated arrival time w indow. Step 1 focuses on the problem of finding the quanti ty of each task
Effects of Ammonium Dinitramide in Human Liver Slices: An EPR/Spin Trapping Study.
1995-09-01
environmentally safe than AP. EPR/spin trapping studies with the spin trap N-tert-butyl-a-phenyl nitrone (PBN lOmM) for 5 min in the presence of ADN yielded...N-tert-butyl-a-phenyl nitrone PBN 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED... nitrone s second SCN- thiocyanate SD standard deviation Vll INTRODUCTION This is a study of the reactions of free radicals formed when ammonium
2016-02-01
system consists of a high-fidelity hardware simulation using field programmable gate arrays (FPGAs), with a set of runtime services (ConcreteWare...perimeter protection, patch, and pray” is not aligned with the threat. Programmers will not bail us out of this situation (by writing defect free code...hosted on a Field Programmable Gate Array (FPGA), with a set of runtime services (concreteware) running on the hardware. Secure applications can be
CLARUS as a Cloud Security Framework: e-Health Use Case.
Vidal, David; Iriso, Santiago; Mulero, Rafael
2017-01-01
Maintaining Passive Medical Health Records (PMHR) is an increasing cost and resource consumption problem. Moving to the cloud is the clearest solution to solve the problem as it offers a high amount of space and computation power. But the cloud is not safe enough when dealing with this kind of information because it can be easily accessed by attackers. The European Commission funded research project CLARUS contributes to protect healthcare-sensitive information in a secure way.
Clinical software development for the Web: lessons learned from the BOADICEA project
2012-01-01
Background In the past 20 years, society has witnessed the following landmark scientific advances: (i) the sequencing of the human genome, (ii) the distribution of software by the open source movement, and (iii) the invention of the World Wide Web. Together, these advances have provided a new impetus for clinical software development: developers now translate the products of human genomic research into clinical software tools; they use open-source programs to build them; and they use the Web to deliver them. Whilst this open-source component-based approach has undoubtedly made clinical software development easier, clinical software projects are still hampered by problems that traditionally accompany the software process. This study describes the development of the BOADICEA Web Application, a computer program used by clinical geneticists to assess risks to patients with a family history of breast and ovarian cancer. The key challenge of the BOADICEA Web Application project was to deliver a program that was safe, secure and easy for healthcare professionals to use. We focus on the software process, problems faced, and lessons learned. Our key objectives are: (i) to highlight key clinical software development issues; (ii) to demonstrate how software engineering tools and techniques can facilitate clinical software development for the benefit of individuals who lack software engineering expertise; and (iii) to provide a clinical software development case report that can be used as a basis for discussion at the start of future projects. Results We developed the BOADICEA Web Application using an evolutionary software process. Our approach to Web implementation was conservative and we used conventional software engineering tools and techniques. The principal software development activities were: requirements, design, implementation, testing, documentation and maintenance. The BOADICEA Web Application has now been widely adopted by clinical geneticists and researchers. BOADICEA Web Application version 1 was released for general use in November 2007. By May 2010, we had > 1200 registered users based in the UK, USA, Canada, South America, Europe, Africa, Middle East, SE Asia, Australia and New Zealand. Conclusions We found that an evolutionary software process was effective when we developed the BOADICEA Web Application. The key clinical software development issues identified during the BOADICEA Web Application project were: software reliability, Web security, clinical data protection and user feedback. PMID:22490389
Clinical software development for the Web: lessons learned from the BOADICEA project.
Cunningham, Alex P; Antoniou, Antonis C; Easton, Douglas F
2012-04-10
In the past 20 years, society has witnessed the following landmark scientific advances: (i) the sequencing of the human genome, (ii) the distribution of software by the open source movement, and (iii) the invention of the World Wide Web. Together, these advances have provided a new impetus for clinical software development: developers now translate the products of human genomic research into clinical software tools; they use open-source programs to build them; and they use the Web to deliver them. Whilst this open-source component-based approach has undoubtedly made clinical software development easier, clinical software projects are still hampered by problems that traditionally accompany the software process. This study describes the development of the BOADICEA Web Application, a computer program used by clinical geneticists to assess risks to patients with a family history of breast and ovarian cancer. The key challenge of the BOADICEA Web Application project was to deliver a program that was safe, secure and easy for healthcare professionals to use. We focus on the software process, problems faced, and lessons learned. Our key objectives are: (i) to highlight key clinical software development issues; (ii) to demonstrate how software engineering tools and techniques can facilitate clinical software development for the benefit of individuals who lack software engineering expertise; and (iii) to provide a clinical software development case report that can be used as a basis for discussion at the start of future projects. We developed the BOADICEA Web Application using an evolutionary software process. Our approach to Web implementation was conservative and we used conventional software engineering tools and techniques. The principal software development activities were: requirements, design, implementation, testing, documentation and maintenance. The BOADICEA Web Application has now been widely adopted by clinical geneticists and researchers. BOADICEA Web Application version 1 was released for general use in November 2007. By May 2010, we had > 1200 registered users based in the UK, USA, Canada, South America, Europe, Africa, Middle East, SE Asia, Australia and New Zealand. We found that an evolutionary software process was effective when we developed the BOADICEA Web Application. The key clinical software development issues identified during the BOADICEA Web Application project were: software reliability, Web security, clinical data protection and user feedback.
USDA-ARS?s Scientific Manuscript database
Nutritious, sustainable, and secure agricultural supplies are important to meet global needs. Although there are broad efforts to ensure food is safe, many people still experience preventable foodborne illness. Mycotoxins are produced by fungi that occasionally contaminate agricultural commodities a...
Radiation and Shipping Port Security | RadTown USA | US ...
2017-08-07
Cargo comes into the U.S. from all over the world. Ports can ensure safety by: Screening cargo for radiation before it gets here. Safely handling any radioactive material that needs to pass through a port.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dasari, Venkateswara Rao
The need for sustainable and secure nuclear energy is summarized. Driven by economics and public-private partnerships, the technology is evolving. Cost control and regulatory simplification are needed for a nuclear renaissance. Small modular reactors--simple, scalable, and inherently safe--may be the future.
49 CFR 393.203 - Cab and body components.
Code of Federal Regulations, 2010 CFR
2010-10-01
... NECESSARY FOR SAFE OPERATION Frames, Cab and Body Components, Wheels, Steering, and Suspension Systems § 393... a roof exit. (b) Bolts or brackets securing the cab or the body of the vehicle to the frame shall...
Code of Federal Regulations, 2010 CFR
2010-07-01
... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To Act on Behalf...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS How Will Safety Management Systems... international certification for the company's and vessel's safety management system. ...
32 CFR 245.22 - Policy for application of EATPL.
Code of Federal Regulations, 2012 CFR
2012-07-01
... that have reached the point of no return, including foreign air carrier flights en route to safe haven... eight, a Security Control Authorization may be granted on a case-by-case basis. Requests for SCAs will...
32 CFR 245.22 - Policy for application of EATPL.
Code of Federal Regulations, 2014 CFR
2014-07-01
... that have reached the point of no return, including foreign air carrier flights en route to safe haven... eight, a Security Control Authorization may be granted on a case-by-case basis. Requests for SCAs will...
32 CFR 245.22 - Policy for application of EATPL.
Code of Federal Regulations, 2011 CFR
2011-07-01
... that have reached the point of no return, including foreign air carrier flights en route to safe haven... eight, a Security Control Authorization may be granted on a case-by-case basis. Requests for SCAs will...
32 CFR 245.22 - Policy for application of EATPL.
Code of Federal Regulations, 2013 CFR
2013-07-01
... that have reached the point of no return, including foreign air carrier flights en route to safe haven... eight, a Security Control Authorization may be granted on a case-by-case basis. Requests for SCAs will...
Assessment of the U. S. Marine Transportation System : a report to congress
DOT National Transportation Integrated Search
1999-09-01
Discusses the collaborative effort to assess the adequacy of the Nation's marine : transportation system (including ports, waterways, harbor approach channels, and : their intermodal connections) to operate in a safe, efficient, secure, and : environ...
Comparing 2 Adhesive Methods on Skin Integrity in the High-Risk Neonate.
Boswell, Nicole; Waker, Cheryl L
2016-12-01
Nurses have a primary role in promoting neonatal skin integrity and skin care management of the critically ill neonate. Adhesive products are essential to secure needed medical devices but can be a significant factor contributing to skin breakdown. Current literature does not offer a definitive answer regarding which products most safely and effectively work to secure needed devices in the high-risk neonatal population. To determine which adhesive method is best practice to safely and effectively secure lines/tubes in the high-risk neonate population. The only main effect that was significant was age group with mean skin scores. Subjects in the younger group (24-28 weeks) had higher skin scores than in the older group (28-34 weeks), validating that younger gestations are at higher risk of breakdown with the use of adhesives. The findings did not clearly identify which product was superior to secure tubes and lines, or was the least injurious to skin of the high-risk neonate. Neither a transparent dressing only or transparent dressing over hydrocolloid method clearly demonstrated an advantage in the high-risk, preterm neonate. Anecdotal comments suggested staff preferred the transparent dressing over hydrocolloid method as providing better adhesive while protecting skin integrity. The findings validated that younger gestations are at higher risk of breakdown with the use of adhesives and therefore require close vigilance to maintain skin integrity.
Time and Space Partition Platform for Safe and Secure Flight Software
NASA Astrophysics Data System (ADS)
Esquinas, Angel; Zamorano, Juan; de la Puente, Juan A.; Masmano, Miguel; Crespo, Alfons
2012-08-01
There are a number of research and development activities that are exploring Time and Space Partition (TSP) to implement safe and secure flight software. This approach allows to execute different real-time applications with different levels of criticality in the same computer board. In order to do that, flight applications must be isolated from each other in the temporal and spatial domains. This paper presents the first results of a partitioning platform based on the Open Ravenscar Kernel (ORK+) and the XtratuM hypervisor. ORK+ is a small, reliable realtime kernel supporting the Ada Ravenscar Computational model that is central to the ASSERT development process. XtratuM supports multiple virtual machines, i.e. partitions, on a single computer and is being used in the Integrated Modular Avionics for Space study. ORK+ executes in an XtratuM partition enabling Ada applications to share the computer board with other applications.
NASA Technical Reports Server (NTRS)
Bishop, Matt
1988-01-01
The organization of some tools to help improve passwork security at a UNIX-based site is described along with how to install and use them. These tools and their associated library enable a site to force users to pick reasonably safe passwords (safe being site configurable) and to enable site management to try to crack existing passworks. The library contains various versions of a very fast implementation of the Data Encryption Standard and of the one-way encryption functions used to encryp the password.
Tso, Lai Sze; Tang, Weiming; Li, Haochu; Yan, H Yanna; Tucker, Joseph D
2016-06-01
Persistent new HIV infections and risky behaviors underscore the need for enhanced HIV prevention. Social media interventions may promote safe sexual behaviors, increase HIV testing uptake, and promote safe injection behaviors. This review discusses how social media interventions tap into the wisdom of crowds through crowdsourcing, build peer-mentored communities, and deliver interventions through social networks. Social media HIV prevention interventions are constrained by ethical issues, low social media usage among some key populations, and implementation issues. Comprehensive measurement of social media interventions to prevent HIV is necessary, but requires further development of metrics.
Tso, Lai Sze; Tang, Weiming; Li, Haochu; Yan, H. Yanna; Tucker, Joseph D.
2015-01-01
Persistent new HIV infections and risky behaviors underscore the need for enhanced HIV prevention. Social media interventions may promote safe sexual behaviors, increase HIV testing uptake, and promote safe injection behaviors. This review discusses how social media interventions tap into the wisdom of crowds through crowdsourcing, build peer-mentored communities, and deliver interventions through social networks. Social media HIV prevention interventions are constrained by ethical issues, low social media usage among some key populations, and implementation issues. Comprehensive measurement of social media interventions to prevent HIV is necessary, but requires further development of metrics. PMID:26516632
Cyber security evaluation of II&C technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Ken
The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less
Security Management and Safeguards Office
NASA Technical Reports Server (NTRS)
Bewley, Nathaniel M.
2004-01-01
The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.
Reviews of the Comprehensive Nuclear-Test-Ban Treaty and U.S. security
NASA Astrophysics Data System (ADS)
Jeanloz, Raymond
2017-11-01
Reviews of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) by the National Academy of Sciences concluded that the United States has the technical expertise and physical means to i) maintain a safe, secure and reliable nuclear-weapons stockpile without nuclear-explosion testing, and ii) effectively monitor global compliance once the Treaty enters into force. Moreover, the CTBT is judged to help constrain proliferation of nuclear-weapons technology, so it is considered favorable to U.S. security. Review of developments since the studies were published, in 2002 and 2012, show that the study conclusions remain valid and that technical capabilities are better than anticipated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-02-01
This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less
The DISAM Journal of International Security Assistance Management. Volume 23, Number 1, Fall 2000
2000-01-01
Security Assistance Command Figure 1 The USASAC, including OPM-SANG, is staffed by 621 men and women , of whom 104 are military. These professionals are...by program managers. These program managers are like “front-line entreprenuers ” delivering products and services to their customers. They have been...NATO history was to be commanded by a Polish general in June 1988. The brigade of some 3000 men and women was composed of five national battalions
Betancourt, Theresa S; Williams, Timothy P; Kellner, Sarah E; Gebre-Medhin, Joy; Hann, Katrina; Kayiteshonga, Yvonne
2012-05-01
This study examines the core components of children's basic security and well-being in order to examine issues central to improving child protection in Rwanda. Sources of data included 15 focus groups with adults, 7 focus groups with children ages 10-17, and 11 key informant interviews with child protection stakeholders, including representatives from international NGOs, community-based groups, and the Rwandan Government, all of which took place in April and May of 2010. Participants painted a complex picture of threats to children's basic security in Rwanda. Three key themes were pervasive across all interviews: (1) deterioration of social and community cohesion in post-genocide Rwanda; (2) the cascading effects of poverty; and (3) the impact of caregiver illness and death on the caregiving environment. Consistent with the SAFE (Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security) model of child protection, participants rarely elaborated on a child protection threat independent of other basic security needs and rights. Findings suggest a need for integrated approaches to child protection that recognize this interrelatedness and extend beyond issue-specific child protection responses. This study contributes to a growing body of work highlighting the interrelated nature of child protection threats and the implications of adaptive and dangerous survival strategies that children and families engage in to meet their basic security needs. Analysis of this interrelatedness provides a roadmap for improving policies and implementing integrated and robust child protection strategies in Rwanda and other settings. Copyright © 2012 Elsevier Ltd. All rights reserved.
Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A
2013-10-01
This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
Tanner-Smith, Emily E; Fisher, Benjamin W
2016-01-01
Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.
Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo
2018-05-03
All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).
Evaluating the effectiveness of biometric access control systems
NASA Astrophysics Data System (ADS)
Lively, Valerie M.
2005-05-01
This paper describes the contribution by the National Safe Skies Alliance (Safe Skies) in operational testing of biometric access control systems under the guidance of the Transportation Security Administration (TSA). Safe Skies has been conducting operational tests of biometric access control systems on behalf of the TSA for approximately four years. The majority of this testing has occurred at the McGhee Tyson Airport (TYS) in Knoxville, Tennessee. Twelve separate biometric devices - eight fingerprint, facial, iris, hand geometry, and fingerprint and iris, have been tested to date. Tests were conducted at a TYS administrative door and different airports to evaluate the access control device under normal, abnormal, and attempt-to-defeat conditions.
Los Alamos National Laboratory Research Library Search Site submit Contact Us | Remote Access | Subject Guides Los Alamos National Laboratory Menu Contacts Remote Catalog About Awards Electronic Public Research Library: delivering essential knowledge services for national security sciences since 1947 Los
33 CFR 96.470 - How does the Coast Guard terminate an organization's authorization?
Code of Federal Regulations, 2010 CFR
2010-07-01
..., DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To Act on Behalf of the U.S. § 96.470...
33 CFR 96.420 - What authority may an organization ask for under this regulation?
Code of Federal Regulations, 2010 CFR
2010-07-01
..., DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To Act on Behalf of the U.S. § 96.420...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To...
Code of Federal Regulations, 2013 CFR
2013-01-01
... access control measures that are not related to the safe use of, or security of, radiological materials... individual, corporation, partnership, firm, association, trust, estate, public or private institution, group... technical nature into practical application for experimental and demonstration purposes, including the...
SAFETY, SECURITY, HYGIENE AND PRIVACY IN MIGRANT FARMWORKER HOUSING
Arcury, Thomas A.; Weir, Maria M.; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F.; Bischoff, Werner E.; Quandt, Sara A.
2013-01-01
Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed. PMID:22776578
Climate Change and Global Food Security: Food Access, Utilization, and the US Food System
NASA Astrophysics Data System (ADS)
Brown, M. E.; Antle, J. M.; Backlund, P. W.; Carr, E. R.; Easterling, W. E.; Walsh, M.; Ammann, C. M.; Attavanich, W.; Barrett, C. B.; Bellemare, M. F.; Dancheck, V.; Funk, C.; Grace, K.; Ingram, J. S. I.; Jiang, H.; Maletta, H.; Mata, T.; Murray, A.; Ngugi, M.; Ojima, D. S.; O'Neill, B. C.; Tebaldi, C.
2015-12-01
This paper will summarize results from the USDA report entitled 'Climate change, Global Food Security and the U.S. Food system'. The report focuses on the impact of climate change on global food security, defined as "when all people at all times have physical, social, and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life". The assessment brought together authors and contributors from twenty federal, academic, nongovernmental, intergovernmental, and private organizations in four countries to identify climate change effects on food security through 2100, and analyze the U.S.'s likely connections with that world. This talk will describe how climate change will likely affect food access and food utilization, and summarize how the U.S. food system contributes to global food security, and will be affected by climate change.
Chichester, Jessica A; Manceva, Slobodanka D; Rhee, Amy; Coffin, Megan V; Musiychuk, Konstantin; Mett, Vadim; Shamloul, Moneim; Norikane, Joey; Streatfield, Stephen J; Yusibov, Vidadi
2013-03-01
The potential use of Bacillus anthracis as a bioterrorism weapon threatens the security of populations globally, requiring the immediate availability of safe, efficient and easily delivered anthrax vaccine for mass vaccination. Extensive research efforts have been directed toward the development of recombinant subunit vaccines based on protective antigen (PA), the principal virulence factor of B. anthracis. Among the emerging technologies for the production of these vaccine antigens is our launch vector-based plant transient expression system. Using this system, we have successfully engineered, expressed, purified and characterized full-length PA (pp-PA83) in Nicotiana benthamiana plants using agroinfiltration. This plant-produced antigen elicited high toxin neutralizing antibody titers in mice and rabbits after two vaccine administrations with Alhydrogel. In addition, immunization with this vaccine candidate protected 100% of rabbits from a lethal aerosolized B. anthracis challenge. The vaccine effects were dose-dependent and required the presence of Alhydrogel adjuvant. In addition, the vaccine antigen formulated with Alhydrogel was stable and retained immunogenicity after two-week storage at 4°C, the conditions intended for clinical use. These results support the testing of this vaccine candidate in human volunteers and the utility of our plant expression system for the production of a recombinant anthrax vaccine.
Storeng, Katerini T.; Ouattara, Fatoumata
2014-01-01
In Burkina Faso, abortion is legally restricted and socially stigmatised, but also frequent. Unsafe abortions represent a significant public health challenge, contributing to the country's very high maternal mortality ratio. Inspired by an internationally disseminated public health framing of unsafe abortion, the country's main policy response has been to provide post-abortion care (PAC) to avert deaths from abortion complications. Drawing on ethnographic research, this article describes how Burkina Faso's PAC policy emerged at the interface of political and moral negotiations between public health professionals, national bureaucrats and international agencies and NGOs. Burkinabè decision-makers and doctors, who are often hostile to induced abortion, have been convinced that PAC is ‘life-saving care’ which should be delivered for ethical medical reasons. Moreover, by supporting PAC they not only demonstrate compliance with international standards but also, importantly, do not have to contend with any change in abortion legislation, which they oppose. Rights-based international NGOs, in turn, tactically focus on PAC as a ‘first step’ towards their broader institutional objective to secure safe abortion and abortion rights. Such negotiations between national and international actors result in widespread support for PAC but stifled debate about further legalisation of abortion. PMID:25132157
Talley, Cheryl L; Wonnacott, Robert O; Schuette, Janice K; Jamieson, Jill; Heung, Michael
2013-01-01
Evidence to support improved outcomes with early ambulation is strong in medical literature. Yet, critically ill continuous renal replacement therapy (CRRT) patients remain tethered to their beds by devices delivering supportive therapy. The University of Michigan Adult CRRT Committee identified this deficiency and sought to change it. There was no guidance in the literature to support mobilizing this population; therefore, we reviewed literature from devices with similar technological profiles. Revision of our institutional mobility protocol for the CRRT population included a simple safety acronym, ASK. The acronym addresses appropriate candidacy; secured, appropriate access; and potential device and patient complications as a memorable aid to help nursing staff determine whether their CRRT patients are candidates for early mobility. After implementing our CRRT mobility standard, a preliminary study of 109 CRRT patients and a review of incident reports related to CRRT demonstrated no significant adverse patient events or falls and no access complications related to mobility. This deliberate intervention allows CRRT patients to safely engage in mobility activities to improve this population's outcomes. A simple mobility protocol and safety acronym partnered with strong clinical leadership has permitted the University of Michigan to add CRRT patients to the body of early mobility literature.
NASA Technical Reports Server (NTRS)
Hall, Philip; Cobleigh, Brent; Buoni, Greg; Howell, Kathleen
2008-01-01
The National Aeronautics and Space Administration, United States Forest Service, and National Interagency Fire Center have developed a partnership to develop and demonstrate technology to improve airborne wildfire imaging and data dissemination. In the summer of 2007, a multi-spectral infrared scanner was integrated into NASA's Ikhana Unmanned Aircraft System (UAS) (a General Atomics Predator-B) and launched on four long duration wildfire mapping demonstration missions covering eight western states. Extensive safety analysis, contingency planning, and mission coordination were key to securing an FAA certificate of authorization (COA) to operate in the national airspace. Infrared images were autonomously geo-rectified, transmitted to the ground station by satellite communications, and networked to fire incident commanders within 15 minutes of acquisition. Close coordination with air traffic control ensured a safe operation, and allowed real-time redirection around inclement weather and other minor changes to the flight plan. All objectives of the mission demonstrations were achieved. In late October, wind-driven wildfires erupted in five southern California counties. State and national emergency operations agencies requested Ikhana to help assess and manage the wildfires. Four additional missions were launched over a 5-day period, with near realtime images delivered to multiple emergency operations centers and fire incident commands managing 10 fires.
European Security in the Balkans: The Case of Macedonia
2013-03-01
for the Republic of Macedonia; it is the problem of the European Union as well, due to the historical fact that the European Great Powers had...integration of Bulgaria and Romania in the European Union was based on the short term political interests of the EU - to create a safe ring toward... Union in the Security of Europe: From Cold War to Terror War, 117. 28 Nicola Guy, The Birth of Albania, “Ethnic Nationalism, the Great Powers of World
Security Perspectives and Policies: Lebanon, Syria, Israel, and the Palestinians. Conference Papers
1991-05-01
long life standing up to Arab demands than the Likud. expectancy rate in power, similarly, there are few Labor’s stated goals in 1988 were security...positions, such successful vote in Israel’s history), it was patronage to-renard a g.’% rate supporters, safe widely suggested b) leaders in other...Arafat and-his senior influence within the PLO’s various councils political advisors have elaborated upon- the PLO’s incommensurate with their
USDA-ARS?s Scientific Manuscript database
The USDA-Agricultural Research Service Center for Medical, Agricultural, and Veterinary Entomology is constantly looking for ways to reduce its energy and water use while still delivering world-class research in a comfortable and safe facility. Over the years, the federal facility has achieved redu...
Designing High Fidelity Simulation to Maximize Student Registered Nursing Decision-Making Ability
ERIC Educational Resources Information Center
Deckers, Cathleen
2011-01-01
The current healthcare environment is a complex system of patients, procedures, and equipment that strives to deliver safe and effective medical care. High fidelity simulation provides healthcare educators with a tool to create safety conscious practitioners utilizing an environment that replicates practice without risk to patients. Using HFS…
Cost of Treatment Procedures in the National Preventive Dentistry Demonstration Program.
ERIC Educational Resources Information Center
Foch, Craig B.; And Others
The National Preventive Dentistry Demonstration Program (NPDDP) delivered five different regimens of school based preventive dental care to groups of children in 10 American cities between 1977 and 1981. All clinical techniques employed had previously been demonstrated to be both safe and effective in clinical trials. The purpose of the NPDDP was…
LGBT Youth from Brighton to Jerusalem
ERIC Educational Resources Information Center
Wood, Jess
2009-01-01
Allsorts Youth Project works with lesbian, gay, bisexual and trans (LGBT) young people in Brighton and Hove. It provides a safe drop-in space and one-to-one support. It also enables LGBT young people to learn new skills and participate in a wide range of volunteering opportunities including delivering homophobia awareness workshops to their peers.
USDA-ARS?s Scientific Manuscript database
Brucella suis strain 353-1 is a stable vaccine strain that is clinically safe, does not cause positive serologic responses on conventional brucellosis surveillance tests, and induces humoral and cellular immunity in swine after vaccination. In this study, we evaluated tissue clearance and immunologi...
Refurbishment of one-person regenerative air revitalization system
NASA Technical Reports Server (NTRS)
Powell, Ferolyn T.
1989-01-01
Regenerative processes for the revitalization of spacecraft atmospheres and reclamation of waste waters are essential for making long-term manned space missions a reality. Processes studied include: static feed water electrolysis for oxygen generation, Bosch carbon dioxide reduction, electrochemical carbon dioxide concentration, vapor compression distillation water recovery, and iodine monitoring. The objectives were to: provide engineering support to Marshall Space Flight Center personnel throughout all phases of the test program, e.g., planning through data analysis; fabricate, test, and deliver to Marshall Space Flight Center an electrochemical carbon dioxide module and test stand; fabricate and deliver an iodine monitor; evaluate the electrochemical carbon dioxide concentrator subsystem configuration and its ability to ensure safe utilization of hydrogen gas; evaluate techniques for recovering oxygen from a product oxygen and carbon dioxide stream; and evaluate the performance of an electrochemical carbon dioxide concentrator module to operate without hydrogen as a method of safe haven operation. Each of the tasks were related in that all focused on providing a better understanding of the function, operation, and performance of developmental pieces of environmental control and life support system hardware.
A security framework for nationwide health information exchange based on telehealth strategy.
Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen
2015-05-01
This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.
Feeling safe during an inpatient hospitalization: a concept analysis.
Mollon, Deene
2014-08-01
This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.
Can Your Older Patients Drive Safely?
DOT National Transportation Integrated Search
2017-09-01
In many areas of the world, driving is an essential part of life and for reasons of comfort, convenience, and security remains the primary mode of transportation among older adults. Both normal aging and diseases that are more prevalent in advanced a...
Semiannual Report: Oct 1, 2004 - Mar 31, 2005
Semiannual Report #EPA-350-R-05-002, April, 2005. During this semiannual reporting period, two of our more important activities focused on the efforts of the EPA to make air safe and healthy to breathe, and to help improve homeland security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Company and Vessel Safety Management Systems § 96.200 Purpose. This subpart establishes the minimum standards that the safety...
33 CFR 96.495 - How can I appeal a decision made by an authorized organization?
Code of Federal Regulations, 2010 CFR
2010-07-01
..., DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized Organizations To Act on Behalf of the U.S. § 96.495...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-26
... that are safe, humane, cost-efficient, and appropriately secure, and that provide work and other self-improvement opportunities to assist offenders in becoming law-abiding citizens. The Bureau accomplishes its...
Evaluation of a patient centered e-nursing and caring system.
Tsai, Lai-Yin; Shan, Huang; Mei-Bei, Lin
2006-01-01
This study aims to develop an electronic nursing and caring system to manage patients' information and provide patients with safe and efficient services. By transmitting data among wireless cards, optical network, and mainframe computer, nursing care will be delivered more systematically and patients' safety centered caring will be delivered more efficiently and effectively. With this system, manual record keeping time was cut down, and relevant nursing and caring information was linked up. With the development of an electronic nursing system, nurses were able to make the best use of the Internet resources, integrate information management systematically and improve quality of nursing and caring service.
Liu, Xiaoxuan; Liu, Cheng; Catapano, Carlo V; Peng, Ling; Zhou, Jiehua; Rocchi, Palma
2014-01-01
RNAi-based nucleic acid molecules have attracted considerable attention as compelling therapeutics providing safe and competent delivery systems are available. Dendrimers are emerging as appealing nanocarriers for nucleic acid delivery thanks to their unique well-defined architecture and the resulting cooperativity and multivalency confined within a nanostructure. The present review offers a brief overview of the structurally flexible triethanolamine-core poly(amidoamine) (PAMAM) dendrimers developed in our group as nanovectors for the delivery of RNAi therapeutics. Their excellent activity for delivering different RNAi therapeutics in various disease models in vitro and in vivo will be highlighted here. © 2013.
Integrated Work Management: Overview, Course 31881
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpson, Lewis Edward
Integrated work management (IWM) is the process used for formally implementing the five-step process associated with integrated safety management (ISM) and integrated safeguards and security management (ISSM) at Los Alamos National Laboratory (LANL). IWM also directly supports the LANL Environmental Management System (EMS). IWM helps all workers and managers perform work safely and securely and in a manner that protects people, the environment, property, and the security of the nation. The IWM process applies to all work activities at LANL, from working in the office to designing experiments to assembling and detonating explosives. The primary LANL document that establishes andmore » describes IWM requirements is Procedure (P) 300, Integrated Work Management.« less
What contribution can international relations make to the evolving global health agenda?
Davies, Sara E
2010-01-01
This article presents two approaches that have dominated International Relations in their approach to the international politics of health. The statist approach, which is primarily security-focused, seeks to link health initiatives to a foreign or defence policy remit. The globalist approach, in contrast, seeks to advance health not because of its intrinsic security value but because it advances the well-being and rights of individuals. This article charts the evolution of these approaches and demonstrates why both have the potential to shape our understanding of the evolving global health agenda. It examines how the statist and globalist perspectives have helped shape contemporary initiatives in global health governance and suggests that there is evidence of an emerging convergence between the two perspectives. This convergence is particularly clear in the articulation of a number of UN initiatives in this area - especially the One World, One Health Strategic Framework and the Oslo Ministerial Declaration (2007) which inspired the first UN General Assembly resolution on global health and foreign policy in 2009 and the UN Secretary-General's note "Global health and foreign policy: strategic opportunities and challenges". What remains to be seen is whether this convergence will deliver on securing states' interest long enough to promote the interests of the individuals who require global efforts to deliver local health improvements.
CREM monitoring: a wireless RF application
NASA Astrophysics Data System (ADS)
Valencia, J. D.; Burghard, B. J.; Skorpik, J. R.; Silvers, K. L.; Schwartz, M. J.
2005-05-01
Recent security lapses within the Department of Energy laboratories prompted the establishment and implementation of additional procedures and training for operations involving classified removable electronic media (CREM) storage. In addition, the definition of CREM has been expanded and the number of CREM has increased significantly. Procedures now require that all CREM be inventoried and accounted for on a weekly basis. Weekly inventories consist of a physical comparison of each item against the reportable inventory listing. Securing and accounting for CREM is a continuous challenge for existing security systems. To address this challenge, an innovative framework, encompassing a suite of technologies, has been developed by Pacific Northwest National Laboratory (PNNL) to monitor, track, and locate CREM in safes, vaults, and storage areas. This Automated Removable Media Observation and Reporting (ARMOR)framework, described in this paper, is an extension of an existing PNNL program, SecureSafe. The key attributes of systems built around the ARMOR framework include improved accountability, reduced risk of human error, improved accuracy and timeliness of inventory data, and reduced costs. ARMOR solutions require each CREM to be tagged with a unique electronically readable ID code. Inventory data is collected from tagged CREM at regular intervals and upon detection of an access event. Automated inventory collection and report generation eliminates the need for hand-written inventory sheets and allows electronic transfer of the collected inventory data to a modern electronic reporting system. An electronic log of CREM access events is maintained, providing enhanced accountability for daily/weekly checks, routine audits, and follow-up investigations.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-05
... Program; Homeland Security Research Program; Human Health Risk Assessment Research Program; Safe and... --atmospheric physics Biology --biogeochemistry --cell biology --endocrinology (endocrine disruptors... analysis --uncertainty analysis Nanotechnology Public Health --children's health --community health...
DOT National Transportation Integrated Search
2009-08-01
Every day almost a million shipments of hazardous materials move safely and securely along our nations transportation system, via any combination of modes. Only a small fraction of total shipments interrupt their planned journey due to an incident...
QUALITY ASSURANCE AND QUALITY CONTROL FOR WASTE CONTAINMENT FACILITIES. Project Summary
It is generally agreed that both quality assurance (QA) and quality control (QC) are essential to the proper installation and eventual performance of environmentally safe and secure waste containment systems. Even further, there are both manufacturing and construction aspects to...
Code of Federal Regulations, 2011 CFR
2011-10-01
... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...
Code of Federal Regulations, 2012 CFR
2012-10-01
... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...
Code of Federal Regulations, 2014 CFR
2014-10-01
... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...
Code of Federal Regulations, 2010 CFR
2010-10-01
... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...
Code of Federal Regulations, 2013 CFR
2013-10-01
... AND ACCESSORIES NECESSARY FOR SAFE OPERATION Protection Against Shifting and Falling Cargo § 393.100..., spilling, blowing or falling from the motor vehicle. (c) Prevention against shifting of load. Cargo must be...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Purpose. 96.400 Section 96.400 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS Authorization of Recognized...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Public Contracts and Property Management Federal Property Management Regulations System (Continued... of the disposition method used: (a) You must maintain property in a safe, secure, and cost-effective...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Scope. 25.301-1 Section 25.301-1 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SOCIOECONOMIC PROGRAMS... include stability operations such as— (1) Establishment or maintenance of a safe and secure environment...
Safety | Argonne National Laboratory
laboratory's ongoing effort to provide a safe and productive environment for employees, users, other site Skip to main content Argonne National Laboratory Toggle Navigation Toggle Search Energy Environment Careers Education Community Diversity Directory Energy Environment National Security User Facilities
ERIC Educational Resources Information Center
Trump, Kenneth S.; Lavarello, Curtis
2003-01-01
Discusses implications of national survey of school-based police that finds majority of respondents believe schools are vulnerable to a terrorist attack. Describes school board's role in improving school safety, steps school officials can take to reduce risk, and some practical, cost-effective measures to increase security. (PKP)
78 FR 14629 - 10th Anniversary of the United States Department of Homeland Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-06
... (DHS) opened its doors with a single task: keeping the American people safe. Day by day, hour by hour... decade of service, our Nation recognizes the men and women who have carried out the Department of...
Advancing STEM Career and Learning through Civic Engagement
ERIC Educational Resources Information Center
Xie, Yichun
2014-01-01
The Mayor's Youth Technology Corps (MYTC)--Creating Safe Communities through Information Technology Training in Homeland Security Applications (2008-2012)--offered a collaboration of resources, supports, and opportunities for strengthening science, technology, engineering, and mathematics (STEM) education efforts in an underserved community, the…
Korfali, Samira Ibrahim; Jurdi, Mey
2009-04-01
Securing adequate safe drinking water and proper sanitation is a major challenge facing the developing world. The "Water for Life Decade" emphasizes the importance of upgrading national water quality and sanitation services. This study assessed the domestic water profile in the city of Beirut. Samples were collected from three types of household water sources (municipality, private wells, and vended water bottles) and assessed for their physiochemical and microbiological profile. At the same time, a cross-sectional survey assessing water consumption patterns and the prevalence of water-borne diseases was conducted. The results showed a deficient water quality profile in all three water sources. The measured physiochemical and bacteriological parameters reflected the high frequency of water-borne diseases. Action to secure a safe domestic water supply is essential. The plan should guarantee the protection of water sources, ensure sufficient treatment of domestic water and upgrade the national program for potable water quality control. Periodic quality monitoring and legislating the chaotic water-vending sector are indispensable. Additionally, the deterioration of private well sources by sea and wastewater infiltration necessitates the enforcement of legislation associated with the use and management of private wells. Consumer awareness and active contributions to promote and protect public health are important.
Re-designing the PhEDEx Security Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, C.-H.; Wildish, T.; Zhang, X.
2014-01-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less
Re-designing the PhEDEx Security Model
NASA Astrophysics Data System (ADS)
C-H, Huang; Wildish, T.; X, Zhang
2014-06-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.
Betancourt, Theresa S.; Zuilkowski, Stephanie S.; Ravichandran, Arathi; Einhorn, Honora; Arora, Nikita; Bhattacharya Chakravarty, Aruna; Brennan, Robert T.
2015-01-01
Background The child protection community is increasingly focused on developing tools to assess threats to child protection and the basic security needs and rights of children and families living in adverse circumstances. Although tremendous advances have been made to improve measurement of individual child health status or household functioning for use in low-resource settings, little attention has been paid to a more diverse array of settings in which many children in adversity spend time and how context contributes to threats to child protection. The SAFE model posits that insecurity in any of the following fundamental domains threatens security in the others: Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security. Site-level tools are needed in order to monitor the conditions that can dramatically undermine or support healthy child growth, development and emotional and behavioral health. From refugee camps and orphanages to schools and housing complexes, site-level threats exist that are not well captured by commonly used measures of child health and well-being or assessments of single households (e.g., SDQ, HOME). Methods The present study presents a methodology and the development of a scale for assessing site-level child protection threats in various settings of adversity. A modified Delphi panel process was enhanced with two stages of expert review in core content areas as well as review by experts in instrument development, and field pilot testing. Results Field testing in two diverse sites in India—a construction site and a railway station—revealed that the resulting SAFE instrument was sensitive to the differences between the sites from the standpoint of core child protection issues. PMID:26540159
Betancourt, Theresa S; Zuilkowski, Stephanie S; Ravichandran, Arathi; Einhorn, Honora; Arora, Nikita; Bhattacharya Chakravarty, Aruna; Brennan, Robert T
2015-01-01
The child protection community is increasingly focused on developing tools to assess threats to child protection and the basic security needs and rights of children and families living in adverse circumstances. Although tremendous advances have been made to improve measurement of individual child health status or household functioning for use in low-resource settings, little attention has been paid to a more diverse array of settings in which many children in adversity spend time and how context contributes to threats to child protection. The SAFE model posits that insecurity in any of the following fundamental domains threatens security in the others: Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security. Site-level tools are needed in order to monitor the conditions that can dramatically undermine or support healthy child growth, development and emotional and behavioral health. From refugee camps and orphanages to schools and housing complexes, site-level threats exist that are not well captured by commonly used measures of child health and well-being or assessments of single households (e.g., SDQ, HOME). The present study presents a methodology and the development of a scale for assessing site-level child protection threats in various settings of adversity. A modified Delphi panel process was enhanced with two stages of expert review in core content areas as well as review by experts in instrument development, and field pilot testing. Field testing in two diverse sites in India-a construction site and a railway station-revealed that the resulting SAFE instrument was sensitive to the differences between the sites from the standpoint of core child protection issues.
Security culture for nuclear facilities
NASA Astrophysics Data System (ADS)
Gupta, Deeksha; Bajramovic, Edita
2017-01-01
Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.
Vines, Tim; Faunce, Thomas
2012-09-01
Public immunisation programs have, time and again, demonstrated their effectiveness at reducing mortality and morbidity from vaccine-preventable diseases such as measles and pertussis. Governments, health agencies and almost all health practitioners regard vaccines as safe and cost-effective treatments with a low risk profile. Nevertheless, despite, or perhaps because of, their success, immunisation programs and vaccines have increasingly been questioned by various lobby groups, sceptical of the safety of vaccines and the motives of those who administer them. Whereas the reach of these groups would have once been limited by the cost of postage, the internet has delivered a global audience. The extent to which these anti-vaccination advocates are expected to comply with the ethical and professional standards applied to registered health professionals remains unresolved in Australia. As demonstrated in the case of Australian Vaccination Network Inc v Health Care Complaints Commission [2012] NSWSC 110, the ability of professional oversight bodies to regulate the information promoted by these lobby groups is limited by traditional conceptions of the doctor-patient relationship and the clinical setting in which medical advice is delivered. Acknowledging that vaccines, like all medical treatments, involve some level of risk, this article explores the relationship between the state, parents, family, medical professionals and such lobbyists within a human rights framework, suggesting that most public immunisation programs deliver benefits in "the best interest of the child" that, on balance, provide a good result for the civil liberties of Australians.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kim, Eun-Sung; Yang, Seung-Woo; Hong, Dong-Ki
Non-viral gene delivery is a safe and suitable alternative to viral vector-mediated delivery to overcome the immunogenicity and tumorigenesis associated with viral vectors. Using the novel, human-origin Hph-1 protein transduction domain that can facilitate the transduction of protein into cells, we developed a new strategy to deliver naked DNA in vitro and in vivo. The new DNA delivery system contains Hph-1-GAL4 DNA-binding domain (DBD) fusion protein and enhanced green fluorescent protein (EGFP) reporter plasmid that includes the five repeats of GAL4 upstream activating sequence (UAS). Hph-1-GAL4-DBD protein formed complex with plasmid DNA through the specific interaction between GAL4-DBD and UAS,more » and delivered into the cells via the Hph-1-PTD. The pEGFP DNA was successfully delivered by the Hph-1-GAL4 system, and the EGFP was effectively expressed in mammalian cells such as HeLa and Jurkat, as well as in Bright Yellow-2 (BY-2) plant cells. When 10 {mu}g of pEGFP DNA was intranasally administered to mice using Hph-1-GAL4 protein, a high level of EGFP expression was detected throughout the lung tissue for 7 days. These results suggest that an Hph-1-PTD-mediated DNA delivery strategy may be an useful non-viral DNA delivery system for gene therapy and DNA vaccines.« less
Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.
He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna
2017-09-06
With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.
ERIC Educational Resources Information Center
Swistock, Bryan R.; Sharpe, William E.; Dickison, John
2001-01-01
A safe drinking water program was delivered by satellite as well as the live speaker program. Responses from 230 traditional and 161 satellite participants showed the satellite program met objectives, was cheaper, and required less specialist time although it attracted a smaller audience and allowed limited interaction. The cost per attendee for…
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Dorairaj, Sudha Devi; Kaliannan, Thilagavathy
2015-01-01
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions. PMID:26258165
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment.
Dorairaj, Sudha Devi; Kaliannan, Thilagavathy
2015-01-01
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... Regarding Securities Delivered to or From Participant Accounts Through the Automated Customer Account... Corporation (``NSCC'') concerning Automated Customer Account Transfer Service (``ACATS'') transfers processed... (July 2, 2010). NSCC's ACATS system enables members to effect automated transfers of customer accounts...
From Rio via the Hague to Johannesburg: the role of multi-stakeholder dialogues.
Dodds, F
2003-01-01
The Stakeholder Forum will contribute a number of partnership initiatives in the areas of food security, freshwater, energy and health. These will demonstrate that stakeholders, working in partnership, can play their roles and meet their responsibilities in delivering sustainable development agreements.
2013-04-10
Patricia Falcone, Associate Director, National Security and International Affairs Division, White House Office of Science and Technology Policy, delivers remarks during a Fiscal Year 2014 budget briefing held at the American Association for the Advancement of Science (AAAS) on Wednesday, April 10, 2013 in Washington. Photo Credit: (NASA/Bill Ingalls)
32 CFR 2800.4 - General information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... shall be maintained by the Staff Security Office. Whenever a combination is changed, the new combination... taken to insure that classified material is not left unsecured or unattended in an office. (3) Working... will never be delivered to an uncleared person, left in an unoccupied office, or sent through...
10 CFR 34.101 - Notifications.
Code of Federal Regulations, 2010 CFR
2010-01-01
... written report to the NRC's Office of Federal and State Materials and Environmental Management Programs... shielded position and secure it in this position; or (3) Failure of any component (critical to safe... overexposure submitted under 10 CFR 20.2203 which involves failure of safety components of radiography...
19 CFR 113.63 - Basic custodial bond conditions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 113.63 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT... transferred under those procedures, thereby assuming primary responsibility for the continued proper custody... use only authorized means of conveyance; (2) To keep safe any merchandise placed in its custody...
33 CFR 155.710 - Qualifications of person in charge.
Code of Federal Regulations, 2012 CFR
2012-07-01
... SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS... control and monitoring systems, the procedures for reporting pollution incidents, and, if installed, the Crude-Oil Washing (COW), inert-gas, and vapor-control systems—to safely conduct a transfer of fuel oil...
33 CFR 155.710 - Qualifications of person in charge.
Code of Federal Regulations, 2011 CFR
2011-07-01
... SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS... control and monitoring systems, the procedures for reporting pollution incidents, and, if installed, the Crude-Oil Washing (COW), inert-gas, and vapor-control systems—to safely conduct a transfer of fuel oil...
75 FR 14609 - Commercial Fishing Industry Vessel Safety Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-26
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2010-0163] Commercial Fishing... applications. SUMMARY: The Coast Guard seeks applications for membership on the Commercial Fishing Industry... Coast Guard on matters relating to the safe operation of commercial fishing industry vessels. DATES...
76 FR 30491 - National Hurricane Preparedness Week, 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... Hurricane Preparedness Week, 2011 Proclamation 8680--National Safe Boating Week, 2011 Proclamation 8681... Hurricane Preparedness Week, 2011 By the President of the United States of America A Proclamation National Hurricane Preparedness Week highlights the importance of planning ahead to protect our families and secure...
46 CFR 16.101 - Purpose of regulations.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...
46 CFR 16.101 - Purpose of regulations.
Code of Federal Regulations, 2013 CFR
2013-10-01
... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...
46 CFR 16.101 - Purpose of regulations.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...
46 CFR 16.101 - Purpose of regulations.
Code of Federal Regulations, 2014 CFR
2014-10-01
... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...
46 CFR 16.101 - Purpose of regulations.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the use of dangerous drugs. (c) As part of a reasonable cause drug testing program established... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN CHEMICAL TESTING... use of intoxicants by merchant marine personnel and to promote a drug free and safe work environment...
Dealing With Russian Tactical Nuclear Weapons
2004-01-01
the plants, facilities, and equipment necessary to safely secure and store weapons pits (the plutonium “triggers” at the center of a thermonuclear ... bomb , and hence the most critical piece) proffered by either party. Furthermore, the statute requires the IAEA to establish control over the pits until
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Scope. 225.7402-1 Section 225.7402-1 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... subsection may include stability operations such as— (1) Establishment or maintenance of a safe and secure...
Code of Federal Regulations, 2010 CFR
2010-07-01
..., working means the external load, in pounds, applied to the derrick, including the weight of load attaching... securely affixed where it is visible to personnel responsible for the safe operation of the equipment. The... of service, and environment, or as specifically indicated below. These inspections shall include the...
33 CFR 104.215 - Vessel Security Officer (VSO).
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Understanding of the importance of creating and maintaining safe working and living conditions for passengers... responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... space numbering; and (B) Understanding of various vessel types; and working knowledge of nautical terms...
Realization and Addressing Analysis In Blockchain Bitcoin
NASA Astrophysics Data System (ADS)
Sakti Arief Daulay, Raja; Michrandi Nasution, Surya; Paryasto, Marisa W.
2017-11-01
The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working mechanism of blockchain in making address bitcoin which is already in the blockchain system.
31 CFR 500.517 - Access to safe deposit boxes under certain conditions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... hereby required to be filed. All reports made pursuant to this section shall bear on their face or have securely attached to them a statement reading, “this report is filed pursuant to 31 CFR 500.517”. [15 FR...
The Future of the U.S. Nuclear Weapons Program
NASA Astrophysics Data System (ADS)
Brooks, Linton F.
2007-03-01
This paper will examine our plans for the future of the U.S. nuclear weapons program including efforts to ``transform'' the stockpile and supporting infrastructure. We proceed from the premise that the United States will need a safe, secure, and reliable nuclear deterrent for the foreseeable future. Moreover, the Stockpile Stewardship Program is working. Today's stockpile---comprised of legacy warheads left over from the Cold War---is safe and reliable. That said, we see increased risk, absent nuclear testing, in assuring the long-term safety and reliability of our current stockpile. Nor is today's nuclear weapons complex sufficiently ``responsive'' to fixing technical problems in the stockpile, or to potential adverse geopolitical change. Our task is to work to ensure that the U.S. nuclear weapons enterprise, including the stockpile and supporting infrastructure, meets long-term national security needs. Our approach is to develop and field replacement warheads for the legacy stockpile---so-called Reliable Replacement Warheads (RRW)---as a means to transform both the nuclear stockpile and supporting infrastructure.
Peer support: helping to influence cultural change.
Whitmore, Mary
2015-02-01
Breastfeeding peer support schemes in Blackpool and Lancashire work closely with midwifery and other partners to offer additional support and encouragement to breastfeeding mothers. Employed and volunteer peer supporters deliver a systematic service in target areas delivering workshops to pregnant mothers, supporting new mothers in hospital, including in the neonatal units, in mothers' homes and in groups at children's centres. Working with health, children's centres, public health and councils, the peer supporters were instrumental in Fleetwood town agreeing to always welcome breastfeeding. They worked with teachers, public health and infant feeding coordinators to deliver a month-long breastfeeding campaign at a local college and, working with health visitors, have engaged with grandmothers to find out how they feel they can help support new mothers. Skilled supervision is essential to ensuring peer supporters work safely and continue to develop their skills and knowledge. Volunteer coordinators play a key role in valuing and organising volunteers.
Trust and Reputation Management for Critical Infrastructure Protection
NASA Astrophysics Data System (ADS)
Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo
Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.
Moghaddam, Ramin; Badredine, Hala
2006-01-01
Iranian Social Security Organization(ISSO) is going to enable the sharing of health related information in a secure environment by means of reliable data in the right time to improve health of insured people throughout the country. There are around 7000 pharmacy throughout the country that ISSO contracted with them in order to deliver seamless services to 30 million insured people. The management of the huge amount of prescriptions based on a scientific basis with considering the financial issues of rising the cost of medicaments certainley needs a sophisticated business process reeingineering using ICT ; the work that is going to be completed in the ISSO in next few months. PMID:17238655
Surveillance of ground vehicles for airport security
NASA Astrophysics Data System (ADS)
Blasch, Erik; Wang, Zhonghai; Shen, Dan; Ling, Haibin; Chen, Genshe
2014-06-01
Future surveillance systems will work in complex and cluttered environments which require systems engineering solutions for such applications such as airport ground surface management. In this paper, we highlight the use of a L1 video tracker for monitoring activities at an airport. We present methods of information fusion, entity detection, and activity analysis using airport videos for runway detection and airport terminal events. For coordinated airport security, automated ground surveillance enhances efficient and safe maneuvers for aircraft, unmanned air vehicles (UAVs) and unmanned ground vehicles (UGVs) operating within airport environments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conover, David R.
The purpose of this document is to identify laws, rules, model codes, codes, standards, regulations, specifications (CSR) related to safety that could apply to stationary energy storage systems (ESS) and experiences to date securing approval of ESS in relation to CSR. This information is intended to assist in securing approval of ESS under current CSR and to identification of new CRS or revisions to existing CRS and necessary supporting research and documentation that can foster the deployment of safe ESS.
Home noninvasive ventilation: what does the anesthesiologist need to know?
Brown, Karen A; Bertolizio, Gianluca; Leone, Marisa; Dain, Steven L
2012-09-01
Treatment of chronic respiratory failure with noninvasive ventilation (NIV) is standard pediatric practice, and NIV systems are commonly used in the home setting. Although practice guidelines on the perioperative management of children supported with home NIV systems have yet to be published, increasingly these patients are referred for consultation regarding perioperative management. Just as knowledge of pharmacology underlies the safe prescription of medication, so too knowledge of biomedical design is necessary for the safe prescription of NIV therapy. The medical device design requirements developed by the Organization for International Standardization provide a framework to rationalize the safe prescription of NIV for hospitalized patients supported at home with NIV systems. This review article provides an overview of the indications for home NIV therapy, an overview of the medical devices currently available to deliver it, and a specific discussion of the management conundrums confronting anesthesiologists.
Development of an Internet Security Policy for health care establishments.
Ilioudis, C; Pangalos, G
2000-01-01
The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in early age. Diagnosis relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology, and ophthalmology. To support clinicians, researchers, and public health decision makers, we developed an information system dedicated to ASD, called TEDIS. It was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured internet connections. TEDIS will be deployed in nine ASD expert assessment centers in Ile-DeFrance district. We present security policy and infrastructure developed in context of TEDIS to protect patient privacy and clinical information. TEDIS security policy was organized around governance, ethical and organisational chart-agreement, patients consents, controlled user access, patients' privacy protection, constrained patients' data access. Security infrastructure was enriched by further technical solutions to reinforce ASD patients' privacy protection. Solutions were tested on local secured intranet environment and showed fluid functionality with consistent, transparent and safe encrypting-decrypting results.